Filtry
wszystkich: 2701
wybranych: 2390
-
Katalog
- Publikacje 2390 wyników po odfiltrowaniu
- Czasopisma 11 wyników po odfiltrowaniu
- Konferencje 3 wyników po odfiltrowaniu
- Osoby 20 wyników po odfiltrowaniu
- Projekty 5 wyników po odfiltrowaniu
- Kursy Online 99 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 169 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: USABLE CYBERSECURITY
-
Cybersecurity in the Electricity Sector
PublikacjaThis book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. The author explains the current state of cybersecurity in the electricity market, and cybersecurity standards that apply in that sector. He then offers a systematic approach to cybersecurity management, including new methods of cybersecurity assessment,...
-
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value
Publikacja -
Stable and unstable bifurcation in the von Karman problem for a circular plate
PublikacjaW niniejszej pracy badamy równania von Karmana dla cienkiej, sprężystej, kołowej płyty, która znajduje się na sprężystym podłożu, pod działaniem sił ściskających wzdłuż swojego brzegu.Stosując metody analizy nieliniowej, dowodzimy istnienia stabilnychi niestabilnych punktów bifurkacji w zbiorze rozwiązań badanych równań.
-
A Plan for Training Global Leaders in Cybersecurity
PublikacjaReferat prezentuje wizję globalnego uniwersytetu, który będzie kształcił potencjalnych liderów w obszarze globalnego cyber-bezpieczeństwa. Opisuje on profil absolwenta z uwzględnieniem kompetencji technicznych, organizacyjnych, psychologiczno-socjologicznych i etycznych, a następnie przedstawia drogę realizacji tej wizji z uwzględnieniem istniejących zasobów.
-
SERVICE-ORIENTED CYBERSPACE FOR IMPROVING CYBERSECURITY
PublikacjaThe paper presents a cyberspace model where different categories of IT services are offered and used largely. A general cybersecurity policy is considered and the corresponding cybersecurity strategies are shown. The role of such technologies as: Internet of Things, Cloud Computing and Big Data is analyzed in order to improve the cybersecurity of a cyberspace. A new kind of service oriented cyberspace is proposed and its main properties...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublikacjaAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublikacjaCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublikacjaResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Standards with cybersecurity controls for smart grid - A systematic analysis
PublikacjaIn recent years numerous standards related to the cybersecurity of smart grids have been published, which led to the challenge for operators in obtaining indications that match their specific objectives and contexts. Although several studies approached this problem by providing more or less comprehensive surveys and overviews of smart grid cybersecurity standards, none of them was dedicated to the actual and important subject of...
-
Building a cybersecurity culture of public administration system in Poland
Publikacja -
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublikacjaA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublikacjaInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublikacjaThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study
PublikacjaThe methods of cybersecurity costs' evaluation are inclined towards the cost of incidents or technological acquirements. At the same time, there are other, less visible costs related to cybersecurity that require proper recognition. These costs are associated with the actions and the time spent by employees on activities connected to cybersecurity management. The costs form a considerable component of cybersecurity expenditures,...
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublikacjaThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublikacjaThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Current issues of functional safety and cybersecurity analysis of the industrial and critical infrastructures
PublikacjaThis article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublikacjaThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis
PublikacjaContemporary approaches to the estimation of cybersecurity costs in organisations tend to focus on the cost of incidents or technological investments. However, there are other, less transparent costs related to cybersecurity management that need to be properly recognised in order to get a complete picture. These costs are associated with everyday activities and the time spent by employees on cybersecurity-related actions. Such...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublikacjaSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Designing Control and Protection Systems with Regard to Integrated Functional Safety and Cybersecurity Aspects
PublikacjaThis article addresses current problems of risk analysis and probabilistic modelling for functional safety management in the life cycle of safety-related systems. Two main stages in the lifecycle of these systems are distinguished, namely the design and operation. The risk analysis and probabilistic modelling differ in these stages in view of available knowledge and data. Due to the complexity and uncertainty involved, both qualitative...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublikacjaRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Remote measurement of building usable floor area - Algorithms fusion
PublikacjaRapid changes that are taking place in the urban environment have significant impact on urban growth. Most cities and urban regions all over the world compete to increase resident and visitor satisfaction. The growing requirements and rapidity of introducing new technologies to all aspects of residents' lives force cities and urban regions to implement "smart cities" concepts in their activities. Real estate is one of the principal...
-
Application of passive sampling techniques as a usable tool in the field of environmental quality monitoring
PublikacjaAnalysis of literature data published for the past 20 years leads to the conclusion, that passive sampling technique has been developing very quickly and is commonly used in the field of monitoring pollutants in air, water and soil environment. The popularity of application of passive sampling techniques in analytical and environmental chemistry results from its many advantages e.g.: Simplicity in use, low costs of exploitation,...
-
Concept of Multifactor Method and Non-Functional Requirements Solution to Increase Resilience through Functional Safety with Cybersecurity Analysis
PublikacjaIn the process of designing safety systems, an integrated approach in safety and cybersecurity analysis is necessary. The paper describes a new technique of increasing resilience through integrated analysis of functional safety and cybersecurity. It is a modeling methodology based on the combination of the multifactor method utilizing modified risk graphs, used previously for Safety Integrity Level (SIL) assessment, and the Non-Functional...
-
Are HBO−and BOH−electronically stable?
Publikacja -
Study on stable dispersion of functionalized Fe-MWCNTs
Publikacja -
Analysis of circular cavity with tunable combline resonator
PublikacjaArtykuł prezentuje analizę rozpraszania fali elektromagnetycznej na obiekcie cylindrycznym umieszczonym we wnęce rezonansowej. Metodą analizy jest metoda dopasowania rodzajów.
-
Weakly connected domination stable trees [online]
PublikacjaPraca dotyczy pełnej charakteryzacji drzew stabilnych ze względu na liczbę dominowania słabo spójnego.
-
A Control Theoretical Approach to Spectral Factorization is Unstable
PublikacjaLocal stability analysis of a recently proposed recursive feedback-based approach to spectral factorization is performed. The method is found not to give stability guarantees. Interestingly enough, its global behavior often allows one to obtain reasonable approximations of spectral factorizations if a suitable stopping criterion is employed.
-
Tunable Waveguide Filter with Bow-Tie Metallic Posts.
PublikacjaBadanie i synteza filtru falowodowego zawiewrającego metalowe rezonatory motylkowe (Bow-Tie). Wykorzystano zmodyfikowaną procedurę iteracyjną i metodę dopasowania rodzajów w celu rozwiązania problemu brzegowego na pojedynczej sekcji filtru i określenie pola rozproszonego od rezonatora motylkowego. Obrót i przemieszczenie opisywane struktury w złączu falowodowym umożliwia zmianę odpowiedzi częstotliwościowych układu. Efekt rotacji...
-
Synthesis and properties of UV-curable poly(imideurethane) acrylates.
PublikacjaOtrzymano światłoczułe poli(imidouretano) akrylany (PIUA) które użyte zostały do wytwarzania światłoczułych kompozycji z dodatkiem reaktywnych rozcieńczalników i różnych fotoinicjatorów. Uzyskane z nich cienkie warstwy polimerowe ulegały usieciowaniu pod działaniem światłaUV w ciągu 10-30 sek. W badaniach fotolitograficznych uzyskano z ich użyciem ścieżki izolacyjne o rozdzielczości 10 mikrometrów. Usieciowane PIUA scharakteryzowano...
-
A model of a tunable quantum dot in a semiconducting carbon nanotube
Publikacja -
Synthesis of Thermally Stable Energetic 1,2,3-Triazole Derivatives
Publikacja -
Tunable broadband integrated circuits for adaptive optical interconnects
Publikacja -
Adaptive neural voltage controller with tunable activation gain
PublikacjaW artykule przedstawiono model adaptacyjnego neuronowego regulatora napięcia dla turbogeneratora z nastrojonym współczynnikiem wzmocnienia funkcji przynależności. Ten model jest kombinacją klasycznego neuronowego modelu i neuronowego modelu z współczynnikiem wzmocnienia funkcji przynależności zależnym od warunków pracy obiektu.Przedstawiono, także wyniki symulacji mające na celu badania efektywności proponowanego regulatora dla...
-
pH-tunable equilibria in azocrown ethers with histidine moieties
PublikacjaEtery koronowe posiadające elektro- i fotoaktywne reszty azowe oraz ugrupowania z ruchliwymi protonami jak w grupie COOH histydyny charakteryzują się unikalnym, zależnym od pH, efektem stymulowania pozornej obecności/nieobecności ugrupowania azowego. Obserwowane różnice właściwości elektrochemicznych eterów azokoronowych z resztą N-acetylohistydyny lub resztami imidazolu uwidaczniają się przebiegiem chemicznej redukcji w silnie...
-
Tunable Dielectric Switching of (Quinuclidinium)[MnCl4] Hybrid Compounds
PublikacjaInorganic−organic hybrid QMnCl (Q = quinuclidinium) crystals were synthesized and characterized. The X-ray and variable-temperature IR/Raman analysis demonstrate that the crystals undergo a reversible structural phase transition, which originates from an order−disorder process and is related to the dynamics of the organic Q cation. Dielectric function measurements disclose a switchability between low (“OFF”) and high (“ON”) dielectric...
-
Two complementary approaches for the synthesis and isolation of stable phosphanylphosphaalkenes
PublikacjaPhospha-Wittig (phosphanylphosphinidene titanium(IV) complex) and phospha-Peterson (lithiated diphosphane) reactions were used to obtain phosphanylphosphaalkenes with the general formula XYC=P-PtBu2 (X = alkyl, aryl group or H; Y = alkyl or aryl group). Therefore, two series of reactions with different ketones and aldehydes were performed. An examination revealed that the two methods are complementary. For smaller carbonyl compounds,...
-
Numerical crash analysis of the cable barrier
PublikacjaSafety barriers are used to increase road safety. Their basic task is to prevent the errant vehicle from getting off the road in places which are potentially dangerous for vehicle passengers. Barriers, which are used on European roads, must fulfill the requirements of EN 1317 standards by passing appropriate crash tests. Because of their high cost, numerical simulations are increasingly used to evaluate the properties of safety...
-
Lamp of adjustable spectrum for photographic usage
PublikacjaPhotography is a unique rapidly growing interdisciplinary field encompassing aspects of science, art and technology. Expectations of photographers are steadily increasing with the development of technology. One of the areas playing a crucial role in photography is lighting. Consequently, several types of light sources for photographic use have been developed. The ongoing research in this field concentrates on lamps with tunable...
-
Analysis of the usage possibility of the electromagnetic curtain
PublikacjaIn the article the definition of IED has been presented as well as its classification and countering methods. The concept of AEGIS device for neutralization of RCIED has been presented. The usage possibility of AEGIS device in civilian environments has been analy sed
-
Modelling of MV and HV Cable Lines
PublikacjaOverhead and cable lines are fundamental elements of power systems. Participation of cable lines is smaller and their percentage decreases as voltage is increased. HV cable lines are often built with the use of cables which are composed of coaxial metallic sheaths. Such cables are also often used in MV networks. The sheath may operate in different confgurations. In the case of Polish MV network the sheaths are earthed at both ends....
-
Optical properties of daylight curable resin doped with nanodiamond powder
PublikacjaIn this paper a new material for 3D printing was elaborated on. Since diamond has very good optical properties, an idea occurred to us to apply it in 3D printing process. A mixture of nanodiamond powder and a standard 3D printing resin was created and several printouts have been completed. They have been tested for their abilities to transmit and absorb light in a wide spectrum of wavelengths. It turned out that the nanopowder...
-
Toward Polyethylene–Polyester Block and Graft Copolymers with Tunable Polarity
PublikacjaThe synthesis and characterization of polyethylene–polyester block and graft copolymers and their potential as compatibilizers in polyethylene-based polymer blends are being described. The various routes to functionalized polyethylenes and the corresponding block/graft copolymers have been compared and evaluated for their scalability to industrial scale production. Hydroxyl chain-end and randomly OH-functionalized HDPE as well...
-
pH -Tunable equilibria in azocrown ethers with histidine moieties, Bioelectrochemistry
PublikacjaThe crown ethers with electro- and photoactive azo moieties containing substituents with mobile protons such as in the –COOH groups of histidine, show unique effect of pH switched on/off presence of the azo form. The differences observed for the electrochemical behavior of azocrown ethers with N-acetylhistidine and imidazole moieties reveal the interference of a chemical reduction pathway in strongly acidified solutions. This...
-
Moderately Reactive Molecules Forming Stable Ionic Compounds with Superhalogens
Publikacja -
Analytical design of stable delta-domain generalized predictive control
PublikacjaPraca dotyczy analitycznej metody projektowania układów sterowania skalarnymi (SISO) obiektami czasu ciągłego według strategii uogólnionego sterowania predykcyjnego (GPC) w oparciu o dyskretnoczasowe modele takich obiektów. Założono wykorzystanie numeryczne odpornych modeli opartych o tak zwany operator delta. Przyjmując kwadratowy funkcjonał kosztów, w którym prognozowany przebieg przyszłego wyjścia sterowanego obiektu porównywany...
-
The influence of durable contact on human tissue on austenitic biomaterials behaviour
PublikacjaBadania opierają się na studium pojedynczego przypadku dwoch wkrętów ze stali austenitycznej, które były implantowane do organizmu człowieka jako element łączący złamaną kość piszczelową. Oba wkręty zostały zostały wkręcone w jednakowych warunkach, na okres 1 roku, po którym miały zostać wyjęte. Na skutek komplikacji życiowej nosiciela, wkręty te zostały usunięte dopiero podczas zabiegu po okresie 8 lat.
-
Extraction of stable foreground image regions for unattended luggage detection
PublikacjaA novel approach to detection of stationary objects in the video stream is presented. Stationary objects are these separated from the static background, but remaining motionless for a prolonged time. Extraction of stationary objects from images is useful in automatic detection of unattended luggage. The proposed algorithm is based on detection of image regions containing foreground image pixels having stable values in time and...