Filtry
wszystkich: 6854
-
Katalog
- Publikacje 4613 wyników po odfiltrowaniu
- Czasopisma 577 wyników po odfiltrowaniu
- Konferencje 317 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 311 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 24 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 2 wyników po odfiltrowaniu
- Kursy Online 224 wyników po odfiltrowaniu
- Wydarzenia 7 wyników po odfiltrowaniu
- Dane Badawcze 776 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SUPERVISORY OR SECURITY SYSTEMS
-
TELECOMMUNICATION SYSTEMS
Czasopisma -
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublikacjaMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
On UMTS security.
PublikacjaW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
Ryszard Katulski prof. dr hab. inż.
Osoby -
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Internal Security
Czasopisma -
Uncertainty assessment in the safety and security oriented risk analyses
PublikacjaW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Discrete identification of continuous non-linear and non-stationary dynamical systems that is insensitive to noise correlation and measurement outliers
PublikacjaThe paper uses specific parameter estimation methods to identify the coefficients of continuous-time models represented by linear and non-linear ordinary differential equations. The necessary approximation of such systems in discrete time in the form of utility models is achieved by the use of properly tuned `integrating filters' of the FIR type. The resulting discrete-time descriptions retain the original continuous parameterization...
-
Anti-theft lab security system based on RFID
PublikacjaThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
Analizy ilości i jakości odpływu wód deszczowych i roztopowych z kontrolowanej zlewni zurbanizowanej
PublikacjaIstotnym problemem Gdańska staje się bezpieczeństwo ekologiczne związane ze spływami miejskimi odprowadzanymi bezpośrednio do wód powierzchniowych, często akwenów użyteczności publicznej. W latach 2011÷2013, Katedra Hydrotechniki Wydziału Inżynierii Lądowej i Środowiska Politechniki Gdańskiej, we współpracy z Wojewódzkim Funduszem Ochrony Środowiska i Gospodarki Wodnej w Gdańsku oraz Gdańskimi Melioracjami, podjęła się wdrożenia...
-
Bezpieczny Pracownik w Cyberprzestrzeni – Security Awareness
Kursy Online -
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publikacja -
Security and knowledge management
PublikacjaOmówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.
-
Security of Web Services
PublikacjaArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND
PublikacjaCulture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...
-
LABOR RESOURCE MANAGEMENT AT THE MACRO LEVEL AS SOCIAL SECURITY IN THE CONTEXT OF EUROPEAN INTEGRATION
Publikacja -
Towards Cognitive and Perceptive Video Systems
PublikacjaIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19
PublikacjaAbstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...
-
Magdalena Gajewska prof. dr hab. inż.
OsobyMagdalena Gajewska (ur. 1.06.1968 r. w Gdańsku) ukończyła studia w 1993 roku na Wydziale Hydrotechniki Politechniki Gdańskiej. Jest adiunktem w Katedrze Technologii Wody i Ścieków na Wydziale Inżynierii Lądowej i Środowiska Politechniki Gdańskiej. Doktorat (2001) i habilitacja (2013) w dyscyplinie inżynierii środowiska. W kadencji 2016–2020 pełni funkcję prodziekana ds. nauki. Specjalizuję się w technologiach związanych z ekoinżynierią:...
-
SYSTEMS SCIENCE
Czasopisma -
Implementing decisional trust: a first approach for smart reliable systems
PublikacjaIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
The EU's Cyber Security Strategy
Publikacja -
On some aspects of maritime security
PublikacjaZostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach
-
Plant Biotechnology in Food Security
Publikacja -
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Adam Dąbrowski dr inż.
OsobyAdam Dąbrowski uzyskał stopień doktora nauk inżynieryjno-technicznych w dyscyplinie inżynieria mechaniczna na Politechnice Gdańskiej oraz ukończył studia II stopnia na kierunku mechatronika na Technische Universität Hamburg a także double degree Engineering and Management of Space Systems na Hochschule Bremen. Posiada doświadczenie przemysłowe (Instytut Lotnictwa w Warszawie, SICK AG w Hamburgu, Blue Dot Solutions w Gdańsku, Niemieckie...
-
Experiment with small objects floating under water in the harbor security aspect.
PublikacjaObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
Innovative method for utilization of wastewater for security and safety in rural areas
PublikacjaIn the rural areas building of sewerage systems and central wastewater treatment plants (WWTPs) often brings too high costs, due to high distances from one farm to another and terrain configuration. Individual treatment systems for each farm are a good solution. The teratment wetlands for nine individual farms were constructed in Kaszubian Lake District in summer and autumn 2009. Three configurations of reed beds were chosen. In...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublikacjaThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
ENISA Study: Challenges in Securing Industrial Control Systems
PublikacjaIn 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublikacjaThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Operational Research - Queuing Systems 2022
Kursy OnlineComponents, characteristics, classification, analysis, and applications of queuing systems.
-
The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego
PublikacjaIt can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...
-
Information systems management - autumn 2023
Kursy OnlineInformation Systems in Management for International Management students. Autumn 2023
-
Current risk analysis and management issues in technical systems.
PublikacjaDealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublikacjaIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
Operational Research - Queuing Systems 2024
Kursy OnlineCourse discusses components, characteristics, classification, analysis, and applications of queuing systems.
-
Operational Research - Queuing Systems 2024
Kursy OnlineCourse discusses components, characteristics, classification, analysis, and applications of queuing systems.
-
Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case
PublikacjaInternet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...
-
An integrated method for security protocols analysis
Publikacja -
Indo-French Defence and Security Partnership
Publikacja -
The Impact of Terrorism on International Peace and Security
Publikacja -
Aspects of maritime security and safety of Poland
PublikacjaReferat przedstawia wybrane aspekty morskiego bezpieczeństwa Polski. Prezentacja problematyki jest ukierunkowana na problemy techniczne związane z bezpieczeństwem, pozostawiając na uboczu problemy prawne, logistyczne i społeczne. Na wstępie przedstawiono analizę zagrożeń dla bezpieczeństwa Bałtyku. Następnie opisano wybrane instytucje odpowiedzialne za morskie bezpieczeństwo Polski, ze szczegółowym uwzględnieniem Morskiej Straży...
-
Hierarchical predictive control of integrated wastewater treatment systems
PublikacjaThe paper proposes an approach to designing the control structure and algorithms for optimising control of integrated wastewater treatment plant-sewer systems (IWWTS) under a full range of disturbance inputs. The optimised control of IWWTS allows for significant cost savings, fulfilling the effluent discharge limits over a long period and maintaining the system in sustainable operation. Due to the specific features of a wastewater...
-
Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.
-
Solutions of inverter systems in Shore-to-Ship Power supply systems
PublikacjaThe article presents a clearly formulated need for installing S2SP (Shore to Ship Power) systems, in particular Medium Voltage (MV) systems, along with certain solutions of modern inverter systems used in those systems. Requirements and basic configurations of S2SP systems are discussed, focusing in particular on capabilities of the S2SP system with DC distribution busbar. Moreover, on the background of the executing assumptions...
-
Systems Software Design 1
Kursy OnlineSystems Software Design