Filtry
wszystkich: 1280
-
Katalog
- Publikacje 974 wyników po odfiltrowaniu
- Czasopisma 108 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 31 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 16 wyników po odfiltrowaniu
- Dane Badawcze 62 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES
-
Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports
PublikacjaThis article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational...
-
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
PublikacjaThe approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublikacjaThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Advanced Scalar-valued Intensity Measures for Residual Drift Prediction of SMRFs with Fluid Viscous Dampers
PublikacjaMaximum Residual Inter-story Drift Ratio (RIDRmax) plays an important role to specify the state of a structure after severe earthquake and the possibility of repairing the structure. Therefore, it is necessary to predict the RIDRmax of Steel Moment-Resisting Frames (SMRFs) with high reliability by employing powerful Intensity Measures (IMs). This study investigates the efficiency and sufficiency of scalar-valued IMs for predicting...
-
A pilot study to assess manufacturing processes using selected point measures of vibroacoustic signals generated on a multitasking machine
PublikacjaThe article presents the method for the evaluation of selected manufacturing processes using the analysis of vibration and sound signals. This method is based on the use of sensors installed outside the machining zone, allowing to be used quickly and reliably in real production conditions. The article contains a developed measurement methodology based on the specific location of microphones and vibration transducers mounted on...
-
Serum lipid profile discriminates patients with early lung cancer from healthy controls
Publikacja -
Interfacial water controls the process of adsorption of hyperactive antifreeze proteins onto the ice surface
PublikacjaA mechanism of interactions between the ice-binding surface of a hyperactive antifreeze protein molecule and the ice surface is proposed, involving the influence of water present between the two surfaces on the behavior of the approaching molecule. It is demonstrated that the interfacial water, even before its full solidification, can act as a factor that pushes away or pulls nearer the protein molecule to ensure its proper positioning....
-
Performance of Vector-valued Intensity Measures for Estimating Residual Drift of Steel MRFs with Viscous Dampers
PublikacjaViscous Dampers (VDs) are widely used as passive energy dissipation system for improving seismic performance levels especially in retrofitting of buildings. Residual Inter-story Drift Ratio (R-IDR) is another important factor that specifies the condition of building after earthquake. The values of R-IDR illustrates the possibility of retrofitting and repairing of a building. Therefore, this study aims to explore the vector-valued...
-
The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego
PublikacjaIt can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublikacjaIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublikacjaMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case
PublikacjaInternet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...
-
Testing Question Order Effects of Self-perception of Risk Propensity on Simple Lottery Choices as Measures of the Actual Risk Propensity
PublikacjaUncertainty together with the necessity of making choices inevitably results in risky decisions. For many years now, scientists have been studying notions connected with risk such as risk management, risk perception or risk propensity. While many sophisticated methods regarding measurement of risk propensity have been developed so far, it seems that little attention has been paid to checking whether they are not inherently flawed....
-
The estimation of fish lenght distribution from its acoustical measures
PublikacjaThe paper concerns the problem of estimating fish length PDF from its target strength PDF obtained from acoustic surveys. It has been shown that the target strength of single fish can be treated in the first approximation as a finction of two variables: one, which depends on fish size and the other, which depends on its angular orientation (aspect). Extending this simplified relationship to the case of fish populations allows to...
-
Measures for interoperability of phenotypic data: minimum information requirements and formatting
Publikacja -
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
An integrated method for security protocols analysis
Publikacja -
Architecture supporting security of agent systems
PublikacjaW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Indo-French Defence and Security Partnership
Publikacja -
The Impact of Terrorism on International Peace and Security
Publikacja -
Aspects of maritime security and safety of Poland
PublikacjaReferat przedstawia wybrane aspekty morskiego bezpieczeństwa Polski. Prezentacja problematyki jest ukierunkowana na problemy techniczne związane z bezpieczeństwem, pozostawiając na uboczu problemy prawne, logistyczne i społeczne. Na wstępie przedstawiono analizę zagrożeń dla bezpieczeństwa Bałtyku. Następnie opisano wybrane instytucje odpowiedzialne za morskie bezpieczeństwo Polski, ze szczegółowym uwzględnieniem Morskiej Straży...
-
Trace Metal Contamination of Bottom Sediments: A Review of Assessment Measures and Geochemical Background Determination Methods
PublikacjaThis paper provides an overview of different methods of assessing the trace metal (TM) contamination status of sediments affected by anthropogenic interference. The geochemical background determination methods are also described. A total of 25 papers covering rivers, lakes, and retention tanks sediments in areas subjected to anthropogenic pressure from the last three years (2019, 2020, and 2021) were analysed to support our examination...
-
Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.
-
Temporal Changes in Complexity of Cardiovascular Regulation during Head-Up Tilt Test by Entropic Measures of Fluctuations of Heart Period Intervals and Systolic Blood Pressure
PublikacjaTemporal changes in complexity of cardiovascular regulation during head-up tilt test by entropic measures of fluctuations of heart period intervals and systolic blood pressure
-
COMPUTERS & SECURITY
Czasopisma -
Health Security
Czasopisma -
Food Security
Czasopisma -
African Security
Czasopisma -
Democracy & Security
Czasopisma -
European Security
Czasopisma -
Asian Security
Czasopisma -
Security Challenges
Czasopisma -
INTERNATIONAL SECURITY
Czasopisma -
Security Forum
Czasopisma -
Security and Privacy
Czasopisma -
Water Security
Czasopisma -
SECURITY STUDIES
Czasopisma -
Security Journal
Czasopisma -
SECURITY DIALOGUE
Czasopisma -
Invariant measures for interval translations and some other piecewise continuous maps
Publikacja -
Triple-objective models for portfolio optimisation with symmetric and percentile risk measures
Publikacja -
Using Probabilistic Availability Measures for Predicting Targeted Attacks on Network Nodes
Publikacja -
Network Protection Against Node Attacks Based on Probabilistic Availability Measures
Publikacja -
Dynamic OWL Ontology matching Using Lexical Wordnet-based Measures
PublikacjaOntologies are often used as a means of describing knowledge and the domain of operation of modern applications. S need arises for the ability to quickly match those ontologies to enable interoperability of such systems. This paper presents an extension to Noy and McGuiness ontology construction methodology which should improve ontology interoperability and a lexicon-based algorithm for merging and aligning of such ontologies stored...
-
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublikacjaW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
Lab security improvement using RFID technologies
PublikacjaTechnologia RFID stanowi nie tylko technologię bliźniaczą w stosunku do kodów paskowych, ale posiada również dodatkowe cechy takie jak zdalna identyfikacja przy użyciu fal radiowych. Technologia ta staje się coraz bardziej dostępna i koszty jej wdrożenia są coraz mniejsze. W artykule przedstawiono wykorzystanie technologii RFID do ochrony sprzętu laboratoryjengo przed kradzieżą. Zawarto opis laboratorium wyposażonego w urządzenia...
-
Network-centric warfare: a strategy for homeland security
PublikacjaPojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...
-
Web-based marine gis for littoral security
PublikacjaW artykule opisano koncepcję oraz przykładowe zastosowania systemu informacji geograficznej umożliwiającego zbieranie, przetwarzanie, integrowanie oraz wizualizację danych pochodzących z pomiarów bezpośrednich, obrazów lotniczych i satelitarnych oraz systemów hydroakustycznych.Przedstawiono przykłady zastosowania systemu w dziedzinie ochrony strefy przybrzeżnej takie, jak: -monitoring rozprzestrzeniania wylewu olejowego, -monitoring...