Filtry
wszystkich: 1255
wybranych: 889
-
Katalog
- Publikacje 889 wyników po odfiltrowaniu
- Czasopisma 119 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 51 wyników po odfiltrowaniu
- Wynalazki 5 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Kursy Online 34 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 63 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: JOB SECURITY
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
The symmetric extendibility of quantum states
PublikacjaStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublikacjaW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publikacja -
Infobrokerstwo w Polsce.
PublikacjaPrzełom XX i XXI wieku stał się bezsprzecznie wiekiem informacji, sama informacja natomiast najważniejszym zasobem gospodarczym dzisiejszych przedsiębiorstw. Rozwój technologii informacyjnych i komunikacyjnych, powszechność dostępu i nieograniczony przyrost publikacji, powoduje niekontrolowany rozrost zasobów informacyjnych. Odpowiedzią na smog informacyjny jest powstanie nowego zawodu - brokera informacji, który jest pośrednikiem...
-
Quiet Quitting and its Link With Knowledge Risks in Organizations – Theoretical Insights
PublikacjaPurpose: Quiet quitting has become a widely publicized concept, driven by social media in the United States and other countries in 2022. It is a term used to describe the phenomenon by which employees do the least amount of their work, just enough to meet the requirements of one’s job description (Mahand and Caldwell, 2023). The trend is spreading quickly among young workers. It can potentially harm individuals, job performance,...
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublikacjaThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
ZASTOSOWANIE KORELACJI OPISUJĄCYCH WYMIANĘ CIEPŁA W OB-SZARZE PĘCZKÓW MIKROSTRUG DO PROJKTOWANIA KOMPAKTOWYCH WYMIENNIKÓW CIEPŁA: CZ.1. BUDOWA MODELOWEGO WYMIENNIKA CIEPŁA I JEGO CHARAKTERYSTYKA
PublikacjaArtykuł przedstawia konstrukcję prototypowego, modułowego mikrostru-gowego wymiennika ciepła. Przeprowadzone badania cieplno przepływo-we w układzie woda-woda, umożliwiają określenie efektywności wymiany ciepła, charakterystyk cieplno przepływowych, oraz wielkości współczynnika przejmowania ciepła. Eksperymenty w dalszej części publikacji posłużą do weryfikacji stosowalności istniejących korelacji opisujących wymianę ciepła w obszarze...
-
Comparison of Compact Reduced Basis Method with Different Model Order Reduction Techniques
PublikacjaDifferent strategies suitable to compare the performance of different model order reduction techniques for fast frequency sweep in finite element analysis in Electromagnetics are proposed and studied in this work. A Frobenius norm error measure is used to describe how good job a reduced-order model is doing with respect to the true system response. In addition, the transfer function correct behavior is monitored by studying the...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES
PublikacjaProblems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Bromidotetrakis(2-isopropyl-1Himidazole-kN3)copper(II) bromide
PublikacjaAtom Cu(II) w tytułowym kompleksie jest skoordynowany przez cztery atomy N obojętnych cząsteczek imidazolu oraz jon bromkowy. Jon kompleksowy ma geometrię piramidy kwadratowej.
-
Implementing SP4CE Learning Rooms concept and AUTODESK online certification in the preparation of a new generation of engineers.
PublikacjaIn academia, educators do not always cope with rapidly changing technologies. Yet keeping up with new trends is essential to graduates’ success in a competitive job market. In the article, the author will answer the question of how Autodesk University Open Educational Resources and Certiport exams including GMetrix can enhance students’ academic progress and prepare them for future career. The concept of co-operation between Authorized...
-
Quiet Quitting and its Link With Knowledge Risks in Organizations – Theoretical Insights
PublikacjaPurpose: Quiet quitting has become a widely publicized concept, driven by social mediain the United States and other countries in 2022. It is a term used to describe thephenomenon by which employees do the least amount of their work, just enough tomeet the requirements of one’s job description (Mahand and Caldwell, 2023). The trendis spreading quickly among young workers. It can potentially harm individuals,...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublikacjaArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublikacjaW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
Zarządzanie opóźnieniami w ruchu kolejowym z zastosowaniem rogramowania ewolucyjnego
PublikacjaZarządzanie opóźnieniami w ruchu kolejowym zostało potraktowane jako wielokryterialny problem optymalizacyjny, który obejmuje między innymi zapewnienie skomunikowania pociągów na stacjach węzłowych oraz dążenie do uzyskania biegu pociągów najbardziej zgodnego z pierwotnym rozkładem jazdy. Uwzględniono priorytety poszczególnych pociągów uzależnione od sytuacji ruchowej i kategorii pociągów. W przeprowadzonym procesie optymalizacji...
-
Burnout as a State: Random-Intercept Cross-Lagged Relationship Between Exhaustion and Disengagement in a 10-Day Study [Response to Letter]
PublikacjaWe are writing in response to the Letter to the Editor by Block, Bair, and Carillo regarding our study, which took a multilevel approach to examine cross-lagged and co-existing relationships between exhaustion and disengagement, measured daily for ten consecutive working days using the Oldenburg Burnout Inventory (OLBI). We assessed the job burnout symptoms using only eight items, all of them worded negatively. Following Block,...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublikacjaDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
Effect of the Road Environment on Road Safety in Poland
PublikacjaRun-off-road accidents tend to be very severe because when a vehicle leaves the road, it will often crash into a solid obstacle (tree, pole, supports, front wall of a culvert, barrier). A statistical analysis of the data shows that Poland's main roadside hazard is trees and the severity of vehicles striking a tree in a run-off-road crash. The risks are particularly high in north-west Poland with many of the roads lined up with...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublikacjaThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Optimization of Trans-esterification Process and Characterization of Biodiesel from Soapstock Using Silica Sulfuric Acid as a Heterogeneous Solid Acid Catalyst
Publikacja -
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
PSYCHOMETRIC PROPERTIES OF THE POLISH VERSION OF THE GENERALIZED ANXIETY DISORDER 7-ITEM SCALE (GAD-7) IN A NON-CLINICAL SAMPLE OF EMPLOYEES DURING PANDEMIC CRISIS
PublikacjaObjectives: The COVID-19 outbreak is an example of a crisis that triggered an increase in generalized anxiety disorder. The study aims to validate the Polish version of the Generalized Anxiety Disorder 7-item scale (GAD-7) by Spitzer et al. among a non-clinical sample of employees and examine the invariance depending on the gender and age of working adults. Material and Methods: For assessing factor structure of the Polish version...
-
Generalized access control in hierarchical computer network
PublikacjaThe paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublikacjaInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...
-
PSYCHOLOGICAL CAPITAL AND CHALLENGE APPRAISAL FOSTER THRIVING IN THE GLOBALIZED MULTICULTURAL WORKPLACE
PublikacjaThe purpose of the study was to examine the psychological resources which foster thriving in multicultural work settings of multinational corporations (MNCs) - the companies that are evident manifestation of globalization. Although globalized multicultural workplace creates specific job demands that pose unique occupational stress to individuals, some personal resources enable them to deal with these demands and to thrive. Thriving...
-
Game Theory Analysis of Bidding for a Construction Contract
PublikacjaThe authors are concerned with a bidding problem. There are two companies (P1 and P2) bidding for a highway construction project. In order to be more competitive, P1 considers buying a new gravel pit near the construction site. The basic cost of the pit is known to both companies. However, there is also an additional, hidden, cost (C) known only to P1. P2 is uncertain whether the hidden cost is C = 0 or C = x. P1 plans to bid for...
-
Bromidotetrakis(1H-2-ethyl-5-methylimidazole-κN3)copper(II) bromide
PublikacjaAtom Cu(II) w tytułowym kompleksie jest skoordynowany przez cztery atomy N obojętnych cząsteczek imidazolu oraz jon bromkowy. Jon kompleksowy ma geometrię piramidy kwadratowej. Kationy kompleksowe w krysztale tworzą układ dipoli ułożonych ''głowa do ogona'' równolegle do osi c.
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena
PublikacjaW niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublikacjaNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
Zero-knowledge convincing protocol on quantum bit is impossible
PublikacjaIt is one of fundamental features of quantum formalism that o n one hand it provides a new infor- mation processing resources and on the other hand puts funda mental constraints on the processing of quantum information implying “no-go” theorems for cloni ng [1–3], bit commitment [4, 5] and deleting [6] in quantum theory. Here we ask about possibilit y of “zero knowledge” scenario which, for its simplicity, can be considered as...
-
THE INVESTMENT ENVIRONMENT MANAGEMENT SYSTEM IN THE FRAMEWORK OF LEGAL SUPPORT AS A FACTOR OF NATIONAL SAFETY
Publikacja -
COMPARATIVE ANALYSES OF INTERNATIONALIZATION OF KAZAKHSTAN ENTERPRISES
PublikacjaThis paper presents the instruments of internationalization of enterprises operating within the Eurasian Economic Union. Research contains answers of 108 enterprises exporters located in the Republic of Kazakhstan. The purpose of the paper is to show the main forms of the internationalization of enterprises in Kazakhstan. The paper also presents the following instruments of enterprises’ internationalization including: indirect...
-
Activity-based payments: alternative (anonymous) online payment model
PublikacjaElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
Zarządzanie opóźnieniami w ruchu kolejowym
PublikacjaZarządzanie opóźnieniami w ruchu kolejowym zostało przedstawione jako wielokryterialny problem optymalizacyjny, do rozwiązania którego został użyty model ogólny (job-shop) szeregowania zadań. W artykule przedstawiono sposób zastosowania trzech algorytmów metaheurystycznych: algorytmu genetycznego (Genetic Algorithm), algorytmu roju (Particle Swarm Optimization) i algorytmu mrówkowego (Ant Colony Optimization) do znalezienia optymalnego...
-
Data from the Survey on Entrepreneurs’ Opinions on Factors Determining the Employment of the Gdańsk University of Technology Graduates
PublikacjaThe dataset includes data from a survey on factors determining the employment of the Gdańsk University of Technology (Gdańsk Tech) graduates’ in the opinion of entrepreneurs. The survey was conducted in 2017. The research sample included 102 respondents representing various firms from the Pomeranian Voivodeship, Poland. The study concerned i.a. factors determining the decision to hire a candidate, methods of recruiting employees,...
-
Navigating the complexities of altruistic helping in Nonprofit Organizations: An analysis of Benefits, Burdens and managerial challenges
PublikacjaWe investigate how individuals cope with side effects of altruistic behaviour at work, i.e. genuine helping behaviour which is not part of any job description, and what role the organizational context plays in these dynamics. Employing simultaneous dyadic interviews, we show how employees of non-profit organizations cope with undesired effects of altruistic help. Our data provides evidence of unintended outcomes for the individual...
-
Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review
PublikacjaFood security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...
-
CHALK & TALK OR SWIPE & SKYPE?
PublikacjaTechnology in classroom is a matter of heated discussions in the field of education development, especially when multidisciplinary education goes along with language skills. Engineers’ education requires theoretical and practical knowledge. Moreover, dedicated computer skills become crucial for both young graduates and experienced educators on the labor market. Teaching online with or without using different Learning Management...
-
On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway
PublikacjaZapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...
-
Threat intelligence platform for the energy sector
PublikacjaIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Bezpieczeństwo elektroenergetyczne dla pokoleń
PublikacjaW artykule przeanalizowano źródła energii pierwotnej, ich wystarczalnośći dywersyfikację w skali lokalnej i globalnej, problem dekarbonizacji polskiej elektroenergetyki na tle europejskiej polityki klimatycznej, osiągalność źródeł gazu jako efektywnego paliwa dla energetyki, polski program energetyki jądrowej, bezpieczeństwo zasilania elektrycznych systemów trakcyjnych jako strategicznej alternatywy...
-
DETERMINATION OF THE CITY CENTRE. STUDY FOR THE TROJMIASTO AGGLOMERATION
PublikacjaDetermination of the centre of the city or agglomeration or generally the geographic area is a task which is often undertaken as part of the promotional actions realized by local authorities or directly by inhabitants. Nowadays, especially due to the development and availability of positioning technology and satellite imaging, this job is undertaken within the framework of general didactic tasks and group projects during the study...
-
Education of Logisticians in Poland: Problems and Prospects in Students’ Opinion
PublikacjaLogistics is one of the key sectors of the Polish economy. Its value reflects not only its own capacity, but also the role it plays in ensuring the proper functioning of the entire economy. The rapid development of the industry and the highest demands on logistics solutions bring to the fore the problem of preparing a new generation of specialists in logistics. That is why the question of compliance to learning expectations of...
-
Language of Benefits as a Novel Tool for Improving Website Personalization
PublikacjaA properly designed website allows the user to search for information faster, and more accurately. The information content of the website should be also adapted to the needs of the user. The purpose of this article is to present a novel Language of Benefits (LoB) approach to facilitate the use of websites for individual user groups. The LoB approach is an approach addressed to IT Analysts, to facilitate the process of web design,...