Filtry
wszystkich: 106
wybranych: 76
-
Katalog
- Publikacje 76 wyników po odfiltrowaniu
- Czasopisma 13 wyników po odfiltrowaniu
- Konferencje 2 wyników po odfiltrowaniu
- Osoby 9 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Kursy Online 3 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 1 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: CYBER HAZOP
-
Zastosowania metody HAZOP w inżynierii oprogramowania.
PublikacjaArtykuł przedstawia HAZOP - metodę analizy modeli systemów oraz jej zastosowania w dziedzinie inżynierii oprogramowania do identyfikacji błędów obecnych w modelach. Omawiane są różne obszary stosowalności związane z różnymi klasami błędów: defektów modelowania, zdarzeń niebezpiecznych dla otoczenia systemu oraz zagrożeń związanych z zabezpieczeniem systemu. Artykuł prezentuje również dotychczasowy stan badań związanych...
-
Development and validation of a HAZOP-based inspection of UML models
PublikacjaArtykuł prezentuje technikę inspekcji ukierunkowaną na wykrywanie defektów w modelach UML. Technika ta została opracowana poprzez adaptację HAZOP - metody szeroko stosowanej w dziedzinie systemów związanych z bezpieczeństwem. Wykorzystano podstawową koncepcję HAZOP (zastosowanie ogólnych słów kluczowych do wykrywania pełnej listy anomalii związanych z danym fragmentem modelu) do systematycznego wygenerowania list kontrolnych dla...
-
The EU's Cyber Security Strategy
Publikacja -
Detecting defects in object-oriented diagrams using UML-HAZOP
PublikacjaArtykuł dotyczy metody wykrywania defektów w dokumentacji oprogramowania wykonywanego z zastosowaniem notacji UML. Metoda ta, nazwana UML-HAZOP, jest adaptacją metody HAZOP szeroko stosowanej w stosunku do systemów związanych z bezpieczeństwem. Metoda ta jest ukierunkowana na wykrywanie anomalii w dokumentacji projektowej na drodze analizy ''przepływów'' pomiędzy komponentami badanego systemu. Adaptacja metody do badania oprogramowania...
-
Eksperymentalne porównanie inspekcji UML-HAZOP z przeglądem niestrukturalnym.
PublikacjaArtykuł opisuje eksperyment przeprowadzony w warunkach akademickich, z udziałem studentów Politechniki Gdańskiej. Celem eksperymentu było porównanie dwóch technik przeglądowych: inspekcji opartej na metodzie UML-HAZOP oraz zwykłego przeglądu niestrukturalnego. W ramach porównania obu technik dokonano oceny ich skuteczności i wydajności. Metodę UML-HAZOP poddano ponadto dodatkowej ocenie uczestników za pomocą anonimowych ankiet....
-
Experimental comparison of UML-HAZOP inspection and non-structured review
PublikacjaArtykuł przedstawia eksperyment przeprowadzony na Politechnice Gdańskiej mający na celu porównanie dwóch technik przeglądowych. Poszczególne rozdziały zawierają: ogólne omówienie tematyki przeglądów i inspekcji, przedstawienie metody UML-HAZOP, opis przebiegu eksperymentu oraz uzyskanych rezultatów.
-
Standards on Cyber Security Assessment of Smart Grid
PublikacjaSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Integrated functional safety and cyber security analysis
PublikacjaThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
METHODS FOR THE IDENTIFICATION OF CYBER RISKS: AN ANALYSIS BASED ON PATENT DATA
Publikacja -
Face recognition by humans with gaze-tracking system Cyber-Eye
PublikacjaW celu dokładniejszego zrozumienia sposobu rozpoznawania i zapamiętywania twarzy przez człowieka przeprowadzono doświadczenie na grupie 20 osób z wykorzystaniem wcześniej opracowanego systemu śledzenia fiksacji wzroku Cyber-Oko [3]. Wykorzystując diody i kamerę podczerwieni wraz z dedykowanym oprogramowaniem Cyber-Oko, które pozwala na śledzenie punktu skupienia wzroku na ekranie. Każdej osobie biorącej udział w doświadczeniu pokazano...
-
The Towers of Hanoi as a Cyber-Physical System Education Case Study
Publikacjacps
-
Visual content representation and retrieval for Cognitive Cyber Physical Systems
PublikacjaCognitive Cyber Physical Systems have gained significant attention from academia and industry during the past few decade. One of the main reasons behind this interest is the potential of such technologies to revolutionize human life since they intend to work robustly under complex visual scenes, which environmental conditions may vary, adapting to a comprehensive range of unforeseen changes, and exhibiting prospective behavior...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublikacjaEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
Dynamic Execution of Engineering Processes in Cyber-Physical Systems of Systems Toolchains
PublikacjaEngineering tools support the process of creating, operating, maintaining, and evolving systems throughout their lifecycle. Toolchains are sequences of tools that build on each others' output during this procedure. The complete chain of tools itself may not even be recognized by the humans who utilize them, people may just recognize the right tool being used at the right place in time. Modern engineering processes, however, do...
-
Model-based testing for execution algorithms in the simulation of cyber-physical systems
PublikacjaThe understanding of simulation semantics of a hybrid system is a challenge for computational engineers as it requires expertise in computer science, engineering, numerical methods, and mathematics at once. The testing methods for the execution of a simulation are being researched but not yet applied on the industrial level. Consequently, the semantics of the simulation becomes a critical artifact in the system development process....
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
CNN-CLFFA: Support Mobile Edge Computing in Transportation Cyber Physical System
PublikacjaIn the present scenario, the transportation Cyber Physical System (CPS) improves the reliability and efficiency of the transportation systems by enhancing the interactions between the physical and cyber systems. With the provision of better storage ability and enhanced computing, cloud computing extends transportation CPS in Mobile Edge Computing (MEC). By inspecting the existing literatures, the cloud computing cannot fulfill...
-
Application of Internet of Thing and Cyber Physical System in Industry 4.0 Smart Manufacturing
Publikacja -
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Set of Experience and Decisional DNA: Toward Brains for Cyber-physical Systems and Industry of the Future
PublikacjaThe concept of Decisional DNA is decade old. This article introduces the initial idea of Set of Experience Knowledge Structure, its advancement into Decisional DNA, and its potential for real life applications in divers domains. The most current and future research steps into Industry 4.0 are also presented and discussed
-
A New Critical Risk on the Block: Cyber Risks as an Example of Technical Knowledge Risks in Organizations
PublikacjaThe breakout of the COVID-19 pandemic has intensified the appearance of many additional technical knowledge risks in organizations. Cyber risks in particular are becoming a great challenge for organizations. At the same time, academic research on cyber risks, their costs, consequences and ability of overcoming them is still scarce and fragmented. In order to fill this gap, the paper is aimed to identify different types of cyber...
-
Experience based knowledge representation for Internet of Things and Cyber Physical Systems with case studies
PublikacjaCyber Physical Systems and Internet of Things have grown significant attention from industry and academia during the past decade. The main reason behind this interest is the capabilities of such technologies to revolutionize human life since they appear as seamlessly integrating classical networks, networked objects and people to create more efficient environments. However, enhancing these technologies with intelligent skills becomes...
-
Virtual Engineering Object / Virtual Engineering Process: A specialized form of Cyber Physical System for Industrie 4.0
PublikacjaThis paper reviews the theories, parallels and variances between Virtual Engineering Object (VEO) / Virtual Engineering Process (VEP) and Cyber Physical System (CPS). VEO and VEP is an experience based knowledge representation of engineering objects and processes respectively. Cyber–physical systems (CPSs) are the next generation of engineered systems in which computing, communication, and control technologies are tightly integrated....
-
Badanie rozpoznawania twarzy przez człowieka z wykorzystaniem systemu śledzenia fiksacji wzroku Cyber-Oko
PublikacjaW celu dokładniejszego zrozumienia sposobu rozpoznawania i zapamiętywania twarzy przez człowieka przeprowadzono doświadczenie na grupie 20 osób z wykorzystaniem wcześniej opracowanego systemu śledzenia fiksacji wzroku Cyber-Oko. Wykorzystując diody i kamerę podczerwieni wraz z dedykowanym oprogramowaniem Cyber-Oko, które pozwala na śledzenie punktu skupienia wzroku na ekranie. Każdej osobie biorącej udział w doświadczeniu pokazano...
-
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
PublikacjaThis report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer,...
-
Empirical evaluation of reading techniques for UML models inspection
PublikacjaArtykuł przedstawia eksperyment, w ramach którego porównane zostały trzy techniki czytania (ad hoc, UML-HAZOP oraz podejście scenariuszowe) zastosowane do inspekcji modeli obiektowych. UML-HAZOP jest techniką czytania wywodzącą się z dziedziny systemów krytycznych, związanych z bezpieczeństwem. W publikacji opisano technikę UML-HAZOP oraz jej różne warianty wykorzystane w eksperymencie. Przedstawiono projekt, sposób przeprowadzenia...
-
Tool support for detecting defects in object-oriented models
PublikacjaArtykuł przedstawia nową metodę analityczną UML-HAZOP oraz narzędzie wspomagające jej stosowanie. Metoda ukierunkowana jest na wykrywanie defektów we wczesnych fazach wytwarzania oprogramowania i koncentruje się na powszechnie stosowanych modelach opartych na metodyce obiektowej.
-
Metoda wykrywania anomalii w wybranych modelach systemów informatycznych
PublikacjaW pracy zaproponowano nową metodę inspekcji ukierunkowaną na wykrywanie defektów w diagramach UML powstających we wczesnych etapach procesu wytwarzania oprogramowania. Mechanizm detekcji defektów został oparty na pomyśle wykorzystania podejścia HAZOP (ang. Hazard and Operability Study) znanego z dziedziny systemów związanych z bezpieczeństwem. Podstawowymi elementami tego mechanizmu są systematyka procesu kontroli i wykrywania...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Community of Practice for Product Innovation Towards the Establishment of Industry 4.0
PublikacjaThe aim of this paper is to present the necessity of formulating the Community of Practice for Product Innovation process based on Cyber-Physical Production Systems towards the establishment of Industry 4.0. At this developing phase of Industry 4.0, there is a need to define a clear and more realistic approach for implementation process of Cyber-Physical Production Systems in manufacturing industries. Today Knowledge Management...
-
Towards the 4th industrial revolution: networks, virtuality, experience based collective computational intelligence, and deep learning
PublikacjaQuo vadis, Intelligent Enterprise? Where are you going? The authors of this paper aim at providing some answers to this fascinating question addressing emerging challenges related to the concept of semantically enhanced knowledge-based cyber-physical systems – the fourth industrial revolution named Industry 4.0.
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
A Plan for Training Global Leaders in Cybersecurity
PublikacjaReferat prezentuje wizję globalnego uniwersytetu, który będzie kształcił potencjalnych liderów w obszarze globalnego cyber-bezpieczeństwa. Opisuje on profil absolwenta z uwzględnieniem kompetencji technicznych, organizacyjnych, psychologiczno-socjologicznych i etycznych, a następnie przedstawia drogę realizacji tej wizji z uwzględnieniem istniejących zasobów.
-
CIP Security Awareness and Training: Standards and Practice
PublikacjaThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublikacjaThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Smart Innovation Engineering Using Set of Experience and Decisional DNA
PublikacjaKnowledge-based Engineering Systems are founded upon integration of knowledge into computer systems and are one of the core requirements for the future Industry 4.0. Since the fourth industrial revolution is passing through the developing phase, implementation of Cyber-Physical Production Systems require more realistic approach. Knowledge Management and Knowledge Engineering plays an important role in manufacturing industries facing...
-
Awareness evaluation of patients in vegetative state employing eye-gaze tracking system
PublikacjaApplication of eye-gaze tracking system to awareness evaluation is demonstrated. Hitherto awareness evaluation methods are presented. The assumptions of proposed method based on analysis of visual activity of patients in vegetative state are demonstrated. The eye-gaze tracking system ''Cyber-Eye'' developed at the Multimedia Systems Department employed to conducted experiments is presented. Research described in the paper indicates...
-
Wspomaganie wykrywania defektów w modelach obiektowych.
PublikacjaModelowanie z zastosowaniem metodyki obiektowej jest powszechnie wykorzystywane w projektach informatycznych i stanowi jeden z kluczowych etapów procesu wytwarzania oprogramowania. Problemem związanym z modelowaniem jest łatwość wprowadzenia do modeli obiektowch defektów wynikających np. ze złego rozpoznania dziedziny problemowej, przyjmowania nieświadomych założeń lub zwykłych pomyłek edycyjnych. Istotne jest szybkie wykrycie...
-
Decisional-DNA-Based Digital Twin Implementation Architecture for Virtual Engineering Objects
PublikacjaDigital twin (DT) is an enabling technology that integrates cyber and physical spaces. It is well-fitted for manufacturing setup since it can support digitalized assets and data analytics for product and process control. Conventional manufacturing setups are still widely used all around the world for the fabrication of large-scale production. This article proposes a general DT implementation architecture for engineering objects/artifacts...
-
Virtual Engineering Object (VEO): Toward Experience-Based Design and Manufacturing for Industry 4.0
PublikacjaIn this article we propose the concept, its framework, and implementation methodology for Virtual Engineering Objects (VEO). A VEO is the knowledge representation of an engineering object that embodies its associated knowledge and experience. A VEO is capable of adding, storing, improving, and sharing knowledge through experience. Moreover, it is demonstrated that VEO is a specialization of a Cyber-Physical System (CPS). In this...
-
Modelling the malware propagation in mobile computer devices
PublikacjaNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Implementing Virtual Engineering Objects (VEO) with the Set of Experience Knowledge Structure (SOEKS)
PublikacjaThis paper illustrates the idea of Virtual Engineering Object (VEO) powered by Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA). A VEO is the knowledge representation of an engineering object, having embodiment of all its associated knowledge and experience within it. Moreover, VEO is a specialization of Cyber-Physical System (CPS) in terms of that its extension in knowledge gathering and reuse, whereas CPS...
-
Virtual Engineering Factory: Creating Experience Base for Industry 4.0
PublikacjaABSTRACT In recent times, traditional manufacturing is upgrading and adopting Industry 4.0, which supports computerization of manufacturing by round-the-clock connection and communica- tion of engineering objects. Consequently, Decisional DNA- based knowledge representation of manufacturing objects, processes, and system is achieved by virtual engineering objects (VEO), virtual engineering processes (VEP), and virtual engineering...
-
Establishing intelligent enterprise through community of practice for product innovation
PublikacjaThis paper presents the idea of implementing the virtual Community of Practice for Product Innovation processes towards the establishment of intelligent enterprise. Since the fourth industrial revolution is passing through the developing phase, implementation of Cyber-Physical Production Systems require more realistic approach. Knowledge Management and Engineering plays an important role in manufacturing industries facing global...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublikacjaThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Decisional-DNA Based Smart Production Performance Analysis Model
Publikacjan order to allocate resources effectively according to the production plan and to reduce disturbances, a framework for smart production performance analysis is proposed in this article. Decisional DNA based knowledge models of engineering objects, processes and factory are developed within the proposed framework. These models are the virtual representation of manufacturing resources, and with help of Internet of Things, are capable...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublikacjaThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublikacjaThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...