Wyniki wyszukiwania dla: cybersecurity - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: cybersecurity

Wyniki wyszukiwania dla: cybersecurity

  • Safety integrity level verification for safety-related functions with security aspects

    The article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A new multi-process collaborative architecture for time series classification

    Publikacja

    - KNOWLEDGE-BASED SYSTEMS - Rok 2021

    Time series classification (TSC) is the problem of categorizing time series data by using machine learning techniques. Its applications vary from cybersecurity and health care to remote sensing and human activity recognition. In this paper, we propose a novel multi-process collaborative architecture for TSC. The propositioned method amalgamates multi-head convolutional neural networks and capsule mechanism. In addition to the discovery...

    Pełny tekst do pobrania w portalu

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publikacja
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Rok 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Pełny tekst do pobrania w portalu

  • Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

    Publikacja
    • A. G. Akintola
    • A. O. Balogun
    • L. F. Capretz
    • H. A. Mojeed
    • S. Basri
    • S. A. Salihu
    • F. E. Usman-Hamza
    • P. O. Sadiku
    • G. B. Balogun
    • Z. O. Alanamu

    - Applied Sciences-Basel - Rok 2022

    As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...

    Pełny tekst do pobrania w portalu

  • Silent Signals The Covert Network Shaping the Future

    Publikacja

    - Rok 2007

    Silent Signals The Covert Network Shaping the Future In a world dominated by information flow and rapid technological advancements, the existence of hidden networks and unseen influences has never been more relevant. "Silent Signals: The Covert Network Shaping the Future" delves deep into the mysterious and often opaque world of covert communication networks. This influential work sheds light on the silent...

    Pełny tekst do pobrania w portalu

  • KONFIGURACJA FIREWALLI CISCO ASA W PROGRAMIE PACKET TRACER

    Publikacja

    - Rok 2020

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Pełny tekst do pobrania w portalu

  • Klaudia Skelnik dr

    Osoby

    dr Klaudia Skelnik Prodziekan Wydziału Prawa i Administracji Wyższa Szkoła Bankowa w Gdańsku, doktor nauk społecznych w dyscyplinie nauki o bezpieczeństwie, absolwent studiów MBA zarządzanie bezpieczeństwem, mgr politologii w specjalizacji ustrojowo-samorządowej, posiadająca podyplomowe wykształcenie wyższe w zakresie prawa Unii Europejskiej, Edukacji dla bezpieczeństwa, Bezpieczeństwa i Higiena Pracy oraz szereg kursów i szkoleń...

  • Dominik Dariusz Ciesiołkiewicz mgr inż.

  • Damian Strojek

    Osoby

  • DEWI Niezawodna Wbudowana Infrastruktura Bezprzewodowa

    Projekty

    Kierownik projektu: dr hab. inż. Łukasz Kulas   Program finansujący: ARTEMIS

    Projekt realizowany w Katedra Inżynierii Mikrofalowej i Antenowej zgodnie z porozumieniem 621353 z dnia 2014-10-22