Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Attack" wg kryterium: Temat


Tytuł:
The Oracle - a New Intelligent Cooperative Strategy of Attacks on Trust and Reputation Systems
Autorzy:
Janiszewski, M.
Powiązania:
https://bibliotekanauki.pl/articles/106242.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
reputation systems
Oracle attack
malicious nodes
model of the attack
Opis:
The paper presents a new concept of attack on trust and reputation systems. The oracle attack could violate the security provided by some of the existing reputation systems. The formal model of the attack is presented in the article on the base of the reference trust model, provided bythe author. The author has proved that this type of attack could be eficient. On the other hand,a sort of measures is provided in the paper which could be implemented in the reputation systems to overcome identified vulnerabilities, unfortunately at the cost of increase of system complication.The paper also provides a definition of intelligent strategies of attacks on trust and reputation systems based on cooperation of many malicious nodes and justifies why this type of attacks is a serious threat.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2014, 14, 2; 86-102
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The threat of cyber attacks in urban conurbations
Autorzy:
Bachor, Marta
Powiązania:
https://bibliotekanauki.pl/articles/576319.pdf
Data publikacji:
2018-09-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyber attack
city
security
Opis:
This paper investigates the threat of cyber attacks in urban conurbations. The first section attempts to define cyberspace and to identify potential objects of attack in the city. The second section analyses the history of past cyber attacks, and the final section gives an overview of activities performed by states and organisations with a view to countering and eliminating cyber threats.
Źródło:
Security and Defence Quarterly; 2018, 20, 3; 72-84
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m
Autorzy:
Wroński, Michał
Powiązania:
https://bibliotekanauki.pl/articles/227051.pdf
Data publikacji:
2019
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
small subgroups attack
side-channel attack
alternative models of elliptic curves
Opis:
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff's curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography. Most of these models allow to use fast and complete arithmetic which is especially convenient in fast implementations that are side-channel attacks resistant. Montgomery, Edwards and twisted Edwards curves have always order of group of rational points divisible by 4. Huff's curves have always order of rational points divisible by 8. Moreover, sometimes to get fast and efficient implementations one can choose elliptic curve with even bigger cofactor, for example 16. Of course the bigger cofactor is, the smaller is the security of cryptosystem which uses such elliptic curve. In this article will be checked what influence on the security has form of cofactor of elliptic curve and will be showed that in some situations elliptic curves with cofactor divisible by 2m are vulnerable for combined small subgroups and side-channel attacks.
Źródło:
International Journal of Electronics and Telecommunications; 2019, 65, 2; 203-209
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Analysis of Potential Threats to Information Systems and Countermeasures
Autorzy:
Busłowska, Eugenia
Nowak, Iwo
Powiązania:
https://bibliotekanauki.pl/articles/504120.pdf
Data publikacji:
2017
Wydawca:
Międzynarodowa Wyższa Szkoła Logistyki i Transportu
Tematy:
Security
Attack
Database
Prevention
Opis:
The article presents the results of the analysis of threats to safety of information in enterprises. How information is protected against publication, modification or being erased has also been taken into account. The objective of the analysis is to raise awareness of value of information and the role of security in an IT system.
Źródło:
Logistics and Transport; 2017, 36, 4; 15-24
1734-2015
Pojawia się w:
Logistics and Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
O polskich i słowackich depeszach kondolencyjnych w związku z atakami terrorystycznymi
The Polish and Slovak telegrams of condolence in connection with the terrorist attacks
Autorzy:
Olchowa, Gabriela
Powiązania:
https://bibliotekanauki.pl/articles/1044697.pdf
Data publikacji:
2018-08-28
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
telegram
condolences
terrorist attack
Opis:
Occasional magazines were discussed, specifically condolences in the Polish-Slovak comparative approach. We analyzed 44 (22 PL / 22 SK) condolences delivered in the years 2015–2017 by the President of the Republic Andrzej Duda and the President of the Slovak Republic Andrej Kiska in connection with terrorist attacks. The characteristic features of condolence messages sent after terrorist attacks were indicated. Based on the collected material, two compositional diagrams and their obligatory components were distinguished. Many similarities have been found in Polish and Slovak condolence messages, which mainly originates from the diplomatic style, which imposes some formal requirements, but also some differences were noticed.
Źródło:
Poznańskie Studia Polonistyczne. Seria Językoznawcza; 2018, 25, 1; 139-149
1233-8672
2450-4939
Pojawia się w:
Poznańskie Studia Polonistyczne. Seria Językoznawcza
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Phase-shift Fault Analysis of Grain v1
Autorzy:
Hromada, V.
Pethö, T.
Powiązania:
https://bibliotekanauki.pl/articles/226344.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
stream ciphers
Grain v1
fault analysis
phase-shift attack
desynchronization attack
Opis:
This paper deals with the phase-shift fault analysis of stream cipher Grain v1. We assume that the attacker is able to desynchronize the linear and nonlinear registers of the cipher during the keystream generation phase by either forcing one of the registers to clock one more time, while the other register is not clocked, or by preventing one of the registers from clocking, while the other register is clocked. Using this technique, we are able to obtain the full inner state of the cipher in reasonable time (under 12 hours on a single PC) by using 150 bits of unfaulted keystream, 600 bits of faulted keystreams and by correctly guessing 28 bits of the linear register.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 2; 131-136
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cryptanalysis of the FSR-255 hash function
Autorzy:
Kontak, M.
Szmidt, J.
Powiązania:
https://bibliotekanauki.pl/articles/206570.pdf
Data publikacji:
2014
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
cryptography
cryptanalysis
FSR-255 hash function
preimage attack
second-preimage attack
collision
Opis:
In this paper we analyse the security of the FSR-255 cryptographic hash function. As a result of our security analysis we present preimage and second-preimage attacks. The attacks base on practical reversibility of the compression function. The complexity of preimage attack is about 211 evaluations of the compression function. The second-preimage attack has the complexity equivalent to one time evaluation of the compression function. Both of the attacks have been practically realised.
Źródło:
Control and Cybernetics; 2014, 43, 2; 365-374
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hardware Implementation of an Enhanced Security- and Authentication-Related Automotive CAN Bus Prototype
Autorzy:
Zniti, Asmae
Ouazzani, Nabih
Powiązania:
https://bibliotekanauki.pl/articles/2200704.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
CAN
automotive security
attack
authentication
Opis:
In this paper a new security technique aiming to ensure safe and reliable communications between different nodes on an automotive Controller Area Network (CAN) is presented. The proposed method relies on a robust authentication code using Blake-3 as a hash algorithm within an adapted structure that includes a monitor node. A prototype is implemented and run effectively to perform hardware simulations of real case-based security problems of automotive embedded CAN systems. As a result, data transfer can take place on a newly enhanced CAN bus according to the standard protocol without being intercepted nor tampered with by unauthorized parties thereby highlighting the effectiveness of the proposed technique.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 1; 83--88
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza możliwości ataku czasowego oraz słownikowego na komunikację z użyciem kryptografii eliptycznej
Analysis of the possibility of the time and dictionary based attacks on elliptic curve cryptography based communication
Autorzy:
Tybura, M.
Powiązania:
https://bibliotekanauki.pl/articles/194177.pdf
Data publikacji:
2017
Wydawca:
Politechnika Rzeszowska im. Ignacego Łukasiewicza. Oficyna Wydawnicza
Tematy:
kryptografia
krzywe eliptyczne
atak słownikowy
atak czasowy
cryptography
elliptic curves
dictionary attack
time attack
Opis:
Przez tysiąclecia tworzono, udoskonalano i łamano dziesiątki rozwiązań, których jedynym celem było uniemożliwienie odczytania informacji przez postronnych. Doprowadziło to do powstania dwóch przeciwstawnych w swoich działaniach dziedzin - kryptografii i kryptoanalizy. W dobie komputerów zrezygnowano ze wszystkich dotychczasowych rozwiązań i wprowadzono zupełnie nowe, z których za najbezpieczniejsza można uznać RSA i szyfry oparte o krzywe eliptyczne. Oba są uznawane za niemożliwe do złamania. Wynika to bezpośrednio z zależności matematycznych użytych w ich definicji. W dotychczasowych badaniach wykazano już kilka ich słabości, lecz nadal nie ma rozwiązania, które działałoby w każdym jednym przypadku. Z uwagi na to postanowiono przyjrzeć się głębiej słabym punktom szyfrów eliptycznych z uwzględnieniem wszystkich dotychczas dostępnych informacji.
For millennia, dozens of solutions, which sole purpose was to prevent outsiders from reading information, have been developed, refined and broken. This led to the emergence of two opposing fields - cryptography and cryptanalysis. In the age of computers, all existing solutions have been abandoned and new ones have been introduced, with the most secure ones RSA and ciphers based on elliptic curves. Both considered impossible to break. This result directly from the math used in their definitions. Some previous researches have already shown some of their weaknesses, but there is still no solution that would work in every single case. Because of this, it was decided to take a closer look at the weak points of elliptic ciphers, taking into account all the information available to date.
Źródło:
Zeszyty Naukowe Politechniki Rzeszowskiej. Elektrotechnika; 2017, z. 36 [296], nr 3, 3; 53-58
0209-2662
2300-6358
Pojawia się w:
Zeszyty Naukowe Politechniki Rzeszowskiej. Elektrotechnika
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of the bombers’ tactics and the consequences of a series of terrorist attacks in Brussels (22 March 2016)
Autorzy:
WOJTASIK, KAROLINA
Powiązania:
https://bibliotekanauki.pl/articles/1798779.pdf
Data publikacji:
2021-04-21
Wydawca:
Wyższa Szkoła Policji w Szczytnie
Tematy:
terrorist attack
ISIS
hard target
soft target
tactics
attack in Brussels
foreign terrorist fighters
TATP
Opis:
The purpose of the article is to analyse the modus operandi of the terrorists who on 22 March 2016 organised the bomb attacks in Brussels. The article characterises the targets of the attackers, analyses their operational tactics and the aftermath of their attacks. In addition, the consequences of the attacks are discussed – both economic and legal. Another issue analysed in the article is the perpetrators of the assassinations – their origin, path of radicalisation and network of contacts. The summary shows why returning foreign terrorist fighters are a threat to security in the EU countries, including Poland.
Źródło:
Przegląd Policyjny; 2020, 140(4); 135-153
0867-5708
Pojawia się w:
Przegląd Policyjny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Self-proclaimed Islamic State. The determinant of violence in the 21st century
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1178982.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Islamic State
Islamic terrorism
terrorist attack
Opis:
In the 21st century, terrorism has become one of the greatest threats. It can be compared to the traditional forms of armed conflict, but in the opinion of the author is not exactly the truth. It works mainly from concealment, and my strength is derived from the intimidation of the world community. Although the border between terrorism and war is still fading, these are two different threats to world order, order and security.
Źródło:
World Scientific News; 2017, 89; 355-363
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Preventing and Detecting Cyber Attacks in Industrial Control System Networks
Autorzy:
Padée, Adam
Wójcik, Michał
Ćwiek, Arkadiusz
Klimaszewski, Konrad
Kopka, Przemysław
Kozioł, Sylwester
Kuźmicki, Krzysztof
Możdżonek, Rafał
Wiślicki, Wojciech
Włodarski, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/307944.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
attack preventing
cybersecurity
industrial control systems
Opis:
This paper outlines the problem of cybersecurity in OT (operations/operational technology) networks. It provides descriptions of the most common components of these systems, summarizes the threats and compares them with those present in the IT domain. A considerable section of the paper summarizes research conducted over the past decade, focusing on how common the problem is and in which countries it prevails. The article presents techniques most commonly used in the protection of these systems, with many examples from the nuclear industry given.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 21-28
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Features of predicting random events and protection of technical objects from their influence
Autorzy:
Korostil, J.
Powiązania:
https://bibliotekanauki.pl/articles/114050.pdf
Data publikacji:
2017
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
prediction
attack
risk
random event
safety
Opis:
The paper presents research results of approaches to solving tasks of predicting occurrence of events that negatively affect technical objects. Among them, super-rare events stand out (events that occur randomly in big time intervals) and analysis of features of predicting them is conducted. Measures of protecting technical objects from negative influence of random events are reviewed, and a method of estimating the prediction accuracy on the basis of using risk concepts is presented.
Źródło:
Measurement Automation Monitoring; 2017, 63, 8; 278-281
2450-2855
Pojawia się w:
Measurement Automation Monitoring
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zapobieganie i zwalczanie zagrożeń ze strony cyberprzestrzeni
Prevention and fight against threats from cyber space
Autorzy:
Iskierka, Iwona
Powiązania:
https://bibliotekanauki.pl/articles/446045.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Rzeszowski
Tematy:
cyberzagrożenie
cyberatak
cyber threats
cyber attack
Opis:
W pracy omówiono zagadnienia związane z ochroną przed cyberzagrożeniami. Zwrócono uwagę na wzrost cyberzagrożeń i konieczność skoordynowania działań w zakresie zapobiegania i zwalczania zagrożeń ze strony cyberprzestrzeni. Ukazano działania zespołu CERT.GOV.PL, funkcjonującego w ramach Departamentu Bezpieczeństwa Teleinformatycznego ABW, które szczególnie uwzględniają ataki ukierunkowane na infrastrukturę obejmującą systemy i sieci telein-formatyczne. Wskazano na potrzebę cyberedukacji dla bezpieczeństwa.
The work discusses the issues related to the protection against cyber threats. Attention on the growth of cyber threats and the need to coordinate activities in the field of the prevention and control of risks on the part of cyberspace. Discusses the Team CERT.GOV.PL functioning within the framework of the Security Department of the ABW, which particularly include targeted attacks on infrastructure, including information and communication systems and networks. Indicated the need of education for cyber security.
Źródło:
Dydaktyka informatyki; 2014, 9; 82-90
2083-3156
Pojawia się w:
Dydaktyka informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Przykładowe narzędzie do ataków DDoS
Examples of tools for DDoS attacks
Autorzy:
Rekosz, Katarzyna
Świerczyńska, Izabela
Zys, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/41205520.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Kazimierza Wielkiego w Bydgoszczy
Tematy:
narzędzie
atak DDoS
tool
DDoS attack
Opis:
W artykule została przedstawiona problematyka dotycząca przykładowego narzędzia do ataku DDoS. Ataki DDoS stanowią rozproszoną wersję ataku Dos. Niniejsza publikacja opisuje specyfikę oraz etapy przeprowadzenia ataku DDoS. Szczegółowo zaprezentowane zostały dwie metody ataku DDoS tj. przy użyciu narzędzia Trinoo oraz Tribe Flood Network.
This article presents issues concerning the exemplary tool for DDoS attack . DDoS attacks are a distributed version of the Dos attack . This publication describes the specifics and the stages of carrying out a DDoS attack. Two methods were presented in detail of DDoS attack using a tool Trinoo and Tribe Flood Network.
Źródło:
Studia i Materiały Informatyki Stosowanej; 2015, 18; 11-14
1689-6300
Pojawia się w:
Studia i Materiały Informatyki Stosowanej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of an algorithm for detecting attacks in sensor wireless systems
Autorzy:
Belej, Olexander
Bokla, Natalia
Więckowski, Tadeusz
Powiązania:
https://bibliotekanauki.pl/chapters/32083874.pdf
Data publikacji:
2021
Wydawca:
Politechnika Białostocka. Oficyna Wydawnicza Politechniki Białostockiej
Tematy:
wireless networks
attacks
attack detection system
Opis:
Wireless networks have gained immense popularity. Their widespread distribution is due to undeniable advantages over traditional cable networks: ease of deployment, user mobility in the network coverage area, easy connection of new users. On the other hand, the security of such networks often limits their application. If an attacker needs to have a physical connection to the network when attacking a wired network, then in the case of wireless networks, he can be anywhere in the network coverage area. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed below. On the other hand, the low level of security of such networks often limits their application. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed.
Źródło:
Methods and tools in CAD – selected issues; 51-62
9788366391871
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Internet narzędziem groźnej broni cyfrowej dla infrastruktury krytycznej w globalnym świecie wiedzy
Internet tool for the weapon digital Critical Infrastructure in the global world of knowledge
Autorzy:
KRAUZ, Antoni
Powiązania:
https://bibliotekanauki.pl/articles/456873.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Rzeszowski
Tematy:
Internet
critical infrastructure
information attack
cyberwar
Opis:
W zamieszczonym artykule dokonano krótkiej charakterystyki problematyki zagrożeń i niebezpieczeństw spowodowanych rozwojem Internetu. Przedstawiono podejmowane próby ataków informatycznych, prowadzonej wojny internetowej skierowanej na różne dziedziny finansowo-ekonomiczne, administracyjne, militarne o zasięgu globalnym. Dokonano przeglądu różnych form i metod ataku na infrastrukturę informatyczną, w tym infrastrukturę krytyczną. Przedstawiono rozwój zagrożeń ze strony broni cyfrowej, cyberterroryzmu, cyberprzestępczości, cyberwojny, podano przykłady ataków hakerskich występujących w skali globalnej. Omówiono przykładowy model zabezpieczenia systemu informatycznego komputera, korzystania z Internetu
In the reproduced article presents a brief characterization of hazards and dangers caused by the growth of the Internet. Are shown attempts to attack information, conducted online war aimed at different areas of financial and economic, administrative, global military. There have been reviews of various forms and methods of attack on infrastructure, including critical infrastructure. Provides an overview of the risks posed by digital weapons, cyberterrorism, cybercrime, cyberwar, are examples of hacking attacks occurring on a global scale. Discussed an example of a computer system security model computer, using the Internet.
Źródło:
Edukacja-Technika-Informatyka; 2013, 4, 1; 388-399
2080-9069
Pojawia się w:
Edukacja-Technika-Informatyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Terrorism in Europe – from the definition to the present day
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1189392.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Islamic extremism
terrorism
terrorist attack
history
Opis:
The description undertaken attempts to investigate the threat of Islamic terrorism in Europe. This problem is still real, because the countries of the Old Continent participating in the so-called the war against global terrorism already experienced terrorist attacks on their territories. The main objective of this work is to determine the capabilities of the terrorist threat by examining the essence of the phenomenon of modern Islamic terrorism in the European area and the assessment of the threat. During the development of this description the author used different research methods, and the main criterion for their selection was a rationalization of the course and the possibility of obtaining objective results. Method of analysis and detailed examination of documents has been used as a gateway and adapted in the optimal way to achieve the desired result in the form of leaked conclusions. The leading element to the entire research process was a critical analysis of the literature on the subject of research. Literature and the sources from which were used in the study can be divided into several thematic segments: the history of Islam and the sources of Islamic fundamentalism, history and theory of terrorism, the sources of law in the context of counter-terrorism and policies in the field of counter-terrorism and the fight against this phenomenon. Literature research in the field of scientific studies in the context of the presented thematic sections, characterized by diverse accessibility, which consists of a number of items related to the Muslim religion and Islamic fundamentalism, terrorism and the disciplines of law, as well as occurring much less frequently highly specialized positions describing the security system of anti-terrorist.
Źródło:
World Scientific News; 2016, 48; 41-51
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Attacks on StreamHash 2
Autorzy:
Buczek, M.
Powiązania:
https://bibliotekanauki.pl/articles/106208.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
StreamHash 2
hash function
collision attack
Opis:
StreamHash 2 is a hash function proposed by Michał Trojnara at the Cryptography and Security Systems in 2011 Conference. This algorithm is a member of StreamHash family which was first introduced in 2008 during the SHA-3 Competition. In this paper we will show collision attacks on the internal state of the StreamHash 2 hash function with complexity about 2^8n for the 32n-bit version of the algorithm and its reduced version with complexity 2^8n. We will also show its application to attacking the full StreamHash 2 function (finding a collision on all output bits) with complexity about 2^88 . We will try to show that any changes made to the construction (for instance the ones proposed for StreamHash 3) will have no effect on the security of the family due to critical fault build into the compression function.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 3; 25-35
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The threat of Islamic terrorism in Europe
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1189675.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Islamic extremism
terrorism
terrorist attack
European Union
Opis:
The terrorist attacks of 11 September 2001 realized to the international community that there are new challenges and threats, which in a completely different light presented the phenomenon of terrorism. They are characterized by an extremely significant result of social, psychological and media. The international situation has undergone dynamic changes. Conditions of international security has changed. The duty of the EU countries is to fight against this kind of threats. Ensuring the safety of citizens within the EU is the responsibility of each state element thereof. This paper deals with the problem of the threat of Islamic terrorism on the territory of the Community. The author tries to present it in the most transparent manner this threat, as well as selected aspects of counteracting this phenomenon.
Źródło:
World Scientific News; 2016, 48; 52-62
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
COMPUTER NETWORK OPERATIONS IN THE LIGHT OF IUS IN BELLO
Autorzy:
Kaja, Kowalczewska,
Powiązania:
https://bibliotekanauki.pl/articles/891441.pdf
Data publikacji:
2018-08-21
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
cyber attack
warfare
international humanitarian law
distinction
Opis:
The paper deals with the legal definition of attack under international humanitarian law, analysed in the context of cyber “attacks”. The armed nature of cyber operation is distinguished from a violent one and therefore special section is devoted to the indirect consequences of cyber attacks. It is also noted that the incremental resort to automated weapon systems, controlled by computer networks still highly vulnerable to hostile malware and interference, challenges the current state of law. Finally, the author attempts to render the linkage between law and IT, both greatly concerned with cyber security.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2014, 15; 135-143
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Armed Attack, Non-State Actors and a Quest for the Attribution Standard
Autorzy:
Kowalski, Michal
Powiązania:
https://bibliotekanauki.pl/articles/706939.pdf
Data publikacji:
2010
Wydawca:
Polska Akademia Nauk. Instytut Nauk Prawnych PAN
Tematy:
ARMED ATTACK
NON-STATE ACTORS
UN CHARTER
Opis:
Article 51 of the UN Charter, in affirming the inherent right of self-defence of each UN Member State 'against which an armed attack has occurred', clearly indicates that the concept of armed attack plays a key role in delineating the right of self-defence. The concept in question was not, however, defined in the UN Charter, and no universally acceptable definition has yet emerged either in practice or in doctrine. One of the fundamental questions to be addressed in this context is who must engage in armed activity for it to qualify as an armed attack. This question is of particular relevance today because of the threat of international terrorism and the expansion of the concept of armed attack through the inclusion of an act of terrorism. The article discusses in some detail the emerging legal framework for attribution of actions undertaken by non-state actors to states.
Źródło:
Polish Yearbook of International Law; 2010, 30; 101-130
0554-498X
Pojawia się w:
Polish Yearbook of International Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance evaluation of machine learning models to predict heart
Autorzy:
Khan, AttackMajid
Husnain, Ghassan
Ahmad, Waqas
Shaukat, Zain
Jan, Latif
Haq, Ihtisham Ul
Ishtiaq, Atif
Powiązania:
https://bibliotekanauki.pl/articles/3147618.pdf
Data publikacji:
2023
Wydawca:
Szkoła Główna Gospodarstwa Wiejskiego w Warszawie. Instytut Informatyki Technicznej
Tematy:
cardiovascular disease
machine learning
heart attack
prediction
Opis:
Coronary Artery Disease is the type of cardiovascular disease (CVD) that happens when the blood vessels which stream the blood toward the heart, either become tapered or blocked. Of this, the heart is incapable to push sufficient blood to encounter its requirements. This would lead to angina (chest pain). CVDs are the leading cause of mortality worldwide. According to WHO, in the year 2019 17.9 million people deceased from CVD. Machine Learning is a type of artificial intelligence that uses algorithms to help analyse large datasets more efficiently. It can be used in medical research to help process large amounts of data quickly, such as patient records or medical images. By using Machine Learning techniques and methods, scientists can automate the analysis of complex and large datasets to gain deeper insights into the data. Machine Learning is a type of technology that helps with gathering data and understanding patterns. Recently, researchers in the healthcare industry have been using Machine Learning techniques to assist with diagnosing heart-related diseases. This means that the professionals involved in the diagnosis process can use Machine Learning to help them figure out what is wrong with a patient and provide appropriate treatment. This paper evaluates different machine learning models performances. The Supervised Learning algorithms are used commonly in Machine Learning which means that the training is done using labelled data, belonging to a particular classification. Such classification methods like Random Forest, Decision Tree, K-Nearest Neighbour, XGBoost algorithm, Naïve Bayes, and Support Vector Machine will be used to assess the cardiovascular disease by Machine Learning.
Źródło:
Machine Graphics & Vision; 2023, 32, 1; 99--114
1230-0535
2720-250X
Pojawia się w:
Machine Graphics & Vision
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The impact of the covid-19 pandemic on business entity cyber security
Autorzy:
Antczak, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/2073391.pdf
Data publikacji:
2022
Wydawca:
Centrum Rzeczoznawstwa Budowlanego Sp. z o.o.
Tematy:
cyber security
hacking attack
pandemic
effects of cyber attack
bezpieczeństwo cybernetyczne
cyberbezpieczeństwo
atak hakerski
pandemia
skutki cyberataku
cyberatak
Opis:
Cybercriminals during the COVID-19 coronavirus pandemic have redefined both their targets and the form of their cyberattacks. The increased dependence of people around the world on the Internet is driving increasingly bold hacking attacks. Business unit managers are forced to implement better and better security of data resources, which should be organized and at the same time characterized by confidentiality, integrity, and availability. The purpose of the article was to identify and analyse the impact of the COVID-19 pandemic on the cyber security of the business entity. In realizing the purpose of the article, the starting point was a theoretical introduction to cybersecurity. Then, based on the Cybercrime: Covid-19 Impact report developed by Interpol, it was indicated that the coronavirus pandemic has a very high impact on the cyber threat panorama. To analyse the actual market situation, the effects of the cyber-attack on CD PROJEKT Capital Group were analysed.
Źródło:
Inżynieria Bezpieczeństwa Obiektów Antropogenicznych; 2022, 1; 7--15
2450-1859
2450-8721
Pojawia się w:
Inżynieria Bezpieczeństwa Obiektów Antropogenicznych
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Strategic Review of the Security of European Countries
Autorzy:
MAGIERA, Maciej
DONAJ, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/642151.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
security
terrorist attack
migration crisis
military conflict
Opis:
This paper combines a review of the strategic security of European countries in 2017, and the creation – on the basis of the international scenario method – of short-, medium- and longterm forecasts. The authors address both the nature of armed conflicts (including the so-called ‘frozen conflicts’) and the escalation of terrorist acts. Also, the issue of the immigration crisis has been highlighted as causing both the rise of radical public sentiments and being a ‘source’ of the smuggling of people (including terrorists) and goods (including weapons which are later used in attacks).
Źródło:
Przegląd Strategiczny; 2018, 11; 355-381
2084-6991
Pojawia się w:
Przegląd Strategiczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected aspects of training of Islamic terrorist
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1162719.pdf
Data publikacji:
2018
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Islamic terrorism
logistics preparing
terrorist attack
training
Opis:
The subject matter of the training varies depending on the activities of the recruits. If a recruited person is not ready to devote his life to a suicide attack, he may be rejected and sent home. In such a case, such a person may be entrusted with another type of mission which he or she may carry out in his own country. Sometimes recruits do not go to training because they are not able to contact the agent who is due to deliver them to the camp, or because they arrive at the camp after they arrive in the country of destination and were under the watch of special forces.
Źródło:
World Scientific News; 2018, 111; 175-181
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected methods of recruiting Islamic terrorists
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1178974.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Islamic terrorism
logistics preparing
terrorist attack
training
Opis:
Recruiting an Islamic terrorist is part of an extremely complex process. So consider them in a broad context. This process, which directly precedes and prepares the basis for training with selected candidates and further radicalization of new terrorists, often takes several months or even years. During this process the newly recruited person is increasingly linked to the their new friends.
Źródło:
World Scientific News; 2017, 89; 329-335
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Legal Qualification of Suicide. Polish Substantive Criminal Law Against Suicide Terrorists
Autorzy:
Valeri, Vachev,
Powiązania:
https://bibliotekanauki.pl/articles/902803.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Warszawski. Wydawnictwa Uniwersytetu Warszawskiego
Tematy:
suicide
suicide attack
illegality of suicide
antiterrorism
Opis:
The paper examines the question of suicide in the light of Polish criminal law. The starting point of discussion is an analysis of actions leading to one depriving oneself of one’s own life which, at the same time, do not pose any harm to third parties. Here, the paper strives to answer the question whether suicide is legal or illegal in view of criminal law, as well as whether state interference with such actions is possible and justified. These questions serve as the background for the core part of the paper, in which justifications for the criminalization of suicidal acts simultaneously being attacks on third parties, i.e. so-called suicide attacks, are sought. The paper sheds light on the latest anti-terrorist laws and formulates conclusions pertaining to its directions of development, particularly in the field of combating suicide terrorist attacks.
Źródło:
Studia Iuridica; 2016, 67; 51-64
0137-4346
Pojawia się w:
Studia Iuridica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Experimental and Theoretical Study on a Wind Energy Unit
Autorzy:
Abusamaha, Hanan M.
Dawoud, Farah
Al-Qalab, B.
Ayadi, O.
Powiązania:
https://bibliotekanauki.pl/articles/123619.pdf
Data publikacji:
2019
Wydawca:
Polskie Towarzystwo Inżynierii Ekologicznej
Tematy:
wind turbine
angle of attack
power curve
Opis:
The conversion process in the wind turbine, from mechanical (kinetic) energy to electrical energy, is affected by many factors that increase or decrease the useful output of the wind energy convertor. In this paper, three factors were studied experimentally on a Horizontal Axis Wind Energy Unit “EEEC” in laboratory-scale. The aim of this experiment was to study the influence of the number of blades, the angle of attack and the incident angle on the wind energy unit parameters to optimize its efficiency. For this purpose, the effect of the number of blades was studied firstly, in order to select the number of blades where the maximum inputs obtained at lab ambient temperature 25 °C and atmospheric pressure. Then, different readings of the incident angle and angle of attacks were taken. The data was analyzed using Microsoft Excel software. The results show that the maximum parameters of wind unite energy that produce the maximum efficiency, namely: voltage (volt), current (ampere) and rotational speed (rpm) are obtained when the number of blades is 4, the incident angle is 0° (when the rotor direction is with wind direction) and the angle of attack is 75°. Finally, these results were implemented in a simulation program (HOMER software) that uses this turbine in a resident along with storage to cover the needs of a selected house.
Źródło:
Journal of Ecological Engineering; 2019, 20, 6; 207-214
2299-8993
Pojawia się w:
Journal of Ecological Engineering
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A known-plaintext attack on iterative random phase encoding in fractional Fourier domains
Autorzy:
Yin, F.
He, Q.
Liu, Z.
Powiązania:
https://bibliotekanauki.pl/articles/174043.pdf
Data publikacji:
2017
Wydawca:
Politechnika Wrocławska. Oficyna Wydawnicza Politechniki Wrocławskiej
Tematy:
image encryption
phase encoding
known-plaintext attack
Opis:
Known-plaintext attack is considered for decrypting the image generated by iterative random phase encoding in fractional Fourier transform domains. The double random phase encoding in Fourier domains is introduced to design the known-plaintext attack procedure. The decryption test is explored without both fractional order and these random phase masks. Some numerical simulations are made to demonstrate the validity of the known-plaintext attack.
Źródło:
Optica Applicata; 2017, 47, 1; 131-139
0078-5466
1899-7015
Pojawia się w:
Optica Applicata
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Acquisition of documents and legalization of Islamic terrorists as one of the stages of the logistics preparing a terrorist attack
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1179683.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
European Union
Islamic terrorism
logistics preparing
terrorist attack
Opis:
One of the important components of preparing a terrorist attack is to obtain identity documents and their corresponding legalization. Muslim terrorists, in the era of pervasive technology and increasingly recent security systems, still use the same tested for years ways to enter the territory of the European Union. The primary responsibilities of law enforcement services and upholding safety, as soon as possible detection of persons who may pose a threat to the European community and the relevant counteracting the phenomenon of illegal migration.
Źródło:
World Scientific News; 2017, 72; 159-168
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Features of protection of technical objects against negative exposure
Autorzy:
Korostil, J.
Powiązania:
https://bibliotekanauki.pl/articles/114248.pdf
Data publikacji:
2016
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
attack
prognosis
security system
model
technical object
tools
Opis:
This paper presents research of different classes of attacks against complex technical objects. Attacks are differentiated into different classes on the basis of analysis of attack features which reflect the possible methods of attack interaction with the security system. The developed methods of formal description of attacks and defense methods on the level of their logical approximation allow describing tasks of withstanding attacks for defense tools with enough certainty. Thanks to the proposed interpretation of attack interaction with a defense object and defense tools, it has become possible to determine approaches to the extension of the defense system by adding new tools oriented towards withstanding new attacks.
Źródło:
Measurement Automation Monitoring; 2016, 62, 7; 234-237
2450-2855
Pojawia się w:
Measurement Automation Monitoring
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Cyberbezpieczeństwo w Federacji Rosyjskiej. Zarys problemu
Cybersecurity in the Russian Federation. Outline of the problem
Autorzy:
Giebień, Helena
Powiązania:
https://bibliotekanauki.pl/articles/521558.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Wrocławski. Wydział Nauk Społecznych. Instytut Studiów Międzynarodowych
Tematy:
cybersecurity
cyber terrorism
cyber attack
cyberwar
Russian Federation
Opis:
The article undertakes the issues of cybersecurity in Russia. It shows the scale of cybercrime, their impact on the functioning of the states and attempts to solve the problem. The main thesis of the article states that the Russia Federation seeks to enhance its cyberspace security systems both on the legislative and executive level, trying to protect state’s institutions and critical infrastructure as well as cooperating with other states and international organizations. The articles analyses primary and secondary sources such as legal acts, reports, scientific literature, and Russian press, to present the research problem and draw conclusions. The research shows that the Russian authorities are aware of the multiple challenges they have to face to ensure the eÐ cient security of the cyberspace. Among the key elements are the raise of the level of competence of Russian specialists fighting cybercrimes, creation of the efficient infrastructure and protection against cyber attacks as well as improving the international system of information exchange on threats in the network. Russia faces also the challenge to strengthen multilateral cooperation with other states, based on mutual trust, especially in the face of a negative image of Russia resulting from the activities of hackers, connected to the state, who can paralyze the critical infrastructure of the other states.
Źródło:
Wschodnioznawstwo; 2018, 12; 187-204
2082-7695
Pojawia się w:
Wschodnioznawstwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Finland in the light of cyber threats in the context of Russia’s aggression against Ukraine
Autorzy:
Kaczmarek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/13949123.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Finland
Russia
Ukraine
NATO
security policy
cyber attack
Opis:
Russia’s attack on Ukraine on 24 February 2022 caused Finland to put an end to its longstanding policy of finlandization and to make a decision to join the North Atlantic Treaty Organisation. Intensified Russian-inspired cyber-attacks against Finland were expected. However, over the first three quarters of 2022, no major cyber incidents occurred. In this article, the Author will undertake an attempt to answer the question as to how Finland and Finnish society defend themselves against cyber threats and whether the lack of any recorded attacks from Russia is the result of Finland’s level of cyber security or the Kremlin’s lack of interest in such activities.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 204-214
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Terrorism and institutional soft target attacks in Nigeria: the way forward
Autorzy:
Eka, Miracle
Ogbonnaya, Dickson
Powiązania:
https://bibliotekanauki.pl/articles/40462379.pdf
Data publikacji:
2024-03-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
Terrorism
Institutional attack
Soft target
Nigeria
Way forward
Opis:
Almost five decades have passed since after the Nigerian civil war that claimed closed to five million lives between Nigerian and Biafran separatists. Yet, rather than learn lessons learnt to forestall peace, it is worrisome that the escalation of terror against state and its institutions has taken heightened dimensions at various times. It is this worry that gave vent to this theoretical paper that utilizes content analysis to explore relevant parameters that are factorial to this dangerous escalation of terror in Nigeria particularly targeting its institutions as helpless soft targets for attack. Consequently, the paper questioned institutional alienation, inequality, and unhealthy politicization of religion and education as largely responsible for the increasing terror attacks. Drawing from these insights, the paper using induction and deduction tools, outlined major ways forward in addressing the menace of terror. Inclusive governance, income redistribution, secularism as a functional state policy and liberalization of access to education according literature, were strong factors that point to solutions that can lead productive engagement and inclusive involvement in governance and decision-making process in order to ultimately encourage the de-escalation of terror attacks against state and its institutions.
Źródło:
Reality of Politics; 2024, 27; 38-60
2082-3959
Pojawia się w:
Reality of Politics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Contemporary WMD proliferation and terrorist threat concerns
Współczesne obawy dotyczące rozprzestrzeniania broni masowego rażenia i zagrożenia terrorystycznego
Autorzy:
Ignjić, Tomislav
Powiązania:
https://bibliotekanauki.pl/articles/566113.pdf
Data publikacji:
2016
Wydawca:
Akademia Sztuki Wojennej
Tematy:
WMD
WMD proliferation
globalization
dualuse materials
International law
conventions and treaties
terrorism
WMD terrorism attack
attack on industrial complexes
Opis:
Celem tej publikacji jest zaprezentowanie współczesnych obaw dotyczących rozprzestrzeniania broni masowego rażenia oraz zagrożenia terrorystycznego. Część pierwsza wprowadza definicje oraz terminy w kontekście historycznym, pokrótce wspominając o wybranych aspektach oddziaływania globalizacji na wysiłki skierowane przeciw rozprzestrzenianiu wyżej wymienionych zagrożeń. Kolejna sekcja odnosi się do prawa międzynarodowego, które dotyczy broni masowego rażenia i współczesnych obaw dotyczących rozprzestrzeniania tej broni. Można tutaj znaleźć, także w kontekście historycznym, opis wysiłków międzynarodowych w celu zakazania badań nad bronią masowego rażenia, opis jej rozwoju oraz spis użytkowania. Następnie znajduje się analiza skuteczności tych mechanizmów zaprezentowana przy użyciu przykładów. Okres po drugiej wojnie światowej omówiony jest w bardziej szczegółowy sposób, przez zestawienie najbardziej istotnych traktatów i konwencji, jak również grup, inicjatyw oraz rezolucji dotyczących omawianego tematu. Dalsza część tego rozdziału dotyczy stosowania się do międzynarodowego prawa oraz przepisów przez kraje, grupy oraz jednostki, co pokazuje typowe sposoby rozprzestrzeniania broni masowego rażenia. Ostatnia sekcja zajmuje się potencjalnym zagrożeniem ze strony ataku terrorystycznego przy użyciu broni masowego rażenia, analizując każdą możliwą broń w arsenale broni masowego rażenia z punktu widzenia terrorystów. Zostały omówione trudności związane z uzyskaniem i produkcją takiej broni, zalety i wady powszechnie stosowanych metod jej użycia oraz jej skutki wywołane w wyniku hipotetycznego ataku terrorystycznego. Zostały także wzięte pod uwagę ataki na cele miękkie w celu wytworzenia „efektu użycia broni masowego rażenia”. Podsumowując, publikacja ta analizuje skuteczność wysiłków wspólnoty międzynarodowej w celu kontroli przepływu broni oraz materiałów masowego rażenia, umieszcza globalizację w kontekście rozprzestrzeniania tej broni a działania radykalnych grup we współczesnej perspektywie, wyliczając sposoby użycia, które mogłyby one wykorzystać i badając wszystkie aspekty możliwego ataku.
Źródło:
Obronność – Zeszyty Naukowe Wydziału Zarządzania i Dowodzenia Akademii Sztuki Wojennej; 2016, 4(20); 29
2084-7297
Pojawia się w:
Obronność – Zeszyty Naukowe Wydziału Zarządzania i Dowodzenia Akademii Sztuki Wojennej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ATiPreTA: An analytical model for time-dependent prediction of terrorist attacks
Autorzy:
Kebir, Oussama
Nouaouri, Issam
Rejeb, Lilia
Ben Said, Lamjed
Powiązania:
https://bibliotekanauki.pl/articles/2172121.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
terrorist attack
attack classification
mathematical modeling
dynamic behavior simulation
damage prediction
atak terrorystyczny
klasyfikacja ataku
model matematyczny
przewidywanie szkód
Opis:
In counter-terrorism actions, commanders are confronted with difficult and important challenges. Their decision-making processes follow military instructions and must consider the humanitarian aspect of the mission. In this paper, we aim to respond to the question: What would the casualties be if governmental forces reacted in a given way with given resources? Within a similar context, decision-support systems are required due to the variety and complexity of modern attacks as well as the enormous quantity of information that must be treated in real time. The majority of mathematical models are not suitable for real-time events. Therefore, we propose an analytical model for a time-dependent prediction of terrorist attacks (ATiPreTA). The output of our model is consistent with casualty data from two important terrorist events known in Tunisia: Bardo and Sousse attacks. The sensitivity and experimental analyses show that the results are significant. Some operational insights are also discussed.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2022, 32, 3; 495--510
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A method of determining influencing parameters and predicting random, critical events in complex technical objects
Autorzy:
Korostil, J.
Powiązania:
https://bibliotekanauki.pl/articles/135464.pdf
Data publikacji:
2017
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
model
prediction
random event
attack
critical event
catastrophe
Opis:
A method of predicting the influence random events on the critical functionality of an object is discussed. Research is performed regarding the possibility of extending a prediction model to a prediction system by functionally uniting this model with additional models or recognizing the type of influence of a random event on a complex technical object. The proposed solution is importatnt because executing a prediction system instead of a prediction model allows one to detect critical situations that, when influencing technical objects, can result in the catastrophic loss of functionality of the corresponding objects.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2017, 51 (123); 95-100
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Acquisition of weapons and explosives by Islamic terrorists
Autorzy:
Janik, Wojciech J.
Powiązania:
https://bibliotekanauki.pl/articles/1179699.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
European Union
Islamic terrorism
logistics preparing
terrorist attack
Opis:
The leaders of the global jihad reveal a growing interest in the use of weapons causing the greatest damage and losses in the civilian population [1]. Al-Qaeda since the early 90s of the twentieth century was interested in buying weapons of mass destruction or components necessary to produce it [2]. Already in 1999 Osama bin Laden said that acquire nuclear and chemical weapons is a religious duty [3]. Nets of islamists also manipulate public opinion by threatening to use chemical, biological, radiological and nuclear (CBRN) [4,5]. Although these actions are purely propaganda and are part of the psychological warfare, the fact is that this grid they make progress in planning the increasingly sophisticated methods of attacks.
Źródło:
World Scientific News; 2017, 72; 279-288
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Twentieth anniversary of September 11. The plot, the events and the aftermath of the terrorist attack on the USA
Autorzy:
Izak, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/1892210.pdf
Data publikacji:
2021
Wydawca:
Agencja Bezpieczeństwa Wewnętrznego
Tematy:
Al-Qaeda
terrorist attack
Hamburg cell
Pentagon
WTC
Opis:
The series of terrorist attacks on 11 September 2001 in the USA, the largest in the history of the world, was carried out by 19 people. Among them were 15 Saudis, two UAE nationals, a Lebanese and an Egyptian. Three of the four formed the Hamburg cell, which was the backbone of the entire plot. It was led by the Egyptian Muhammad Atta el-Sayed. He flew Boeing 767 aircraft American Airlines Flight 11, which first struck the North Tower of the WTC. Marwan al-Shehhi was the pilot of Boeing 767 aircraft United Airlines Flight 175, which crashed into the South Tower of the WTC. Hani Hanjour sat at the controls of the Boeing 757 aircraft American Airlines flight 77. It was the third machine to target the Pentagon. The pilot of the fourth plane - Boeing 757 aircraft United Airlines Flight 93 - Ziad Jarrah failed to reach his destination, possibly the Capitol, because the passengers decided to take over the control of the plane from the terrorists. The machine crashed in Pennsylvania. In the events of 9/11, a total of 2,996 people were killed, including 19 terrorists, and 6,291 were injured. Six Poles were among the fatalities. 343 firefighters died in the rescue operation. The attacks caused enormous material losses. Particularly high costs were incurred by insurance and reinsurance companies, airlines and aircraft manufacturers, as well as the tourism industry. The huge losses related to the destruction of the New York City World Trade Center and the disruption of the financial system had to be covered by insurance companies involved in the operations on the American market. The terrorist attack on the USA was the impetus for the largest reform of the American secret services since 1947. Washington made a decision regarding the need to create a system that would effectively counteract terrorist threats and effectively warn in the event of their occurrence. This was related to the strengthening of structures with operational and reconnaissance powers, increasing the scope of their tasks and improving their ability to coordinate. Most of the legal regulations were expressed in the document commonly known as the USA Patriot Act of 26 October 2001. The most critical, however, were the international repercussions. By the attacks on the WTC and the Pentagon, al-Qaeda influenced world politics by prompting Washington to declare a “war on terror”. Within its framework, American forces, supporting the so-called Northern Alliance led to the collapse of the Islamic Emirate of Afghanistan, and then entered Iraq, which in the long run turned out to be one of the most spectacular and deadly strategic mistakes in the history of the military. At the same time the September 11 attacks sparked many conspiracy theories. Their propagation in the media, in documentaries, as well as in articles, contributed to undermining trust in the American government. An organization called Architects and Engineers for 9/11 Truth which boasts 3.3 thousand architects and engineers from all over the United States, is still very active in researching the case of 7 WTC. Its mission is to establish the truth that the twin towers did not collapse due to the impact of terrorist-piloted planes, as well as the destruction of WTC 7 was not a result of the detachment of a fragment of the second plane. In the opinion of members of this organisation, the damage caused by the planes was far from sufficient to lead to such a catastrophe. They believe someone must have planted explosives.
Źródło:
Przegląd Bezpieczeństwa Wewnętrznego; 2021, 13, 25; 341-369
2080-1335
2720-0841
Pojawia się w:
Przegląd Bezpieczeństwa Wewnętrznego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Face-attack in Political Discussions on Radio in the Context of Ghana’s 2016 Electioneering Period
Autorzy:
Anderson, Jemima Asabea
Thompson, Rachel G. A.
Amoakohene, Margaret Ivy
Tawiah, Vincent
Powiązania:
https://bibliotekanauki.pl/articles/2081264.pdf
Data publikacji:
2021-06-24
Wydawca:
Akademia Pedagogiki Specjalnej. Language and Society Research Committee
Tematy:
Election
Face Attack
Politics
Free Speech
Democracy
Radio
Opis:
We examined insulting and offensive comments made by political actors and party sympathizers on radio as recorded by the Media Foundation for West Africa in the 2016 electioneering period in Ghana. Using the concepts of face and face attack, we found that rival politicians, members/affiliates of political parties and even journalists were attacked through face-threatening acts which include the use of name-calling expressions and derogatory adjectives. We identified face-attacking expressions in the form of attack on moral behaviour, attack on intellectual/mental ability, and attack on physical appearance/characteristics. As suggested by previous studies, face attacks block the free exchange of critical ideas which play a very important role in the development of democratic countries as many citizens would not want to get involved in discussions that threaten their self-image. We, therefore, recommend that political actors in Ghana desist from disrespecting people of divergent political backgrounds or persuasions and rather focus on substantive issues in their public speeches.
Źródło:
Language, Discourse & Society; 2021, 9 (1); 79-94
2239-4192
Pojawia się w:
Language, Discourse & Society
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
BRAT: A BRidge Attack Tool for cyber security assessments of maritime systems
Autorzy:
Hemminghaus, C.
Bauer, J.
Padilla, E.
Powiązania:
https://bibliotekanauki.pl/articles/1841570.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
cyber security
Bridge Attack Tool (BRAT)
cyber attack
cyder defense
maritime systems
security assessment
Integrated Bridge System (IBS)
Maritime Cyber Security
Opis:
Today’s shipping industry is largely digitalized and networked, but by no means immune to cyber attacks. As recent incidents show, attacks, particularly those targeting on the misleading of navigation, not only pose a serious risk from an economic perspective when disrupting maritime value chains, but can also cause collisions and endanger the environment and humans. However, cyber defense has not yet been an integral part of maritime systems engineering, nor are there any automated tools to systematically assess their security level as well-established in other domains. In this paper, we therefore present a holistic BRidge Attack Tool (BRAT) that interactively offers various attack implementations targeting the communication of nautical data in maritime systems. This provides system engineers with a tool for security assessments of integrated bridge systems, enabling the identification of potential cyber vulnerabilities during the design phase. Moreover, it facilitates the development and validation of an effective cyber defense.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2021, 15, 1; 35-44
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Applying of security mechanisms to middle and high layers of OSI/ISO network model
Mechanizmy bezpieczeństwa w zastosowaniu śsrodkowych i górnych warstw sieciowego modelu OSI/ISO
Autorzy:
Kołodziejczyk, M.
Ogiela, M. R.
Powiązania:
https://bibliotekanauki.pl/articles/375804.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
AES
authentication
authorization
application
community string
dictionary attack
DDoS attack
DNS
DoS attack
hash function
HTTP
ICMP
IPv4
IPv6
man in the middle attack
MD5
OSI/ISO model
password
port scanning
protocol
SHA-1
sniffing
SNMP
spoofing
SYN flooding
TCP
tunnelling
UDP
Opis:
This article describes security mechanisms used by 3rd-7th layers in OSI/ISO network model. Many of commonly used protocols by these layers were designed with assumption that there are no intruders. Such assumption was true many years ago. The network situation has been changed for last few years and we should realize that some properties of existing protocols may be abused. Moreover, we should exchange some of them or create new versions. There are some methods and guidelines concerning secure programming, but there is also lack of guidelines about creating secure protocols. Authors see the necessity of such guideline and this article is an attempt at analysing existing solutions and selecting some universal and important patterns.
Artykuł opisuje popularne mechanizmy bezpieczeństwa stosowane w istniejących protokołach sieciowych środkowych i górnych warstw modelu OSI/ISO (od trzeciej warstwy włącznie). Wiele spośród tych protokołów zostało zaprojektowanych bardzo dawno temu i chociaż do dzisiaj są wykorzystywane i spisują się bardzo dobrze to jednak umożliwiają pewne nadużycia swojej funkcjonalności. Wiele z opisanych tutaj protokołów nie bierze pod uwagę ataków sieciowych. Autorzy postanowili wyselekcjonować pewną grupę protokołów, które mogą posłużyć do analizy zagrożeń sieciowych. Dzisiaj, mając pewne niebezpieczne rozwiązania jesteśmy bogatsi o pewne praktyczne doświadczenia z tym związane. Pozwala to analizować zagrożenie, klasyfikować je i wreszcie skutecznie im przeciwdziałać w nowych protokołach. Często są to rozwiązania lokalne, tworzone przez pewne grupy studentów lub konkretne firmy. Powstają również nowe, globalne rozwiązania. W pierwszym przypadku, nowy protokół może stanowić realne zagrożenie ze strony intruza. W drugim, należałoby poddać przynajmniej częściowej analizie formalnej nowe rozwiązanie. Istnieje wiele metod skupiających się na tworzonym oprogramowaniu, jednak często protokoły, jako rozwiązania autorskie są pomijane w analizie. Artykuł jest również próbą wstępnej klasyfikacji zagrożeń i stworzenia pewnych uniwersalnych rad dla twórców nowych rozwiązań. W pracy zarysowuje się potrzeba zmian pewnych istniejących rozwiązań, których słabości są opisane w artykule. Autorzy są przekonani, że niebezpieczny protokół nie może być użyty w bezpiecznym programie, bo jak np. można stworzyć bezpieczny program, jeśli protokół nie posiada odpowiedniego mechanizmu uwierzytelniania? Ten i wiele innych aspektów bezpieczeństwa zostało w pracy poruszonych i omówionych na przykładzie istniejących rozwiązań.
Źródło:
Theoretical and Applied Informatics; 2012, 24, 1; 95-106
1896-5334
Pojawia się w:
Theoretical and Applied Informatics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Phishing wall - jak zbudować ludzką zaporę przeciwko cyberatakom?
Autorzy:
Masztalerz, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/2080433.pdf
Data publikacji:
2021
Wydawca:
Nowa Energia
Tematy:
cyberbezpieczeństwo
cyberatak
cyberzagrożenie
phishing
cybersecurity
cyber attack
cyber threat
Opis:
O cyberzagrożeniach łatwo mówić, gdy doszło już do incydentu bezpieczeństwa. Wówczas dowiadujemy się, że firma musiała zapłacić okup za uzyskanie klucza do zaszyfrowanych przez złośliwe oprogramowanie danych. Biznes na chwilę obniża poziom ciśnienia krwi, a cyberprzestępca liczy wpływy. Jak wynika z rynku zachodniego i badań zajmującej się cyberbezbieczeństwem firmy Infrascale: już 78% małych i średnich przedsiębiorców działających w modelu B2B zapłaciło pierwsze okupy w wyniku cyber ataku.
Źródło:
Nowa Energia; 2021, 5/6; 70--71
1899-0886
Pojawia się w:
Nowa Energia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wybrane aspekty cyberbezpieczeństwa autonomicznych statków morskich
Selected aspects of cybersecurity of maritime autonomous surface ships
Autorzy:
Sokołowski, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/2053204.pdf
Data publikacji:
2021
Wydawca:
Akademia Marynarki Wojennej. Wydział Dowodzenia i Operacji Morskich
Tematy:
statek autonomiczny
cyberatak
zarządzanie cyberryzykiem
autonomous ship
cyber attack
Opis:
W artykule poruszono zagadnienia dotyczące cyberbezpieczeństwa autonomicznych statków morskich. Scharakteryzowano wybrane cyberataki, które miały miejsce w sektorze morskim. Omówiono cele, sekwencję i skutki cyberataków oraz regulacje prawne w zakresie cyberbezpieczeństwa morskiego. Jednak najwięcej uwagi poświęcono sposobom zapobiegania cyberzagrożeniom i kształtowaniu przemyślanej polityki cyberbezpieczeństwa morskiego.
The article deals with cybersecurity of maritime autonomous surface ships. Selected cyber attacks that took place in the maritime sector were characterized. The objectives, sequence and effects of cyber attacks as well as legal regulations in the field of maritime cybersecurity were discussed. However, most attention has been paid to how to prevent cyber threats and to shape a proper maritime cybersecurity policy.
Źródło:
Rocznik Bezpieczeństwa Morskiego; 2021, R. XV; 167-198
1898-3189
Pojawia się w:
Rocznik Bezpieczeństwa Morskiego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The effect of angle of attack on the generated wave propagation
Autorzy:
Javanmardi, M.
Binns, J.
Izham, M. I. C.
Rafieshahraki, J.
Powiązania:
https://bibliotekanauki.pl/articles/135352.pdf
Data publikacji:
2017
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
wave propagation
surfable wave
wave quality
angle of attack
Opis:
The presented work is an experimental investigation into the waves generated by a pressure source moving in a straight channel. Wave fields generated by the moving pressure source are described and the effects of angle of attack on the generated wave height, surfable wave quality, drag and vertical forces are presented. The main objective of this study was to investigate the relationship between the angle of attack and the generated wave height across the towing tank width and the surfable wave quality. The investigations were conducted at the Australian Maritime College towing tank on a wavedozer at four different attack angles at various speeds. Three wave probes were installed across the channel to record the generated wave heights. Based on the experimental results, it was concluded that smaller angles of attack produced higher quality surfable waves compared to larger angles of attack, while the height of the generated wave has a direct relationship with the angle of attack. By comparing the forces for different models, it was concluded that the pressure source with the lowest angle of attack has the minimum drag but maximum displacement.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2017, 50 (122); 36-41
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of the vulnerability of the Apache server to DDoS attaks
Badanie podatności serwera Apache na ataki odmowy usługi
Autorzy:
Nycz, M.
Szeliga, T.
Hajder, P.
Powiązania:
https://bibliotekanauki.pl/articles/194323.pdf
Data publikacji:
2017
Wydawca:
Politechnika Rzeszowska im. Ignacego Łukasiewicza. Oficyna Wydawnicza
Tematy:
DDoS attack
security
Apache
web server
bezpieczeństwo
atak DDoS
Opis:
The article presents an analysis of the vulnerability of the Apache server with regard to common DDoS attacks. The paper begins with presenting the statistical overview of the issue of denial-of-service attacks. We also discuss the methods used for performing DDoS attacks. Working with the virtual systems, the authors designed a test environment, where the assessment was conducted of the vulnerability of selected WWW systems. At the end of the article, actions are proposed to implement effective methods of defending against the denial-of-service attacks.The paper is written for the specialists in the field of web systems security.
W artykule przedstawiono analizę podatności serwera Apache w odniesieniu do popularnych ataków DDoS. Praca rozpoczyna się od przedstawienia statystycznego ujęcia problemu, jakim są ataki odmowy usług. Ponadto przedstawiony został problem rozpowszechniania metod wykorzystywanych do przeprowadzania ataków DDoS. Autorzy, bazując na systemach wirtualnych opracowali środowisko testowe, na którym zrealizowano badania podatności wybranych systemów WWW. Publikację kończą propozycje działań mających na celu zaimplementowanie efektywnych metod obrony przed atakami odmowy usługi. Artykuł jest adresowany do osób zajmujących się bezpieczeństwem systemów webowych.
Źródło:
Zeszyty Naukowe Politechniki Rzeszowskiej. Elektrotechnika; 2017, z. 36 [296], nr 1, 1; 67-76
0209-2662
2300-6358
Pojawia się w:
Zeszyty Naukowe Politechniki Rzeszowskiej. Elektrotechnika
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Project of aircraft attack avionics on - board control system with air - task efficiency estimation subsystem based on fuzzy logic (rockets subsystem in A-G missions)
Autorzy:
Grzesik, N.
Powiązania:
https://bibliotekanauki.pl/articles/247116.pdf
Data publikacji:
2013
Wydawca:
Instytut Techniczny Wojsk Lotniczych
Tematy:
control
attack avionics
on-board system
fuzzy subsystem
efficiency
Opis:
In this article author presents the project of aircraft attack avionics on-board control system with fuzzy efficiency of air-task estimation subsystem (rockets subsystem in A-G missions). Conducting extensive analysis and preliminary studies and very wide range of applications of fuzzy logic, the author found that its properties could also be used in aviation. Author’s study referred to the development of fuzzy expert aircraft attack avionics on-board control system project used by pilot during the air task (air combat task with use of rockets). One of the projects was presented in the publication. It has been developed based on Matlab (Fuzzy Logic Toolbox) and Simulink software. Complicity of the project and some mathematical calculations required relevant assumptions, which are also reported. At the end author describes his vision about operation of the system and conclusions. Schematic diagram of aircraft attack avionics system and rockets on-board control subsystem with fuzzy efficiency of air-task estimation subsystem, fuzzy efficiency estimation subsystem schematic diagram, inference and defuzification in rule viewer, fuzzy efficiency estimation control surfaces, dependence of the efficiency of the air- task on the distance from the target for „Rockets fuzzy controller” are presented in the paper.
Źródło:
Journal of KONES; 2013, 20, 1; 119-125
1231-4005
2354-0133
Pojawia się w:
Journal of KONES
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
Autorzy:
Huang, Z.
Liu, S.
Qin, B.
Chen, K.
Powiązania:
https://bibliotekanauki.pl/articles/330140.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
sender equivocable encryption
chosen ciphertext attack
cross authentication code
Opis:
Fehr et al. (2010) proposed the first sender-equivocable encryption scheme secure against chosen-ciphertext attacks (NCCCA) and proved that NC-CCA security implies security against selective opening chosen-ciphertext attacks (SO-CCA). The NC-CCA security proof of the scheme relies on security against substitution attacks of a new primitive, the “cross-authentication code”. However, the security of the cross-authentication code cannot be guaranteed when all the keys used in the code are exposed. Our key observation is that, in the NC-CCA security game, the randomness used in the generation of the challenge ciphertext is exposed to the adversary. Based on this observation, we provide a security analysis of Fehr et al.'s scheme, showing that its NC-CCA security proof is flawed. We also point out that the scheme of Fehr et al. encrypting a single-bit plaintext can be refined to achieve NC-CCA security, free of the cross-authentication code. Furthermore, we propose the notion of “strong cross-authentication code”, apply it to Fehr et al. 's scheme, and show that the new version of the latter achieves NC-CCA security for multi-bit plaintexts.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2015, 25, 2; 415-430
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Muzułmański terroryzm w Europie. Radykalizacja poglądów religijnych wśród migrantów z Bliskiego Wschodu
Muslim Terrorism in European Union. Radicalization of Religious Views Among Immigrants From Middle East
Мусульманский терроризм в Европе. Радикализация религиозных взглядов среди мигрантов из стран Ближнего Востока
Autorzy:
Piwko, Aldona Maria
Powiązania:
https://bibliotekanauki.pl/articles/564983.pdf
Data publikacji:
2020-08-08
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
Islam
terroryzm
zamach
religia
atak
terrorism
attempt
religion
attack
Opis:
Artykuł jest analizą aktualnej sytuacji w krajach Unii Europejskiej, spowodowanej „napięciem terrorystycznym” i definiuje zjawisko muzułmańskiego terroryzmu religijnego. Omówiono wybrane akty terroryzmu dokonane w Europie w latach 2015–2019 w kontekście muzułmańskiego radykalizmu religijnego. Zwrócono uwagę na profil muzułmańskiego terrorysty oraz motywy jego działania i gotowość na samobójczą śmierć. Ponadto w artykule omówiono przyczyny radykalizacji poglądów wśród muzułmanów żyjących w Europie. Kształtowanie postaw radykalnych w społeczności muzułmańskiej jest sposobem obrony wartości religijnych przed agresją kulturową Zachodu. Istotne znaczenie posiadają także centra religijne islamu, a więc imamowie oraz meczety, które są finansowane przez radykałów muzułmańskich.
The article is an analysis of the current situation in European Union caused by the "terrorist tension" and defines the phenomenon of Muslim religious terrorism. Selected terrorist acts made in Europe in 2015-2019 in the context of religious radicalism were discussed. Attention was paid to the profile of the Muslim terrorist and the motives of his actions and readiness for suicide. In addition, the article discusses the reasons for the radicalization of views among Muslims living in Europe. Shaping radical attitudes in the Muslim community is a way of defending religious values against Western cultural aggression. Also important are religious centers of Islam, and therefore imams and mosques, which are financed by Muslim radicals.
Źródło:
De Securitate et Defensione. O Bezpieczeństwie i Obronności; 2020, 1(6); 118-135
2450-5005
Pojawia się w:
De Securitate et Defensione. O Bezpieczeństwie i Obronności
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies