Filtry
wszystkich: 706
-
Katalog
- Publikacje 456 wyników po odfiltrowaniu
- Czasopisma 113 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 31 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 11 wyników po odfiltrowaniu
- Dane Badawcze 6 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: BELARUS, SECURITY STRATEGIES, THE RUSSIAN FEDERATION, THE COLLECTIVE SECURITY TREATY ORGANISATION
-
Horizon Europe proposals - Administrative Part
Dane BadawczeThe dataset contains data collected during the HE National Contact Point training on Oct. 12, 2022, reg. the administrative part of Horizon Europe grant proposals. The data set includes presentations concerning administrative forms of 2022 proposals and their content, including participant data; information about abstract writing, keyword choice and...
-
Public Security and Public Order
Czasopisma -
International Journal of Information Security
Czasopisma -
Karol Zdzisław Zalewski mgr inż.
Osoby -
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublikacjaDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Zabezpieczenie Społeczne. Teoria, Prawo, Praktyka. Zeszyty Naukowe Zakładu Zabezpieczenia Społecznego IPS UW
Czasopisma -
Paweł Lubomski dr inż.
OsobyAbsolwent Politechniki Gdańskiej. Po zebraniu doświadczeń jako analityk systemowy i biznesowy w dużych korporacjach IT wrócił na uczelnię, gdzie aktualnie pracuje na stanowisku Dyrektora Centrum Usług Informatycznych. Naukowo specjalizuje się w zagadnieniach bezpieczeństwa i niezawodności dużych rozproszonych systemów usługowych oraz budową bezpiecznych i wydajnych architektur IT, a także projektowania architektur chmurowych oraz...
-
Nadzeya Sabatini dr
OsobyNadzeya Sabatini is Assistant Professor in Digital Transformation at Gdańsk University of Technology (Gdansk, Poland), its Department of Informatics in Management (Faculty of Management and Economics). Nadzeya is lecturer at USI – Università della Svizzera italiana (Lugano, Switzerland), a research fellow at the Institute of Digital Technologies for Communication of the same university, and coordinator of MSc in Digital Fashion...
-
International Journal on Information Technologies and Security
Czasopisma -
International Journal for Information Security Research
Czasopisma -
International Journal of Safety and Security Engineering
Czasopisma -
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublikacjaMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Redevelopment of Russian closed towns: The Example of Zato "Zvezdniy"
PublikacjaThe current economic crisis is having a strong impact on socio-economic processes in the development of Russian cities. The impact of the crisis is particularly strong on city territory where the activity of core industrial enterprises, military units or similar institutions has been stopped. In such cases, the situation is directly related to the functioning of military units or one industrial enterprise responsible for the formation...
-
Krzysztof Gierłowski dr inż.
OsobyKrzysztof Gierłowski uzyskał tytuł doktora inżyniera telekomunikacji na Wydziale Elektroniki, Telekomunikacji i Informatyki w 2018 roku. Jest autorem lub współautorem ponad 80 publikacji naukowych oraz recenzentem wielu czasopism i konferencji. Brał udział w szeregu projektów badawczych dotyczących tematyki IT, wliczając w to: finansowany ze źródeł UE projekt Inżynieria Internetu Przyszłości, projekt infrastrukturalny PL-LAB2020,...
-
Andrzej Chybicki dr inż.
OsobyZ wykształcenia informatyk, absolwent Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej, doktor nauk technicznych w dziedzinie informatyka specjalizujący się w przetwarzaniau danych przestrzennych w rozproszonych systemach informatycznych. Ukierunkowany na wykorzystywanie osiągnięć i wiedzy zakresu prowadzonych badań w przemyśle. Współpracował z szeregiem podmiotów przemysłu informatycznego, geodezyjnego...
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublikacjaCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
The Effectiveness of Basic Resuscitation Activities Carried out by Combat Paramedics of the Police, as Exemplified by Polish Counterterrorist Units
PublikacjaThe tasks carried out by Police officers are often accompanied by dangerous situations that threaten the life and health of the people involved, the police themselves, and bystanders. It concerns especially counter-terrorism police units whose activities are aimed at terrorists and particularly dangerous criminals, and their course is violent and aggressive. In conjunction with the inability to bring civilian rescue services into...
-
Psychosocial risks associated with the profession of train driver
PublikacjaExcellent competencies as well as a good physical and mental health are required in train drivers’ profession. Despite the changes in the structure of employment the train drivers above 46 years and job tenure longer than 30 years are the largest group. The generation gap is becoming more pronounced, and its fulfilment will not be easy. It is related not only to training of new personnel but also promotion of healthy work environment...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublikacjaAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
Evaluation of Professional Demands and Financial Reward Through the Perception of Police Managers
PublikacjaThe aim of the study was to examine the relationship between job demands and salary in the subjective perception of mid-level police managers. An occupational stress model in which effort spent on job demands are not balanced by the received reward, was adopted. The study comprised 51 police officers (4 women). The partial least squares method was used for the analysis, and the SmartPLS 2.0 program was applied. The income and...
-
Impact of Work on the Well-Being of Police Officers and Firefighters
PublikacjaWork is one of the most important spheres of human functioning and has a significant impact on individual overall well-being. The purpose of this study is to assess the positive and negative impact of the work of police officers and firefighters on their well-being in different spheres of life. In particular, the study examines the relationship between the type of occupation and the elements that generate a feeling of well-being,...
-
Identification of Emotional States Using Phantom Miro M310 Camera
PublikacjaThe purpose of this paper is to present the possibilities associated with the use of remote sensing methods in identifying human emotional states, and to present the results of the research conducted by the authors in this field. The studies presented involved the use of advanced image analysis to identify areas on the human face that change their activity along with emotional expression. Most of the research carried out in laboratories...
-
Clustering Context Items into User Trust Levels
PublikacjaAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
International Journal of Computer Science and Network Security
Czasopisma -
Definition of urban regeneration projects in Russian cities
PublikacjaUrban regeneration is extremely important process for Russian cities, which faced to the challenges of post-industrial economy. In an attempt, to explain needs of urban regeneration in Russian megacities author analyzed the social and economic trends and some historic features of Russian cities development. The article identified the key areas for regeneration such as the regeneration of historic core, the regeneration of the urban...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublikacjaCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review
PublikacjaFood security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...
-
Usable Security and Privacy (Usable Security Workshop)
Konferencje -
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2022
Kursy OnlineThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2023
Kursy OnlineThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2024
Kursy OnlineThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Income obtained according to particular rates only by taxpayers conducting non-agricultural business activity 2015
Dane BadawczeTaxation in the form of a lump sum on recorded revenues does not apply to certain types of activity, regardless of their size. We are talking about taxpayers who achieve revenue in whole or in part, among others from on account of running pharmacies, activities in the field of buying and selling foreign exchange values, activities in the field of trade...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Michal Piechowicz dr
OsobyAdjunct at the Department of European Studies at the Faculty of Political Science and Security Studies. Doctoral thesis defended in 2011. Author of publications in the field of European integration and security. Research interests focus on issues related to the decision-making processes and EU defense and security policy issues. I'm visiting the CEEs constantly. My ongoing and future-oriented goal is establishing research and trust-based...
-
The impact of China’s One-Belt One-Road initiative on international trade and global value chains
PublikacjaThis study examines the potential effects of China’s ‘One-Belt One-Road’initiative (OBOR) on trade flows and global value chain (GVC) connections.The empirical analysis is based on the augmented trade gravity model, which comprises 186 economies and 199 of their partners from 2000 to 2018. We also estimate the gravity model for involvement in GVC (domestic value added in intermediate exports, foreign value added in exports, and...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublikacjaThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
Feature extraction in detection and recognition of graphical objects
PublikacjaDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Architektura bezpieczeństwa systemu netBaltic
PublikacjaW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublikacjaW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
The symmetric extendibility of quantum states
PublikacjaStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
New RFID readers for scalable RFID system
PublikacjaRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Usenix Security Symposium
Konferencje