Wyniki wyszukiwania dla: CHARACTERISTICS OF ATTACKS - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: CHARACTERISTICS OF ATTACKS

Wyniki wyszukiwania dla: CHARACTERISTICS OF ATTACKS

  • Bioterrorism — characteristics and possibilities of prevention

    In the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.

    Pełny tekst do pobrania w portalu

  • Architectural and Urban Planning Solutions for the Protection of Heritage Buildings in the Context of Terrorist Attacks: Following the Example of Passive Protection Systems

    Publikacja

    Events in recent years showing numerous terrorist attacks raise awareness regarding the neces-sity of considering the safety of heritage buildings. The analysis of available data allows us to conclude that it is not possible to fully prevent terrorist attacks. On the other hand, it is possible to minimize the impact of such incidents through proper design of Passive Protection System (PPS) components. One possible architectural...

    Pełny tekst do pobrania w portalu

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publikacja
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Rok 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Pełny tekst do pobrania w portalu

  • Adversarial attack algorithm for traffic sign recognition

    Publikacja

    - MULTIMEDIA TOOLS AND APPLICATIONS - Rok 2022

    Deep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs

    Publikacja
    • D. Santos
    • A. de Sousa
    • C. Mas-Machuca
    • J. Rak

    - IEEE Access - Rok 2021

    In Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...

    Pełny tekst do pobrania w portalu

  • Traffic Remapping Attacks in Ad Hoc Networks

    Publikacja

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Pełny tekst do pobrania w portalu

  • Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks

    Deep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...

    Pełny tekst do pobrania w portalu

  • Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships

    Publikacja
    • M. Adam
    • H. Tomita
    • M. Szymański
    • P. Klimowicz
    • S. Tyszkowski
    • B. Wolska

    - Ido Movement for Culture. Journal of Martial Arts Anthropology - Rok 2015

    There is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...

    Pełny tekst do pobrania w portalu

  • Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice

    The vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...

    Pełny tekst do pobrania w portalu

  • Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures

    Publikacja

    In IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...

    Pełny tekst do pobrania w portalu

  • Quantum randomness protected against detection loophole attacks

    Publikacja
    • P. A. Mironowicz
    • G. Cañas
    • J. Cariñe
    • E. S. Gómez
    • J. F. Barra
    • A. Cabello
    • G. B. Xavier
    • G. Lima
    • M. Pawłowski

    - Quantum Information Processing - Rok 2021

    Device and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • MAlSim - Mobile Agent Malware Simulator

    Publikacja

    - Rok 2008

    One of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...

  • Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast

    Recent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...

    Pełny tekst do pobrania w portalu

  • Software Agents for Computer Network Security

    Publikacja

    - Rok 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain

    Publikacja

    The main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...

  • Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection

    A methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Texture Features for the Detection of Playback Attacks: Towards a Robust Solution

    This paper describes the new version of a method that is capable of protecting automatic speaker verification (ASV) systems from playback attacks. The presented approach uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. Our goal is to make the algorithm independent from the contents of the training set as much as possible; we look for the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Karol Grębowski dr inż.

    Karol Grębowski (dr inż.) pracuje jako adiunkt w Katedrze Technicznych Podstaw Projektowania Architektonicznego na Wydziale Architektury Politechniki Gdańskiej. Jego badania naukowe dotyczą zjawisk szybkozmiennych zachodzących podczas drgań konstrukcji budowlanych, obiektów mostowych (trzęsienia ziemi) oraz badania w zakresie metodologii projektowania budynków stanowiących system ochrony pasywnej (SOP) odpornych na uderzenia pojazdów...

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publikacja

    - Rok 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Pełny tekst do pobrania w portalu

  • Biometric identity verification

    Publikacja

    - Rok 2022

    This chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...