Filtry
wszystkich: 3166
-
Katalog
- Publikacje 2214 wyników po odfiltrowaniu
- Czasopisma 157 wyników po odfiltrowaniu
- Konferencje 90 wyników po odfiltrowaniu
- Wydawnictwa 5 wyników po odfiltrowaniu
- Osoby 95 wyników po odfiltrowaniu
- Projekty 24 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 310 wyników po odfiltrowaniu
- Wydarzenia 19 wyników po odfiltrowaniu
- Dane Badawcze 250 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: IOT SECURITY
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
THE SITUATION OF WOMEN IN THE POLISH LABOUR MARKET IN THE LIGHT OF CHANGES IN THE PENSION SECURITY SYSTEM
PublikacjaThe aim of the study is to examine the opinion of a group of women on their economic activity and decisions related to retirement. The first part of the article reviews previous research related to the economic activity of older people with a special focus on women. In the empirical part of the article, women’s opinions on issues related to retirement were analyzed. The research was carried out in 2016 on a sample of 45 women,...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublikacjaIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19
PublikacjaAbstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...
-
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application
PublikacjaRecent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...
-
Design of an Autonomous IoT Node Powered by a Perovskite-Based Wave Energy Converter
PublikacjaThis paper presents the results of experimental research focused on wave energy harvesting and its conversion to power Internet of Things (IoT) devices. The harvesting and conversion process was performed using a wave energy converter (WEC) consisting of a lead zirconate titanate piezoelectric ceramic perovskite material and a prototype power electronic circuit. The designed WEC was considered as a power supply for an end node...
-
LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module
PublikacjaMonitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...
-
Software-Defined NB-IoT Uplink Framework - The Design, Implementation and Use Cases
PublikacjaIn the radiocommunication area, we may observe a rapid growth of new technology, such as 5G. Moreover, all the newly introduced radio interfaces, e.g., narrowband Internet of Things (NB-IoT), are strongly dependent on the software. Hence, the radiocommunication software development and optimization, as well as the 3GPP technical specification, should be introduced at the academic level of education. In this paper, a software-defined...
-
Low-Profile ESPAR Antenna for RSS-Based DoA Estimation in IoT Applications
PublikacjaIn this paper, we have introduced a low-profile electronically steerable parasitic array radiator (ESPAR) antenna that can successfully be used to estimate the direction-of-arrival (DoA) of incoming signals in wireless sensor network (WSN) applications, in which the height of the complete antenna has to be low. The proposed antenna is over three times lower than high-profile ESPAR antenna designs currently available in the literature...
-
Investigation of Performance and Configuration of a Selected IoT System—Middleware Deployment Benchmarking and Recommendations
PublikacjaNowadays Internet of Things is gaining more and more focus all over the world. As a concept it gives many opportunities for applications for society and it is expected that the number of software services deployed in this area will still grow fast. Especially important in this context are properties connected with deployment such as portability, scalability and balance between software requirements and hardware capabilities. In...
-
Modeling an Industrial Revolution: How to Manage Large-Scale, Complex IoT Ecosystems?
PublikacjaAdvancements around the modern digital industry gave birth to a number of closely interrelated concepts: in the age of the Internet of Things (IoT), System of Systems (SoS), Cyber-Physical Systems (CPS), Digital Twins and the fourth industrial revolution, everything revolves around the issue of designing well-understood, sound and secure complex systems while providing maximum flexibility, autonomy and dynamics. The aim of the...
-
Agata Kot-Wasik prof. dr hab. inż.
OsobyAgata Kot-Wasik, urodzona w 1964 r. w Siedlcach (woj. mazowieckie), ukończyła studia magisterskie w 1988 r. na Wydziale Chemicznym Politechniki Gdańskiej, w specjalności Analityka Techniczna i Przemysłowa. W latach 1988–1992 była zatrudniona w Katedrze Chemii Organicznej na macierzystym wydziale na stanowisku naukowo-technicznym. W 1990 r. ukończyła na PG studia podyplomowe „Techniki Instrumentalne w Analizie Śladów i Ochronie...
-
ICT Express
Czasopisma -
IET Networks
Czasopisma -
IET Optoelectronics
Czasopisma -
IET Communications
Czasopisma -
IET Nanobiotechnology
Czasopisma -
Frontiers in ICT
Czasopisma -
IET Nanodielectrics
Czasopisma -
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublikacjaW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value
Publikacja -
Machine Learning for Control Systems Security of Industrial Robots: a Post-covid-19 Overview
Publikacja -
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublikacjaCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublikacjaMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
N-doped graphene quantum dot-decorated MOF-derived yolk-shell ZnO/NiO hybrids to boost lithium and sodium ion battery performance
PublikacjaSurface engineering at the nanoscale to obtain robust interface between metal oxides and quantum dots is essential for improving the performance and stability of battery materials. Herein, we designed and prepared novel N-doped graphene quantum dot-modified ZnO/NiO anode materials with a well-defined yolk-shell structure for lithium and sodium-ion batteries. NG QDs were assembled on the ZnO/NiO microspheres using three different...
-
Journal of Transportation Safety & Security
Czasopisma -
International Social Security Review
Czasopisma -
Journal of Information Assurance and Security
Czasopisma -
Journal of Applied Security Research
Czasopisma -
Computer Law & Security Review
Czasopisma -
GLOBAL CHANGE, PEACE & SECURITY
Czasopisma -
European Journal of International Security
Czasopisma -
European Journal of Social Security
Czasopisma -
Journal of Global Security Studies
Czasopisma -
ACM Transactions on Privacy and Security
Czasopisma -
Journal of Information Security and Applications
Czasopisma -
International Journal of Cryptography and Security
Czasopisma -
Economics of Peace and Security Journal
Czasopisma -
EURASIP Journal on Information Security
Czasopisma -
JOURNAL OF CONFLICT & SECURITY LAW
Czasopisma -
International Journal of Security and Networks
Czasopisma -
Journal of Cyber Security and Mobility
Czasopisma -
Journal of Information Systems Security
Czasopisma -
Journal of Conflict Transformation and Security
Czasopisma -
Journal of Nutrition and Food Security
Czasopisma -
International Journal of Nuclear Security
Czasopisma -
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...