Wyniki wyszukiwania dla: ATTACUS ATLAS
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
The International Symposium on Research in Attacks, Intrusions and Defenses (International Symposium on Recent Advances in Intrusion Detection)
Konferencje -
Ocena ryzyka na sieci dróg krajowych w Polsce - program EURORAP
PublikacjaEuropejski Atlas BRD jest narzędziem ułatwiającym: klasyfikację dróg z uwzględnieniem ryzyka, porównanie stopnia ryzyka na sieci dróg poszczególnych krajów, województw, wybór działań poprawiających stan bezpieczeństwa ruchu na drogach, szerokie komunikowanie o ryzyku na drogach za pomocą map, stron internetowych itp.Zaprezentowane wyniki oceny ryzyka na drogach krajowych są przydatne: kierowcom planującym bezpieczna podróż po kraju,...
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublikacjaThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection
PublikacjaA methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....
-
Considerations of Computational Efficiency in Volunteer and Cluster Computing
PublikacjaIn the paper we focus on analysis of performance and power consumption statistics for two modern environments used for computing – volunteer and cluster based systems. The former integrate computational power donated by volunteers from their own locations, often towards social oriented or targeted initiatives, be it of medical, mathematical or space nature. The latter is meant for high performance computing and is typically installed...
-
Wody opadowe 2016
PublikacjaCharakterystyczne problemy wód opadowych które wystąpiły w 2016 r. Omówiono przewidywane kierunki zmian w polskim systemie prawnym wraz z wynikającymi stąd zagrożeniami. Specyficzne problemy zbiornika retencyjnego. Platforma retencja pl, informacja o przygotowaniu polskiego atlasu elektronicznego wód opadowych PANDA. Podstawowe informacje dotyczące opadu gdańskiego z lipca 2016.
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublikacjaStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Rate performance of the V2O5 nanocrystals as cathode material in Li-ion batteries
Dane BadawczeThe DataSet contains the galvanostatic charge/discharge curves of the V2O5 nanocrystals obtained by the sol-gel method. The battery tests of the samples were performed using the Atlas-Sollich 0961 (Atlas-Sollich, Poland) with different current densities in the voltage range between 2.0 V and 4.0 V vs. Li/Li+. Here 1C is 294 mAh g-1.
-
Rate performance of the V2O5 nanorods as cathode material in Li-ion batteries
Dane BadawczeThe DataSet contains the galvanostatic charge/discharge curves of the V2O5 nanorods obtained by the sol-gel method. The battery tests of the samples were performed using the Atlas-Sollich 0961 (Atlas-Sollich, Poland) with different current densities in the voltage range between 2.0 V and 4.0 V vs. Li/Li+. Here 1C is 294 mAh g-1.
-
Biometric identity verification
PublikacjaThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Cycling performances of the V2O5 nanorods as cathode material in Li-ion batteries
Dane BadawczeThe DataSet contains the next one hundred galvanostatic charge/discharge curves of the V2O5 nanorods obtained by the sol-gel method. The battery tests of the samples were performed using the Atlas-Sollich 0961 (Atlas-Sollich, Poland) with C/5 and 2C current densities in the voltage range between 2.0 V and 4.0 V vs. Li/Li+. Here 1C is 294 mAh g-1. The...
-
Cycling performances of the V2O5 nanocrystals as cathode material in Li-ion batteries
Dane BadawczeThe DataSet contains the next one hundred galvanostatic charge/discharge curves of the V2O5 nanocrystals obtained by the sol-gel method. The battery tests of the samples were performed using the Atlas-Sollich 0961 (Atlas-Sollich, Poland) with C/5 and 2C current densities in the voltage range between 2.0 V and 4.0 V vs. Li/Li+. Here 1C is 294 mAh g-1. ...
-
Cycling performances of the V2O5 nanostructures as cathode material in Na-ion batteries
Dane BadawczeThe DataSet contains the next one hundred galvanostatic charge/discharge curves of the V2O5 nanostructures with different morphology obtained by the sol-gel method. The battery tests of the samples were performed using the Atlas-Sollich 0961 (Atlas-Sollich, Poland) with C/5 current densities in the voltage range between 2.0 V and 4.0 V vs. Li/Li+. Here...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublikacjaNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publikacjaarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Collective angst and collective action for progressive city policies: study4
Dane BadawczeWe conducted this study before the second term of the presidential election in Poland in 2020. Conservative-nationalist President Andrzej Duda’s rival was Rafał Trzaskowski, the liberal Mayor of Warsaw supported by Civic Platform [pol. Platforma Obywatelska] party. 456 residents of Gdańsk participated in the study (313 women, 3 non-binary) with M age...
-
Stanisław Barański mgr inż.
OsobyStanisław Barański received BSc in 2019 and MSc in 2020 in informatics at Gdańsk University of Technology. Currently, he is a PhD candidate at the Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. His research interests include blockchains and cryptography, especially the issue of blockchain-based internet voting and mitigation of content poisoning...
-
Bioterrorism — characteristics and possibilities of prevention
PublikacjaIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Magnetic field microsensor based on GaAs MESFET
PublikacjaA novel concept of the drain separation design in a horizontally-split-drain GaAs MAGFET sensor, based on epitaxial layer growth, was developed. Proper choice of GaAs/AlAs/GaAs epitaxial layer sequence provided good electrical isolation between the drain regions. The measured leakage current between the drain regions was in the range of nA for up to 2V drain voltage bias difference. Performed analytical and numerical calculations...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Detection of illicit chemicals by portable Raman spectrometer
PublikacjaThe Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublikacjaIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
The AFM micrographs of pitting corrosion evolution on high-alloy steel 1.4301
Dane BadawczeThe dataset contains the results of topographic imaging of high-alloy stainless steel 1.4301 on which the pitting corrosion process was induced by electrochemical methods. The study of the effects of a local attack allows for conclusions about the intensity and mechanism of this type of corrosion. The file contains atomic force microscopy (AFM) data...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublikacjaThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
Imaging of the effects of pitting corrosion with the use of AFM
Dane BadawczePitting corrosion is a local attack on a metal surface, limited to a point or small area, which appears as a hole. Pitting corrosion is one of the most harmful forms of corrosion due to the fact that it is associated with small, difficult to detect damage, that can even lead to perforation of the structure. A single pit may range in size from micrometers...
-
AeroSense Measurements: Wind Tunnel ETH Zurich
Dane BadawczeData from wind tunnel tests of Aerosesne measurement system installed on NACA 0012 at ETH Zurich wind tunnel.
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Design and computational fluid dynamics analysis of the last stage of innovative gas-steam turbine
PublikacjaResearch regarding blade design and analysis of flow has been attracting interest for over a century. Meanwhile new concepts and design approaches were created and improved. Advancements in information technologies allowed to introduce computational fluid dynamics and computational flow mechanics. Currently a combination of mentioned methods is used for the design of turbine blades. These methods enabled us to improve flow efficiency...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
PublikacjaThis paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...
-
Rafał Leszczyna dr hab. inż.
OsobyDr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...
-
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Impedance spectra of ZnO varistor type 280 model O M ver. 89
Dane BadawczeThe impedance spectrum of high-voltage ZnO varistor obtained using FRA EIS impedance spectrosocpy measurement method. The 1V sinusoidal excitation was used. The frequency range was chosen from 10 kHz down to 100 uHz. The object under test and the measuring instrument were placed in a Faraday cage due to high impedance of the object. The data was acquired...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Photocatalytic performance of alkali metal doped graphitic carbon nitrides and Pd-alkali metal doped graphitic carbon nitride composites
Publikacja -
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS
PublikacjaW wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...
-
Rate performance of (NH4)2V10O25·8H2O as cathode material in Li-ion batteries
Dane BadawczeThe DataSet contains the galvanostatic charge/discharge curves of the ammonium vanadate nanostructures obtained by the hydrothermal method under an initial pressure of 50 bar ((NH4)2V10O25·8H2O). The battery tests of the samples were performed using the ATLAS 0961 MBI multichannel battery testing system with different current densities in the voltage...
-
Rate performance of mixture (NH4)2V6O16 and (NH4)2V10O25·8H2O as cathode material in Li-ion batteries
Dane BadawczeThe DataSet contains the galvanostatic charge/discharge curves of the ammonium vanadate nanostructures obtained by the hydrothermal method without initial pressure (mixture (NH4)2V6O16 and (NH4)2V10O25·8H2O). The battery tests of the samples were performed using the ATLAS 0961 MBI multichannel battery testing system with different current densities...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublikacjaIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
On design and analysis of flow characteristics of the last stage of gas-steam turbine
PublikacjaResearch regarding blade design and analysis of flow have been conducted for over a century. Meanwhile new concepts and design approaches were created and improved. Advancements in information technologies allowed to introduce computational fluid dynamics (CFD) and computational flow mechanics (CFM). Currently a combination of mentioned methods is used for design of turbine blades. These methods enabled us to improve flow efficiency...
-
Power equalization of AES FPGA implementation
PublikacjaThis paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....
-
Scanning electron microscopy studies of the weld decay on SS 304 of water supply pipeline
Dane BadawczeThis dataset contains micrographs made with scanning electron microscope (SEM) Hitachi S-3400N, of the weld decay for water supply system pipelines made of AISI 304 stainless steel. Within the dataset one can see the different corrosion mechanisms. The micrographs were made after the Strauss test (excluding pictures labeled as pits_in_HAZ, done without...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...