Filtry
wszystkich: 1255
-
Katalog
- Publikacje 889 wyników po odfiltrowaniu
- Czasopisma 119 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 51 wyników po odfiltrowaniu
- Wynalazki 5 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Kursy Online 34 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 63 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: JOB SECURITY
-
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Security aspects in verification of the safety integrity level of distributed control and protection systems
PublikacjaPrzedstawiono najważniejsze zagadnienia zwišzane z weryfikacjš poziomu nienaruszalnoci bezpieczeństwa SIL rozproszonych systemów sterowania i zabezpieczeń z uwzględnieniem aspektów ochrony informacji. Przedstawiono ilociowš metodę weryfikacji poziomu SIL z wykorzystaniem wskaników różnicowych oraz dwuparametrowš funkcję kryterialnš łaczšcš wymagania SIL oraz EAL (poziom uzasadnionego zaufania dla ochrony informacji).
-
LABOR RESOURCE MANAGEMENT AT THE MACRO LEVEL AS SOCIAL SECURITY IN THE CONTEXT OF EUROPEAN INTEGRATION
Publikacja -
State security and patriotism vs the implementation of obligations and prohibitions related to covid-19
Publikacja -
The Issue of Operating Security Systems in Terms of the Impact of Electromagnetic Interference Generated Unintentionally
Publikacja -
Reliability analysis of aerodrome’s electronic security systems taking into account electromagnetic interferences
Publikacja -
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublikacjaThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublikacjaIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publikacja -
Indo–French Defence Cooperation in the Light of Regional Security Balance in South Asia
Publikacja -
DETERMINANTS OF THE PROVISION OF MARITIME TRAVEL IN THE CONTEXT OF A SENSE OF SECURITY OF GENERATION Y REPRESENTATIVES
Publikacja -
EFFECTIVENESS OF THE SANDPITS SECURITY SYSTEM AGAINST MICROORGANISMS AND INTESTINAL PARASITES SAND CONTAMINATION
Publikacja -
THE SITUATION OF WOMEN IN THE POLISH LABOUR MARKET IN THE LIGHT OF CHANGES IN THE PENSION SECURITY SYSTEM
PublikacjaThe aim of the study is to examine the opinion of a group of women on their economic activity and decisions related to retirement. The first part of the article reviews previous research related to the economic activity of older people with a special focus on women. In the empirical part of the article, women’s opinions on issues related to retirement were analyzed. The research was carried out in 2016 on a sample of 45 women,...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19
PublikacjaAbstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...
-
Remote task submission and publishing in BeesyCluster: security and efficiency of Web Service interface
PublikacjaPrezentujemy nowy system BeesyCluster, który stanowi łatwy w użyciu portal dostępowy do rozszerzalnej sieci usług wdrożonych i opublikowanych na klastrach/komputerach PC z wirtualnymi płatnościami za wykorzystanie usług. Administratorzy/użytkownicy mogą dołączać klastry/komputery PC dostępne poprzez SSH kliknięciem myszy bez konieczności dalszej konfiguracji na klastrze/komputerze PC udostępniającego. Ponadto, użytkownicy mogą...
-
JOM-US
Czasopisma -
Scheduling jobs to contain a natural disaster: a model and complexity
Publikacjathis paper is devoted to the problem of scheduling suppression units so that a natural disaster is dealt with as efficient as possible. the concept of deteriorating jobs is adopted, that is, the formal model of scheduling represents linearly increasing value loss as the disaster remains unsuppressed and increasing time for its suppression. more precisely, two different goals are considered: finding a suppression schedule of minimal...
-
Elimination of dominated partial schedules in scheduling deteriorating jobs
Publikacjaw artykule rozważany jest problem szeregowania zadań uwarunkowanych czasowo, w notacji trójpolowej opisywany przez 1 | pi = a + bisi | ?ci. wprowadzona jest koncepcja zdominowanych częściowych harmonogramów oraz przedstawiony jest niewielomianowy algorytm dla problemu, który bazuje na eliminacji zdominowanych częściowych harmonogramów. przedstawione są wyniki eksperymentów obliczeniowych, porównujących zaprezentowany algorytm oraz...
-
MICROSEISMIC EVENT DETECTION USING DIFFERENT ALGORITHMS ON REAL DATA FROM PATCH ARRAY GEOPHONE GRID FROM EASTERN POMERANIA FRACTURING JOB
PublikacjaThe microseismic monitoring is a method of monitoring of fracture propagation during hydraulic fracturing process. Hydraulic fracturing is a method of reservoir stimulation used especially for unconventional gas recovery. A matrix of several thousand geophones is placed on the surface of earth to record every little tremor of ground induced by fracturing process. Afterwards, the signal is analysed and the place of tremor occurrence...
-
IET Information Security
Czasopisma -
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublikacjaW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublikacjaCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Machine Learning for Control Systems Security of Industrial Robots: a Post-covid-19 Overview
Publikacja -
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value
Publikacja -
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case
PublikacjaInternet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublikacjaMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Gdańsk University of Technology graduates’ job position – years 2013-2018
Dane BadawczeThe dataset includes data from the survey on the Gdańsk University of Technology graduates from years 2013-2018 on their current job position. The survey was conducted in the period from 2015 to 2020, two years after the respondents obtained graduate status. The research sample included 11190 respondents. To summarizing, the Gdańsk University of Technology...
-
Journal of Transportation Safety & Security
Czasopisma -
International Social Security Review
Czasopisma -
Journal of Information Assurance and Security
Czasopisma -
Journal of Applied Security Research
Czasopisma -
Computer Law & Security Review
Czasopisma -
GLOBAL CHANGE, PEACE & SECURITY
Czasopisma -
European Journal of International Security
Czasopisma -
European Journal of Social Security
Czasopisma -
Journal of Global Security Studies
Czasopisma -
ACM Transactions on Privacy and Security
Czasopisma -
Journal of Information Security and Applications
Czasopisma -
International Journal of Cryptography and Security
Czasopisma -
Economics of Peace and Security Journal
Czasopisma -
EURASIP Journal on Information Security
Czasopisma -
JOURNAL OF CONFLICT & SECURITY LAW
Czasopisma -
International Journal of Security and Networks
Czasopisma -
Journal of Cyber Security and Mobility
Czasopisma -
Journal of Information Systems Security
Czasopisma