Filtry
wszystkich: 439
wybranych: 221
Wyniki wyszukiwania dla: ATTACUS ATLAS
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublikacjaIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
A random access protocol under backoff attack: performance and game-theoretic deterrent
PublikacjaPrzedstawiono metodę obrony przed atakiem na protokół CSMA/CA, opartą na generacji sekwencji zagłuszających z wykorzystaniem wzajemnej słyszalności stacji. Na podstawie analizy wypłat odpowiedniej gry w formie rozwiniętej pokazano możliwość osiągania punktu równowagi odpowiadającego standardowym ustawieniom protokołu.
-
High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
PublikacjaThis work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublikacjaThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
WHY SHOULD WE ADOPT NON-USED ATTICS OF MONUMENTAL SACRAL CATHOLIC CHURCHES FOR SECULAR PURPOSES?
PublikacjaA motive for adapting the desecrated churches to new purposes is a broadly discussed matter, progressively better investigated and defined. Is it advisable to introduce a new, permanent function, complementary to the sacred one in the historical ecclesial buildings? This paper presents the results of the research on benefits of adapting the non-utilized attics of monumental churches still performing their sacred function, located...
-
Analiza dobrych praktyk ekonomii społecznej w Polsce – o zasobach i ich pozyskiwaniu w przedsiębiorczości społecznej
PublikacjaArtykuł, przy wykorzystaniu analizy zawartości (content analysis) przedstawionych w dobrych praktykach przedsiębiorstw społecznych i ekonomii społecznej, stanowi próbę przeanalizowania rodzajów zasobów wykorzystywanych przez przedsiębiorstwa społeczne, procesów pozyskiwania zasobów oraz trudności się w nich pojawiających. W tym celu wykorzystano profile 25 przypadków dobrych praktyk, prezentowanych i promowanych na najbardziej...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublikacjaThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Finger Vein Presentation Attack Detection Method Using a Hybridized Gray-Level Co-Occurrence Matrix Feature with Light-Gradient Boosting Machine Model
PublikacjaPresentation Attack Detection (PAD) is crucial in biometric finger vein recognition. The susceptibility of these systems to forged finger vein images is a significant challenge. Existing approaches to mitigate presentation attacks have computational complexity limitations and limited data availability. This study proposed a novel method for identifying presentation attacks in finger vein biometric systems. We have used optimal...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublikacjaA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Mechanical and structural investigations of wings of selected insect species
PublikacjaThis paper presents research and measurements leading to obtaining the Young’s modulus of wing bearing structures of selected insect species. A small testing machine intended for three-point bending and equipped with instruments registering low forces was constructed for the needs of the experiment. The machine was used to perform numerous bending tests of wings of three species of insects (obtained from a breeding farm): Attacus...
-
Performance evaluation of GPS anti-spoofing system based on antenna array processing
PublikacjaThis article concerns the problem of detection and mitigation of spoofing attacks in Global Navigation Satellite Systems. First, background information about spoofing and its possible countermeasures is provided. Next, concept of a novel GPS anti-spoofing system based on antenna array processing is presented and implementation of prototype of this system is described. The third section outlines the performance evaluation of proposed...
-
Standard MST i jego wykorzystanie przy opisie jednostek chorobowych
PublikacjaW podrozdziale przedstawiono ujednolicony sposób opisu chorób gastroentero-logicznych. Omówiono założenia standardu MST oraz model dokumentu elektroni-cznego. Opisano jak zaimplementowano ten standard w systemie ERS i jak natej podstawie utworzono elektroniczny atlas endoskopowy.
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublikacjaW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Improved jamming resistance using electronically steerable parasitic antenna radiator
PublikacjaThis paper presents an idea of using an Electronically Steerable Parasitic Antenna Radiator (ESPAR) for jamming suppression in IEEE 802.11b networks. Jamming (intentional interference) attacks are known to be effective and easy to perform, which may impose connectivity problems in applications concerning Internet of Things (IoT). In our paper, theoretical considerations are presented and the results of experiments performed in...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublikacjaNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
Ekologiczne aspekty projektowania fundamentów palowych
PublikacjaProjektowanie i wykonawstwo fundamentów palowych realizowane jest obecnie w coraz trudniejszych warunkach gruntowych. Wszystkie rodzaje budownictwa wkraczają również na tereny ekologicznie cenne. W referacie przedstawiono technologie, np. pale Omega, Atlas, przemieszczeniowe wiercone, prefabrykowane, które w dużym stopniu eliminują niekorzystne oddziaływanie fundamentów palowych na środowisko.
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublikacjaTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublikacjaThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublikacjaThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...
-
Toksyczność ekosystemu. W: Rzeka Bug, zasoby wodne i przyrodnicze. Pod red.J. Dojlido, W. Kowalczewskiego, R. Miłaszewskiego, J. Ostrowskiego. Warsza- wa: IMGW, Wyż. Szk. Ekol. i Zarz.**2003 s. 352-361, 4 rys. 2 tab. bibliogr. 5 poz. Seria Atlasy i Monografie
PublikacjaOmówiono wyniki badań ekotoksykologicznych prowadzonych w ramach ''Projektupilotowego wdrożenia wytycznych monitoringu i oceny jakości wód transgrani-cznych w zlewni rzeki Bug w ramach Konwencji EKO/ONZ w ochronie i użytkowa-niu cieków transgranicznych i jezior międzynarodowych''. Badania dotyczyły o-ceny ekotoksykologicznej wód, osadów i ścieków w zlewni rzeki Bug. Badaniadowodzą, że jakość ekotoksykologiczna wód i osadów...
-
Revalorisation of the Szewalski’s concept of the law of varying the last-stage blade retraction in a gas-steam turbine
PublikacjaThe article presents the implementations of the free vortex law to the blade of the last stage of a gas-steam turbine. First, a thermodynamic analysis was carried out, determining the parameters at the inlet, then the number of stages of the high and low-pressure part of the turbine was constructed, together with the kinematics and velocity vectors for subsequent stages of the axial turbine. The last step of article was to take...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Problemy z deszczem. Wody opadowe – ustalenia ilościowe
PublikacjaProblemy określenia wskaźników ilościowych przy zagospodarowaniu wód opadowych w Polsce. Wymagania formalne, problematyczność ustaleń ilościowych wg wzorów empirycznych. Tworzenie atlasu elektronicznego. Problem zdarzeń niemieszczących się typowych schematach. Zmiany wprowadzane nową ustawą prawo wodne.
-
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast
PublikacjaRecent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Ocena ryzyka na sieci dróg krajowych w Polsce - program EURORAP
PublikacjaEuropejski Atlas BRD jest narzędziem ułatwiającym: klasyfikację dróg z uwzględnieniem ryzyka, porównanie stopnia ryzyka na sieci dróg poszczególnych krajów, województw, wybór działań poprawiających stan bezpieczeństwa ruchu na drogach, szerokie komunikowanie o ryzyku na drogach za pomocą map, stron internetowych itp.Zaprezentowane wyniki oceny ryzyka na drogach krajowych są przydatne: kierowcom planującym bezpieczna podróż po kraju,...
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublikacjaThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection
PublikacjaA methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....
-
Considerations of Computational Efficiency in Volunteer and Cluster Computing
PublikacjaIn the paper we focus on analysis of performance and power consumption statistics for two modern environments used for computing – volunteer and cluster based systems. The former integrate computational power donated by volunteers from their own locations, often towards social oriented or targeted initiatives, be it of medical, mathematical or space nature. The latter is meant for high performance computing and is typically installed...
-
Wody opadowe 2016
PublikacjaCharakterystyczne problemy wód opadowych które wystąpiły w 2016 r. Omówiono przewidywane kierunki zmian w polskim systemie prawnym wraz z wynikającymi stąd zagrożeniami. Specyficzne problemy zbiornika retencyjnego. Platforma retencja pl, informacja o przygotowaniu polskiego atlasu elektronicznego wód opadowych PANDA. Podstawowe informacje dotyczące opadu gdańskiego z lipca 2016.
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublikacjaStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Biometric identity verification
PublikacjaThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublikacjaNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publikacjaarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Bioterrorism — characteristics and possibilities of prevention
PublikacjaIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Magnetic field microsensor based on GaAs MESFET
PublikacjaA novel concept of the drain separation design in a horizontally-split-drain GaAs MAGFET sensor, based on epitaxial layer growth, was developed. Proper choice of GaAs/AlAs/GaAs epitaxial layer sequence provided good electrical isolation between the drain regions. The measured leakage current between the drain regions was in the range of nA for up to 2V drain voltage bias difference. Performed analytical and numerical calculations...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Detection of illicit chemicals by portable Raman spectrometer
PublikacjaThe Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublikacjaIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublikacjaThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Design and computational fluid dynamics analysis of the last stage of innovative gas-steam turbine
PublikacjaResearch regarding blade design and analysis of flow has been attracting interest for over a century. Meanwhile new concepts and design approaches were created and improved. Advancements in information technologies allowed to introduce computational fluid dynamics and computational flow mechanics. Currently a combination of mentioned methods is used for the design of turbine blades. These methods enabled us to improve flow efficiency...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...