Wyniki wyszukiwania dla: security - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: security

Wyniki wyszukiwania dla: security

  • Mechanizmy bezpieczeństwa transmisji w systemie netBaltic

    artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Architektura bezpieczeństwa systemu netBaltic

    W artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...

  • Maciej Szczodrak dr inż.

  • New RFID readers for scalable RFID system

    RFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...

  • Simulating Malware with MAlSim

    Publikacja

    - Rok 2008

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

  • Simulating malware with MAlSim

    Publikacja

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The symmetric extendibility of quantum states

    Studies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Kontekstowo zorientowany model bezpieczeństwa systemów internetowych

    Publikacja

    - Rok 2016

    W rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...

    Pełny tekst do pobrania w portalu

  • Mechanizmy bezpieczeństwa w strefie C systemu netBaltic

    W artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • WIKI-WS as a C2 NIWA Web Service Management Platform

    Publikacja

    - TASK Quarterly - Rok 2015

    The Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...

    Pełny tekst do pobrania w portalu

  • AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES

    Problems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...

    Pełny tekst do pobrania w portalu

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publikacja

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Signatures and acoustic images of objects moving in water

    Publikacja

    Observation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...

  • Low-dimensional bound entanglement with one-way distillable cryptographic key

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2008

    In this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...

  • Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants

    The aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...

  • Piotr Grudowski dr hab. inż.

    Dr hab. inż. Piotr Grudowski, profesor w Politechnice Gdańskiej karierę naukową rozpoczynał na Wydziale Mechanicznym Technologicznym Politechniki Gdańskiej w zespole „Inżynierii Jakości i Metrologii”. Stopień doktora nauk technicznych w dyscyplinie budowa i eksploatacja maszyn uzyskał w roku 1993 na Wydziale Mechanicznym PG a stopień doktora habilitowanego nauk ekonomicznych, w dyscyplinie nauk o zarządzaniu, w 2008 roku na Wydziale...

  • Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego

    Artykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...

    Pełny tekst do pobrania w portalu

  • Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego

    W artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.

    Pełny tekst do pobrania w portalu

  • ENISA Study: Challenges in Securing Industrial Control Systems

    Publikacja

    - Rok 2013

    In 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...

  • Device-independent quantum key distribution based on measurement inputs

    Publikacja

    - PHYSICAL REVIEW A - Rok 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Pełny tekst do pobrania w portalu

  • Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics

    Publikacja
    • C. Busch
    • F. Deravi
    • D. Frings
    • E. Kindt
    • R. Lessmann
    • A. Nouak
    • J. Salomon
    • M. Achcar
    • F. Alonso-Fernandez
    • D. Bachenheimer... i 38 innych

    - IET Biometrics - Rok 2023

    Due to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...

    Pełny tekst do pobrania w portalu

  • INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS

    Publikacja

    - TASK Quarterly - Rok 2019

    This article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...

    Pełny tekst do pobrania w portalu

  • Trust Management Method for Wireless Sensor Networks

    Publikacja

    - Rok 2017

    A Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...

    Pełny tekst do pobrania w portalu

  • Cybersecurity of Enterprise Infrastructure 2023

    Kursy Online
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Cybersecurity of Enterprise Infrastructure 2024

    Kursy Online
    • R. Leszczyna
    • S. Ostrowski

    The aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...

  • Unraveling Luminescent Energy Transfer Pathways: Futuristic Approach of Miniature Shortwave Infrared Light-Emitting Diode Design

    Dane Badawcze
    open access

    Phosphor-converted shortwave infrared phosphor light-emitting diodes (pc-SWIR LEDs, 900–1700 nm) are promising next-generation portable light sources for spectroscopy, security, optical communication, and medical applications. A typical design strategy involves energy transfer from Cr3+ to Ni2+, and thus, energy transfer from Cr3+–Cr3+ pairs to Ni2+...

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Pełny tekst do pobrania w portalu

  • Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria

    Publikacja

    - Rok 2022

    Information technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...

    Pełny tekst do pobrania w portalu

  • Validation of a virtual test environment for C2X communication under radio jamming conditions

    Publikacja

    - Rok 2020

    In this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...

    Pełny tekst do pobrania w portalu

  • The role of rewards and demands in burnout among surgical nurses

    Objective: Job rewards have both, an intrinsic and an extrinsic motivational potential, and lead to employees’ development as well as help them to achieve work goals. Rewards can balance job demands and protect from burnout. Due to changes on the labour market, new studies are needed. The aim of our study was to examine the role of demands and individual rewards (and their absence) in burnout among surgical nurses. Materials and...

    Pełny tekst do pobrania w portalu

  • Kacper Wereszko mgr inż.

    Osoby

    Kacper Wereszko uzyskał tytuł zawodowy magistra inżyniera w 2016 roku (kierunek: informatyka, specjalność: algorytmy i technologie internetowe), a od 2017 roku jest uczestnikiem studiów doktoranckich z dyscypliny Informatyka. Obecnie pracuje jako asystent w Katedrze Algorytmów i Modelowania Systemów. Jego zainteresowania badawcze obejmują badanie własności bezpieczeństwa w grafach, problemy dominowania w grafach oraz ich praktyczne...

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena

    Publikacja

    W niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...

  • Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji

    Publikacja

    Niniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...

  • Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects

    This article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Bartosz Woliński dr inż.

    Prowadzone przedmioty Informatization strategies (sem. zim. 20/21, sem. zim. 22/23) Technologie zespołów IT (sem zim. 20/21) Decision analysis (sem zim. 20/21, sem zim. 21/22, sem letni 22/23) Kontroling w IT (sem. letni 20/21, 21/22, 22/23) Projekty w przedsiębiorstwie (sem. letni 20/21, 22/23) Integrated enterprise information systems (sem. zim. 20/21) Managing enterprise IT infrastructure and security (sem. letni 2021/22) Decision...

  • Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review

    Publikacja
    • S. A. Siddiqui
    • Ö. Süfer
    • G. Çalışkan Koç
    • H. Lutuf
    • T. Rahayu
    • R. Castro Munoz
    • I. Fernando

    - ENVIRONMENT DEVELOPMENT AND SUSTAINABILITY - Rok 2024

    Food security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...

    Pełny tekst do pobrania w portalu

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Pełny tekst do pobrania w portalu

  • On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway

    Publikacja

    - Rok 2008

    Zapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...

  • Bezpieczeństwo elektroenergetyczne dla pokoleń

    Publikacja
    • W. Kamrat
    • M. Bartosik
    • M. Każmierkowski
    • L. Włodzmierz
    • P. Maciej
    • T. Peryt
    • T. Skoczkowski
    • S. Andrzej
    • S. Adam

    - Przegląd Elektrotechniczny - Rok 2016

    W artykule przeanalizowano źródła energii pierwotnej, ich wystarczalnośći dywersyfikację w skali lokalnej i globalnej, problem dekarbonizacji polskiej elektroenergetyki na tle europejskiej polityki klimatycznej, osiągalność źródeł gazu jako efektywnego paliwa dla energetyki, polski program energetyki jądrowej, bezpieczeństwo zasilania elektrycznych systemów trakcyjnych jako strategicznej alternatywy...

    Pełny tekst do pobrania w portalu

  • Marek Przyborski dr hab. inż.

    Osoby

    Marek Przyborski (ur. 20.03.1964 r. w Chełmży) – specjalista z zakresu teledetekcji i fotogrametrii bliskiego zasięgu. Prowadzi badania w zakresie wykorzystania tzw. „szybkich kamer” do analizy zjawisk szybkozmiennych. Współautor i autor publikacji traktujących o szeroko rozumianej teledetekcji w zastosowaniach związanych z budownictwem, transportem, inżynierią środowiska oraz bezpieczeństwem narodowym. Jest autorem licznych publikacji...

  • A place of school in the idea of the sustainable development

    Publikacja

    Well designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Self-Organizing Wireless Monitoring System for Containers

    This paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...

  • Self-organizing wireless monitoring system for cargo containers

    This paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...

    Pełny tekst do pobrania w portalu

  • Platforma KASKADA jako system zapewniania bezpieczeństwa poprzez masową analizę strumieni multimedialnych w czasie rzeczywistym

    W artykule przedstawiono Platformę KASKADA rozumianą jako system przetwarzania danych cyfrowych i strumieni multimedialnych oraz stanowiącą ofertę usług wspomagających zapewnienie bezpieczeństwa publicznego, ocenę badań medycznych i ochronę własności intelektualnej. celem prowadzonych prac było stworzenie innowacyjnego systemu umozliwiajacego wydajną i masową analizę dokumentów cyfrowych i strumieni multimedialnych w czasie rzeczywistym...

  • Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Publikacja

    - CMC-Computers Materials & Continua - Rok 2020

    The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...

    Pełny tekst do pobrania w portalu

  • Further developments of parameterization methods of audio stream analysis for secuirty purposes

    Publikacja

    - Rok 2009

    The paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...

  • Implementing decisional trust: a first approach for smart reliable systems

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2009

    In this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system

    Publikacja

    Motivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.

    Pełny tekst do pobrania w portalu

  • Resolving conflicts in object tracking for automatic detection of events in video

    An algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Towards Cognitive and Perceptive Video Systems

    Publikacja
    • T. Akgun
    • C. Attwood
    • A. Cavallaro
    • C. Fabre
    • F. Poiesi
    • P. Szczuko

    - Rok 2014

    In this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Secure Quaternion Feistel Cipher for DICOM Images

    An improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The fast identification of explosives, natcotics and other chemicals carried on board of ships or transported in containers

    Publikacja

    - Rok 2011

    The fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is an advanced technique used in state-of-the art laboratories for fast identification of chemicals. No sample preparation is required, and identification can be carried out through transparent packing, such as plastic or glass,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A Paradigm for HV, MV, LV Distribution Grid Development Planning

    Publikacja

    In the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...

    Pełny tekst do pobrania w portalu

  • Karol Zdzisław Zalewski mgr inż.

    Osoby

  • Determinanty bezpieczeństwa energetycznego Mołdawii: między Unią Europejską a Federacją Rosyjską

    Publikacja

    - Rok 2018

    Artykuł ukazuje główne determinanty politycznego wymiaru bezpieczeństwa energetycznego Mołdawii wynikające ze stosunków z Unią Europejską i Federacją Rosyjską oraz ewolucji mołdawskiej sceny politycznej. Uwzględniając głównie rosnącą obecność rosyjskiego kapitału na mołdawskim rynku energetycznym od schyłku XX w., narastające zadłużenie za dostawy gazu wobec Gazpromu, rosyjskie szantaże energetyczne i handlowe, stopniowo wprowadzane...

  • IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA

    34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...

    Pełny tekst do pobrania w portalu

  • Testing Situation Awareness Network for the Electrical Power Infrastructure

    The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...

    Pełny tekst do pobrania w portalu

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

  • Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń

    W niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...

  • Computer -Aided Local Energy Planning Using ALEP-PL Software

    The issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...

  • Current risk analysis and management issues in technical systems.

    Dealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...

    Pełny tekst do pobrania w portalu

  • Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course

    In this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram) and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that...

    Pełny tekst do pobrania w portalu

  • Distributed measurement system with data transmission secured using XXTEA algorithm

    Publikacja

    - Przegląd Elektrotechniczny - Rok 2016

    The paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...

    Pełny tekst do pobrania w portalu

  • Quaternion Encryption Method for Image and Video Transmission

    Quaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...

  • Bezpieczeństwo transmisji danych w systemie KNX

    Publikacja

    - Rok 2014

    W artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.

  • Politiceskaja pressa o rosijsko-ukrainskich otnoszenijach i sobytiach w Krymu = Polish press covering russian- ukrainian relations and events in Crimea

    The paper made a review of opinions expressed by the most widely read Polish newpapers on the issue of Ukraine-Russian relations and events in Crimea in the period from early December 2013 till late March 2014. The author has brought to light attitudes to the events in Ukraine perceived while having in mind preserving security of Poland in political, economic and societal aspects. The EC policy towards the Russian Federation and...

  • Bezpieczeństwo transmisji danych w systemie KNX

    Publikacja

    - Rok 2015

    W artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.

  • Agnieszka Ubowska dr hab. inż.

    Dr hab. inż. Agnieszka Ubowska, prof. ZUT urodziła się w 1978 r. w Pile, gdzie ukończyła Technikum Ochrony Środowiska. W latach 1998-2003 studiowała na Wydziale  Technologii i Inżynierii Chemicznej Politechniki Szczecińskiej na kierunku ochrona środowiska. Stopień doktora nauk technicznych uzyskała w 2008 r., broniąc na Wydziale  Technologii i Inżynierii Chemicznej Politechniki Szczecińskiej pracę pt. „Hybrydowe hydrofilowe (ko)polimery...

  • Wireless Systems of Threats Monitoring

    The concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...

  • A video monitoring system using ontology-driven identification of threats

    Publikacja

    In this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Toward Intelligent Vehicle Intrusion Detection Using the Neural Knowledge DNA

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2018

    In this paper, we propose a novel intrusion detection approach using past driving experience and the neural knowledge DNA for in-vehicle information system security. The neural knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for classifying malicious vehicle control commands...

    Pełny tekst do pobrania w portalu

  • Spatial Modelling in Environmental Analysis and Civil Engineering

    As can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...

    Pełny tekst do pobrania w portalu

  • Andrzej Chybicki dr inż.

    Z wykształcenia informatyk, absolwent Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej, doktor nauk technicznych w dziedzinie informatyka specjalizujący się w przetwarzaniau danych przestrzennych w rozproszonych systemach informatycznych. Ukierunkowany na wykorzystywanie osiągnięć i wiedzy zakresu prowadzonych badań w przemyśle. Współpracował z szeregiem podmiotów przemysłu informatycznego, geodezyjnego...

  • Multichannel Human Body Communication

    Publikacja

    Human Body Communication is an attractive alternative for traditional wireless communication (Bluetooth, ZigBee) in case of Body Sensor Networks. Low power, high data rates and data security makes it ideal solution for medical applications. In this paper, signal attenuation for different frequencies, using FR4 electrodes, has been investigated. Performance of single and multichannel transmission with frequency modulation of analog...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improvement of subsoil and railway substructure by explosive means.

    Publikacja

    Quick and effective method of subsoil and railway substructure improvement by using explosive means (registered trade name: microblasting) allowes design and construct railways on lowered bearing soils (i.e. wetlands, marshlands, industrial by-products, municipal wastes, degraded antropogenic embankments). It is usefull and recommendable technology to construct new railways, modernization or maintenance and repairing of old ones...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Architecture and Basic Assumptions of RSMAD

    The study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...

  • RUSSIANS ON THE POLISH LABOUR MARKET

    The article looks into the employment of Russian citizens in Poland in 2004– 2018. It presents the legal basis for Russians’ entering Poland and taking up work without having to seek a work permit, and specifies who must apply for such a permit. Russian citizens can obtain refugee status under the Geneva Convention, which grants them the right to move freely, choose their place of residence and undertake paid employment, while...

    Pełny tekst do pobrania w portalu

  • Multisensor System for the Protection of Critical Infrastructure of Seaport

    Publikacja
    • M. Kastek
    • R. Dulski
    • M. Życzkowski
    • M. Szustakowski
    • P. Trzaskawka
    • W. Ciurapiński
    • P. Markowski
    • M. Karol
    • G. Grelowska
    • I. Gloza... i 2 innych

    - Rok 2013

    There are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...

  • Anonymity Architecture for Mobile Agent Systems

    Publikacja

    - Rok 2007

    The paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analysis and comparision of safety of children and adult passanger in car based on crash tests results

    Publikacja

    This paper presents analysis and comparision of safety of children and adult passanger in car based on crash tests results. The car crash test with four dummies, including two car seats allowed a direct comparison of the security under the same conditions of children and passengers directly to the car seat. Analysis of acceleration and video from the test allows to understand the phenomena during the collision, the air bags influence,...

  • Moving object detection and tracking for the purpose of multimodal surveillance system in urban areas

    Publikacja

    - Rok 2008

    Background subtraction method based on mixture of Gaussians was employed to detect all regions in a video frame denoting moving objects. Kalman filters were used for establishing relations between the regions and real moving objects in a scene and for tracking them continuously. The objects were represented by rectangles. The objects coupling with adequate regions including the relation of many-to-many was studied experimentally...

  • Implementation of the Concept of Flexicurity in the Selected Countries of Central Eastern Europe

    Publikacja

    The CEE countries have to create their own flexicurity policies which would take into account the employment policy guidelines, cultural traditions and socio-economic development. The aim of this article is to examine and evaluate the implementation of the flexicurity concept on the basis of the adopted set of composite indicators. The study covers 9 countries of the CEE region, and the research period covers the years 2007 and 2013....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream

    A background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich

    Publikacja

    Złożoność przestrzenna i gospodarcza oraz silne oddziaływanie działalności portowej na procesy społeczno-gospodarcze w regionie, wymaga opracowania specjalnego podejścia do zarządzania bezpieczeństwem na obszarach portowych. W pracy przedstawiono założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich uwzględniające zasady międzynarodowego kodeksu ISPS (International Ship and Port Security Code) oraz wymagania...

  • Methods of deep modification of low-bearing soil for the foundation of new and spare air runways

    After analyzing the impact of aircraft on the airport pavement (parking spaces, runways, startways), it was considered advisable to consider the problem of deep improvement or strengthening of its subsoil. This is especially true for low-bearing soil. The paper presents a quick and effective method of strengthening the subsoil intended for the construction of engineering structures used for civil...

    Pełny tekst do pobrania w portalu

  • Wykorzystanie programu AutoFocus do analizy protokołów kryptograficznych

    AutoFocus jest narzędziem wspomagającym wytwarzanie systemów wbudowanych charakteryzujących się wysoką niezawodnością. Artykuł prezentuje studium przypadku zastosowania narzędzia i związanej z nim metody formalnej Focus do analizy bezpieczeństwa (ang. security) protokołu tworzenia podpisu cyfrowego w środowisku rozproszonym. Zastosowana metoda formalna wykorzystana została jako ostatni etap zintegrowanej metody oceny protokołów...

  • Radiokomunikacja morska - problemy eksploatacyjne i rozwój

    Publikacja

    - Rok 2006

    W pracy omówiono stan obecny oraz wynikające z tego problemy eksploatacyjne występujące w radiokomunikacji morskiej, ze szczególnym odniesieniem do zagadnień związanych z bezpieczeństwem pracy na morzu. Scharakteryzowano kierunki rozwoju w obszarach głównych podsystemów składowych tej dziedziny łączności radiowej. Poruszono także coraz bardziej aktualny problem zastosowania systemów łączności dla potrzeb ochrony żeglugi (maritime...

  • CoRBAC – kontekstowo zorientowany model bezpieczeństwa

    Zaproponowano uogólniony model kontroli dostępu do usługowych systemów internetowych uwzględniający różne kategorie kontekstu. Określono wpływ kontekstu na model jak i architekturę systemu bezpieczeństwa. Podano przykład implementacji modelu i architektury bezpieczeństwa dla zestawu usług dotyczących e-uczelni i wstępnie oszacowano zalety takiego rozwiązania.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Modeling the impact of surface currents in a harbor using graph theory

    Publikacja

    - Zeszyty Naukowe Akademii Morskiej w Szczecinie - Rok 2016

    Ensuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...

    Pełny tekst do pobrania w portalu

  • RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band

    Publikacja

    In this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....

    Pełny tekst do pobrania w portalu

  • Challenges in providing support for management of evidence-based arguments

    The paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analysis of human behavioral patterns

    Publikacja

    - Rok 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system

    The study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...

  • Józef Woźniak prof. dr hab. inż.

    Prof. dr hab. inż. Józef Woźniak prof. zw. Politechniki Gdańskiej ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej w 1971 r. W 1976 r. uzyskał stopień doktora nauk technicznych, a w 1991 r. stopień doktora habilitowanego w dyscyplinie telekomunikacja i specjalności teleinformatyka. W styczniu roku 2002 otrzymał tytuł profesora nauk technicznych. W 1994 r. został mianowany na stanowisko profesora nadzwyczajnego w Politechnice...

  • Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey

    Resilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...

    Pełny tekst do pobrania w portalu

  • Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym

    Publikacja

    A method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application

    Publikacja

    - Rok 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • Multi-Stage Video Analysis Framework

    The chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A Novel Multicast Architecture of Programmable Networks

    Publikacja

    - Rok 2015

    In the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications

    Publikacja

    - Logistyka - Rok 2010

    The study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...