Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Attack" wg kryterium: Temat


Tytuł:
The Oracle - a New Intelligent Cooperative Strategy of Attacks on Trust and Reputation Systems
Autorzy:
Janiszewski, M.
Powiązania:
https://bibliotekanauki.pl/articles/106242.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
reputation systems
Oracle attack
malicious nodes
model of the attack
Opis:
The paper presents a new concept of attack on trust and reputation systems. The oracle attack could violate the security provided by some of the existing reputation systems. The formal model of the attack is presented in the article on the base of the reference trust model, provided bythe author. The author has proved that this type of attack could be eficient. On the other hand,a sort of measures is provided in the paper which could be implemented in the reputation systems to overcome identified vulnerabilities, unfortunately at the cost of increase of system complication.The paper also provides a definition of intelligent strategies of attacks on trust and reputation systems based on cooperation of many malicious nodes and justifies why this type of attacks is a serious threat.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2014, 14, 2; 86-102
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The threat of cyber attacks in urban conurbations
Autorzy:
Bachor, Marta
Powiązania:
https://bibliotekanauki.pl/articles/576319.pdf
Data publikacji:
2018-09-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber attack
city
security
Opis:
This paper investigates the threat of cyber attacks in urban conurbations. The first section attempts to define cyberspace and to identify potential objects of attack in the city. The second section analyses the history of past cyber attacks, and the final section gives an overview of activities performed by states and organisations with a view to countering and eliminating cyber threats.
Źródło:
Security and Defence Quarterly; 2018, 20, 3; 72-84
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m
Autorzy:
Wroński, Michał
Powiązania:
https://bibliotekanauki.pl/articles/227051.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
small subgroups attack
side-channel attack
alternative models of elliptic curves
Opis:
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff's curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography. Most of these models allow to use fast and complete arithmetic which is especially convenient in fast implementations that are side-channel attacks resistant. Montgomery, Edwards and twisted Edwards curves have always order of group of rational points divisible by 4. Huff's curves have always order of rational points divisible by 8. Moreover, sometimes to get fast and efficient implementations one can choose elliptic curve with even bigger cofactor, for example 16. Of course the bigger cofactor is, the smaller is the security of cryptosystem which uses such elliptic curve. In this article will be checked what influence on the security has form of cofactor of elliptic curve and will be showed that in some situations elliptic curves with cofactor divisible by 2m are vulnerable for combined small subgroups and side-channel attacks.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 2; 203-209
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Analysis of Potential Threats to Information Systems and Countermeasures
Autorzy:
Busłowska, Eugenia
Nowak, Iwo
Powiązania:
https://bibliotekanauki.pl/articles/504120.pdf
Data publikacji:
2017
Wydawca:
Międzynarodowa Wyższa Szkoła Logistyki i Transportu
Tematy:
Security
Attack
Database
Prevention
Opis:
The article presents the results of the analysis of threats to safety of information in enterprises. How information is protected against publication, modification or being erased has also been taken into account. The objective of the analysis is to raise awareness of value of information and the role of security in an IT system.
Źródło:
Logistics and Transport; 2017, 36, 4; 15-24
1734-2015
Pojawia się w:
Logistics and Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
O polskich i słowackich depeszach kondolencyjnych w związku z atakami terrorystycznymi
The Polish and Slovak telegrams of condolence in connection with the terrorist attacks
Autorzy:
Olchowa, Gabriela
Powiązania:
https://bibliotekanauki.pl/articles/1044697.pdf
Data publikacji:
2018-08-28
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
telegram
condolences
terrorist attack
Opis:
Occasional magazines were discussed, specifically condolences in the Polish-Slovak comparative approach. We analyzed 44 (22 PL / 22 SK) condolences delivered in the years 2015–2017 by the President of the Republic Andrzej Duda and the President of the Slovak Republic Andrej Kiska in connection with terrorist attacks. The characteristic features of condolence messages sent after terrorist attacks were indicated. Based on the collected material, two compositional diagrams and their obligatory components were distinguished. Many similarities have been found in Polish and Slovak condolence messages, which mainly originates from the diplomatic style, which imposes some formal requirements, but also some differences were noticed.
Źródło:
Poznańskie Studia Polonistyczne. Seria Językoznawcza; 2018, 25, 1; 139-149
1233-8672
2450-4939
Pojawia się w:
Poznańskie Studia Polonistyczne. Seria Językoznawcza
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Phase-shift Fault Analysis of Grain v1
Autorzy:
Hromada, V.
Pethö, T.
Powiązania:
https://bibliotekanauki.pl/articles/226344.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
stream ciphers
Grain v1
fault analysis
phase-shift attack
desynchronization attack
Opis:
This paper deals with the phase-shift fault analysis of stream cipher Grain v1. We assume that the attacker is able to desynchronize the linear and nonlinear registers of the cipher during the keystream generation phase by either forcing one of the registers to clock one more time, while the other register is not clocked, or by preventing one of the registers from clocking, while the other register is clocked. Using this technique, we are able to obtain the full inner state of the cipher in reasonable time (under 12 hours on a single PC) by using 150 bits of unfaulted keystream, 600 bits of faulted keystreams and by correctly guessing 28 bits of the linear register.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 131-136
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cryptanalysis of the FSR-255 hash function
Autorzy:
Kontak, M.
Szmidt, J.
Powiązania:
https://bibliotekanauki.pl/articles/206570.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
cryptography
cryptanalysis
FSR-255 hash function
preimage attack
second-preimage attack
collision
Opis:
In this paper we analyse the security of the FSR-255 cryptographic hash function. As a result of our security analysis we present preimage and second-preimage attacks. The attacks base on practical reversibility of the compression function. The complexity of preimage attack is about 211 evaluations of the compression function. The second-preimage attack has the complexity equivalent to one time evaluation of the compression function. Both of the attacks have been practically realised.
Źródło:
Control and Cybernetics; 2014, 43, 2; 365-374
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hardware Implementation of an Enhanced Security- and Authentication-Related Automotive CAN Bus Prototype
Autorzy:
Zniti, Asmae
Ouazzani, Nabih
Powiązania:
https://bibliotekanauki.pl/articles/2200704.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
CAN
automotive security
attack
authentication
Opis:
In this paper a new security technique aiming to ensure safe and reliable communications between different nodes on an automotive Controller Area Network (CAN) is presented. The proposed method relies on a robust authentication code using Blake-3 as a hash algorithm within an adapted structure that includes a monitor node. A prototype is implemented and run effectively to perform hardware simulations of real case-based security problems of automotive embedded CAN systems. As a result, data transfer can take place on a newly enhanced CAN bus according to the standard protocol without being intercepted nor tampered with by unauthorized parties thereby highlighting the effectiveness of the proposed technique.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 83--88
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza możliwości ataku czasowego oraz słownikowego na komunikację z użyciem kryptografii eliptycznej
Analysis of the possibility of the time and dictionary based attacks on elliptic curve cryptography based communication
Autorzy:
Tybura, M.
Powiązania:
https://bibliotekanauki.pl/articles/194177.pdf
Data publikacji:
2017
Wydawca:
Politechnika Rzeszowska im. Ignacego Łukasiewicza. Oficyna Wydawnicza
Tematy:
kryptografia
krzywe eliptyczne
atak słownikowy
atak czasowy
cryptography
elliptic curves
dictionary attack
time attack
Opis:
Przez tysiąclecia tworzono, udoskonalano i łamano dziesiątki rozwiązań, których jedynym celem było uniemożliwienie odczytania informacji przez postronnych. Doprowadziło to do powstania dwóch przeciwstawnych w swoich działaniach dziedzin - kryptografii i kryptoanalizy. W dobie komputerów zrezygnowano ze wszystkich dotychczasowych rozwiązań i wprowadzono zupełnie nowe, z których za najbezpieczniejsza można uznać RSA i szyfry oparte o krzywe eliptyczne. Oba są uznawane za niemożliwe do złamania. Wynika to bezpośrednio z zależności matematycznych użytych w ich definicji. W dotychczasowych badaniach wykazano już kilka ich słabości, lecz nadal nie ma rozwiązania, które działałoby w każdym jednym przypadku. Z uwagi na to postanowiono przyjrzeć się głębiej słabym punktom szyfrów eliptycznych z uwzględnieniem wszystkich dotychczas dostępnych informacji.
For millennia, dozens of solutions, which sole purpose was to prevent outsiders from reading information, have been developed, refined and broken. This led to the emergence of two opposing fields - cryptography and cryptanalysis. In the age of computers, all existing solutions have been abandoned and new ones have been introduced, with the most secure ones RSA and ciphers based on elliptic curves. Both considered impossible to break. This result directly from the math used in their definitions. Some previous researches have already shown some of their weaknesses, but there is still no solution that would work in every single case. Because of this, it was decided to take a closer look at the weak points of elliptic ciphers, taking into account all the information available to date.
Źródło:
Zeszyty Naukowe Politechniki Rzeszowskiej. Elektrotechnika; 2017, z. 36 [296], nr 3, 3; 53-58
0209-2662
2300-6358
Pojawia się w:
Zeszyty Naukowe Politechniki Rzeszowskiej. Elektrotechnika
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of the bombers’ tactics and the consequences of a series of terrorist attacks in Brussels (22 March 2016)
Autorzy:
WOJTASIK, KAROLINA
Powiązania:
https://bibliotekanauki.pl/articles/1798779.pdf
Data publikacji:
2021-04-21
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
terrorist attack
ISIS
hard target
soft target
tactics
attack in Brussels
foreign terrorist fighters
TATP
Opis:
The purpose of the article is to analyse the modus operandi of the terrorists who on 22 March 2016 organised the bomb attacks in Brussels. The article characterises the targets of the attackers, analyses their operational tactics and the aftermath of their attacks. In addition, the consequences of the attacks are discussed – both economic and legal. Another issue analysed in the article is the perpetrators of the assassinations – their origin, path of radicalisation and network of contacts. The summary shows why returning foreign terrorist fighters are a threat to security in the EU countries, including Poland.
Źródło:
Przegląd Policyjny; 2020, 140(4); 135-153
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Self-proclaimed Islamic State. The determinant of violence in the 21st century
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1178982.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Islamic State
Islamic terrorism
terrorist attack
Opis:
In the 21st century, terrorism has become one of the greatest threats. It can be compared to the traditional forms of armed conflict, but in the opinion of the author is not exactly the truth. It works mainly from concealment, and my strength is derived from the intimidation of the world community. Although the border between terrorism and war is still fading, these are two different threats to world order, order and security.
Źródło:
World Scientific News; 2017, 89; 355-363
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Preventing and Detecting Cyber Attacks in Industrial Control System Networks
Autorzy:
Padée, Adam
Wójcik, Michał
Ćwiek, Arkadiusz
Klimaszewski, Konrad
Kopka, Przemysław
Kozioł, Sylwester
Kuźmicki, Krzysztof
Możdżonek, Rafał
Wiślicki, Wojciech
Włodarski, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/307944.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
attack preventing
cybersecurity
industrial control systems
Opis:
This paper outlines the problem of cybersecurity in OT (operations/operational technology) networks. It provides descriptions of the most common components of these systems, summarizes the threats and compares them with those present in the IT domain. A considerable section of the paper summarizes research conducted over the past decade, focusing on how common the problem is and in which countries it prevails. The article presents techniques most commonly used in the protection of these systems, with many examples from the nuclear industry given.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 21-28
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Features of predicting random events and protection of technical objects from their influence
Autorzy:
Korostil, J.
Powiązania:
https://bibliotekanauki.pl/articles/114050.pdf
Data publikacji:
2017
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
prediction
attack
risk
random event
safety
Opis:
The paper presents research results of approaches to solving tasks of predicting occurrence of events that negatively affect technical objects. Among them, super-rare events stand out (events that occur randomly in big time intervals) and analysis of features of predicting them is conducted. Measures of protecting technical objects from negative influence of random events are reviewed, and a method of estimating the prediction accuracy on the basis of using risk concepts is presented.
Źródło:
Measurement Automation Monitoring; 2017, 63, 8; 278-281
2450-2855
Pojawia się w:
Measurement Automation Monitoring
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zapobieganie i zwalczanie zagrożeń ze strony cyberprzestrzeni
Prevention and fight against threats from cyber space
Autorzy:
Iskierka, Iwona
Powiązania:
https://bibliotekanauki.pl/articles/446045.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Rzeszowski
Tematy:
cyberzagrożenie
cyberatak
cyber threats
cyber attack
Opis:
W pracy omówiono zagadnienia związane z ochroną przed cyberzagrożeniami. Zwrócono uwagę na wzrost cyberzagrożeń i konieczność skoordynowania działań w zakresie zapobiegania i zwalczania zagrożeń ze strony cyberprzestrzeni. Ukazano działania zespołu CERT.GOV.PL, funkcjonującego w ramach Departamentu Bezpieczeństwa Teleinformatycznego ABW, które szczególnie uwzględniają ataki ukierunkowane na infrastrukturę obejmującą systemy i sieci telein-formatyczne. Wskazano na potrzebę cyberedukacji dla bezpieczeństwa.
The work discusses the issues related to the protection against cyber threats. Attention on the growth of cyber threats and the need to coordinate activities in the field of the prevention and control of risks on the part of cyberspace. Discusses the Team CERT.GOV.PL functioning within the framework of the Security Department of the ABW, which particularly include targeted attacks on infrastructure, including information and communication systems and networks. Indicated the need of education for cyber security.
Źródło:
Dydaktyka informatyki; 2014, 9; 82-90
2083-3156
Pojawia się w:
Dydaktyka informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Przykładowe narzędzie do ataków DDoS
Examples of tools for DDoS attacks
Autorzy:
Rekosz, Katarzyna
Świerczyńska, Izabela
Zys, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/41205520.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Kazimierza Wielkiego w Bydgoszczy
Tematy:
narzędzie
atak DDoS
tool
DDoS attack
Opis:
W artykule została przedstawiona problematyka dotycząca przykładowego narzędzia do ataku DDoS. Ataki DDoS stanowią rozproszoną wersję ataku Dos. Niniejsza publikacja opisuje specyfikę oraz etapy przeprowadzenia ataku DDoS. Szczegółowo zaprezentowane zostały dwie metody ataku DDoS tj. przy użyciu narzędzia Trinoo oraz Tribe Flood Network.
This article presents issues concerning the exemplary tool for DDoS attack . DDoS attacks are a distributed version of the Dos attack . This publication describes the specifics and the stages of carrying out a DDoS attack. Two methods were presented in detail of DDoS attack using a tool Trinoo and Tribe Flood Network.
Źródło:
Studia i Materiały Informatyki Stosowanej; 2015, 18; 11-14
1689-6300
Pojawia się w:
Studia i Materiały Informatyki Stosowanej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of an algorithm for detecting attacks in sensor wireless systems
Autorzy:
Belej, Olexander
Bokla, Natalia
Więckowski, Tadeusz
Powiązania:
https://bibliotekanauki.pl/chapters/32083874.pdf
Data publikacji:
2021
Wydawca:
Politechnika Białostocka. Oficyna Wydawnicza Politechniki Białostockiej
Tematy:
wireless networks
attacks
attack detection system
Opis:
Wireless networks have gained immense popularity. Their widespread distribution is due to undeniable advantages over traditional cable networks: ease of deployment, user mobility in the network coverage area, easy connection of new users. On the other hand, the security of such networks often limits their application. If an attacker needs to have a physical connection to the network when attacking a wired network, then in the case of wireless networks, he can be anywhere in the network coverage area. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed below. On the other hand, the low level of security of such networks often limits their application. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed.
Źródło:
Methods and tools in CAD – selected issues; 51-62
9788366391871
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Internet narzędziem groźnej broni cyfrowej dla infrastruktury krytycznej w globalnym świecie wiedzy
Internet tool for the weapon digital Critical Infrastructure in the global world of knowledge
Autorzy:
KRAUZ, Antoni
Powiązania:
https://bibliotekanauki.pl/articles/456873.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Rzeszowski
Tematy:
Internet
critical infrastructure
information attack
cyberwar
Opis:
W zamieszczonym artykule dokonano krótkiej charakterystyki problematyki zagrożeń i niebezpieczeństw spowodowanych rozwojem Internetu. Przedstawiono podejmowane próby ataków informatycznych, prowadzonej wojny internetowej skierowanej na różne dziedziny finansowo-ekonomiczne, administracyjne, militarne o zasięgu globalnym. Dokonano przeglądu różnych form i metod ataku na infrastrukturę informatyczną, w tym infrastrukturę krytyczną. Przedstawiono rozwój zagrożeń ze strony broni cyfrowej, cyberterroryzmu, cyberprzestępczości, cyberwojny, podano przykłady ataków hakerskich występujących w skali globalnej. Omówiono przykładowy model zabezpieczenia systemu informatycznego komputera, korzystania z Internetu
In the reproduced article presents a brief characterization of hazards and dangers caused by the growth of the Internet. Are shown attempts to attack information, conducted online war aimed at different areas of financial and economic, administrative, global military. There have been reviews of various forms and methods of attack on infrastructure, including critical infrastructure. Provides an overview of the risks posed by digital weapons, cyberterrorism, cybercrime, cyberwar, are examples of hacking attacks occurring on a global scale. Discussed an example of a computer system security model computer, using the Internet.
Źródło:
Edukacja-Technika-Informatyka; 2013, 4, 1; 388-399
2080-9069
Pojawia się w:
Edukacja-Technika-Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Terrorism in Europe – from the definition to the present day
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1189392.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Islamic extremism
terrorism
terrorist attack
history
Opis:
The description undertaken attempts to investigate the threat of Islamic terrorism in Europe. This problem is still real, because the countries of the Old Continent participating in the so-called the war against global terrorism already experienced terrorist attacks on their territories. The main objective of this work is to determine the capabilities of the terrorist threat by examining the essence of the phenomenon of modern Islamic terrorism in the European area and the assessment of the threat. During the development of this description the author used different research methods, and the main criterion for their selection was a rationalization of the course and the possibility of obtaining objective results. Method of analysis and detailed examination of documents has been used as a gateway and adapted in the optimal way to achieve the desired result in the form of leaked conclusions. The leading element to the entire research process was a critical analysis of the literature on the subject of research. Literature and the sources from which were used in the study can be divided into several thematic segments: the history of Islam and the sources of Islamic fundamentalism, history and theory of terrorism, the sources of law in the context of counter-terrorism and policies in the field of counter-terrorism and the fight against this phenomenon. Literature research in the field of scientific studies in the context of the presented thematic sections, characterized by diverse accessibility, which consists of a number of items related to the Muslim religion and Islamic fundamentalism, terrorism and the disciplines of law, as well as occurring much less frequently highly specialized positions describing the security system of anti-terrorist.
Źródło:
World Scientific News; 2016, 48; 41-51
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Attacks on StreamHash 2
Autorzy:
Buczek, M.
Powiązania:
https://bibliotekanauki.pl/articles/106208.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
StreamHash 2
hash function
collision attack
Opis:
StreamHash 2 is a hash function proposed by Michał Trojnara at the Cryptography and Security Systems in 2011 Conference. This algorithm is a member of StreamHash family which was first introduced in 2008 during the SHA-3 Competition. In this paper we will show collision attacks on the internal state of the StreamHash 2 hash function with complexity about 2^8n for the 32n-bit version of the algorithm and its reduced version with complexity 2^8n. We will also show its application to attacking the full StreamHash 2 function (finding a collision on all output bits) with complexity about 2^88 . We will try to show that any changes made to the construction (for instance the ones proposed for StreamHash 3) will have no effect on the security of the family due to critical fault build into the compression function.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 3; 25-35
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The threat of Islamic terrorism in Europe
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1189675.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Islamic extremism
terrorism
terrorist attack
European Union
Opis:
The terrorist attacks of 11 September 2001 realized to the international community that there are new challenges and threats, which in a completely different light presented the phenomenon of terrorism. They are characterized by an extremely significant result of social, psychological and media. The international situation has undergone dynamic changes. Conditions of international security has changed. The duty of the EU countries is to fight against this kind of threats. Ensuring the safety of citizens within the EU is the responsibility of each state element thereof. This paper deals with the problem of the threat of Islamic terrorism on the territory of the Community. The author tries to present it in the most transparent manner this threat, as well as selected aspects of counteracting this phenomenon.
Źródło:
World Scientific News; 2016, 48; 52-62
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
COMPUTER NETWORK OPERATIONS IN THE LIGHT OF IUS IN BELLO
Autorzy:
Kaja, Kowalczewska,
Powiązania:
https://bibliotekanauki.pl/articles/891441.pdf
Data publikacji:
2018-08-21
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
cyber attack
warfare
international humanitarian law
distinction
Opis:
The paper deals with the legal definition of attack under international humanitarian law, analysed in the context of cyber “attacks”. The armed nature of cyber operation is distinguished from a violent one and therefore special section is devoted to the indirect consequences of cyber attacks. It is also noted that the incremental resort to automated weapon systems, controlled by computer networks still highly vulnerable to hostile malware and interference, challenges the current state of law. Finally, the author attempts to render the linkage between law and IT, both greatly concerned with cyber security.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2014, 15; 135-143
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Armed Attack, Non-State Actors and a Quest for the Attribution Standard
Autorzy:
Kowalski, Michal
Powiązania:
https://bibliotekanauki.pl/articles/706939.pdf
Data publikacji:
2010
Wydawca:
Polska Akademia Nauk. Instytut Nauk Prawnych PAN
Tematy:
ARMED ATTACK
NON-STATE ACTORS
UN CHARTER
Opis:
Article 51 of the UN Charter, in affirming the inherent right of self-defence of each UN Member State 'against which an armed attack has occurred', clearly indicates that the concept of armed attack plays a key role in delineating the right of self-defence. The concept in question was not, however, defined in the UN Charter, and no universally acceptable definition has yet emerged either in practice or in doctrine. One of the fundamental questions to be addressed in this context is who must engage in armed activity for it to qualify as an armed attack. This question is of particular relevance today because of the threat of international terrorism and the expansion of the concept of armed attack through the inclusion of an act of terrorism. The article discusses in some detail the emerging legal framework for attribution of actions undertaken by non-state actors to states.
Źródło:
Polish Yearbook of International Law; 2010, 30; 101-130
0554-498X
Pojawia się w:
Polish Yearbook of International Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance evaluation of machine learning models to predict heart
Autorzy:
Khan, AttackMajid
Husnain, Ghassan
Ahmad, Waqas
Shaukat, Zain
Jan, Latif
Haq, Ihtisham Ul
Ishtiaq, Atif
Powiązania:
https://bibliotekanauki.pl/articles/3147618.pdf
Data publikacji:
2023
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Instytut Informatyki Technicznej
Tematy:
cardiovascular disease
machine learning
heart attack
prediction
Opis:
Coronary Artery Disease is the type of cardiovascular disease (CVD) that happens when the blood vessels which stream the blood toward the heart, either become tapered or blocked. Of this, the heart is incapable to push sufficient blood to encounter its requirements. This would lead to angina (chest pain). CVDs are the leading cause of mortality worldwide. According to WHO, in the year 2019 17.9 million people deceased from CVD. Machine Learning is a type of artificial intelligence that uses algorithms to help analyse large datasets more efficiently. It can be used in medical research to help process large amounts of data quickly, such as patient records or medical images. By using Machine Learning techniques and methods, scientists can automate the analysis of complex and large datasets to gain deeper insights into the data. Machine Learning is a type of technology that helps with gathering data and understanding patterns. Recently, researchers in the healthcare industry have been using Machine Learning techniques to assist with diagnosing heart-related diseases. This means that the professionals involved in the diagnosis process can use Machine Learning to help them figure out what is wrong with a patient and provide appropriate treatment. This paper evaluates different machine learning models performances. The Supervised Learning algorithms are used commonly in Machine Learning which means that the training is done using labelled data, belonging to a particular classification. Such classification methods like Random Forest, Decision Tree, K-Nearest Neighbour, XGBoost algorithm, Naïve Bayes, and Support Vector Machine will be used to assess the cardiovascular disease by Machine Learning.
Źródło:
Machine Graphics & Vision; 2023, 32, 1; 99--114
1230-0535
2720-250X
Pojawia się w:
Machine Graphics & Vision
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The impact of the covid-19 pandemic on business entity cyber security
Autorzy:
Antczak, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/2073391.pdf
Data publikacji:
2022
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cyber security
hacking attack
pandemic
effects of cyber attack
bezpieczeństwo cybernetyczne
cyberbezpieczeństwo
atak hakerski
pandemia
skutki cyberataku
cyberatak
Opis:
Cybercriminals during the COVID-19 coronavirus pandemic have redefined both their targets and the form of their cyberattacks. The increased dependence of people around the world on the Internet is driving increasingly bold hacking attacks. Business unit managers are forced to implement better and better security of data resources, which should be organized and at the same time characterized by confidentiality, integrity, and availability. The purpose of the article was to identify and analyse the impact of the COVID-19 pandemic on the cyber security of the business entity. In realizing the purpose of the article, the starting point was a theoretical introduction to cybersecurity. Then, based on the Cybercrime: Covid-19 Impact report developed by Interpol, it was indicated that the coronavirus pandemic has a very high impact on the cyber threat panorama. To analyse the actual market situation, the effects of the cyber-attack on CD PROJEKT Capital Group were analysed.
Źródło:
Inżynieria Bezpieczeństwa Obiektów Antropogenicznych; 2022, 1; 7--15
2450-1859
2450-8721
Pojawia się w:
Inżynieria Bezpieczeństwa Obiektów Antropogenicznych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Strategic Review of the Security of European Countries
Autorzy:
MAGIERA, Maciej
DONAJ, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/642151.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
security
terrorist attack
migration crisis
military conflict
Opis:
This paper combines a review of the strategic security of European countries in 2017, and the creation – on the basis of the international scenario method – of short-, medium- and longterm forecasts. The authors address both the nature of armed conflicts (including the so-called ‘frozen conflicts’) and the escalation of terrorist acts. Also, the issue of the immigration crisis has been highlighted as causing both the rise of radical public sentiments and being a ‘source’ of the smuggling of people (including terrorists) and goods (including weapons which are later used in attacks).
Źródło:
Przegląd Strategiczny; 2018, 11; 355-381
2084-6991
Pojawia się w:
Przegląd Strategiczny
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies