Wyniki wyszukiwania dla: MALWARE LIFECYCLE - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: MALWARE LIFECYCLE

Wyniki wyszukiwania dla: MALWARE LIFECYCLE

  • Sustainability objectives and collaboration lifecycle in cluster organizations

    Publikacja

    - Quality and Quantity - Rok 2023

    In our paper, we combine two issues, collaboration in cluster organizations and sustainability, aiming to answer the question: Does complex governance structure of cluster organizations support members in formulating and reaching sustainability objectives? Based on four case studies of cluster organizations and a still novel abductive approach, we present the ways in which sustainability was executed in their functioning. Our study...

    Pełny tekst do pobrania w portalu

  • The lifecycle of a digital historical document: structure and content.

    Publikacja

    - Rok 2004

    Zaproponowno model cyklu wytwarzania dokumentu cyfrowego z papierowych oryginałów pisanych na maszynie i przedstawiono opracowany przez autorów i wdrożony w środowisku Państwowego Muzeum Stutthof w Sztutowie zestaw narzędziowy DOW do automatycznej ekstrakcji treści dokumentu. Istotę nowej metodologii, opracowanej w ramach projektu 5PR UE IST-33441 MEMORIAL, jest wykorzystanie informacji semantycznej w procesach segmentacji tła,...

    Pełny tekst do pobrania w portalu

  • Integration and Dependency in Software Lifecycle Based on Jazz Platform

    Publikacja
    • B. Chrabski

    - Rok 2011

    Software delivery organizations are being asked to meet goals that seem mutually exclusive. Teams are asked to increase product quality, accelerate time to market, and meet increasing mandates from regulatory bodies. As software solutions and software development environments become rapidly more complex. Many business drivers compound these challlenges.

  • Simulating Malware with MAlSim

    Publikacja

    - Rok 2008

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

  • Simulating malware with MAlSim

    Publikacja

    This paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Acoustic lifecycle study of the double-layer porous asphalt on E4 in Huskvarna, Sweden

    Publikacja

    - Rok 2018

    In 2010 a double-layer porous asphalt concrete (DPAC) pavement was constructed on the E4 motorway through the Swedish city Huskvarna. Earlier experience in Sweden indicated that it was feasible to obtain a high initial noise reduction but due to the widespread use of studded tires in winter, clogging and ravelling created losses of around 2 dB per year, with an expected acoustical lifetime of only 3 years. However, the improved...

  • Malware - a survey on threats and mitigation techniques

    Publikacja

    - Rok 2015

    This paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...

  • MAlSim - Mobile Agent Malware Simulator

    Publikacja

    - Rok 2008

    One of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...

  • Assessment of the Environmental Impact of a Car Tire throughout Its Lifecycle Using the LCA Method

    Publikacja
    • K. Piotrowska
    • W. Kruszelnicka
    • P. Bałdowska-Witos
    • R. Kasner
    • J. Rudnicki
    • A. Tomporowski
    • J. Flizikowski
    • M. Opielak

    - Materials - Rok 2019

    There are numerous threats to the natural environment that pose a significant risk both to the environment and to human health, including car tires. Thus, there is a need to determine the impact of the life cycle of car tires on the environment, starting with the processes of raw materials acquisition, production, and ending with end-of-life management. Therefore, the authors of this study chose to do research on passenger car...

    Pełny tekst do pobrania w portalu

  • International Journal of Product Lifecycle Management

    Czasopisma

    ISSN: 1743-5110

  • Modelling the malware propagation in mobile computer devices

    Publikacja

    - COMPUTERS & SECURITY - Rok 2018

    Nowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

    Publikacja
    • A. Akintola
    • A. Balogun
    • L. Capretz
    • H. Mojeed
    • S. Basri
    • S. Salihu
    • F. Usman-Hamza
    • P. Sadiku
    • G. Balogun
    • Z. Alanamu
    • H. A. Mojeed

    - Applied Sciences-Basel - Rok 2022

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection

    Publikacja
    • A. G. Akintola
    • A. O. Balogun
    • H. A. Mojeed
    • F. Usman-Hamza
    • S. A. Salihu
    • K. S. Adewole
    • G. B. Balogun
    • P. O. Sadiku

    - International Journal of Interactive Mobile Technologies - Rok 2022

    Due to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...

    Pełny tekst do pobrania w portalu

  • Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

    Publikacja
    • A. G. Akintola
    • A. O. Balogun
    • L. F. Capretz
    • H. A. Mojeed
    • S. Basri
    • S. A. Salihu
    • F. E. Usman-Hamza
    • P. O. Sadiku
    • G. B. Balogun
    • Z. O. Alanamu

    - Applied Sciences-Basel - Rok 2022

    As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...

    Pełny tekst do pobrania w portalu

  • Positively aware : the monthly journal of the Test Positive Aware Network

    Czasopisma

    ISSN: 1523-2883

  • Affect aware video games

    Publikacja

    - Rok 2022

    In this chapter a problem of affect aware video games is described, including such issue as: emotional model of the player, design, development and UX testing of affect-aware video games, multimodal emotion recognition and a featured review of affect-aware video games.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Modeling emotions for affect-aware applications

    The chapter concerns emotional states representation and modeling for software systems, that deal with human affect. A review of emotion representation models is provided, including discrete, dimensional and componential models. The paper provides also analysis of emotion models used in diverse types of affect-aware applications: games, mood trackers or tutoring systems. The analysis is supported with two design cases. The study...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A method for ice-aware maritime route optimization

    Publikacja
    • R. Guinness
    • J. Saarimaki
    • L. Ruotsalainen
    • H. Kuusniemi
    • F. Goerlandt
    • J. Montewka
    • R. Berglund
    • V. Kotovirta

    - Rok 2014

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Trust Models for Community- Aware Identity Managment. [....]

    Publikacja

    - Rok 2006

    Artykuł przedstawia możliwości budowania zaufania pomiędzy członkami społecznych sieci współpracujacych w Internecie. Przedstawiono system informatyczne wykorzystującyna współczesą wiedzę z zakresu psychologi społecznej, umozliwiajacy tworzenie sieci społecznych w internecie.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Emotion Recognition for Affect Aware Video Games

    In this paper the idea of affect aware video games is presented. A brief review of automatic multimodal affect recognition of facial expressions and emotions is given. The first result of emotions recognition using depth data as well as prototype affect aware video game are presented

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Design Elements of Affect Aware Video Games

    Publikacja

    - Rok 2015

    In this paper issues of design and development process of affect-aware video games are presented. Several important design aspects of such games are pointed out. A concept of a middleware framework is proposed that separates the development of affect-aware video games from emotion recognition algorithms and support from input sensors. Finally, two prototype affect-aware video games are presented that conform to the presented architecture...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A New Model for context aware applications analysis and design

    Publikacja

    W artykule zostały opisane aplikacje kontekstowe, które działają w przestrzeniach inteligentnych, oraz zostały przeanalizowane ich właściwości. Na podstawie analizy zaproponowano nowe podejście do ich modelowania które zapewnia oddzielenie logiki aplikacji w zakresie adaptacji (do zmian środowiska) od jej realizacji. Zostały wykorzystane MVC i modele zmian stanu. Zaproponowano ilościową miarę poziomu kontekstowości a także sposób...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Rendezvous of Distance-Aware Mobile Agents in Unknown Graphs

    Publikacja

    - Rok 2014

    We study the problem of rendezvous of two mobile agents starting at distinct locations in an unknown graph. The agents have distinct labels and walk in synchronous steps. However the graph is unlabelled and the agents have no means of marking the nodes of the graph and cannot communicate with or see each other until they meet at a node. When the graph is very large we want the time to rendezvous to be independent of the graph size...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Design and Configuration of Context-aware VoIP Telephony Systems

    Publikacja

    - Rok 2013

    Voice over IP is a widely used concept with regard to a realization technology of different types of telephony systems, including those that are used in enterprises. Such systems of a call procesing component and a set of desk endpoints that are pervasove from a user perspective. Those andpoints are usually not mobile, but in result can deliver a much greater set of functions needed in an everyday office work. Those functions also...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Towards better understanding of context-aware knowledge transformation

    Publikacja

    Considering different aspects of knowledge functioning, context is poorly understood in spite of intuitively identifying this concept with environmental recognition. For dynamic knowledge, context especially seems to be an essential factor of change. Investigation on the impact of context on knowledge dynamics or more generally on the relationship between knowledge and its contextual interpretation is important in order to understand...

    Pełny tekst do pobrania w portalu

  • Substrate noise-aware floorplanning for mixed-signal SOCs.

    Publikacja

    - Rok 2004

    Opisano nową metodę projektowania systemów na chipie z uwzglednieniem minimalizacji szumu podłożowego. Optymalizacje rozmieszczenia bloków układowych na chipie uzyskuje się dzieki wykorzystaniu algorytmu ewolucyjnego minimalizującego funkcję celu uwzględniającą poziom szumu podłożowego.

  • Interference aware bluetooth scatternet (re)configuration algorithm IBLUERA

    Publikacja

    - Rok 2007

    This paper presents a new algorithm IBLUEREA, which enables reconfiguration of Bluetooth scatternet to reduce interference. IBLUEREA makes use of the complex model comparing ISM environment efficiency. The mechanism envisages the use of the assessment of the probability of successful (unsuccessful) frame transmission in order to take a decision concerning co-existence of technologies which make use of the same ISM band (here Bluetooth...

  • Interference aware Bluetooth scatternet (Re)configuration algorithm IBLUEREA

    The paper presents a new algorithm IBLUEREA, which enables reconfiguration of Bluetooth (BT) scatternet to reduce mutual interferences between BT and Wi-Fi (IEEE 802.11b) networks operating on the same area. IBLUEREA makes use of proposed procedure for modelling ISM environment around a given BT scatternet. The mechanism is based on estimation of the probabilities of successful (unsuccessful) frame transmissions. This determination...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • EvOLAP Graph – Evolution and OLAP-Aware Graph Data Model

    Publikacja

    - Rok 2018

    The objective of this paper is to propose a graph model that would be suitable for providing OLAP features on graph databases. The included features allow for a multidimensional and multilevel view on data and support analytical queries on operational and historical graph data. In contrast to many existing approaches tailored for static graphs, the paper addresses the issue for the changing graph schema. The model, named Evolution...

    Pełny tekst do pobrania w portalu

  • Context-aware User Modelling and Generation of Recommendations in Recommender Systems

    Publikacja

    - Rok 2018

    Recommender systems are software tools and techniques which aim at suggesting new items that may be of interest to a user. This dissertation is focused on four problems in recommender systems domain. The first one is context-awareness, i.e. how to obtain relevant contextual information, how to model user preferences in a context and use them to make predictions. The second one is multi-domain recommendation, which aim at suggesting...

    Pełny tekst do pobrania w portalu

  • Performance and Power-Aware Modeling of MPI Applications for Cluster Computing

    Publikacja

    - Rok 2016

    The paper presents modeling of performance and power consumption when running parallel applications on modern cluster-based systems. The model includes basic so-called blocks representing either computations or communication. The latter includes both point-to-point and collective communication. Real measurements were performed using MPI applications and routines run on three different clusters with both Infiniband and Gigabit Ethernet...

    Pełny tekst do pobrania w portalu

  • Energy-Aware Scheduling for High-Performance Computing Systems: A Survey

    Publikacja

    High-performance computing (HPC), according to its name, is traditionally oriented toward performance, especially the execution time and scalability of the computations. However, due to the high cost and environmental issues, energy consumption has already become a very important factor that needs to be considered. The paper presents a survey of energy-aware scheduling methods used in a modern HPC environment, starting with the...

    Pełny tekst do pobrania w portalu

  • Network-aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework

    Rapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...

    Pełny tekst do pobrania w portalu

  • How to Design Affect-aware Educational Systems – the AFFINT Process Approach

    Publikacja

    - Rok 2016

    Computer systems, that support learning processes, can adapt to the needs and states of a learner. The adaptation might directly address the knowledge deficits and most tutoring systems apply an adaptable learning path of that kind. Apart from a preliminary knowledge state, there are more factors, that influence education effectiveness and among those there are fluctuating emotional states. The tutoring systems may recognize or...

  • Context-Aware Indexing and Retrieval for Cognitive Systems Using SOEKS and DDNA

    Publikacja

    - Advances in Intelligent Systems and Computing - Rok 2019

    Visual content searching, browsing and retrieval tools have been a focus area of interest as they are required by systems from many different domains. Context-based, Content-Based, and Semantic-based are different approaches utilized for indexing/retrieving, but have their drawbacks when applied to systems that aim to mimic the human capabilities. Such systems, also known as Cognitive Systems, are still limited in terms of processing...

    Pełny tekst do pobrania w portalu

  • Process arrival pattern aware algorithms for acceleration of scatter and gather operations

    Imbalanced process arrival patterns (PAPs) are ubiquitous in many parallel and distributed systems, especially in HPC ones. The collective operations, e.g. in MPI, are designed for equal process arrival times (PATs), and are not optimized for deviations in their appearance. We propose eight new PAP-aware algorithms for the scatter and gather operations. They are binomial or linear tree adaptations introducing additional process...

    Pełny tekst do pobrania w portalu

  • Justyna Płotka-Wasylka dr hab. inż.

    Urodziła się w Słupsku (24.03.1986).W 2005 roku ukończyła I Liceum Ogólnokształcące im. Jana II Sobieskiego w Wejherowie i rozpoczęła studia na Wydziale Chemicznym Politechniki Gdańskiej. Po ich ukończeniu w 2010 rozpoczęła pracę naukową na tej uczelni, uzyskując w 2014 roku stopień doktora nauk chemicznych. Tematem jej rozprawy doktorskiej, wykonywanej pod kierunkiem prof. Marka Biziuka oraz dr Caluma Morrisona (Uniwersytet w...

  • CMGNet: Context-aware middle-layer guidance network for salient object detection

    Publikacja
    • K. Shaheed
    • I. Ullah
    • S. Hussain
    • W. Ali
    • S. Ali Khan
    • Y. Yin
    • Y. Ma

    - Rok 2024

    Salient object detection (SOD) is a critical task in computer vision that involves accurately identifying and segmenting visually significant objects in an image. To address the challenges of gridding issues and feature...

  • Using Different Information Channels for Affect-Aware Video Games - A Case Study

    Publikacja

    - Rok 2018

    This paper presents the problem of creating affect-aware video games that use different information channels, such as image, video, physiological signals, input devices, and player’s behaviour, for emotion recognition. Presented case studies of three affect-aware games show certain conditions and limitations for using specific signals to recognize emotions and lead to interesting conclusions.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Evaluation of affective intervention process in development of affect-aware educational video games

    Publikacja

    - Rok 2016

    In this paper initial experiences are presented on implementing specific methodology of affective intervention design (AFFINT) for development of affect-aware educational video games. In the described experiment, 10 student teams are to develop affect-aware educational video games using AFFINT to formalize the whole process. Although all projects are still in progress, first observations and conclusions may already be presented.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Performance/energy aware optimization of parallel applications on GPUs under power capping

    Publikacja

    In the paper we present an approach and results from application of the modern power capping mechanism available for NVIDIA GPUs to the bench- marks such as NAS Parallel Benchmarks BT, SP and LU as well as cublasgemm- benchmark which are widely used for assessment of high performance computing systems’ performance. Specifically, depending on the benchmarks, various power cap configurations are best for desired trade-off of performance...

    Pełny tekst do pobrania w portalu

  • Multi-domain and Context-Aware Recommendations Using Contextual Ontological User Profile

    Publikacja

    - Rok 2022

    Recommender Systems (RS) became popular tools in many Web services like Netflix, Amazon, or YouTube, because they help a~user to avoid an information overload problem. One of the types of RS are Context-Aware RS (CARS) which exploit contextual information to provide more adequate recommendations. Cross-Domain RS (CDRS) were created as a response to the data sparsity problem which occurs when only few users can provide reviews or...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Rapid tolerance‐aware design of miniaturized microwave passives by means of confined‐domain surrogates

    The effects of uncertainties, primarily manufacturing tolerances but also incomplete information about operating conditions or material parameters, can be detrimental to the performance of microwave components. Quantification of such effects is essential to ensure a meaningful evaluation of the structure, in particular, its reliability under imperfect fabrication procedures. The improvement of the circuit robustness can be achieved...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Energy-Aware High-Performance Computing: Survey of State-of-the-Art Tools, Techniques, and Environments

    The paper presents state of the art of energy-aware high-performance computing (HPC), in particular identification and classification of approaches by system and device types, optimization metrics, and energy/power control methods. System types include single device, clusters, grids, and clouds while considered device types include CPUs, GPUs, multiprocessor, and hybrid systems. Optimization goals include various combinations of...

    Pełny tekst do pobrania w portalu

  • Tolerance-Aware Optimization of Microwave Circuits by Means of Principal Directions and Domain-Restricted Metamodels

    Practical microwave design is most often carried out in the nominal sense. Yet, in some cases, performance degradation due to uncertainties may lead to the system failing to meet the prescribed specifications. Reliable uncertainty quantification (UQ) is therefore important yet intricate from numerical standpoint, especially when the circuit at hand is to be evaluated using electromagnetic (EM) simulation tools. Tolerance-aware...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • 1D convolutional context-aware architectures for acoustic sensing and recognition of passing vehicle type

    Publikacja

    A network architecture that may be employed to sensing and recognition of a type of vehicle on the basis of audio recordings made in the proximity of a road is proposed in the paper. The analyzed road traffic consists of both passenger cars and heavier vehicles. Excerpts from recordings that do not contain vehicles passing sounds are also taken into account and marked as ones containing silence....

  • Tolerance-Aware Multi-Objective Optimization of Antennas by Means of Feature-Based Regression Surrogates

    Assessing the immunity of antenna design to fabrication tolerances is an important consideration, especially when the manufacturing process has not been predetermined. At the same time, the antenna parameter tuning should be oriented toward improving the performance figures pertinent to both electrical (e.g., input matching) and field properties (e.g., axial ratio bandwidth) as much as possible. Identification of available trade-offs...

    Pełny tekst do pobrania w portalu

  • Karolina Zielińska-Dąbkowska dr inż. arch.

    Karolina M. Zielinska-Dabkowska (dr inż. arch., Dipl.-Ing. Arch.[FH]) jest adiunktem na Wydziale Architektury Politechniki Gdańskiej. W roku 2002 ukończyła studia na Wydziale Architektury i Urbanistyki  Politechniki Gdańskiej a w 2004 inżynierii architektonicznej na HAWK Hochschule für angewandte Wissenschaft und Kunst Hildesheim w Niemczech. Po studiach pracowała dla kilku firm o światowej renomie w Berlinie, Londynie, Nowym Jorku...

  • Nowe podejście do gwarancji QoS w sieciach IP - Flow Aware Networking (FAN)

    Artykuł przedstawia nowy sposób gwarantowania jakości w sieciach IP zaproponowany przez dział R&D France Telecom. W oparciu o istotne cechy ruchu internetowego opisane zostały problemy napotykane przez dotychczasowe architektury QoS. Przybliżono założenia FAN oraz przykład praktycznej implementacji - ruter Cross-protect. FAN realizuje gwarancje QoS poprzez sterowanie przyjęciem do obsługi oparte o przepływy i pomiary ruchu na...

  • Performance and Energy Aware Training of a Deep Neural Network in a Multi-GPU Environment with Power Capping

    In this paper we demonstrate that it is possible to obtain considerable improvement of performance and energy aware metrics for training of deep neural networks using a modern parallel multi-GPU system, by enforcing selected, non-default power caps on the GPUs. We measure the power and energy consumption of the whole node using a professional, certified hardware power meter. For a high performance workstation with 8 GPUs, we were...

    Pełny tekst do pobrania w serwisie zewnętrznym