Zobrazeno 1 - 10
of 57
pro vyhledávání: '"Krzysztof Cabaj"'
Autor:
Sebastian Plamowski, Robert Nebeluk, Andrzej Wojtulewicz, Krzysztof Cabaj, Patryk Chaber, Maciej Lawrynczuk, Piotr Marusak, Krzysztof Zarzycki
Publikováno v:
IEEE Access, Vol 12, Pp 135551-135563 (2024)
This paper describes a methodology used to test the vulnerability of control algorithms implemented in an industrial Programmable Logic Controller (PLC) environment to cyber attacks. Three stages of testing are discussed. First, we start with a simul
Externí odkaz:
https://doaj.org/article/39bb648725e6406bba682b39a56782ff
Autor:
Piotr Marusak, Robert Nebeluk, Andrzej Wojtulewicz, Krzysztof Cabaj, Patryk Chaber, Maciej Ławryńczuk, Sebastian Plamowski, Krzysztof Zarzycki
Publikováno v:
Sensors, Vol 24, Iss 12, p 3860 (2024)
The article deals with the issue of detecting cyberattacks on control algorithms running in a real Programmable Logic Controller (PLC) and controlling a real laboratory control plant. The vulnerability of the widely used Proportional–Integral–Der
Externí odkaz:
https://doaj.org/article/8f236fa7eff846e28c387fa75f60998d
Autor:
Krzysztof Zarzycki, Patryk Chaber, Krzysztof Cabaj, Maciej Lawrynczuk, Piotr Marusak, Robert Nebeluk, Sebastian Plamowski, Andrzej Wojtulewicz
Publikováno v:
IEEE Access, Vol 11, Pp 49587-49600 (2023)
Protection of computer systems and networks against malicious attacks is particularly important in industrial networked control systems. A successful cyber-attack may cause significant economic losses or even destruction of controlled processes. Ther
Externí odkaz:
https://doaj.org/article/52746cfd35144f4f9a19b86b7c5f5204
Autor:
Rafał Kozik, Wojciech Mazurczyk, Krzysztof Cabaj, Aleksandra Pawlicka, Marek Pawlicki, Michał Choraś
Publikováno v:
Sensors, Vol 23, Iss 24, p 9666 (2023)
Currently, one can observe the evolution of social media networks. In particular, humans are faced with the fact that, often, the opinion of an expert is as important and significant as the opinion of a non-expert. It is possible to observe changes a
Externí odkaz:
https://doaj.org/article/f514154a38424da6b4e0fe292c1e1fe9
Autor:
Krzysztof Zarzycki, Patryk Chaber, Krzysztof Cabaj, Maciej Ławryńczuk, Piotr Marusak, Robert Nebeluk, Sebastian Plamowski, Andrzej Wojtulewicz
Publikováno v:
Sensors, Vol 23, Iss 15, p 6778 (2023)
This work is concerned with the vulnerability of a network industrial control system to cyber-attacks, which is a critical issue nowadays. This is because an attack on a controlled process can damage or destroy it. These attacks use long short-term m
Externí odkaz:
https://doaj.org/article/ae1920a59f564d44baf5074cf0e6fa78
Publikováno v:
IEEE Access, Vol 8, Pp 149255-149269 (2020)
Cyber attacks are on the rise and each day cyber criminals are developing more and more sophisticated methods to compromise the security of their targets. Sniffing is one of the most important techniques that enables the attacker to collect informati
Externí odkaz:
https://doaj.org/article/eb952cf88d8b4041955e59d71cc14695
Publikováno v:
Sensors, Vol 21, Iss 20, p 6904 (2021)
There are a dozen messaging protocols proposed for IoT systems. Choosing one for a new design is complicated, and a non-optimal selection can result in slower development and higher design costs. This paper aims to help select appropriate protocols,
Externí odkaz:
https://doaj.org/article/f4e7ee466be6455785b0ab1739ef7caa
Publikováno v:
EURASIP Journal on Information Security, Vol 2018, Iss 1, Pp 1-3 (2018)
Externí odkaz:
https://doaj.org/article/06e3aee0445f4516ae6b15235b7c9612
Autor:
Dayu Shi, Xun Zhang, Lina Shi, Andrei Vladimirescu, Wojciech Mazurczyk, Krzysztof Cabaj, Benjamin Meunier, Kareem Ali, John Cosmas, Yue Zhang
Publikováno v:
Sensors, Vol 21, Iss 4, p 1515 (2021)
In this paper, a novel device identification method is proposed to improve the security of Visible Light Communication (VLC) in 5G networks. This method extracts the fingerprints of Light-Emitting Diodes (LEDs) to identify the devices accessing the 5
Externí odkaz:
https://doaj.org/article/30bc59cf616f4a92936ecca2ab53b8a1
Publikováno v:
Annals of computer science and information systems, Vol 8, Pp 981-989 (2016)
Externí odkaz:
https://doaj.org/article/40cd5bea2181430a8a2b6b21bce4c63e