Wyniki wyszukiwania dla: ATTACUS ATLAS
-
Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements
PublikacjaIn Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...
-
A game-theoretic study of CSMA/CA under a backoff attack
PublikacjaAnalizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublikacjaAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Solvability of a Markovian model of an IEEE 802.11 LANunder a backoff attack
PublikacjaPrzedstawiono ulepszony model jakościowy mechanizmu CSMA/CA dla bezprzewodowych sieci lokalnych z indywidualną konfiguracją okien rywalizacji. Sformułowano warunki dostateczne rozwiązywalności modelu oraz wykazano obecność bezwarunkowej motywacji do zmniejszania okien rywalizacji.
-
Performance of an ad-hoc 802.11 LAN under a backoff attack
PublikacjaSamowolna rekonfiguracja wartości okien rywalizacji w protokole MAC sieci bezprzewodowych 802.11 może prowadzić do niesprawiedliwego rozdziału dostępnego pasma transmisyjnego. Dla dużego obciążenia ruchowego sformułowano prosty model markowowski umożliwiający szybką symulację Monte Carlo dla oceny udziału w pasmie poszczególnych stacji sieci. Traktując otrzymane wielkości jako wypłaty w grze niekoalicyjnej przedstawiono niektóre...
-
Architectural and Urban Planning Solutions for the Protection of Heritage Buildings in the Context of Terrorist Attacks: Following the Example of Passive Protection Systems
PublikacjaEvents in recent years showing numerous terrorist attacks raise awareness regarding the neces-sity of considering the safety of heritage buildings. The analysis of available data allows us to conclude that it is not possible to fully prevent terrorist attacks. On the other hand, it is possible to minimize the impact of such incidents through proper design of Passive Protection System (PPS) components. One possible architectural...
-
Abacus-A Journal of Accounting Finance and Business Studies
Czasopisma -
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublikacjaIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
A random access protocol under backoff attack: performance and game-theoretic deterrent
PublikacjaPrzedstawiono metodę obrony przed atakiem na protokół CSMA/CA, opartą na generacji sekwencji zagłuszających z wykorzystaniem wzajemnej słyszalności stacji. Na podstawie analizy wypłat odpowiedniej gry w formie rozwiniętej pokazano możliwość osiągania punktu równowagi odpowiadającego standardowym ustawieniom protokołu.
-
High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
PublikacjaThis work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublikacjaThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Case Study NEB Atlas / part I - 3D Models / Brunnshög, Lund
Dane BadawczeThe data presents the results of work on the analysis of contemporary neighbourhoods. The aim of this part of the research was to create a digital model - a simplified digital twin - for selected parts of housing estates already realised in various cities in Europe. This group presents a model for a fragment of the Brunnshög district in Lund, Sweden....
-
Case Study NEB Atlas / part I - 3D Models / King's Cross, London
Dane BadawczeThe data presents the results of work on the analysis of contemporary neighbourhoods. The aim of this part of the research was to create a digital model - a simplified digital twin - for selected parts of housing estates already realised in various cities in Europe. This group presents a model for a fragment of the King's Cross, London, UK. The students...
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / BedZED, London
Dane BadawczeThe data presents the results of work on the analysis of contemporary neighbourhoods. The aim of this part of the research was to analysis housing estates already existed in various cities in Europe. The analyses ware done in real time with AI and powered for key factors such as sun hours, daylight potential, noise, wind, and microclimate. These data...
-
WHY SHOULD WE ADOPT NON-USED ATTICS OF MONUMENTAL SACRAL CATHOLIC CHURCHES FOR SECULAR PURPOSES?
PublikacjaA motive for adapting the desecrated churches to new purposes is a broadly discussed matter, progressively better investigated and defined. Is it advisable to introduce a new, permanent function, complementary to the sacred one in the historical ecclesial buildings? This paper presents the results of the research on benefits of adapting the non-utilized attics of monumental churches still performing their sacred function, located...
-
Jakub Szulwic dr inż.
OsobyJakub Szulwic (ur. 23 grudnia 1974 w Bydgoszczy) – geodeta uprawniony, specjalizujący się w zakresie pomiarów i oceny geometrii obiektów inżynierskich szczególnie z wykorzystaniem metod fotogrametrii inżynieryjnej i skaningu laserowego; zajmuje się geomatyką i geoinformtyką. Autor ponad 100 publikacji naukowych, w tym 50 indeksowanych w Web of Science (h-index =15). W 1993 roku ukończył klasę o profilu mat-fiz i zdał maturę w Liceum...
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / Oceanhamnen, Helsingborg, Sweden
Dane BadawczeThe data present the results of the work on the analysis of modern settlements. The goal of this part of the research was to analyze housing estates already in place in various European cities. Analyses were performed in real time using artificial intelligence, and responses were searched for sun hours, daylight potential, noise, wind, and microclimate....
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / Garnizon district in Gdansk, Poland
Dane BadawczeThe data present the results of the work on the analysis of modern settlements. The goal of this part of the research was to analyze housing estates already in place in various European cities. Analyses were performed in real time using artificial intelligence, and responses were searched for sun hours, daylight potential, noise, wind, and microclimate....
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / Seestadt Aspern, Vienna, Austria
Dane BadawczeThe data present the results of the work on the analysis of modern settlements. The goal of this part of the research was to analyze housing estates already in place in various European cities. Analyses were performed in real time using artificial intelligence, and responses were searched for sun hours, daylight potential, noise, wind, and microclimate....
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / Brunnshög district in Lund, Sweden
Dane BadawczeThe data presents the results of work on the analysis of contemporary neighbourhoods. The aim of this part of the research was to analysis housing estates already existed in various cities in Europe. The analyses ware done in real time with AI and powered for key factors such as sun hours, daylight potential, noise, wind, and microclimate. These data...
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / Västra Hamnen, Malmö, Sweden.
Dane BadawczeThe data present the results of the work on the analysis of modern settlements. The goal of this part of the research was to analyze housing estates already in place in various European cities. Analyses were performed in real time using artificial intelligence, and responses were searched for sun hours, daylight potential, noise, wind, and microclimate....
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / Hammarby-Sjöstad, Stockholm, Sweden.
Dane BadawczeThe data present the results of the work on the analysis of modern settlements. The goal of this part of the research was to analyze housing estates already in place in various European cities. Analyses were performed in real time using artificial intelligence, and responses were searched for sun hours, daylight potential, noise, wind, and microclimate....
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / Pilestredet Park, Oslo, Norway.
Dane BadawczeThe data present the results of the work on the analysis of modern settlements. The goal of this part of the research was to analyze housing estates already in place in various European cities. Analyses were performed in real time using artificial intelligence, and responses were searched for sun hours, daylight potential, noise, wind, and microclimate....
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / King’s Cross, London, UK.
Dane BadawczeThe data present the results of the work on the analysis of modern settlements. The goal of this part of the research was to analyze housing estates already in place in various European cities. Analyses were performed in real time using artificial intelligence, and responses were searched for sun hours, daylight potential, noise, wind, and microclimate....
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / ZAC de Bonne, Grenoble, France
Dane BadawczeThe data presents the results of work on the analysis of contemporary neighbourhoods. The aim of this part of the research was to analysis housing estates already existed in various cities in Europe. The analyses ware done in real time with AI and powered for key factors such as sun hours, daylight potential, noise, wind, and microclimate. These data...
-
Case Study NEB Atlas / part II - Autodesk Forma analysis / La Courrouze district in Rennes, France
Dane BadawczeThe data present the results of the work on the analysis of modern settlements. The goal of this part of the research was to analyze housing estates already in place in various European cities. Analyses were performed in real time using artificial intelligence, and responses were searched for sun hours, daylight potential, noise, wind, and microclimate....
-
Analiza dobrych praktyk ekonomii społecznej w Polsce – o zasobach i ich pozyskiwaniu w przedsiębiorczości społecznej
PublikacjaArtykuł, przy wykorzystaniu analizy zawartości (content analysis) przedstawionych w dobrych praktykach przedsiębiorstw społecznych i ekonomii społecznej, stanowi próbę przeanalizowania rodzajów zasobów wykorzystywanych przez przedsiębiorstwa społeczne, procesów pozyskiwania zasobów oraz trudności się w nich pojawiających. W tym celu wykorzystano profile 25 przypadków dobrych praktyk, prezentowanych i promowanych na najbardziej...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublikacjaThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Finger Vein Presentation Attack Detection Method Using a Hybridized Gray-Level Co-Occurrence Matrix Feature with Light-Gradient Boosting Machine Model
PublikacjaPresentation Attack Detection (PAD) is crucial in biometric finger vein recognition. The susceptibility of these systems to forged finger vein images is a significant challenge. Existing approaches to mitigate presentation attacks have computational complexity limitations and limited data availability. This study proposed a novel method for identifying presentation attacks in finger vein biometric systems. We have used optimal...
-
Case Study NEB Atlas / part II - Autodesk Forma (formerly Spacemaker) / Battersea Power Station Development, London
Dane BadawczeThe data presents the results of work on the analysis of contemporary neighbourhoods. The aim of this part of the research was to analysis housing estates already existed in various cities in Europe. The analyses ware done in real time with AI and powered for key factors such as sun hours, daylight potential, noise, wind, and microclimate. These data...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublikacjaA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Mechanical and structural investigations of wings of selected insect species
PublikacjaThis paper presents research and measurements leading to obtaining the Young’s modulus of wing bearing structures of selected insect species. A small testing machine intended for three-point bending and equipped with instruments registering low forces was constructed for the needs of the experiment. The machine was used to perform numerous bending tests of wings of three species of insects (obtained from a breeding farm): Attacus...
-
Performance evaluation of GPS anti-spoofing system based on antenna array processing
PublikacjaThis article concerns the problem of detection and mitigation of spoofing attacks in Global Navigation Satellite Systems. First, background information about spoofing and its possible countermeasures is provided. Next, concept of a novel GPS anti-spoofing system based on antenna array processing is presented and implementation of prototype of this system is described. The third section outlines the performance evaluation of proposed...
-
Standard MST i jego wykorzystanie przy opisie jednostek chorobowych
PublikacjaW podrozdziale przedstawiono ujednolicony sposób opisu chorób gastroentero-logicznych. Omówiono założenia standardu MST oraz model dokumentu elektroni-cznego. Opisano jak zaimplementowano ten standard w systemie ERS i jak natej podstawie utworzono elektroniczny atlas endoskopowy.
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublikacjaW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Improved jamming resistance using electronically steerable parasitic antenna radiator
PublikacjaThis paper presents an idea of using an Electronically Steerable Parasitic Antenna Radiator (ESPAR) for jamming suppression in IEEE 802.11b networks. Jamming (intentional interference) attacks are known to be effective and easy to perform, which may impose connectivity problems in applications concerning Internet of Things (IoT). In our paper, theoretical considerations are presented and the results of experiments performed in...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublikacjaNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
Ekologiczne aspekty projektowania fundamentów palowych
PublikacjaProjektowanie i wykonawstwo fundamentów palowych realizowane jest obecnie w coraz trudniejszych warunkach gruntowych. Wszystkie rodzaje budownictwa wkraczają również na tereny ekologicznie cenne. W referacie przedstawiono technologie, np. pale Omega, Atlas, przemieszczeniowe wiercone, prefabrykowane, które w dużym stopniu eliminują niekorzystne oddziaływanie fundamentów palowych na środowisko.
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublikacjaTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublikacjaThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublikacjaThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...
-
Toksyczność ekosystemu. W: Rzeka Bug, zasoby wodne i przyrodnicze. Pod red.J. Dojlido, W. Kowalczewskiego, R. Miłaszewskiego, J. Ostrowskiego. Warsza- wa: IMGW, Wyż. Szk. Ekol. i Zarz.**2003 s. 352-361, 4 rys. 2 tab. bibliogr. 5 poz. Seria Atlasy i Monografie
PublikacjaOmówiono wyniki badań ekotoksykologicznych prowadzonych w ramach ''Projektupilotowego wdrożenia wytycznych monitoringu i oceny jakości wód transgrani-cznych w zlewni rzeki Bug w ramach Konwencji EKO/ONZ w ochronie i użytkowa-niu cieków transgranicznych i jezior międzynarodowych''. Badania dotyczyły o-ceny ekotoksykologicznej wód, osadów i ścieków w zlewni rzeki Bug. Badaniadowodzą, że jakość ekotoksykologiczna wód i osadów...
-
Revalorisation of the Szewalski’s concept of the law of varying the last-stage blade retraction in a gas-steam turbine
PublikacjaThe article presents the implementations of the free vortex law to the blade of the last stage of a gas-steam turbine. First, a thermodynamic analysis was carried out, determining the parameters at the inlet, then the number of stages of the high and low-pressure part of the turbine was constructed, together with the kinematics and velocity vectors for subsequent stages of the axial turbine. The last step of article was to take...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Problemy z deszczem. Wody opadowe – ustalenia ilościowe
PublikacjaProblemy określenia wskaźników ilościowych przy zagospodarowaniu wód opadowych w Polsce. Wymagania formalne, problematyczność ustaleń ilościowych wg wzorów empirycznych. Tworzenie atlasu elektronicznego. Problem zdarzeń niemieszczących się typowych schematach. Zmiany wprowadzane nową ustawą prawo wodne.
-
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast
PublikacjaRecent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...