Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY

Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY

  • Mobile Security: Threats and Best Practices

    Publikacja

    - Mobile Information Systems - Rok 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Pełny tekst do pobrania w portalu

  • Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,

    The national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...

    Pełny tekst do pobrania w portalu

  • Imminent threats analysis and security level evaluation in social networks

    Publikacja

    - Rok 2011

    Rozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...

  • Ad hoc routing protocols - security objectives, threats and solution

    Publikacja

    Zaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.

  • Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities

    Publikacja

    - Journal of Modern Science - Rok 2023

    Pełny tekst do pobrania w serwisie zewnętrznym

  • PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND

    Publikacja

    - Rok 2016

    Culture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...

    Pełny tekst do pobrania w portalu

  • INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS

    It has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments

    Publikacja

    W pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...

  • Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams

    Publikacja

    - Rok 2015

    A system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...

  • Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments

    Publikacja

    - Rok 2010

    The goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...

  • Public administration and state security aspects

    Czasopisma

    eISSN: 2786-5533

  • International Journal of Intelligence, Security, and Public Affairs

    Czasopisma

    ISSN: 2380-0992 , eISSN: 2380-100X

  • Algorithms for processing and visualization of Critical Infrastructure security data as well as simulation and analysis of threats = Algorytmy przetwarzania i wizualizacji danych dotyczących bezpieczeństwa infrastruktur krytycznych oraz symulacji i analizy zagrożeń

    Publikacja

    - Rok 2010

    Rozprawa traktuje o algorytmach przetwarzania danych dotyczących różnego rodzaju zagrożeń, w szczególności wyników analiz ryzyka infrastruktur krytycznych, pozwalających na przestrzenną analizę tych danych w kontekście geograficznym za pomocą dedykowanego Systemu Informacji Przestrzennej. Prezentowane metody analizy zgrupowań Infrastruktur Krytycznych oraz propagacji ich zagrożeń wykorzystują wyniki syntetycznej analizy podatności...

  • Public Security and Public Order

    Czasopisma

    ISSN: 2335-2035

  • COMPARATIVE ANALYSES OF INTERNATIONALIZATION OF KAZAKHSTAN ENTERPRISES

    This paper presents the instruments of internationalization of enterprises operating within the Eurasian Economic Union. Research contains answers of 108 enterprises exporters located in the Republic of Kazakhstan. The purpose of the paper is to show the main forms of the internationalization of enterprises in Kazakhstan. The paper also presents the following instruments of enterprises’ internationalization including: indirect...

    Pełny tekst do pobrania w portalu

  • Jerzy Konorski dr hab. inż.

    Jerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...

  • Marcin Niedopytalski Ekspert ds. Ochrony Osób, Strzelectwa i Prawa Konstytucyjnego

    Osoby

    Marcin Niedopytalski to uznany ekspert z 25-letnim doświadczeniem w dziedzinie ochrony i bezpieczeństwa, autor wielu specjalistycznych książek, naukowiec, a także badacz i obserwator w szeroko rozumianej sferze ochrony. Jego rozległe kompetencje obejmują wiele kluczowych obszarów, takich jak zarządzanie kryzysowe, ochrona VIP-ów, samoobrona, strzelectwo, a także ratownictwo medyczne. Marcin rozpoczął swoją karierę w ochronie bardzo...

  • Experiment with small objects floating under water in the harbor security aspect.

    Publikacja

    - Rok 2013

    Observation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Janusz Górski prof. dr hab. inż.

    Osoby

  • Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons

    Publikacja

    Recent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...

    Pełny tekst do pobrania w portalu

  • Wireless Systems of Threats Monitoring

    The concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...

  • Security and Anonymity in Agent Systems

    Publikacja

    - Rok 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Approach to security assessment of critical infrastructures' information systems

    Publikacja

    - IET Information Security - Rok 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Pełny tekst do pobrania w portalu

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Managing enterprise IT infrastructure and security 2022

    Kursy Online
    • R. Leszczyna
    • B. Woliński

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Security Evaluation of IT Systems Underlying Critical Networked Infrastructures

    Publikacja

    - Rok 2008

    Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security Assessment of a Turbo-Gas Power Plant

    Publikacja

    - Rok 2009

    Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Some Security Features of Selected IoT Platforms

    Publikacja

    - TASK Quarterly - Rok 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Pełny tekst do pobrania w portalu

  • Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System

    Publikacja

    Overhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A video monitoring system using ontology-driven identification of threats

    Publikacja

    In this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The networking of the justice system as part of public court networks

    Publikacja

    - Rok 2015

    The goal of this paper is to look at the organizational structure of the justice system and provide the answer to the basic question of the possible network relations, their force, and imapct. As part od the paper, I have defined public inetrorganisational court network, dividing them into regulatory inter-organisational networks nad voluntary inetrorganisational networks. Emphasis has also been placed on the benefits and threats...

  • Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

    The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...

    Pełny tekst do pobrania w portalu

  • Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras

    The study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.

  • Public spaces connecting cities. Green and Blue Infrastructures potential.

    Publikacja

    A city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports

    This article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Digital Public Service Innovation: Framework Proposal

    Publikacja

    - Rok 2016

    This paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Planning the City Against Barriers. Enhancing the Role of Public Spaces

    Contemporary cities are being fragmented by growing number of technical barriers like roads, railways, infrastructural objects, that generate variety of problems of different nature. The aim of the research is to present the issues connected with such barriers in the city and the ways of solving them. Main problems are e.g.: the destruction of the complexity of urban fabric, functional disadvantages, environmental and landscape...

    Pełny tekst do pobrania w portalu

  • On Software Unit Testing For Security and Performance Gain At Unit Level

    Publikacja

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • On Software Unit Testing For Improving Security And Performance Of Distributed Applications

    Performance and security are software (SW) application attributes situated on the opposite corners of system design. In the most drastic example the most secure component is the one totally isolated from the outside world, with communication performance reduced to zero level (e.g. disconnected physically from the network, placed inside a Faraday cage to eliminate possible wireless accessibility). On the other hand the most performance-optimized...

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publikacja

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems

    Publikacja

    This article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...

  • Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity

    Publikacja
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2008

    In this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...

  • Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface

    Publikacja

    - Rok 2020

    Multimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Pełny tekst do pobrania w portalu

  • Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19

    Publikacja

    - Knowledge and Process Management - Rok 2022

    Abstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...

    Pełny tekst do pobrania w portalu

  • An Adversarial Machine Learning Approach on Securing Large Language Model with Vigil, an Open-Source Initiative

    Publikacja

    - Procedia Computer Science - Rok 2024

    Several security concerns and efforts to breach system security and prompt safety concerns have been brought to light as a result of the expanding use of LLMs. These vulnerabilities are evident and LLM models have been showing many signs of hallucination, repetitive content generation, and biases, which makes them vulnerable to malicious prompts that raise substantial concerns in regard to the dependability and efficiency of such...

    Pełny tekst do pobrania w portalu

  • Threats to Rural Landscape and Its Protection in Poland

    Publikacja

    - Environments - Rok 2018

    The article describes the premises and conditions for the implementation of a pro-landscape spatial policy in rural areas in Poland. It presents the erosion of spatial order in a large part of the country’s territory. Firstly, the state of protection of the rural landscape and the legal aspects of shaping the space of rural areas are described. Secondly, the location is depicted, and the main physiognomic and environmental threats...

    Pełny tekst do pobrania w portalu

  • Cybersecurity of Enterprise Infrastructure 2023

    Kursy Online
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Cybersecurity of Enterprise Infrastructure 2025

    Kursy Online
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Cybersecurity of Enterprise Infrastructure 2024

    Kursy Online
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...