Filtry
wszystkich: 2701
-
Katalog
- Publikacje 2390 wyników po odfiltrowaniu
- Czasopisma 11 wyników po odfiltrowaniu
- Konferencje 3 wyników po odfiltrowaniu
- Osoby 20 wyników po odfiltrowaniu
- Projekty 5 wyników po odfiltrowaniu
- Kursy Online 99 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 169 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: USABLE CYBERSECURITY
-
Cybersecurity
Czasopisma -
Cybersecurity in the Electricity Sector
PublikacjaThis book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. The author explains the current state of cybersecurity in the electricity market, and cybersecurity standards that apply in that sector. He then offers a systematic approach to cybersecurity management, including new methods of cybersecurity assessment,...
-
Journal of Cybersecurity
Czasopisma -
Cybersecurity and Law
Czasopisma -
Cybersecurity and Cybercrime
Czasopisma -
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value
Publikacja -
Stable and unstable bifurcation in the von Karman problem for a circular plate
PublikacjaW niniejszej pracy badamy równania von Karmana dla cienkiej, sprężystej, kołowej płyty, która znajduje się na sprężystym podłożu, pod działaniem sił ściskających wzdłuż swojego brzegu.Stosując metody analizy nieliniowej, dowodzimy istnienia stabilnychi niestabilnych punktów bifurkacji w zbiorze rozwiązań badanych równań.
-
A Plan for Training Global Leaders in Cybersecurity
PublikacjaReferat prezentuje wizję globalnego uniwersytetu, który będzie kształcił potencjalnych liderów w obszarze globalnego cyber-bezpieczeństwa. Opisuje on profil absolwenta z uwzględnieniem kompetencji technicznych, organizacyjnych, psychologiczno-socjologicznych i etycznych, a następnie przedstawia drogę realizacji tej wizji z uwzględnieniem istniejących zasobów.
-
SERVICE-ORIENTED CYBERSPACE FOR IMPROVING CYBERSECURITY
PublikacjaThe paper presents a cyberspace model where different categories of IT services are offered and used largely. A general cybersecurity policy is considered and the corresponding cybersecurity strategies are shown. The role of such technologies as: Internet of Things, Cloud Computing and Big Data is analyzed in order to improve the cybersecurity of a cyberspace. A new kind of service oriented cyberspace is proposed and its main properties...
-
Rafał Leszczyna dr hab. inż.
OsobyDr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublikacjaAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublikacjaCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublikacjaResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Standards with cybersecurity controls for smart grid - A systematic analysis
PublikacjaIn recent years numerous standards related to the cybersecurity of smart grids have been published, which led to the challenge for operators in obtaining indications that match their specific objectives and contexts. Although several studies approached this problem by providing more or less comprehensive surveys and overviews of smart grid cybersecurity standards, none of them was dedicated to the actual and important subject of...
-
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublikacjaA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
Building a cybersecurity culture of public administration system in Poland
Publikacja -
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublikacjaThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study
PublikacjaThe methods of cybersecurity costs' evaluation are inclined towards the cost of incidents or technological acquirements. At the same time, there are other, less visible costs related to cybersecurity that require proper recognition. These costs are associated with the actions and the time spent by employees on activities connected to cybersecurity management. The costs form a considerable component of cybersecurity expenditures,...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublikacjaInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...
-
Applied Cybersecurity & Internet Governance
Czasopisma -
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis
PublikacjaContemporary approaches to the estimation of cybersecurity costs in organisations tend to focus on the cost of incidents or technological investments. However, there are other, less transparent costs related to cybersecurity management that need to be properly recognised in order to get a complete picture. These costs are associated with everyday activities and the time spent by employees on cybersecurity-related actions. Such...
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublikacjaThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublikacjaThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Current issues of functional safety and cybersecurity analysis of the industrial and critical infrastructures
PublikacjaThis article addresses some functional safety assessment procedures with cybersecurity aspects in critical industrial installations with regard to the functional safety requirements specified in standards IEC 61508 and IEC 61511. The functional safety management includes hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on the risk assessment...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublikacjaThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublikacjaSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Designing Control and Protection Systems with Regard to Integrated Functional Safety and Cybersecurity Aspects
PublikacjaThis article addresses current problems of risk analysis and probabilistic modelling for functional safety management in the life cycle of safety-related systems. Two main stages in the lifecycle of these systems are distinguished, namely the design and operation. The risk analysis and probabilistic modelling differ in these stages in view of available knowledge and data. Due to the complexity and uncertainty involved, both qualitative...
-
Selecting an Applicable Cybersecurity Assessment Framework: Qualitative Metrics-Based Multiple-Factor Analysis
PublikacjaRecently, a survey of cybersecurity assessment methods focused on general characteristics was conducted. Among its major findings, it revealed the methods’ adoption issues. This paper presents a follow-up to the study. It provides an in-depth analysis of the methods’ adoption-related properties based on qualitative metrics. As a result, the proposals which demonstrate a higher adoption potential were identified. The methods are...
-
Remote measurement of building usable floor area - Algorithms fusion
PublikacjaRapid changes that are taking place in the urban environment have significant impact on urban growth. Most cities and urban regions all over the world compete to increase resident and visitor satisfaction. The growing requirements and rapidity of introducing new technologies to all aspects of residents' lives force cities and urban regions to implement "smart cities" concepts in their activities. Real estate is one of the principal...
-
SAE International Journal of Transportation Cybersecurity and Privacy
Czasopisma -
Application of passive sampling techniques as a usable tool in the field of environmental quality monitoring
PublikacjaAnalysis of literature data published for the past 20 years leads to the conclusion, that passive sampling technique has been developing very quickly and is commonly used in the field of monitoring pollutants in air, water and soil environment. The popularity of application of passive sampling techniques in analytical and environmental chemistry results from its many advantages e.g.: Simplicity in use, low costs of exploitation,...
-
Concept of Multifactor Method and Non-Functional Requirements Solution to Increase Resilience through Functional Safety with Cybersecurity Analysis
PublikacjaIn the process of designing safety systems, an integrated approach in safety and cybersecurity analysis is necessary. The paper describes a new technique of increasing resilience through integrated analysis of functional safety and cybersecurity. It is a modeling methodology based on the combination of the multifactor method utilizing modified risk graphs, used previously for Safety Integrity Level (SIL) assessment, and the Non-Functional...
-
Round Table
Czasopisma -
Journal of the ASABE
Czasopisma -
Transactions of the ASABE
Czasopisma -
Developpement Durable & Territoires
Czasopisma -
Are HBO−and BOH−electronically stable?
Publikacja -
Usable Security and Privacy (Usable Security Workshop)
Konferencje -
Analysis of circular cavity with tunable combline resonator
PublikacjaArtykuł prezentuje analizę rozpraszania fali elektromagnetycznej na obiekcie cylindrycznym umieszczonym we wnęce rezonansowej. Metodą analizy jest metoda dopasowania rodzajów.
-
Study on stable dispersion of functionalized Fe-MWCNTs
Publikacja -
Weakly connected domination stable trees [online]
PublikacjaPraca dotyczy pełnej charakteryzacji drzew stabilnych ze względu na liczbę dominowania słabo spójnego.
-
A Control Theoretical Approach to Spectral Factorization is Unstable
PublikacjaLocal stability analysis of a recently proposed recursive feedback-based approach to spectral factorization is performed. The method is found not to give stability guarantees. Interestingly enough, its global behavior often allows one to obtain reasonable approximations of spectral factorizations if a suitable stopping criterion is employed.
-
A model of a tunable quantum dot in a semiconducting carbon nanotube
Publikacja -
Synthesis of Thermally Stable Energetic 1,2,3-Triazole Derivatives
Publikacja -
Tunable broadband integrated circuits for adaptive optical interconnects
Publikacja -
Adaptive neural voltage controller with tunable activation gain
PublikacjaW artykule przedstawiono model adaptacyjnego neuronowego regulatora napięcia dla turbogeneratora z nastrojonym współczynnikiem wzmocnienia funkcji przynależności. Ten model jest kombinacją klasycznego neuronowego modelu i neuronowego modelu z współczynnikiem wzmocnienia funkcji przynależności zależnym od warunków pracy obiektu.Przedstawiono, także wyniki symulacji mające na celu badania efektywności proponowanego regulatora dla...
-
pH-tunable equilibria in azocrown ethers with histidine moieties
PublikacjaEtery koronowe posiadające elektro- i fotoaktywne reszty azowe oraz ugrupowania z ruchliwymi protonami jak w grupie COOH histydyny charakteryzują się unikalnym, zależnym od pH, efektem stymulowania pozornej obecności/nieobecności ugrupowania azowego. Obserwowane różnice właściwości elektrochemicznych eterów azokoronowych z resztą N-acetylohistydyny lub resztami imidazolu uwidaczniają się przebiegiem chemicznej redukcji w silnie...
-
Tunable Waveguide Filter with Bow-Tie Metallic Posts.
PublikacjaBadanie i synteza filtru falowodowego zawiewrającego metalowe rezonatory motylkowe (Bow-Tie). Wykorzystano zmodyfikowaną procedurę iteracyjną i metodę dopasowania rodzajów w celu rozwiązania problemu brzegowego na pojedynczej sekcji filtru i określenie pola rozproszonego od rezonatora motylkowego. Obrót i przemieszczenie opisywane struktury w złączu falowodowym umożliwia zmianę odpowiedzi częstotliwościowych układu. Efekt rotacji...
-
Synthesis and properties of UV-curable poly(imideurethane) acrylates.
PublikacjaOtrzymano światłoczułe poli(imidouretano) akrylany (PIUA) które użyte zostały do wytwarzania światłoczułych kompozycji z dodatkiem reaktywnych rozcieńczalników i różnych fotoinicjatorów. Uzyskane z nich cienkie warstwy polimerowe ulegały usieciowaniu pod działaniem światłaUV w ciągu 10-30 sek. W badaniach fotolitograficznych uzyskano z ich użyciem ścieżki izolacyjne o rozdzielczości 10 mikrometrów. Usieciowane PIUA scharakteryzowano...
-
Tunable Dielectric Switching of (Quinuclidinium)[MnCl4] Hybrid Compounds
PublikacjaInorganic−organic hybrid QMnCl (Q = quinuclidinium) crystals were synthesized and characterized. The X-ray and variable-temperature IR/Raman analysis demonstrate that the crystals undergo a reversible structural phase transition, which originates from an order−disorder process and is related to the dynamics of the organic Q cation. Dielectric function measurements disclose a switchability between low (“OFF”) and high (“ON”) dielectric...