Filtry
wszystkich: 8125
-
Katalog
- Publikacje 5360 wyników po odfiltrowaniu
- Czasopisma 916 wyników po odfiltrowaniu
- Konferencje 83 wyników po odfiltrowaniu
- Wydawnictwa 5 wyników po odfiltrowaniu
- Osoby 177 wyników po odfiltrowaniu
- Projekty 37 wyników po odfiltrowaniu
- Laboratoria 4 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 2 wyników po odfiltrowaniu
- Kursy Online 167 wyników po odfiltrowaniu
- Wydarzenia 53 wyników po odfiltrowaniu
- Dane Badawcze 1320 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: LAW SEVERITY
-
UCLA LAW REVIEW
Czasopisma -
STANFORD LAW REVIEW
Czasopisma -
Generalization of Kramers-Krönig relations for evaluation of causality in power-law media
PublikacjaClassical Kramers-Krönig (K–K) relations connect real and imaginary parts of the frequency-domain response of a system. The K–K relations also hold between the logarithm of modulus and the argument of the response, e.g. between the attenuation and the phase shift of a solution to a wave-propagation problem. For square-integrable functions of frequency, the satisfaction of classical K–K relations implies causality in the time domain....
-
Law regulations against physical calculations - problems in water and sewage management
PublikacjaW pracy zostały opisane przykłady trzech typów problemów w zakresie gospodarki wodno-ściekowej, z jakimi można spotkać się w związku z wejściem w życie przepisów uwzględniających obowiązujące w tej dziedzinie dyrektywy Unii Europejskiej. Są to m.in. problemy ze zbyt szeroką możliwością interpretacji pewnych zapisów, problemy związane z nieuwzględnianiem w przepisach praw fizyki, a także brak ustawowej regulacji pewnych zagadnień.
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublikacjaThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
SDN testbed for validation of cross-layer data-centric security policies
PublikacjaSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
An Experimental Investigation of Pressure Wave Celerity During the Transient Slurry Flow
PublikacjaTransportation of slurries in pressure pipelines is an example of a complex flow due to specific parameters of transported medium. For practitioners, the economy of designing and maintenance is usually the most important factor. For this reason, most of hydrotransport installations are fairly simple; however, they become more vulnerable to negative effects of the transient flow which can occur in pressure pipelines. As the consequence,...
-
EU's Energy Policy and Assessing Europe's Spiraling Energy Security Crises
Publikacja -
INDO–FRENCH DEFENCE PARTNERSHIP AND REGIONAL SECURITY BALANCE IN SOUTH ASIA
Publikacja -
Experiment with small objects floating under water in the harbor security aspect.
PublikacjaObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublikacjaWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublikacjaThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Security information sharing for smart grids: Developing the right data model
PublikacjaThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Safety integrity level verification for safety-related functions with security aspects
PublikacjaThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublikacjaEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublikacjaIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Topology improvements in scale-free networks when assuring security and survivability
PublikacjaW artykule zaproponowano heurystyczny algorytm iteracyjny (NEA) kontrolowanego rozrostu sieci, zmniejszający stopień jej bezskalowości. Pokazano, że odpowiednia kontrola rozrostu sieci, prowadzi do uzyskania sieci o topologii zbliżonej do regularnej, a więc w duzym stopniu odpornej na celowe działania niszczące - ataki. Właściwości algorytmu zostały przebadane przy pomocy dedykowanego symulatora dla reprezentatywnej próby inicjalnych...
-
International Conference on Artificial Intelligence and Law
Konferencje -
Association between the seroprevalence of antibodies against seasonal alphacoronaviruses and SARS-CoV-2 humoral immune response, Covid-19 severity, and influenza vaccination.
Publikacja -
Clinical Course and Severity of COVID-19 in 940 Infants with and without Comorbidities Hospitalized in 2020 and 2021: The Results of the National Multicenter Database SARSTer-PED
Publikacja -
Performance Analysis of the "Intelligent" Kirchhoff- Law - Johnson-Noise Secure Key Exchange
PublikacjaThe Kirchhoff-law - Johnson-noise (KLJN) secure key distribution system provides a way of exchanging theoretically secure keys by measuring random voltage and current through the wire connecting two different resistors at Alice’s and Bob’s ends. Recently new advanced protocols for the KLJN method have been proposed with enhanced performance. In this paper, we analyze the KLJN system and compare with the „intelligent” KLJN (iKLJN)...
-
Regulatory approach to competition law in the practice of the Polish Competition Authority – critical assessment
PublikacjaThe text provides a critical analysis of the Polish practice of using competition law provisions as regulation provisions
-
Legislation and Practice of Selected State Aid Issues, According to EU and Polish Law
PublikacjaThe dataset encompasses several tables, each consisting of three elements: legislation, jurisprudence and scientific articles on numerous subjects and economic activities receiving public financial support in the form of state aid instruments. The set includes a subjective list of the most commonly used and/or disputable examples of granting aid, such as for (local) airports and airlines, steel production, shipyards, and coalmines....
-
The exponential law for partial, local and proper maps and its application to otopy theory
Publikacja -
Legislative and criminal law aspects of water protection and prevention of pharmaceuticals accumulation in nature
Publikacja -
A constitutive law for concrete with smooth transition from continuous into discontinuous cracks’ description
PublikacjaPaper presents a constitutive model for concrete that combines a continuous and discontinuous crack’s description to simulate the concrete under tensile dominated loads. In a continuum regime, two different constitutive laws were used. First, a plasticity model with the Rankine failure criterion and an associated flow rule was used. Second, a constitutive law based on isotropic damage mechanics was formulated. Both model alternatives...
-
A non local hypoplastic constitutive law to describe shear localization in granular bodies.
PublikacjaPrzedstawiono wyniki numerycznej analizy formacji stref ścinania w materiale granulowanym podczas ściskania. Zachowanie suchego piasku podczas testów ściskania w płaskim stanie odkształcenia było analizowane z zastosowaniem metody elementów skończonych i nielokalnego hipoplastycznego prawa konstytutywnego. Podczas obliczeń numerycznych zwrócono szczególną uwagę na wpływ długości charakterystycznej na nośność i szerokość...
-
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
LABOR RESOURCE MANAGEMENT AT THE MACRO LEVEL AS SOCIAL SECURITY IN THE CONTEXT OF EUROPEAN INTEGRATION
Publikacja -
DETERMINANTS OF THE PROVISION OF MARITIME TRAVEL IN THE CONTEXT OF A SENSE OF SECURITY OF GENERATION Y REPRESENTATIVES
Publikacja -
Security aspects in verification of the safety integrity level of distributed control and protection systems
PublikacjaPrzedstawiono najważniejsze zagadnienia zwišzane z weryfikacjš poziomu nienaruszalnoci bezpieczeństwa SIL rozproszonych systemów sterowania i zabezpieczeń z uwzględnieniem aspektów ochrony informacji. Przedstawiono ilociowš metodę weryfikacji poziomu SIL z wykorzystaniem wskaników różnicowych oraz dwuparametrowš funkcję kryterialnš łaczšcš wymagania SIL oraz EAL (poziom uzasadnionego zaufania dla ochrony informacji).
-
Overview of current communication systems for security forces. Features, limitations and potential solutions
Publikacja -
State security and patriotism vs the implementation of obligations and prohibitions related to covid-19
Publikacja -
The Issue of Operating Security Systems in Terms of the Impact of Electromagnetic Interference Generated Unintentionally
Publikacja -
Reliability analysis of aerodrome’s electronic security systems taking into account electromagnetic interferences
Publikacja -
Indo–French Defence Cooperation in the Light of Regional Security Balance in South Asia
Publikacja -
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publikacja -
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublikacjaThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19
PublikacjaAbstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
THE SITUATION OF WOMEN IN THE POLISH LABOUR MARKET IN THE LIGHT OF CHANGES IN THE PENSION SECURITY SYSTEM
PublikacjaThe aim of the study is to examine the opinion of a group of women on their economic activity and decisions related to retirement. The first part of the article reviews previous research related to the economic activity of older people with a special focus on women. In the empirical part of the article, women’s opinions on issues related to retirement were analyzed. The research was carried out in 2016 on a sample of 45 women,...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublikacjaIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Remote task submission and publishing in BeesyCluster: security and efficiency of Web Service interface
PublikacjaPrezentujemy nowy system BeesyCluster, który stanowi łatwy w użyciu portal dostępowy do rozszerzalnej sieci usług wdrożonych i opublikowanych na klastrach/komputerach PC z wirtualnymi płatnościami za wykorzystanie usług. Administratorzy/użytkownicy mogą dołączać klastry/komputery PC dostępne poprzez SSH kliknięciem myszy bez konieczności dalszej konfiguracji na klastrze/komputerze PC udostępniającego. Ponadto, użytkownicy mogą...
-
IET Information Security
Czasopisma -
Shear-Jamming in Two-Dimensional Granular Materials with Power-Law Grain-Size Distribution
Publikacja