Filtry
wszystkich: 11828
-
Katalog
- Publikacje 6480 wyników po odfiltrowaniu
- Czasopisma 756 wyników po odfiltrowaniu
- Konferencje 412 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 296 wyników po odfiltrowaniu
- Wynalazki 2 wyników po odfiltrowaniu
- Projekty 18 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Aparatura Badawcza 4 wyników po odfiltrowaniu
- Kursy Online 274 wyników po odfiltrowaniu
- Wydarzenia 59 wyników po odfiltrowaniu
- Oferty 1 wyników po odfiltrowaniu
- Dane Badawcze 3523 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS
-
Narrowband Transmission Quality in Presence of Modified IEEE 802.15.4a UWB Signal
PublikacjaPublikacja przedstawia opis stanowiska laboratoryjnego użytego do badania wpływu zakłóceń impulsowych na jakość odbioru sygnałów wąskopasmowych. Przedstawione zostały przykładowe wyniki pomiaru jakości transmisji wąskopasmowych wraz z wykazaniem, że modyfikacja widma zakłócającego sygnału IR UWB powoduje poprawę jakości odbioru sygnałów wąskopasmowych.
-
IEEE Transactions on Autonomous Mental Development
Czasopisma -
Assessing Word Difficulty for Quiz-Like Game
PublikacjaMappings verification is a laborious task. Our research aims at providing a framework for manual verification of mappings using crowdsourcing approach. For this purpose we plan on implementing a quiz like game. For this purpose the mappings have to be evaluated in terms of difficulty to better present texts in respect of game levels. In this paper we present an algorithm for assessing word difficulty. Three approaches...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublikacjaThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublikacjaIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Game with a Purpose for Verification of Mappings Between Wikipedia and WordNet
PublikacjaThe paper presents a Game with a Purpose for verification of automatically generated mappings focusing on mappings between WordNet synsets and Wikipedia articles. General description of idea standing behind the games with the purpose is given. Description of TGame system, a 2D platform mobile game with verification process included in the game-play, is provided. Additional mechanisms for anti-cheating, increasing player’s motivation...
-
Analiza sieci bezprzewodowych serii IEEE 802.15.x - Bluetooth (BT), UWB i ZigBee - z transmisją wieloetapową. Część I
PublikacjaW artykule zaprezentowano ogólną koncepcję pracy bezprzewodowych sieci mesh (Wireless Mesh Networks - WMNs), tj. sieci ad hoc z topologią złożoną (kratową) i z transmisją wieloetapową. Opisano podstawowe problemy projektowania i implementacji sieci WMN. Przedstawiono ogólne założenia nowego standardu IEEE 802.15.5 - WPAN Mesh. Skoncentrowano się przy tym na opisie i analizie bezprzewodowych sieci złożonych typu WPAN, realizowanych...
-
Analiza sieci bezprzewodowych serii IEEE 802.15.x - Bluetooth (BT), UWB i ZigBee - z transmisją wieloetapową. Część II
PublikacjaW artykule zaprezentowano ogólną koncepcję pracy bezprzewodowych sieci mesh (Wireless Mesh Networks - WMNs), tj. sieci ad hoc z topologią złożoną (kratową) i z transmisją wieloetapową. Opisano podstawowe problemy projektowania i implementacji sieci WMN. Przedstawiono ogólne założenia nowego standardu IEEE 802.15.5 - WPAN Mesh. Skoncentrowano się przy tym na opisie i analizie bezprzewodowych sieci złożonych typu WPAN, realizowanych...
-
Smooth start for strategry game development supported by XNA framework
PublikacjaTo attract young and casual game developers, Microsoft created a set of libraries oriented towards easier game development and end-product management. The aim of XNA Framework is to provide a unified software development environment for creating games for both PC's and dedicated platforms like XBOX consoles or mobile phones capable of 3D acceleration. The use of modern, object oriented languages available for the .NET platform...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Ocena efektywności standardu ieee 802.11b w otoczeniu sieci Bluetooth
PublikacjaW niniejszej pracy analizowano problem współistnienia najbardziej popularnych obecnie standardów bezprzewodowej komunikacji: IEEE 802.11b (zwanego również Wi-Fi - z ang. Wireless Fidelity) oraz Bluetooth 1.1. Podjęto m.in. próbę określenia "bezpiecznej odległości" przy której Wi-Fi mimo występowania w otoczeniu sieci Bluetooth (BT) może jeszcze pracować przy założonej efektywności
-
Capacity-fairness performance of an ad hoc IEEE 802.11 WLAN with noncooperative stations
PublikacjaWykazano, że wartości kombinowanego wskaźnika wydajności lokalnej sieci bezprzewodowej ze stacjami niekooperacyjnymi, uwzględniającego przepustowość i sprawiedliwość rozdziału pasma, są znacznie niższe od przewidywanych na podstawie modeli działania kooperacyjnego. Sytuację może poprawić zastosowanie przez stacje inteligentnych strategii motywacyjnych pod warunkiem, że liczba stacji jest niewielka i są one wystarczająco uwarunkowane...
-
Multipath routing for quality of service differentiation and network capacity optimization in broadband low-earth orbit systems
PublikacjaThis paper shows the importance of employing multiple different paths for routing in Inter-Satellite Link (ISL) networks in broadband Low-Earth Orbit (LEO) satellite systems. A theoretical analysis is presented and a routing concept is proposed to demonstrate three facts that make multipath routing especially important in broadband LEO networks: (1) differences in the propagation delays have a much greater impact on end-to-end...
-
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain
PublikacjaAbstract—Information-centric networks struggle with content poisoning attacks (CPAs), especially their stronger form called Fake Data CPA, in which an intruder publisher uploads content signed with stolen credentials. Following an existing graphinfection based approach leveraging the constrained time when stolen credentials are useful, we design a blockchain-based mitigation scheme for Named Data Networking architectures. We postulate...
-
Journal of Service Theory and Practice
Czasopisma -
Enhancing Resilience of FSO Networks to Adverse Weather Conditions
PublikacjaOptical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....
-
Linear game non-contextuality and Bell inequalities—a graph-theoretic approach
PublikacjaWe study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...
-
International Journal of Quality and Service Sciences
Czasopisma -
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Topology improvements in scale-free networks when assuring security and survivability
PublikacjaW artykule zaproponowano heurystyczny algorytm iteracyjny (NEA) kontrolowanego rozrostu sieci, zmniejszający stopień jej bezskalowości. Pokazano, że odpowiednia kontrola rozrostu sieci, prowadzi do uzyskania sieci o topologii zbliżonej do regularnej, a więc w duzym stopniu odpornej na celowe działania niszczące - ataki. Właściwości algorytmu zostały przebadane przy pomocy dedykowanego symulatora dla reprezentatywnej próby inicjalnych...
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublikacjaThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Comparison of selected algorithms for scheduling workflow applications with dynamically changing service availability
PublikacjaThis paper compares the quality and execution times of several algorithms for scheduling service based workflow applications with changeable service availability and parameters. A workflow is defined as an acyclic directed graph with nodes corresponding to tasks and edges to dependencies between tasks. For each task, one out of several available services needs to be chosen and scheduled to minimize the workflow execution time and...
-
Bożena Kostek prof. dr hab. inż.
Osoby -
Network Protection Against Node Attacks Based on Probabilistic Availability Measures
Publikacja -
IEEE TRANSACTIONS ON NEURAL NETWORKS
Czasopisma -
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Topology recognition and leader election in colored networks
PublikacjaTopology recognition and leader election are fundamental tasks in distributed computing in networks. The first of them requires each node to find a labeled isomorphic copy of the network, while the result of the second one consists in a single node adopting the label 1 (leader), with all other nodes adopting the label 0 and learning a path to the leader. We consider both these problems in networks whose nodes are equipped with...
-
The reliability of tree and star networks.
PublikacjaOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
Data Model Development for Security Information Sharing in Smart Grids
PublikacjaThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Autonomous (systems) vehicles control
Kursy Online -
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublikacjaCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Texture Features for the Detection of Playback Attacks: Towards a Robust Solution
PublikacjaThis paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...
-
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network
PublikacjaThe capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...
-
International Conference on Embedded Wireless Systems and Networks
Czasopisma -
Remote Monitoring System for Impedance Spectroscopy using Wireless Sensor Network
PublikacjaThe architecture of a miniaturized impedanceanalyser with wireless communication module for remoteImpedance Spectroscopy (IS) of anticorrosion coatings ondifficult-to-reach objects (e.g. on the steel construction ofthe bridge) is described in this paper. Some practical aspectsof implementation of a Wireless Sensor Network (WSN) arealso discussed. A low scale, middle range, WSN networkcomposed of a Base Station (BS) with a Personal...
-
Krzysztof Cwalina dr inż.
OsobyKrzysztof Kamil Cwalina w 2013 r. uzyskał tytuł inżyniera na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej; w 2014 r. uzyskał tytuł magistra inżyniera, a w 2017 r. otrzymał stopień doktora nauk technicznych w dyscyplinie: telekomunikacja, także na WETI PG. Aktualnie pracuje na stanowisku adiunkta w Katedrze Systemów i Sieci Radiokomunikacyjnych Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki...
-
Zero-Visibility Cops and Robber Game on a Graph
PublikacjaWe examine the zero-visibility cops and robber graph searching model, which differs from the classical cops & robber game in one way: the robber is invisible. We show that this model is not monotonic. We also provide bounds on both the zero-visibility copnumber and monotonic zero-visibility copnumber in terms of the pathwidth.
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY
Publikacja -
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
PublikacjaIn this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...
-
Workshop on Graph Theory
WydarzeniaThe Gdańsk Workshop on Graph Theory (GWGT) is an annual, informal workshop whose goal is to provide a forum for scientists to meet, present their work, interact, and establish collaborations in the field of Graph Theory
-
Wireless paging system
PublikacjaAssistance to patients at hospitals and nursing homesoften encounters problems related to obtaining information onthe current needs of the patient. Traditionally, patient informshospital stuff by wire and wireless paging systems. WirelessPaging Systems allow one to overcome the limitations of theirwire counterparts, which include high installation costs (cabling)and lack of patient mobility. The main difference betweenpresented...
-
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Evolving neural network as a decision support system — Controller for a game of “2048” case study
PublikacjaThe paper proposes an approach to designing the neuro-genetic self-learning decision support system. The system is based on neural networks being adaptively learned by evolutionary mechanism, forming an evolved neural network. Presented learning algorithm enables for a selection of the neural network structure by establishing or removing of connections between the neurons, and then for a finding the beast suited values of the network...
-
Packet routing and frame length optimization in wireless mesh networks with multicast communications
Publikacja -
Router Selfishness in Community Wireless Mesh Networks: Cross-Layer Benefits and Harms
PublikacjaWęzły sieci mesh nie są poddane administracyjnej kontroli, zarazem nie odczuwają ograniczeń energetycznych. Są przez to skłonne do zachowań egoistycznych w warstwach 2 i 3 OSI, w szczególności w odniesieniu do protokołów MAC i routingowych. W pracy przebadano symulacyjnie wybrane aspekty środowiska mesh uzasadniające podjęcie ataków egoistycznych i zidentyfikowano trzy: gęstość rozmieszczenia i położenie routerów oraz warstwa OSI...
-
Managing enterprise IT infrastructure and security 2022
Kursy OnlineThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Traffic Type Influence on Performance of OSPF QoS Routing
PublikacjaFeasibility studies with QoS routing proved that the network traffic type has influence on routing performance. In this work influence of self-similar traffic for network with DiffServ architecture and OSPF QoS routing has been verified. Analysis has been done for three traffic classes. Multiplexed ON-OFF model was used for self-similar traffic generation. Comparison of simulation results were presented using both relative and...
-
IEEE Microwave and Wireless Technology Letters
Czasopisma