Filtry
wszystkich: 690
-
Katalog
- Publikacje 449 wyników po odfiltrowaniu
- Czasopisma 106 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 29 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 11 wyników po odfiltrowaniu
- Dane Badawcze 6 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: security
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Architektura bezpieczeństwa systemu netBaltic
PublikacjaW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Maciej Szczodrak dr inż.
Osoby -
New RFID readers for scalable RFID system
PublikacjaRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
The symmetric extendibility of quantum states
PublikacjaStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublikacjaW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublikacjaW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublikacjaThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES
PublikacjaProblems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Signatures and acoustic images of objects moving in water
PublikacjaObservation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublikacjaThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
Piotr Grudowski dr hab. inż.
OsobyDr hab. inż. Piotr Grudowski, profesor w Politechnice Gdańskiej karierę naukową rozpoczynał na Wydziale Mechanicznym Technologicznym Politechniki Gdańskiej w zespole „Inżynierii Jakości i Metrologii”. Stopień doktora nauk technicznych w dyscyplinie budowa i eksploatacja maszyn uzyskał w roku 1993 na Wydziale Mechanicznym PG a stopień doktora habilitowanego nauk ekonomicznych, w dyscyplinie nauk o zarządzaniu, w 2008 roku na Wydziale...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublikacjaArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublikacjaW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
ENISA Study: Challenges in Securing Industrial Control Systems
PublikacjaIn 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublikacjaDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublikacjaThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Cybersecurity of Enterprise Infrastructure 2023
Kursy OnlineThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Cybersecurity of Enterprise Infrastructure 2024
Kursy OnlineThe aim of the course is for a student to acquire fundamental knowledge on cybersecurity management in organisations. During the course the concepts and methods associated with of an information security management system, cybersecurity standards and guidelines, cybersecurity management process, cybersecurity policy, cybersecurity threats, risk management, protection controls and the cost of the cybersecurity management will be...
-
Unraveling Luminescent Energy Transfer Pathways: Futuristic Approach of Miniature Shortwave Infrared Light-Emitting Diode Design
Dane BadawczePhosphor-converted shortwave infrared phosphor light-emitting diodes (pc-SWIR LEDs, 900–1700 nm) are promising next-generation portable light sources for spectroscopy, security, optical communication, and medical applications. A typical design strategy involves energy transfer from Cr3+ to Ni2+, and thus, energy transfer from Cr3+–Cr3+ pairs to Ni2+...
-
Generalized access control in hierarchical computer network
PublikacjaThe paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublikacjaInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
The role of rewards and demands in burnout among surgical nurses
PublikacjaObjective: Job rewards have both, an intrinsic and an extrinsic motivational potential, and lead to employees’ development as well as help them to achieve work goals. Rewards can balance job demands and protect from burnout. Due to changes on the labour market, new studies are needed. The aim of our study was to examine the role of demands and individual rewards (and their absence) in burnout among surgical nurses. Materials and...
-
Kacper Wereszko mgr inż.
OsobyKacper Wereszko uzyskał tytuł zawodowy magistra inżyniera w 2016 roku (kierunek: informatyka, specjalność: algorytmy i technologie internetowe), a od 2017 roku jest uczestnikiem studiów doktoranckich z dyscypliny Informatyka. Obecnie pracuje jako asystent w Katedrze Algorytmów i Modelowania Systemów. Jego zainteresowania badawcze obejmują badanie własności bezpieczeństwa w grafach, problemy dominowania w grafach oraz ich praktyczne...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena
PublikacjaW niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublikacjaNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublikacjaThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...
-
Bartosz Woliński dr inż.
OsobyProwadzone przedmioty Informatization strategies (sem. zim. 20/21, sem. zim. 22/23) Technologie zespołów IT (sem zim. 20/21) Decision analysis (sem zim. 20/21, sem zim. 21/22, sem letni 22/23) Kontroling w IT (sem. letni 20/21, 21/22, 22/23) Projekty w przedsiębiorstwie (sem. letni 20/21, 22/23) Integrated enterprise information systems (sem. zim. 20/21) Managing enterprise IT infrastructure and security (sem. letni 2021/22) Decision...
-
Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review
PublikacjaFood security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...
-
Threat intelligence platform for the energy sector
PublikacjaIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway
PublikacjaZapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...
-
Bezpieczeństwo elektroenergetyczne dla pokoleń
PublikacjaW artykule przeanalizowano źródła energii pierwotnej, ich wystarczalnośći dywersyfikację w skali lokalnej i globalnej, problem dekarbonizacji polskiej elektroenergetyki na tle europejskiej polityki klimatycznej, osiągalność źródeł gazu jako efektywnego paliwa dla energetyki, polski program energetyki jądrowej, bezpieczeństwo zasilania elektrycznych systemów trakcyjnych jako strategicznej alternatywy...
-
Marek Przyborski dr hab. inż.
OsobyMarek Przyborski (ur. 20.03.1964 r. w Chełmży) – specjalista z zakresu teledetekcji i fotogrametrii bliskiego zasięgu. Prowadzi badania w zakresie wykorzystania tzw. „szybkich kamer” do analizy zjawisk szybkozmiennych. Współautor i autor publikacji traktujących o szeroko rozumianej teledetekcji w zastosowaniach związanych z budownictwem, transportem, inżynierią środowiska oraz bezpieczeństwem narodowym. Jest autorem licznych publikacji...
-
A place of school in the idea of the sustainable development
PublikacjaWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Self-Organizing Wireless Monitoring System for Containers
PublikacjaThis paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...
-
Self-organizing wireless monitoring system for cargo containers
PublikacjaThis paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...
-
Platforma KASKADA jako system zapewniania bezpieczeństwa poprzez masową analizę strumieni multimedialnych w czasie rzeczywistym
PublikacjaW artykule przedstawiono Platformę KASKADA rozumianą jako system przetwarzania danych cyfrowych i strumieni multimedialnych oraz stanowiącą ofertę usług wspomagających zapewnienie bezpieczeństwa publicznego, ocenę badań medycznych i ochronę własności intelektualnej. celem prowadzonych prac było stworzenie innowacyjnego systemu umozliwiajacego wydajną i masową analizę dokumentów cyfrowych i strumieni multimedialnych w czasie rzeczywistym...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublikacjaThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublikacjaThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Implementing decisional trust: a first approach for smart reliable systems
PublikacjaIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublikacjaMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaAn algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...
-
Towards Cognitive and Perceptive Video Systems
PublikacjaIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
The fast identification of explosives, natcotics and other chemicals carried on board of ships or transported in containers
PublikacjaThe fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is an advanced technique used in state-of-the art laboratories for fast identification of chemicals. No sample preparation is required, and identification can be carried out through transparent packing, such as plastic or glass,...
-
A Paradigm for HV, MV, LV Distribution Grid Development Planning
PublikacjaIn the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...
-
Karol Zdzisław Zalewski mgr inż.
Osoby -
Determinanty bezpieczeństwa energetycznego Mołdawii: między Unią Europejską a Federacją Rosyjską
PublikacjaArtykuł ukazuje główne determinanty politycznego wymiaru bezpieczeństwa energetycznego Mołdawii wynikające ze stosunków z Unią Europejską i Federacją Rosyjską oraz ewolucji mołdawskiej sceny politycznej. Uwzględniając głównie rosnącą obecność rosyjskiego kapitału na mołdawskim rynku energetycznym od schyłku XX w., narastające zadłużenie za dostawy gazu wobec Gazpromu, rosyjskie szantaże energetyczne i handlowe, stopniowo wprowadzane...
-
IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA
Publikacja34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublikacjaW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublikacjaW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublikacjaThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Current risk analysis and management issues in technical systems.
PublikacjaDealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...
-
Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course
PublikacjaIn this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram) and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that...
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublikacjaThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Quaternion Encryption Method for Image and Video Transmission
PublikacjaQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublikacjaW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Politiceskaja pressa o rosijsko-ukrainskich otnoszenijach i sobytiach w Krymu = Polish press covering russian- ukrainian relations and events in Crimea
PublikacjaThe paper made a review of opinions expressed by the most widely read Polish newpapers on the issue of Ukraine-Russian relations and events in Crimea in the period from early December 2013 till late March 2014. The author has brought to light attitudes to the events in Ukraine perceived while having in mind preserving security of Poland in political, economic and societal aspects. The EC policy towards the Russian Federation and...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublikacjaW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Agnieszka Ubowska dr hab. inż.
OsobyDr hab. inż. Agnieszka Ubowska, prof. ZUT urodziła się w 1978 r. w Pile, gdzie ukończyła Technikum Ochrony Środowiska. W latach 1998-2003 studiowała na Wydziale Technologii i Inżynierii Chemicznej Politechniki Szczecińskiej na kierunku ochrona środowiska. Stopień doktora nauk technicznych uzyskała w 2008 r., broniąc na Wydziale Technologii i Inżynierii Chemicznej Politechniki Szczecińskiej pracę pt. „Hybrydowe hydrofilowe (ko)polimery...
-
Wireless Systems of Threats Monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
A video monitoring system using ontology-driven identification of threats
PublikacjaIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Toward Intelligent Vehicle Intrusion Detection Using the Neural Knowledge DNA
PublikacjaIn this paper, we propose a novel intrusion detection approach using past driving experience and the neural knowledge DNA for in-vehicle information system security. The neural knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for classifying malicious vehicle control commands...
-
Spatial Modelling in Environmental Analysis and Civil Engineering
PublikacjaAs can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...
-
Andrzej Chybicki dr inż.
OsobyZ wykształcenia informatyk, absolwent Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej, doktor nauk technicznych w dziedzinie informatyka specjalizujący się w przetwarzaniau danych przestrzennych w rozproszonych systemach informatycznych. Ukierunkowany na wykorzystywanie osiągnięć i wiedzy zakresu prowadzonych badań w przemyśle. Współpracował z szeregiem podmiotów przemysłu informatycznego, geodezyjnego...
-
Multichannel Human Body Communication
PublikacjaHuman Body Communication is an attractive alternative for traditional wireless communication (Bluetooth, ZigBee) in case of Body Sensor Networks. Low power, high data rates and data security makes it ideal solution for medical applications. In this paper, signal attenuation for different frequencies, using FR4 electrodes, has been investigated. Performance of single and multichannel transmission with frequency modulation of analog...
-
Improvement of subsoil and railway substructure by explosive means.
PublikacjaQuick and effective method of subsoil and railway substructure improvement by using explosive means (registered trade name: microblasting) allowes design and construct railways on lowered bearing soils (i.e. wetlands, marshlands, industrial by-products, municipal wastes, degraded antropogenic embankments). It is usefull and recommendable technology to construct new railways, modernization or maintenance and repairing of old ones...
-
Architecture and Basic Assumptions of RSMAD
PublikacjaThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
RUSSIANS ON THE POLISH LABOUR MARKET
PublikacjaThe article looks into the employment of Russian citizens in Poland in 2004– 2018. It presents the legal basis for Russians’ entering Poland and taking up work without having to seek a work permit, and specifies who must apply for such a permit. Russian citizens can obtain refugee status under the Geneva Convention, which grants them the right to move freely, choose their place of residence and undertake paid employment, while...
-
Multisensor System for the Protection of Critical Infrastructure of Seaport
PublikacjaThere are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...
-
Anonymity Architecture for Mobile Agent Systems
PublikacjaThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Analysis and comparision of safety of children and adult passanger in car based on crash tests results
PublikacjaThis paper presents analysis and comparision of safety of children and adult passanger in car based on crash tests results. The car crash test with four dummies, including two car seats allowed a direct comparison of the security under the same conditions of children and passengers directly to the car seat. Analysis of acceleration and video from the test allows to understand the phenomena during the collision, the air bags influence,...
-
Moving object detection and tracking for the purpose of multimodal surveillance system in urban areas
PublikacjaBackground subtraction method based on mixture of Gaussians was employed to detect all regions in a video frame denoting moving objects. Kalman filters were used for establishing relations between the regions and real moving objects in a scene and for tracking them continuously. The objects were represented by rectangles. The objects coupling with adequate regions including the relation of many-to-many was studied experimentally...
-
Implementation of the Concept of Flexicurity in the Selected Countries of Central Eastern Europe
PublikacjaThe CEE countries have to create their own flexicurity policies which would take into account the employment policy guidelines, cultural traditions and socio-economic development. The aim of this article is to examine and evaluate the implementation of the flexicurity concept on the basis of the adopted set of composite indicators. The study covers 9 countries of the CEE region, and the research period covers the years 2007 and 2013....
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublikacjaA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich
PublikacjaZłożoność przestrzenna i gospodarcza oraz silne oddziaływanie działalności portowej na procesy społeczno-gospodarcze w regionie, wymaga opracowania specjalnego podejścia do zarządzania bezpieczeństwem na obszarach portowych. W pracy przedstawiono założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich uwzględniające zasady międzynarodowego kodeksu ISPS (International Ship and Port Security Code) oraz wymagania...
-
Methods of deep modification of low-bearing soil for the foundation of new and spare air runways
PublikacjaAfter analyzing the impact of aircraft on the airport pavement (parking spaces, runways, startways), it was considered advisable to consider the problem of deep improvement or strengthening of its subsoil. This is especially true for low-bearing soil. The paper presents a quick and effective method of strengthening the subsoil intended for the construction of engineering structures used for civil...
-
Wykorzystanie programu AutoFocus do analizy protokołów kryptograficznych
PublikacjaAutoFocus jest narzędziem wspomagającym wytwarzanie systemów wbudowanych charakteryzujących się wysoką niezawodnością. Artykuł prezentuje studium przypadku zastosowania narzędzia i związanej z nim metody formalnej Focus do analizy bezpieczeństwa (ang. security) protokołu tworzenia podpisu cyfrowego w środowisku rozproszonym. Zastosowana metoda formalna wykorzystana została jako ostatni etap zintegrowanej metody oceny protokołów...
-
Radiokomunikacja morska - problemy eksploatacyjne i rozwój
PublikacjaW pracy omówiono stan obecny oraz wynikające z tego problemy eksploatacyjne występujące w radiokomunikacji morskiej, ze szczególnym odniesieniem do zagadnień związanych z bezpieczeństwem pracy na morzu. Scharakteryzowano kierunki rozwoju w obszarach głównych podsystemów składowych tej dziedziny łączności radiowej. Poruszono także coraz bardziej aktualny problem zastosowania systemów łączności dla potrzeb ochrony żeglugi (maritime...
-
CoRBAC – kontekstowo zorientowany model bezpieczeństwa
PublikacjaZaproponowano uogólniony model kontroli dostępu do usługowych systemów internetowych uwzględniający różne kategorie kontekstu. Określono wpływ kontekstu na model jak i architekturę systemu bezpieczeństwa. Podano przykład implementacji modelu i architektury bezpieczeństwa dla zestawu usług dotyczących e-uczelni i wstępnie oszacowano zalety takiego rozwiązania.
-
Modeling the impact of surface currents in a harbor using graph theory
PublikacjaEnsuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublikacjaIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....
-
Challenges in providing support for management of evidence-based arguments
PublikacjaThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
Analysis of human behavioral patterns
PublikacjaWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system
PublikacjaThe study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...
-
Józef Woźniak prof. dr hab. inż.
OsobyProf. dr hab. inż. Józef Woźniak prof. zw. Politechniki Gdańskiej ukończył studia na Wydziale Elektroniki Politechniki Gdańskiej w 1971 r. W 1976 r. uzyskał stopień doktora nauk technicznych, a w 1991 r. stopień doktora habilitowanego w dyscyplinie telekomunikacja i specjalności teleinformatyka. W styczniu roku 2002 otrzymał tytuł profesora nauk technicznych. W 1994 r. został mianowany na stanowisko profesora nadzwyczajnego w Politechnice...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublikacjaResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym
PublikacjaA method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublikacjaAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Multi-Stage Video Analysis Framework
PublikacjaThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications
PublikacjaThe study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...