Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "attacks" wg kryterium: Temat


Tytuł:
A Study on Denial of Service Attacks in Cluster Based Web Servers
Autorzy:
Poornima, A.
Maheshwari, D.
Powiązania:
https://bibliotekanauki.pl/articles/1193575.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
DoS attacks
Flooding
Protocol
Opis:
In today’s computing world Network Security became vulnerable. As many types of attacks makes the system unsecure and reduces the performance of servers. One such attack is - Denial of Service (DoS) attacks. The drawbacks of this attacks end user application accessibility will be diminishing and the request handling capacity of the application server will drastically subsides.
Źródło:
World Scientific News; 2016, 41; 222-229
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Development of an algorithm for detecting attacks in sensor wireless systems
Autorzy:
Belej, Olexander
Bokla, Natalia
Więckowski, Tadeusz
Powiązania:
https://bibliotekanauki.pl/chapters/32083874.pdf
Data publikacji:
2021
Wydawca:
Politechnika Białostocka. Oficyna Wydawnicza Politechniki Białostockiej
Tematy:
wireless networks
attacks
attack detection system
Opis:
Wireless networks have gained immense popularity. Their widespread distribution is due to undeniable advantages over traditional cable networks: ease of deployment, user mobility in the network coverage area, easy connection of new users. On the other hand, the security of such networks often limits their application. If an attacker needs to have a physical connection to the network when attacking a wired network, then in the case of wireless networks, he can be anywhere in the network coverage area. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed below. On the other hand, the low level of security of such networks often limits their application. Also, these networks are subject, including due to protocol imperfections, to specific attacks, which will be discussed.
Źródło:
Methods and tools in CAD – selected issues; 51-62
9788366391871
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Towards an Evaluation Model of Trust and Reputation Management Systems
Autorzy:
Janiszewski, M.
Powiązania:
https://bibliotekanauki.pl/articles/226314.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
trust
reputation
attacks
trust and reputation management system
TRM
attacks on trust and reputation management systems
Opis:
The paper presents a set of concepts which can establish a basis for the creation of new evaluation model of trust and reputation management systems (TRM). The presented approach takes into account essential characteristics of such systems to provide an assessment of its robustness. The model also specifies measures of effectiveness of trust and reputation systems. There is still a need to create a comprehensive evaluation model of attacks on trust and reputation management systems and evaluation model of TRM systems itself, which could facilitate establishing a framework to deeply evaluate the security of existing TRM systems. We believe that this paper could be perceived as a small step forward towards this goal.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 4; 411-416
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication architecture using threshold cryptography in Kerberos for mobile ad hoc networks
Autorzy:
Gharib, H
Belloulata, K
Powiązania:
https://bibliotekanauki.pl/articles/103196.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
authentication
attacks
Kerberos
MANET
threshold cryptography
Opis:
The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 12-18
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Counter Terrorist Solutions in the Polish Police versus Contemporary Forms and Methods of Terrorist Organizations Activities
Autorzy:
Liedel, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/2055861.pdf
Data publikacji:
2018-12-21
Wydawca:
Collegium Civitas
Tematy:
police
combating terrorism
counterterrorist sub-units
anti-terrorism system
terrorist attacks
forms and methods of attacks
Opis:
The security environment in the 21st century is dynamic. The tools that the state uses to ensure its own security, its and citizens’ interests must be adapted to the current challenges. Preparation of counter-terroristic sub-units of the Police, both in terms of their organization, their place in the wider structure of security and public order services, as well as and legal basis for action, is one of the most important among these tools. The article is devoted to the analysis of the preparation of counterterrorism subunits of the Polish Police to the challenges posed by tactics used by terrorist organizations, posing a threat to national and international security.
Źródło:
Securitologia; 2018, 1 (27); 94-106
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Challenges for Ukraine’s cyber security: National dimensions
Autorzy:
Katerynchuk, Pavlo
Powiązania:
https://bibliotekanauki.pl/articles/1041594.pdf
Data publikacji:
2019-12-30
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
cyberspace
cyber security
hacker attacks
information security
Opis:
The usage of information as a weapon in the foreign and domestic policies of Russia is not a new phenomenon. Still, the sophistication and intensity of it grow with each passing year. Recently the EU and USA have realized the powerful latent influence of Russian media and propaganda, including on electoral processes and the activities of State administration. They have realized that Russian disinformation poses a serious threat to the United States and its European allies, first and foremost with regard to Poland, the Baltic States and Ukraine. Moreover, unlike Soviet propaganda, the modern methods of the Russian information war do not rudely promote the agenda of the Kremlin. Instead, they aim to confuse, daze and divert citizens from supporting the EU and Ukraine. Russia seeks to undermine the support for European values; producing disarray among European allies in order to increase its influence. Ethnic, linguistic, regional, social and historical contradictions and stereotypes are used for this purpose. As current experience shows, Russian advocacy efforts in Europe make up an important part of their hybrid approach to the projection of force. Despite the fact that the crisis in Ukraine for the first time drew the attention of the West to the importance and real meaning of the information campaign in Russia, the Kremlin’s use of disinformation was launched long before the crisis. Russia carefully and purposefully prepared an information war against Ukraine.
Źródło:
Eastern Review; 2019, 8; 137-147
1427-9657
2451-2567
Pojawia się w:
Eastern Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Women of Palestine Fighting for Independence
Autorzy:
Deja, Elżbieta
Powiązania:
https://bibliotekanauki.pl/articles/2053964.pdf
Data publikacji:
2017
Wydawca:
Collegium Civitas
Tematy:
female bombers
IDF
suicide attacks
suicide bombers
Opis:
The article is going to present the main reasons for which Palestinian women decide to take part in suicide bombing. The brief characteristic of Palestinian female bombers will allow answering the following questions: What makes women to conduct suicide attacks? Is this a kind of fight for emancipation or gender equality? To what extend participating in a terrorist attack is a sovereign decision of a woman and to what extent are they used as a new type of weapon and treated just like a tool?
Artykuł ma na celu przedstawienie powodów, dla których kobiety palestyńskie decydują się na udział w bombowych atakach samobójczych. Krótka charakterystyka palestyńskich kobiet-bomb pozwoli odpowiedzieć na pytania: Co popycha kobiety do przeprowadzenia ataków terrorystycznych? Czy to swoista walka o emancypację lub równość płci? Na ile udział w zamachu jest suwerenną decyzją samych kobiet, a na ile stanowią one nowy rodzaj broni i są traktowane instrumentalnie?
Źródło:
Securitologia; 2017, 1 (25); 109-118
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication over Internet Protocol
Autorzy:
Apiecionek, Ł.
Czerniak, J. M.
Romantowski, M.
Ewald, D.
Tsizh, B.
Zarzycki, H.
Dobrosielski, W. T.
Powiązania:
https://bibliotekanauki.pl/articles/202193.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network security
communication
Internet Protocol
DoS attacks
Opis:
Defending against DoS (denial of service) attacks has become a great challenge, especially for institutions that provide access to their services in the public network. State-of-the-art identity concealing tools and vast number of computers connected to the network require ensuring appropriate means for entities at risk to enable defence from the particular type of threats. This article presents a concept of user authentication in IP communication. The concept consists in providing the receiver with the possibility to determine sender՚s identity at the Internet layer level. This provides both the capability of defence against DoS attacks and possibility of utilizing the presented model over existing Internet network, which is directly responsible for transmission. The authors hope that the concept is a significant step in the perception of public network data transmission.
Źródło:
Bulletin of the Polish Academy of Sciences. Technical Sciences; 2020, 68, 2; 245-253
0239-7528
Pojawia się w:
Bulletin of the Polish Academy of Sciences. Technical Sciences
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ataki z wykorzystaniem serwera DNS (Domain Name System)
Attacks with the use of DNS servers (Domain Name System)
Autorzy:
Antkowiak, Magdalena
Engler, Maria
Kośmider, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/41205526.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Kazimierza Wielkiego w Bydgoszczy
Tematy:
zagrożenia bezpieczeństwa
atak
DNS
security threats
attacks
Opis:
Serwery DNS (Domain Name System) to pewnego rodzaju książka telefoniczna Internetu. Bez nich nie byłoby możliwe wywołanie żadnej strony internetowej, nasz komputer nie widziałby, jak przyporządkować adres internetowy konkretnemu serwerowi. Obecnie hakerzy potrafią uzyskać dostęp do serwerów DNS, a następnie przekierować przepływ informacji na własne komputery. Ataki z wykorzystaniem serwera DNS są bardzo niebezpieczne, głównym celem jest wyszpiegowanie poufnych informacji, takich jak: hasła czy kody PIN umożliwiających dostęp do internetowych banków. W niniejszym artykule zostaną przedstawione zagrożenia usługi DNS.
DNS Servers are kind of the internet's phone book. Without DNS, there wouldn't be possible to open a website and our computer wouldn't know how to assign an internet address to a particular server. Currently, hackers are able to get an access to DNS servers and then transfer the information to their computers. The attacks with the use of DNS servers are very dangerous, as the main purpose of them is to spy sensitive information, such as passwords or PINs which allow the access to the online banks. In this article, there will be presented the danger of DNS service.
Źródło:
Studia i Materiały Informatyki Stosowanej; 2015, 18; 7-10
1689-6300
Pojawia się w:
Studia i Materiały Informatyki Stosowanej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Overview of round one power attacks on SHA-3 Based MAC
Autorzy:
Millar, Kevin
Chu, Chun-Yi
Łukowiak, Marcin
Powiązania:
https://bibliotekanauki.pl/articles/397819.pdf
Data publikacji:
2018
Wydawca:
Politechnika Łódzka. Wydział Mikroelektroniki i Informatyki
Tematy:
SHA-3
power attacks
FPGA
atak energetyczny
Opis:
Digital signatures and message authentication codes are the two most common applications of cryptographic hash functions. Others range from ensuring data integrity to randomization functions and key derivation. Because of there cent break of the SHA-1 hash function, it is expected that in the nearest future there will be an increasing interest in the new SHA-3 algorithm. SHA-3 implements a subset of the Keccak family and was released as the NIST standard in 2015.SHA-3 based MAC is a keyed-hash message authentication function, which can be used to verify both the data integrity of a message and its source. Though Keccak is cryptographically secure, implementations of the algorithm may be susceptible to power analysis attacks if not sufficiently protected. This work implements and analyzes two correlation power analysis (CPA)attacks targeting the round one operations of a SHA-3 based MAC implementation on an FPGA.
Źródło:
International Journal of Microelectronics and Computer Science; 2018, 9, 3; 114-122
2080-8755
2353-9607
Pojawia się w:
International Journal of Microelectronics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ontology of input validation attack patterns on web applications
Autorzy:
Akinwale, Adio
Shonubi, Joseph
Adekoya, Adebayo
Sodiya, Adesina
Mewomo, Tosin
Powiązania:
https://bibliotekanauki.pl/articles/432359.pdf
Data publikacji:
2013
Wydawca:
Wydawnictwo Uniwersytetu Ekonomicznego we Wrocławiu
Tematy:
input validation attacks
patterns
ontology
web application
Opis:
Web applications have been the main intrusion target, and input errors from the web users lead to serious security vulnerabilities. Many web applications contain such errors, making them vulnerable to remotely exploitable input validation attacks such as SQL Injection, Command Injection, Meta-Characters, Formatting String, Path Traversal and Cross Site scripting. In this paper, we present ontology to represent patterns of input validation attacks on web applications. More specifically, our ontology is based on individual subclasses, properties and inverse functional properties, domain and range of input validation attack patterns. The ontology is implemented and interpreted with the web application development language OWL (Ontology Web Language).
Źródło:
Informatyka Ekonomiczna; 2013, 4(30); 11-23
1507-3858
Pojawia się w:
Informatyka Ekonomiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Novel Inconsequential Encryption Algorithm for Big Data in Cloud Computing
Autorzy:
Motupalli, Ravi Kanth
Prasad, Krishna K.
Powiązania:
https://bibliotekanauki.pl/articles/2086214.pdf
Data publikacji:
2022
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
Hadoop network
data security
cyber attacks
Salsa20
Opis:
In the digitalized era of the information technology the expansion of the data usage is very high accounting for about enormous data transaction in day to day life. Data from different sources like sensors, mobile phones, satellite, social media and networks, logical transaction and ventures, etc add an gigantic pile to the existing stack of data. One of the best way to handle this exponential data production is the Hadoop network. Thus in the current scenario big industries and organizations rely on the Hadoop network for the production of their essential data. Focusing on the data generation and organization, data security one of the most primary important consideration was left unnoticed making data vulnerable to cyber attacks and hacking. Hence this article proposes an effective mixed algorithm concept with the Salsa20 and AES algorithm to enhance the security of the transaction against unauthorised access and validates the quick data transaction with minimal encryption and decryption time. High throughput obtained in this hybrid framework demonstrates the effectiveness of the proposed algorithmic structure over the existing systems
Źródło:
Journal of Computer Sciences Institute; 2022, 23; 140--144
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
MISJA WOJSK ISAF W AFGANISTANIE – ZAGROŻENIA TYPU „GREEN ON BLUE”
THE ISAF MISSION IN AFGHANISTAN – THE DANGER OF ‘GREEN ON BLUE’ ATTACKS
Autorzy:
MACHNIAK, ARKADIUSZ
Powiązania:
https://bibliotekanauki.pl/articles/513256.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Rzeszowski. Wydawnictwo Uniwersytetu Rzeszowskiego
Tematy:
green on blue attacks
Taliban
ISAF
coalitions
Afghanistan
Opis:
The terrorist attacks in New York on 11th September 2001 resulted in a new method of armed conflict which was asymmetric in character, on this occasion in Afghanistan. The ISAF faced the Taliban – a rival who had an advantage because of local knowledge and help from some of the neighbouring countries, such as Pakistan, and international terrorist organizations such as Al-Qaeda. The Taliban maintained surveillance on the ANSF which supported ISAF. As a result, attacks described as green on blue happened which were caused also by a conflict of a cultural and religious basis between Afghan soldiers and ISAF soldiers. Due to its unpre-dictability and the impossibility of stating its area and time, they became one of the biggest dangers for ISAF soldiers during that difficult mission.
Źródło:
Polityka i Społeczeństwo; 2014, 12, 4; 24-34 (11)
1732-9639
Pojawia się w:
Polityka i Społeczeństwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Life-threatening laryngeal attacks in hereditary angioedema patients
Autorzy:
Piotrowicz-Wójcik, Katarzyna
Porebski, Grzegorz
Powiązania:
https://bibliotekanauki.pl/articles/1397492.pdf
Data publikacji:
2020
Wydawca:
Index Copernicus International
Tematy:
C1 inhibitor
hereditary angioedema
icatibant
laryngeal attacks
Opis:
Background: Hereditary angioedema due to C1-inhibitor deficiency (HAE-C1INH) is a rare genetic disease that runs in the family. As a result of the disease, acute swellings of the subcutaneous tissue and mucous membranes of the digestive and respiratory systems, including the larynx, occur. Any attack of the disease involving the throat and larynx is particularly dangerous and requires knowledge of clinical determinants of the disease and its proper management.Materials and methods: The study included adult consecutive HAE-C1INH patients having follow-up visits in our centre. The group was examined with a structured clinical questionnaire, concerning the last 6 months and focusing particularly on laryngeal swelling attacks. Results: 55 subjects (F/M – 35/20, age range – 18–76) were included in the study. Laryngeal attacks occurred in 19 individuals (34.5%): 1–3, 4–6, and ≥7 attacks in 9, 8 and 2 patients, respectively, two of whom required intubation. In comparison to other patients, subjects with laryngeal attacks were characterised by significantly more frequent: (1) facial attacks, (2) severe disease activity, (3) the occurrence of female patients, (4) mental stress as a trigger of attacks. All patients with laryngeal attacks had a rescue medication at home and 15/19 (78%) patients could use it at home. Most of them used plasma-derived C1-inhibitor 17/19 (89.5%) and icatibant, 8/19 (42.1%). Discussion: HAE-C1INH patients with laryngeal attacks require particular attention. Proper training regarding the identifica-tion of these patients, adequate management, access to emergency services and emergency drugs are essential to ensure the safety of subjects with this localization of HAE-C1INH attacks
Źródło:
Polish Journal of Otolaryngology; 2020, 74, 2; 42-46
0030-6657
2300-8423
Pojawia się w:
Polish Journal of Otolaryngology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Sieci Wi-Fi – zabezpieczenia i metody ataków
Wi-Fi network - security and methods of attacks
Autorzy:
Nitka, Ewelina
Kawalec, Klaudia
Karpowicz, Andrzej
Powiązania:
https://bibliotekanauki.pl/articles/41205533.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Kazimierza Wielkiego w Bydgoszczy
Tematy:
Wi-Fi
WEP
WPA/WPA 2
SSID
metody ataku
atak pasywny
atak aktywny
methods of attack
passive attacks
active attacks
Opis:
Sieci Wi-Fi są systemem komunikacji zaprojektowanym jako alternatywa lub uzupełnienie sieci tradycyjnej kablowej. Sieci bezprzewodowe mają bardzo szerokie zastosowanie. Wykorzystuje się je m.in. do projektowania sieci domowych oraz firmowych. Najprostszą i najczęściej stosowaną metodą zabezpieczenia sieci jest protokół WPA 2 Personal. Od początku istnienia sieci bezprzewodowych trwa prawdziwy wyścig zbrojeń. Nowe opracowania protokołów szybko stają się nieaktualne. Hakerzy odkrywają kolejne metody ataków i wskazują wady istniejących rozwiązań. Przeprowadzenie ataku na sieć na ogół poprzedzone jest zbadaniem środowiska obranego celu. Nie wszystkie ataki jednak związane są z wykorzystaniem sprzętu komputerowego, w niektórych przypadkach łatwiejszym celem są użytkownicy sieci.
Wi-Fi is a system of communication designed with an alternative or a complement for traditional cable network. Wireless networks are very common in use. They are used for example to project a home network or a business network. The easiest and the most popular method of network security is a WPA 2 Personal protocol. From the very beginning, there have been a real arms race. New coverages of the protocols are getting very quickly not actual. Hackers discover new methods of an attack and they show disadvantages of existing solutions. Performing an attack against some network is in general preceded by studying an environment of the aim. Not all attacks are connected with using a hardware. In some cases, users of a network are the easier aim.
Źródło:
Studia i Materiały Informatyki Stosowanej; 2015, 18; 15-19
1689-6300
Pojawia się w:
Studia i Materiały Informatyki Stosowanej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analysis of Performance and Efficiency of Hardware and Software Firewalls
Autorzy:
Konikiewicz, W.
Markowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/108760.pdf
Data publikacji:
2017
Wydawca:
Społeczna Akademia Nauk w Łodzi
Tematy:
firewall
virtual firewall
network security
network performance
DoS attacks
Opis:
Firewalls are key elements of network security infrastructure. They should guarantee the proper level of security and, at the same time, the satisfying performance in order to not increase the packet delay in the network. In the paper, we present the comparative study on performance and security of a few firewall technologies including hardware, software and virtual solutions. Three important criteria are considered: the maximal throughput of firewall, the introduced delay and the ability to resist Denial of Service attacks. We report results of experiments, present analysis and formulate a few practical conclusions.
Źródło:
Journal of Applied Computer Science Methods; 2017, 9 No. 1; 49-63
1689-9636
Pojawia się w:
Journal of Applied Computer Science Methods
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiza podatności użytkowników systemów informatycznych na atak phishingowy
Analysis of the vulnerability of IT system users to a phishing attack
Autorzy:
Grzebielec, Szymon
Powiązania:
https://bibliotekanauki.pl/articles/98078.pdf
Data publikacji:
2020
Wydawca:
Politechnika Lubelska. Instytut Informatyki
Tematy:
network security
network attacks
phishing
bezpieczeństwo sieci
atak sieciowy
Opis:
This article presents an analysis of users' vulnerability to phishing attacks. The study was carried out using a self-prepared attack. A phishing attack was carried out on a group of 100 people. The subjects were divided into two groups of 50 people. The first group was attacked from a private, trusted account. The second group was attacked from a foreign email address. The attacked people were asked to complete the survey, its results and conclusions are presented in this article.
W niniejszym artykule przedstawiono analizę podatności użytkowników na atak phishingowy. Badania dokonano za pomocą samodzielnie przygotowanego ataku. Atak phishingowy przeprowadzono na grupie 100 osób. Badanych podzielono na dwie grupy po 50 osób. Pierwszą grupę zaatakowano z prywatnego, zaufanego konta. Drugą grupę natomiast zaatakowano z obcego adresu e-mail. Zaatakowane osoby poproszono o wypełnienie ankiety, jej wyniki oraz wnioski przedstawiono w niniejszym artykule.
Źródło:
Journal of Computer Sciences Institute; 2020, 15; 164-167
2544-0764
Pojawia się w:
Journal of Computer Sciences Institute
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Safeguarding critical infrastructures from cyber attacks : A case study for offshore natural gas Assets
Autorzy:
Hadjistassou, C.
Bratskas, R.
Koutras, N.
Kyriakides, A.
Charalambous, E.
Hadjiantonis, A. M.
Powiązania:
https://bibliotekanauki.pl/articles/2069216.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
cyber attacks
energy
natural gas
gas hydrates
Opis:
The majority of operations, as well as the physical and chemical processes, which take place on offshore Natural Gas installations are controlled by computer systems. These computer systems are vulnerable to cyber-attacks. If successful, such attacks can have disastrous and far-reaching consequences, including human casualties, large-scale pollution, and immense financial cost. In this paper we identify one possible way that an attacker can inflict material damage, by altering the parameters of the gas hydrate inhibition system. The formation of gas hydrates can completely halt operations for a prolonged period of time, could damage equipment, and directly endanger human lives. To raise the level of protection we propose the implementation of two lines of defense the second based on machine learning algorithms. Appreciating the sophistication of attacks, the inherent risks and complexity of multi-billion offshore energy assets we highlight the need for further research intended to address safety loopholes.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 1; 115--124
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Journalists under attack: self-censorship as an unperceived method for avoiding hostility
Autorzy:
Himma-Kadakas, Marju
Ivask, Signe
Powiązania:
https://bibliotekanauki.pl/articles/2176110.pdf
Data publikacji:
2023-02-24
Wydawca:
Polskie Towarzystwo Komunikacji Społecznej
Tematy:
self-censorship
journalistic role performance
journalism
attacks on journalism
Opis:
This study investigates journalists’ self-censorship and introduces a phenomenon of unperceived collective self-censorship that demands a combination of detection methods. We conducted a content analysis of media critique texts (N=156) that discuss attacks on Estonian journalism. These results were combined with the content analysis of journalistic roles in the news (N=2409) and a survey on journalists (N=99) and completed with semi-structured interviews (N=14). The findings showed that accusations against journalists were frequently related to discourses regarding journalists’ interventionist or watchdog roles. Juxtaposing these results with quantitative data, it became evident that when aspects of interventionist and watchdog roles were criticized in the media texts, the performance of these roles decreased in the news. However, journalists’ self-assessment does not show the perception of this change. We argue that self-censorship was created unknowingly within the newsroom. External pressures – such as politically motivated attacks on journalism – may promote unperceived self-censorship.
Źródło:
Central European Journal of Communication; 2022, 15, 3(32); 359-378
1899-5101
Pojawia się w:
Central European Journal of Communication
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
“Islamic State” as a new form of international terrorism
„Państwo Islamskie” jako nowa forma terroryzmu międzynarodowego
Autorzy:
Kocoń, Sławomir
Powiązania:
https://bibliotekanauki.pl/articles/891513.pdf
Data publikacji:
2019-01-17
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
international terrorism
Islamic State
ideology
terrorist attacks
jihadists
war
Opis:
The purpose of the following article is to provide details regarding the foundation, expansion, ideology, strategy and mindset of the Islamic State. The article examines the current situation in Syria, a failed state, and Iraq. Furthermore, the complex geopolitical situation of the entire Middle East region, as well as, significant problems which ISIS poses worldwide have been discussed thoroughly. Finally, new areas of operation, possible threats, but also the whole new operational framework contemporary terrorist organizations or their affiliates may use, have been taken into consideration.
Celem niniejszej publikacji jest przedstawienie przyczyny powstania, ekspansji, ideologii, metod działania tzw. Państwa Islamskiego. W poniższym artykule opisano również obecną sytuację na terenie Syrii, która ma aktualnie status państwa upadłego, oraz Iraku. Ponadto przedstawiono również skomplikowaną sytuację geopolityczną całego regionu bliskowschodniego, a także problem, jaki niesie ze sobą ISIS na terenie całego globu. W publikacji przedstawione zostały również nowe sektory działań, zagrożenia, a także nowe ramy, w jakich mogą działać współczesne organizacje terrorystyczne na arenie międzynarodowej.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2018, 31; 105-118
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
MoveSteg : A Method of Network Steganography Detection
Autorzy:
Szczypiorski, K.
Tyl, T.
Powiązania:
https://bibliotekanauki.pl/articles/226603.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
network steganography
information
hiding network
detection of new attacks
Opis:
This article presents a new method for detecting a source point of time based network steganography - MoveSteg. A steganography carrier could be an example of multimedia stream made with packets. These packets are then delayed intentionally to send hidden information using time based steganography methods. The presented analysis describes a method that allows finding the source of steganography stream in network that is under our management.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 4; 335-341
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Russia-United Kingdom Relations after The Year 2018. Condition and Predictions
Autorzy:
Kustowska, Joanna
Powiązania:
https://bibliotekanauki.pl/articles/1933775.pdf
Data publikacji:
2021-12-31
Wydawca:
Wydawnictwo Adam Marszałek
Tematy:
Russia-United Kingdom relations
diplomatic row
military/cyber-attacks
Brexit
Opis:
The relations between the United Kingdom and the Russian Federation have a long history. Over centuries those relations were changing. At the beginning the countries were hostile and militant towards each other. Then, they became allies in World War I and World War II. However, never in the modern history bilateral relations between Great Britain and Russia have been so obscure and distant. Some scientists and politicians even suggest that relations between the United Kingdom and Russia are frozen. This thesis can be supported by the analysis of recent events in the 21st century history: from an attempt to murder ex-Russian agent in 2018 to firing warning shots at the British Royal Navy destroyer in the Black See by Russians in 2021.
Źródło:
Reality of Politics; 2021, 18; 101-115
2082-3959
Pojawia się w:
Reality of Politics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Goals of terrorist attacks in the perspective of the indirect strategy of terrorism
Autorzy:
Stelmach, J.
Powiązania:
https://bibliotekanauki.pl/articles/347296.pdf
Data publikacji:
2017
Wydawca:
Akademia Wojsk Lądowych imienia generała Tadeusza Kościuszki
Tematy:
terrorist attack
goals of terrorist attacks
indirect strategy of terrorism
Opis:
The aim of the publication is diagnosing the nature and multidimensional character of the goals of terrorist attacks from the perspective of the indirect strategy of terrorism. The structure of this article is based on the identification of the essence of a terrorist attack and the analysis of the nature of the goals of terrorist activity. The underlying assumption made by the author was the claim that the goals of terrorist attacks can be divided into instrumental and main goals. This division emphasises the multidimensional character of the phenomenon of terrorism and justifies the validity of using the notion of indirect strategy when referring to the activity of contemporary terrorists. The knowledge of mutual relations between the stages of terrorist activity in the framework of the assumed terrorist strategy can increase the efficiency of antiterrorist actions, which means that the investigated issue acquires particular significance.
Źródło:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki; 2017, 2; 74-82
1731-8157
Pojawia się w:
Zeszyty Naukowe / Wyższa Szkoła Oficerska Wojsk Lądowych im. gen. T. Kościuszki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Migracja do Polski w drugiej dekadzie XXI wieku – skala zjawiska i zagrożenia
Migration to Poland in the Second Decade of the 21st Century – the Scale of the Phenomenon and Threats
Autorzy:
Brążkiewicz, Dariusz
Powiązania:
https://bibliotekanauki.pl/chapters/2191673.pdf
Data publikacji:
2021
Wydawca:
Akademia Bialska Nauk Stosowanych im. Jana Pawła II w Białej Podlaskiej
Tematy:
ataki
debata
kryzys
proces
wydarzenia
attacks
debate
crisis
trial
events
Opis:
W najnowszej historii Polski kryzys migracyjny w Europie w drugiej dekadzie XXI wieku stał się przedmiotem wielu burzliwych debat społecznych i politycznych zarówno w kraju jak i wewnątrz Unii Europejskiej. Wynika to z wielu zagrożeń, w tym terrorystycznych, społecznych, kulturowych, religijnych i ekonomicznych. W trwającym światowym procesie migracyjnym, to właśnie wydarzenia w międzynarodowym środowisku około europejskim drugiej dekady XXI wieku wywarły duże znaczenie na sytuacje kryzysowe wielu krajów Unii Europejskiej. Proces migracyjny do Europy ma dwa kierunki. Pierwszy kierunek od południa i południowego wschodu wynika z przemian społeczno-politycznych okresu Arabskiej Wiosny 2011 roku. Główną spuścizną tych wydarzeń są trwające do dziś konflikty etniczno-polityczne w Libii oraz wojna domowa w Syrii. Drugi kierunek procesu migracyjnego to rosnąca liczba migrantów społeczno-ekonomicznych ze wschodniej Europy oraz Azji. I to właśnie z tych obszarów pochodzą migranci kierujący się do Polski. Mianownikiem tych dwóch nurtów migracyjnych jest fakt, że wielu migrantów jest wyznania muzułmańskiego, co w porównaniu z atakami radykalnych islamistów w Europie powoduje stan zagrożenia, również w Polsce.
In the recent Polish history, the migration crisis in Europe in the second decade of the 21st century has become the subject of many stormy social and political debates both in the country and within the European Union. This is due to many threats, including terrorism, social, cultural, religious and economic. In the ongoing global migration process, it is the events in the international environment around Europe that have greatly influenced the crisis situations of many European Union countries. The migration process to Europe has two directions. The first direction from the south and southeast is due to socio-political changes in the Arab Spring of 2011. The main legacy of these events are the ethno-political conflicts in Libya and the civil war in Syria that continues to this day. The second direction of the migration process is the growing number of socio-economic migrants from Eastern Europe and Asia. Immigrants heading to Poland come from these areas. The name of these two migration trends is the fact that many migrants are Muslim, which in comparison with the attacks of radical Islamists in Europe causes a state of threat, also in Poland.
Źródło:
Współczesne zagrożenia bezpieczeństwa państwa. Część druga; 126-139
9788364881770
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wzrost liczby ataków terrorystycznych z wykorzystaniem samochodów
The growth of terrorist attacks with using vehicles
Autorzy:
Nowacki, G.
Olejnik, K.
Zakrzewski, B.
Powiązania:
https://bibliotekanauki.pl/articles/313002.pdf
Data publikacji:
2018
Wydawca:
Instytut Naukowo-Wydawniczy "SPATIUM"
Tematy:
atak terrorystyczny
atak terrorystyczny z wykorzystaniem samochodów
samochody
bezpieczeństwo drogowe
ITS
UE
terrorist attacks
terrorist attacks with use of vehicles
vehicles
road safety
Opis:
W artykule omówione zostały zagrożenia terrorystyczne, w tym szczególnie ataki z wykorzystaniem samochodów. Dokonano analizy ataków terrorystycznych w zakresie strategii i taktyki terrorystów, uwzględniając dane statystyczne z 2016 roku. Przedstawiono dane dotyczące liczby ataków terrorystycznych, ofiar i osób rannych na świecie oraz w Unii Europejskiej na przestrzeni ostatnich lat, przedstawiając ranking Instytutu Ekonomii i Pokoju. Ponadto omówiono ataki terrorystyczne z wykorzystaniem samochodów na świecie oraz państwach UE.
Paper discussed the terrorist threats, including in particular attacks using vehicles. An analysis of terrorist attacks in the field of terrorist strategy and tactics was made, taking into account statistical data from 2016. Data on the number of terrorist attacks, victims and wounded people in the world and in the European Union over the past years were presented, presenting the ranking of the Institute of Economics and Peace. In addition, terrorist attacks with the use of vehicles in the world and the European Union member states were discussed.
Źródło:
Autobusy : technika, eksploatacja, systemy transportowe; 2018, 19, 9; 265-269
1509-5878
2450-7725
Pojawia się w:
Autobusy : technika, eksploatacja, systemy transportowe
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies