Wyniki wyszukiwania dla: COMPUTER SECURITY LABORATORY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: COMPUTER SECURITY LABORATORY

Wyniki wyszukiwania dla: COMPUTER SECURITY LABORATORY

  • Study on Strategy in University Laboratory Class Teaching

    Publikacja

    - Rok 2021

    Laboratory teaching is a critical way to ensure the effective input of techniques in engineering learning. Laboratory teaching not only contributes to improving course quality but also helps enrich comprehensive engineering application ability. However, there are some typical problems in current university laboratory teaching, such as rigid and isolated course design, outdated contents and materials, and not encouraging innovation...

    Pełny tekst do pobrania w portalu

  • Adapting Agile Practices to Security Context – Practitioners’ Perspective

    Publikacja

    In this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?

    This study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...

    Pełny tekst do pobrania w portalu

  • Gesture-based computer control system

    In the paper a system for controlling computer applications by hand gestures is presented. First, selected methods used for gesture recognition are described. The system hardware and a way of controlling a computer by gestures are described. The architecture of the software along with hand gesture recognition methods and algorithms used are presented. Examples of basic and complex gestures recognized by the system are given.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • System of monitoring of the Forest Opera in Sopot structure and roofing

    The authors present a solution realized in Forest Opera (name in Polish: Opera Leśna) in Sopot (Poland) in connection with the modernization and construction of a new roof. The complicated structure of the roof of the facility and the used covering in form of membrane made of technical fabric required (for security reasons) to install the unit of devices allowing for the continuous geodetic monitoring of the facility. Monitoring...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Justyna Szostak dr inż.

    I Gdańsk University of Technology: Chair of the Rector’s Internationalization Committee (October 2020 - Present) Erasmus + Coordinator for students and staff members, Faculty of Applied Physics and Mathematics (Mar 2017 - Present) Dean's Proxy for Internationalization, Faculty of Applied Physics and Mathematics (October 2020 - Present) Coordinator of the International Relations Office of the Faculty of Applied Physics and...

  • Managing the security vulnerabilities of critical systems and hazardous plants

    Publikacja

    - Rok 2007

    Rozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....

  • Security-oriented agile approach with AgileSafe and OWASP ASVS

    Publikacja

    In this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publikacja

    - Rok 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Design and implementation of GEPON architecture in laboratory testbed

    Publikacja

    This paper presents a proposition of GEPON architecture for the didactic purpose. The GEPON architecture is implemented in access networks laboratory testbed. The paper includes a brief description of GEPON standardization, a description of laboratory GEPON equipment architecture and a short presentation of proposed laboratory exercises. The exemplary performance results are included.The proposition of GEPON architecture testbed...

  • Wybrane problemy ochrony żeglugi (Maritime Security)

    Publikacja

    - Rok 2005

    przedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...

  • Algorithms for testing security in graphs

    In this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...

    Pełny tekst do pobrania w portalu

  • Functional safety and security assessment of the control and protection systems

    Publikacja

    - Rok 2006

    W artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.

  • A LABORATORY STAND FOR THE ANALYSIS OF DYNAMIC PROPERTIES OF THERMOCOUPLES

    In the present elaboration, problems connected with measurements of high variable temperatures of gases are introduced and the impact of dynamic properties of different construction solutions of thermoelements on the accuracy of the measurements is considered. A laboratory stand built within research under doctoral thesis, destined for analysis of dynamic properties of thermocouples is also described. Results of numerical simulation...

    Pełny tekst do pobrania w portalu

  • ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS

    The article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...

    Pełny tekst do pobrania w portalu

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Computer Networks-laboratories - 2023

    Kursy Online
    • M. Hoeft
    • T. Gierszewski
    • I. Szczypior
    • J. Grochowski
    • J. Rak
    • W. Gumiński
    • K. Jurczenia
    • K. Gierłowski
    • K. Nowicki

    Acquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.

  • Computer Networks laboratories 2024

    Kursy Online
    • M. Hoeft
    • T. Gierszewski
    • I. Szczypior
    • J. Grochowski
    • J. Rak
    • W. Gumiński
    • K. Jurczenia
    • K. Gierłowski
    • K. Nowicki

    Acquiring the skills to design, build and configure computer networks. Demonstration of skills to identify and analyze selected protocols and mechanisms of LAN and WAN networks.

  • Security Assessment of a Turbo-Gas Power Plant

    Publikacja

    - Rok 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Electric Machines Virtual Laboratory

    Kursy Online
    • F. Kutt
    • M. Michna
    • G. A. Kostro
    • R. Ryndzionek
    • Ł. Sienkiewicz

    This is an educational aid for students. It shows the environment of industrial application of electric machines and allows for a look inside them. Users can see the main components of the power system in its natural environment. This course is to allow access to the VR app – Electric Machines Virtual Laboratory.

  • A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2019

    In this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quantum security and theory of decoherence

    Publikacja

    We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...

    Pełny tekst do pobrania w portalu

  • Jacek Rak dr hab. inż.

    Jacek Rak uzyskał stopień doktora habilitowanego nauk technicznych w dyscyplinie telekomunikacji (specjalność: teleinformatyka) w 2016 r., a stopień doktora nauk technicznych w dyscyplinie informatyka w 2009 r. Obecnie jest pracownikiem naukowo-dydaktycznym Katedry Teleinformatyki Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej. Jego działalność naukowa koncentruje się w obszarze doboru tras, projektowania...

  • Spectroscopy Methods in Nanotechnology - laboratory 2022

    Kursy Online
    • W. P. Korzeniewski
    • A. Witkowska

    Course for 2nd degree Students of Nanotechnology, specialization Nanostructures and computer simulations in materials science, sem. 2.

  • Spectroscopy Methods in Nanotechnology - laboratory 2023

    Kursy Online
    • L. Wicikowski
    • A. Witkowska

    Course for 2nd degree Students of Nanotechnology, specialization Nanostructures and computer simulations in materials science, sem. 2.

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2018

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

    Pełny tekst do pobrania w portalu

  • CIP Security Awareness and Training: Standards and Practice

    Publikacja

    - Rok 2016

    These are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...

  • Automatic sound recognition for security purposes

    Publikacja

    - Rok 2008

    In the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...

  • Marek Czachor prof. dr hab.

  • Comparison of road and laboratory measurements of tyre/road noise

    Tyre/road noise is one of the major environmental problems related to road traffic. There are several measuring methods of tyre/road noise that may be carried out on the road (for example Coast-down and Close Proximity Method) or in the laboratory (Drum Method). Road measurements are preferred for evaluations of pavement properties while laboratory methods are mostly used to evaluate tyres. One of the biggest problems associated...

  • Wojciech Chrzanowski dr hab. inż.

    Osoby

    Wojciech Chrzanowski, urodzony w 1952 r. w Toruniu, ukończył w 1975 r. studia magisterskie na kierunku Technologia Chemiczna, w specjalności Technologia Nieorganiczna (specjalizacja: ochrona przed korozją), na Wydziale Chemicznym PG, uzyskując dyplom z wyróżnieniem. W tym samym roku został zatrudniony w Zakładzie Technik Analitycznych ówczesnego Instytutu Inżynierii Chemicznej i Technik Pomiarowych, początkowo na stanowisku technicznym,...

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publikacja

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • On Software Unit Testing For Improving Security And Performance Of Distributed Applications

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • A sense of security and freedom in a residential environment

    The article is based on the results of a survey carried out among students of architecture faculties in several countries, which examined the students’ knowledge of shaping the housing environment in such a way as to enable them to fulfil two basic and, at the same time, seemingly mutually exclusive psychological needs of a person: a sense of security and a sense of freedom. In examining these issues, particular emphasis was placed...

    Pełny tekst do pobrania w portalu

  • DWDM Network Laboratory Solution for Telecommunication Education Engineering

    Publikacja

    Development of network architectures in the field of optical telecommunications technologies is an indicator of changes in telecommunication education engineering. Conducting didactic classes requires hardware infrastructure and research in terms of teaching needs. In the paper we present DWDM network laboratory solution for telecommunication education engineering on the basis of the ADVA Optical Networking equipment. We have to...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Mohsan Ali Master of Science in Computer Science

    Osoby

    Mohsan Ali is a researcher at the University of the Aegean. He won the Marie-Curie Scholarship in 2021 in the field of open data ecosystem (ODECO) to pursue his PhD degree at the University of the Aegean. Currently, he is working on the technical interoperability of open data in the information systems laboratory; this position is funded by ODECO. His areas of expertise are open data, open data interoperability, data science, natural...

  • SDN testbed for validation of cross-layer data-centric security policies

    Publikacja

    - Rok 2017

    Software-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments

    Publikacja

    - SENSORS - Rok 2023

    [Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...

    Pełny tekst do pobrania w portalu

  • Computer application for railway track realignment

    Publikacja

    - Rok 2014

    The topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrated monitoring, control and security of Critical Infrastructure Systems

    Publikacja

    Modern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrated safety and security analysis of hazardous plants and systems of critical infrastructure

    This article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security information sharing for smart grids: Developing the right data model

    Publikacja

    The smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security of export transactions in the offer of leading banks on the Polish market

    Publikacja

    - Rok 2018

    The following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...

  • Laboratory Stand for Wideband Analysis Radiocommunication Signals

    Publikacja

    - Rok 2012

    A laboratory stand for wideband analysis radiocommunication signals is presented in the paper. The stand is designed for signals acquisition in wide spectrum and research a field of digital signal processing. Procedures used for simultaneous acquiring many frequency channels in selected wide band are described. The method of detection of direct sequence spread spectrum signals (DS SS) which power spectral density is lower than...

    Pełny tekst do pobrania w portalu

  • Laboratory stand for wideband analysis radiocommunication signals

    Publikacja

    - Rok 2011

    A laboratory stand for wideband analysis radiocommunication signals is presented in the paper. The stand is designed for signals acquisition in wide spectrum and research a field of digital signal processing. Procedures used for simultaneous acquiring many frequency channels in selected wide band are described. The method of detection of direct sequence spread spectrum signals (DS SS) which power spectral density is lower than...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Orken Mamyrbayev Professor

    Osoby

    1.  Education: Higher. In 2001, graduated from the Abay Almaty State University (now Abay Kazakh National Pedagogical University), in the specialty: Computer science and computerization manager. 2.  Academic degree: Ph.D. in the specialty "6D070300-Information systems". The dissertation was defended in 2014 on the topic: "Kazakh soileulerin tanudyn kupmodaldy zhuyesin kuru". Under my supervision, 16 masters, 1 dissertation...

  • Computer modeling and testing of structural metamaterials

    Publikacja
    • T. Krolikowski
    • R. Knitter
    • A. Blazejewski

    - Procedia Computer Science - Rok 2019

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Hybrid Laboratory of Radio Communication With Online Simulators and Remote Access

    Contribution: Two toolsets for the remote teaching of radio communication laboratory classes: 1) online simulators for individual work of students and 2) a remote access system to laboratory workstations for group work. Initial assumptions and method of implementation of both tools are presented. Background: The COVID-19 pandemic has forced a change in teaching at all levels of education. The specificity of practical classes, such...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Model and laboratory simulation of a induction motor for diagnostic purposes

    Publikacja

    Statistics say that bearings are this part of induction motors which is most susceptible to damage. The equipment employed for bearing diagnostics usually makes use of vibrations as the criterion for technical condition of the bearings. A faulty bearing results in additional motor vibrations. They are reflected in the harmonic content of stator currents. In certain operating conditions the current signal is the sole source of information...

    Pełny tekst do pobrania w portalu