Wyniki wyszukiwania dla: ATTACK SCENARIO - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: ATTACK SCENARIO

Wyniki wyszukiwania dla: ATTACK SCENARIO

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publikacja

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Pełny tekst do pobrania w portalu

  • Device-independent quantum key distribution based on measurement inputs

    Publikacja

    - PHYSICAL REVIEW A - Rok 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Pełny tekst do pobrania w portalu

  • How to choose drive’s rated power in electrified urban transport?

    Publikacja

    Selection of drive's rated power influences not only vehicle's dynamics, but also its energy efficiency. Mentioned above approach requires a multiphysical model, which covers both mechanical and electrical phenomena. This paper discusses how selection of traction drive's rated power influences vehicle energy consumption on example of a trolleybus. A complex mathematical model was developed in Matlab/Simulink to describe the multiphisical...

    Pełny tekst do pobrania w portalu

  • 4D Reconstruction and Visualisation of Krakow Fortress

    Publikacja
    • E. G. Głowienka
    • K. Michałowska
    • P. Opaliński
    • B. Hejmanowska
    • S. Mikrut
    • P. Kramarczyk
    • A. Struś

    - Rok 2017

    The specific aim of the European project named "Cultural Heritage Through Time" (CHT2) and reported in this paper is to fully integrate the fourth dimension (4D) into Cultural Heritage studies for analysing structures and landscapes over time. Krakow-the Fortress City (Poland) is the one of four case studies of the CHT2, which are used for the time varying reconstruction, analysis, visualization, and preservation. The goal of...

  • System Loss in UWB Off-Body Communications in a Ferry Environment

    Publikacja

    In this paper, the system loss in UWB off-body communications in a ferry environment based on measurements is presented. A mobile measurement set-up, consisting of WBAN nodes with UWB DWM1000 modules, was used. System loss was split into LOS and NLOS conditions. For the former, the smallest mean value, 24.4 dB, was obtained for the user approaching the fixed terminal, with the antenna on his chest, and the largest, 28.1 dB, for...

  • Combined extraction and microextraction techniques: Recent trends and future perspectives

    Publikacja

    The latest advancements in the analytical sample preparation indicate a trend of combining different extraction techniques with targeting an improvement in separation, cleanup, detection limits, enrichment factors, and dealing with complex matrices. This manuscript identifies mainly two groups of combined sample preparation techniques. The first group integrates conventional or enhanced extraction techniques with microextraction....

    Pełny tekst do pobrania w portalu

  • Novel Low-Loss Substrates for 5G Applications

    Publikacja

    - Rok 2022

    This paper presents a feasibility study of a new type of microwave low-loss dielectric substrates for 5G network applications. The new substrate materials are composites of polypropylene and high-dielectric-constant micro-ceramics. This combination is expected to form a very low-loss dielectric material at low fabrication cost. Two substrate samples with different dielectric properties are fabricated and their characteristics at...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Fundamentals of Communication Networks Resilience to Disasters and Massive Disruptions

    Publikacja
    • J. Rak
    • D. Hutchison
    • J. Tapolcai
    • R. Bruzgiene
    • M. Tornatore
    • C. Mas-Machuca
    • M. Furdek
    • P. Smith

    - Rok 2020

    Communication networks are exposed to a variety of massive failure events following from activities of nature, weather-induced disruptions, technology-implied problems, and malicious human activities. In this chapter, we first highlight the characteristics of these scenarios and discuss example failure events reported during the last three decades. Next, we explain the concept of network resilience and present an overview of major...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Multicriteria decision analysis in ranking of analytical procedures for aldrin determination in water

    The study presents the possibility of multi-criteria decision analysis (MCDA) application when choosing analytical procedures with low environmental impact. A type of MCDA, Preference Ranking Organization Method for Enrichment Evaluations (PROMETHEE), was chosen as versatile tool that meets all the analytical chemists – decision makers requirements. Twenty five analytical procedures for aldrin determination in water samples (as...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • On Improved-Reliability Design Optimization of High-Frequency Structures Using Local Search Algorithms

    The role of numerical optimization has been continuously growing in the design of high-frequency structures, including microwave and antenna components. At the same time, accurate evaluation of electrical characteristics necessitates full-wave electromagnetic (EM) analysis, which is CPU intensive, especially for complex systems. As rigorous optimization routines involve repetitive EM simulations, the associated cost may be significant....

    Pełny tekst do pobrania w portalu

  • Analysis of the Ways to Identify Rail Running Surface Defects by Means of Vibration Signals

    Publikacja

    - Problemy Kolejnictwa - Rok 2020

    Th e article discusses a preliminary concept of a method enabling the identifi cation of chosen rail running surface defects, such as squats, spalling, and running surface defects, by analysing the parameters of vibration signals. It features a description of the methodology of the conducted tests, the scope thereof, and the selection of the measurement points with specifi c defect types. Th e article covers selected results of...

    Pełny tekst do pobrania w portalu

  • Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures

    Publikacja
    • J. Rak
    • D. Hutchison
    • E. Calle
    • T. Gomes
    • M. Gunkel
    • P. Smith
    • J. Tapolcai
    • S. Verbrugge
    • L. Wosinska

    - Rok 2016

    Disaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publikacja

    - Rok 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Dynamical description of quantum computing: generic nonlocality of quantumnoise

    Publikacja

    We develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...

    Pełny tekst do pobrania w portalu

  • Service-based Resilience for Embedded IoT Networks

    Publikacja

    - Rok 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improving the Survivability of Carrier Networks to Large-Scale Disasters

    Publikacja
    • A. de Sousa
    • J. Rak
    • F. Barbosa
    • D. Santos
    • D. Mehta

    - Rok 2020

    This chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Projekt Fakultatywny II/ Elective Design II 2020/2021 S.Hudnik+K.Życzkowska

    Kursy Online
    • K. Życzkowska

    SUPERSURFACE – an alternative model for life The studio will explore an alternative architectural models for contemporary society in the context of different political, cultural, economic and environmental contexts. Temporal living and technology links the general fashion principles with architecture. The projects will investigate the visionary scenarios through Superstudio movies Fundamental Acts and various concepts and structures...

  • Several notes on technical modernization of a historical building

    Publikacja

    - Rok 2013

    This paper describes methods and means used during the renovation process of several elements of a building – the assembly hall, inner courtyards and attics of the main building at Gdansk University of Technology, both in design and construction domains. A tissue of a historic building required special approach to these tasks, with special emphasis on good recognition of problems, careful planning and consistent implementing of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • FDTD-Compatible Green's function based on scalar discrete Green's function and multidimensional Z-transform

    Publikacja

    - Rok 2015

    In this contribution, a new formulation of the discrete Green's function (DGF) is presented for the finitedifference time-domain (FDTD) grid. Recently, dyadic DGF has been derived from the impulse response of the discretized scalar wave equation (i.e., scalar DGF) with the use of the multidimensional Z-transform. Its software implementation is straightforward because only elementary functions are involved and a single function...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Sudden death of effective entanglement

    Publikacja

    - PHYSICAL REVIEW A - Rok 2010

    Sudden death of entanglement is a well-known effect resulting from the finite volume of separable states. We study the case when the observer has a limited measurement capability and analyze the effective entanglement (i.e., entanglement minimized over the output data). We show that in the well-defined system of two quantum dots monitored by single-electron transistors, one may observe a sudden death of effective entanglement when...

    Pełny tekst do pobrania w portalu

  • MEASUREMENT O F HEALTHCARE SYSTEM EFFICIENCY IN OECD COUNTRIES

    Increased spending on healthcare systems in many countries tends to attract attention to their efficiency. The aim of this paper is to evaluate the efficiency of healthcare systems in the OECD countries and indicate causes of inefficiency by applying Data Envelopment Analysis (DEA) and using additive and super-efficiency models. The homogeneity of the sample is assessed and outliers are excluded. A ranking is established on the...

    Pełny tekst do pobrania w portalu

  • New First - Path Detector for LTE Positioning Reference Signals

    Publikacja

    - Rok 2014

    In today's world, where positioning applications reached a huge popularity and became virtually ubiquitous, there is a strong need for determining a device location as accurately as possible. A particularly important role in positioning play cellular networks, such as Long Term Evolution (LTE). In the LTE Observed Time Difference of Arrival (OTDOA) positioning method, precision of device location estimation depends on accuracy...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Numerical Simulations of Seepage in Dikes Using unsaturated and Two-Phase Flow Models

    Publikacja

    Modeling of water flow in variably saturated porous media, including flood dikes, is often based on the Richards equation, which neglects the flow of pore air, assuming that it remains at constant atmospheric pressure. However, there is also evidence that the air flow can be important, especially when the connectivity between the pore air and atmospheric air is lost. In such cases a full two-phase air-water flow model should be...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Playback detection using machine learning with spectrogram features approach

    Publikacja

    This paper presents 2D image processing approach to playback detection in automatic speaker verification (ASV) systems using spectrograms as speech signal representation. Three feature extraction and classification methods: histograms of oriented gradients (HOG) with support vector machines (SVM), HAAR wavelets with AdaBoost classifier and deep convolutional neural networks (CNN) were compared on different data partitions in respect...

    Pełny tekst do pobrania w portalu

  • Quantifying Contextuality

    Publikacja
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • R. Horodecki
    • P. Joshi
    • W. Kłobus
    • A. Wójcik

    - PHYSICAL REVIEW LETTERS - Rok 2014

    Contextuality is central to both the foundations of quantum theory and to the novel information processing tasks. Despite some recent proposals, it still faces a fundamental problem: how to quantify its presence? In this work, we provide a universal framework for quantifying contextuality. We conduct two complementary approaches: (i) the bottom-up approach, where we introduce a communication game, which grasps the phenomenon of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Video Classification Technology in a Knowledge-Vision-Integration Platform for Personal Protective Equipment Detection: An Evaluation

    Publikacja

    - Rok 2018

    This work is part of an effort for the development of a Knowledge-Vision Integration Platform for Hazard Control (KVIP-HC) in industrial workplaces, adaptable to a wide range of industrial environments. This paper focuses on hazards resulted from the non-use of personal protective equipment (PPE), and examines a few supervised learning techniques to compose the proposed system for the purpose of recognition of three protective...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Detection of Water on Road Surface with Acoustic Vector Sensor

    Publikacja

    - SENSORS - Rok 2023

    This paper presents a new approach to detecting the presence of water on a road surface, employing an acoustic vector sensor. The proposed method is based on sound intensity analysis in the frequency domain. Acoustic events, representing road vehicles, are detected in the sound intensity signals. The direction of the incoming sound is calculated for the individual spectral components of the intensity signal, and the components...

    Pełny tekst do pobrania w portalu

  • Study on transmission quality in cellular 4G and 5G networks between 2019–2021: Impact of the COVID-19 pandemic on the level of provided services by operating base transceiver stations

    The COVID-19 pandemic has significantly limited user mobility, not least among students. Remote learning had a particular impact on resource allocation in relation to using terrestrial cellular networks, especially 4G systems in urban agglomerations. This paper presents the results of a quality evaluation of an outdoor environment, carried out between 2019 and 2021 on the campus of a technical university. Annual studies are conducted...

    Pełny tekst do pobrania w portalu

  • Knowledge-Based Virtual Modeling and Simulation of Manufacturing Processes for Industry 4.0

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2020

    ABSTRACT Industry 4.0 aims at providing a digital representation of a production landscape, but the challenges in building, maintaining, optimizing, and evolving digital models in inter-organizational production chains have not been identified yet in a systematic manner. In this paper, various Industry 4.0 research and technical challenges are addressed, and their present scenario is discussed. Moreover, in this article, the novel...

    Pełny tekst do pobrania w portalu

  • Ancient settlements-atavistic solutions for present water supply and drainage problems engendered by urbanism

    Publikacja

    - ENVIRONMENT DEVELOPMENT AND SUSTAINABILITY - Rok 2021

    Water is the most valuable resource available on earth. Although it is present in abundance, its usable volume is very scarce. This is the reason behind the existence of both floods and droughts around the world. However, human settlements face water scarcity issues that are primarily engendered by improper town planning measures. To create a balance between the available fractions of water, it is therefore imperative to have proper...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Subjective Quality Evaluation of Speech Signals Transmitted via BPL-PLC Wired System

    Publikacja
    • P. Falkowski-Gilski
    • G. Debita
    • M. Habrych
    • B. Miedziński
    • P. Jedlikowski
    • B. Polnik
    • J. Wandzio
    • X. Wang

    - Rok 2020

    The broadband over power line – power line communication (BPL-PLC) cable is resistant to electricity stoppage and partial damage of phase conductors. It maintains continuity of transmission in case of an emergency. These features make it an ideal solution for delivering data, e.g. in an underground mine environment, especially clear and easily understandable voice messages. This paper describes a subjective quality evaluation of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The complete lists of 1D reversible number-conserving cellular automata with radius one of up to 7 states

    Dane Badawcze
    open access

    This dataset contains complete lists of all one-dimensional reversible number-conserving k-ary cellular automata with radius one of up to 7 states, i.e. with state sets {0,1}, {0,1,2}, {0,1,2,3}, {0,1,2,3,4}, {0,1,2,3,4,5} and {0,1,2,3,4,5,6}.

  • Wybrane aspekty oceny satysfakcji i lojalności klientów i pracowników

    Celem artykułu jest przedstawienie propozycji oryginalnego modelu pozwalającego lepiej zrozumieć mechanizmy kształtowania się satysfakcji i lojalności klientów i pracowników oraz umożliwiającego porównywanie satysfakcji klientów różnych przedsiębiorstw w oderwaniu od ich specyfiki branżowej. Zaprezentowany model opiera się na mechanizmach przyczynowo-skutkowych i pozwala na stawianie kwantyfikowalnych celów, dając w rezultacie...

    Pełny tekst do pobrania w portalu

  • Deep eutectic solvents vs ionic liquids: Similarities and differences

    Publikacja

    - MICROCHEMICAL JOURNAL - Rok 2020

    Deep eutectic solvents (DES) were introduced as an alternative to ionic liquids (IL) to overcome the drawbacks of IL solvents. However, some authors consider them to be a subclass of ILs. In contrast, other authors emphasize that these are by their nature independent, different groups of substances. Thus, the question arises: Which solvent group should DESs belong to? Maybe a new class should be added to the existing ones. The...

    Pełny tekst do pobrania w portalu

  • Rule-Based Model for Selecting Integration Technologies for Smart Cities Systems

    Publikacja

    The aim of this article is to present the stages of development for an information technology integration model for the design of systems for smart cities. The Introduction explains the need for integration technologies and presents a model for selecting integration technologies and the conditions for its use in designing smart cities systems. Then two verification stages of the presented model are discussed. In the first stage,...

    Pełny tekst do pobrania w portalu

  • An optimised placement of the hard quality sensors for a robust monitoring of the chlorine concentration in drinking water distribution systems

    The problem of an optimised placement of the hard quality sensors in drinking water distribution systemsunder several water demand scenarios for a robust monitoring of the chlorine concentration is formulatedin this paper. The optimality is understood as achieving a desired trade off between the sensors and theirmaintenance costs and the accuracy of estimation of the chlorine concentration. The contribution of thiswork is a comprehensive...

    Pełny tekst do pobrania w portalu

  • Hedging Strategies of Derivatives Instruments for Commodity Trading Entities

    Publikacja

    - Rok 2015

    Hedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...

  • Analysis of data fusion algorithms for the vessel with the dynamic positioning system

    Publikacja

    The dynamic positioning (DP) system on the vessel is operated to control the position and heading of the vessel with the use of propellers and thrusters installed on the board. On DP vessels redundant measurement systems of position, heading and the magnitude and direction of environmental forces are required for safety at sea. In this case, a fusion of data is needed from individual measurement devices. The article proposes a...

    Pełny tekst do pobrania w portalu

  • Computer-Aided Automated Greenery Design—Towards a Green BIM

    Contemporary climate challenges are changing the architect’s awareness, which results in a broader spectrum of interest. The available software enables the design of vegetation, but it is often very limited and requires specialist knowledge. The available software allows the creation of individual solutions based on visual algorithms or writing scripts; however, they are still not common methods used in architecture and urban planning....

    Pełny tekst do pobrania w portalu

  • Tools, Methods and Services Enhancing the Usage of the Kepler-based Scientific Workflow Framework

    Publikacja
    • M. Płóciennik
    • S. Winczewski
    • P. Ciecieląg
    • F. Imbeaux
    • B. Guillerminet
    • P. Huynh
    • M. Owsiak
    • P. Spyra
    • T. Aniel
    • B. Palak... i 3 innych

    - Procedia Computer Science - Rok 2014

    Scientific workflow systems are designed to compose and execute either a series of computational or data manipulation steps, or workflows in a scientific application. They are usually a part of a larger eScience environment. The usage of workflow systems, however very beneficial, is mostly not irrelevant for scientists. There are many requirements for additional functionalities around scientific workflows systems that need to be...

    Pełny tekst do pobrania w portalu

  • An empirical study on the impact of AspectJ on software evolvability

    Since its inception in 1996, aspect-oriented programming (AOP) has been believed to reduce the effort required to maintain software systems by replacing cross-cutting code with aspects. However, little convincing empirical evidence exists to support this claim, while several studies suggest that AOP brings new obstacles to maintainability. This paper discusses two experiments conducted to evaluate the impact of AspectJ (the most...

    Pełny tekst do pobrania w portalu

  • CMGNet: Context-aware middle-layer guidance network for salient object detection

    Publikacja
    • K. Shaheed
    • I. Ullah
    • S. Hussain
    • W. Ali
    • S. Ali Khan
    • Y. Yin
    • Y. Ma

    - Rok 2024

    Salient object detection (SOD) is a critical task in computer vision that involves accurately identifying and segmenting visually significant objects in an image. To address the challenges of gridding issues and feature...

  • Seismic gap between buildings founded on different soil types experiencing pounding during earthquakes

    Publikacja

    Several formulas have been suggested in the literature to evaluate the minimum seismic gap that would prevent collisions between adjacent buildings during earthquakes, including those based on the absolute sum of the peak displacements (ABS), square root of the sum of the squares (SRSS), the double difference method (DDC), Australian code, and approach proposed by Naderpour et al. The aim of the present study is to evaluate the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Disaster-resilient communication networks: Principles and best practices

    Publikacja
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Rok 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • On Symmetry of Uniform and Preferential Attachment Graphs

    Publikacja

    - ELECTRONIC JOURNAL OF COMBINATORICS - Rok 2014

    Motivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number m of existing ones according to some attachment scheme. We prove symmetry results for m=1 and 2 , and we conjecture that for m≥3 , both models yield asymmetry with high...

    Pełny tekst do pobrania w portalu

  • Hydroperoxyl radical and formic acid formation from common DNA stabilizers upon low energy electron attachment

    Publikacja
    • A. Ribar
    • S. Huber
    • M. Śmiałek-Telega
    • K. Tanzer
    • M. Neustetter
    • R. Schürmann
    • I. Bald
    • S. Denifl

    - PHYSICAL CHEMISTRY CHEMICAL PHYSICS - Rok 2018

    2-Amino-2-(hydroxymethyl)-1,3-propanediol (TRIS) and ethylenediaminetetraacetic acid (EDTA) are key components of biological buffers and are frequently used as DNA stabilizers in irradiation studies. Such surface or liquid phase studies are done with the aim to understand the fundamental mechanisms of DNA radiation damage and to improve cancer radiotherapy. When ionizing radiation is used, abundant secondary electrons are formed...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Pełny tekst do pobrania w portalu

  • Some Security Features of Selected IoT Platforms

    Publikacja

    - TASK Quarterly - Rok 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Pełny tekst do pobrania w portalu