32 research outputs found

    Network Event Correlation and Semantic Reasoning for Federated Networks Protection System

    No full text

    Image retrieval based on hierarchical Gabor filters

    No full text
    Content Based Image Retrieval (CBIR) is now a widely investigated issue that aims at allowing users of multimedia information systems to automatically retrieve images coherent with a sample image. A way to achieve this goal is the computation of image features such as the color, texture, shape, and position of objects within images, and the use of those features as query terms. We propose to use Gabor filtration properties in order to find such appropriate features. The article presents multichannel Gabor filtering and a hierarchical image representation. Then a salient (characteristic) point detection algorithm is presented so that texture parameters are computed only in a neighborhood of salient points. We use Gabor texture features as image content descriptors and efficiently emply them to retrieve images

    The preliminary results of the intelligent computer vision system to support blind people

    No full text
    In this paper we present innovative computer vision solutions to support social inclusion of totally blind people. We present the overall framework architecture and we focus on intelligent computer vision system applied to support Instrumental Activities of Daily Living (IADL). Results of the proposed intelligent computer vision system are reported and presented on the basis of sample real-life scenarios

    Information exchange between domains in the Federated Networks Protection System

    No full text
    W niniejszym artykule przedstawiono koncepcję wymiany informacji pomiędzy domenami w systemie ochrony sieci federacyjnych. Zaproponowano architekturę systemu ochrony sieci federacyjnych, a w szczególności omówiono zasadę działania Modułów Decyzyjnych (MD). Zaprezentowany sposób komunikacji między domenami wykorzystuje technologię P2P (Peer to Peer). Moduły Decyzyjne w poszczególnych domenach federacji mogą wymieniać informacje o stanie sieci, wykrytych działaniach nieuprawnionych oraz Ogólne Reguły Decyzyjne (ORD) będące wypracowanymi poleceniami reakcji. Współpraca domen w federacji pozwala na osiągnięcie efektu synergii i zwiększenie bezpieczeństwa sieci (m.in. sieci wykorzystywanych w administracji publicznej lub sieci militarnych). Opisano kwestie związane z bezpieczeństwem technologii P2P oraz przedstawiono scenariusz ukazujący korzyści płynące z zaproponowanego rozwiązania. Przedstawiona koncepcja jest rezultatem prac w projekcie rozwojowym SOPAS finansowanym przez MNiSW w zakresie bezpieczeństwa państwa.In this paper a concept and architecture of the Federated Networks Protection System (FNPS) are presented. The system components and, particularly, the Decision Module are described. The major contribution of the paper is the concept of P2P (Peer to Peer) based information exchange between federated networks. Communication between Decision Modules (DM) in each of the federated domain is based on P2P in order to inform about network status, detected attacks or anomalies and distribute General Decision Rules (GDR) describing specific reactions. The presented system is dedicated for federated networks and systems used by the public administration and military sector. Such systems can increase their overall security and resiliency by sharing and exchanging security related information and general reaction rules. There is also presented a sample scenario (SQLIA - SQL injection attack detection) to show how the proposed system can detect complex attacks and benefit from information sharing between federated domains

    The overview of trends and challenges in mobile biometrics

    No full text
    Currently, various biometric modalities are used to perform human identification or user verification. Although the research results are promising, the constant development of biometric systems is needed. Recently, biometric systems are also implemented for mobile devices, services and applications. In this article, the review of current trends in mobile biometrics is discussed. The paper also describes the most challenging aspects like aging, template protection or wide users’ acceptance. Finally, palmprints are described as the trait that may give promising results and could be implemented widely in mobile biometrics

    Lip Tracking Method for the System of Audio-Visual Polish Speech Recognition

    No full text

    Increasing Protection and Resilience of Critical Infrastructures – Current challenges and approaches

    No full text
    In this paper we present current key challenges with respect to Critical Infrastructure Protection and to their resiliency. As our world becomes more and more interconnected via open networks with the cyberspace, many new challenges arise. Therefore, we frame the problem within three distinctive domains: real world natural events, human (organisational and legal), and cyber one. Within our analysis we present how current technologies, tools and methodologies can be used to address certain problems within those domains. Moreover, we stress the fact that there is a limited number of initiatives that aim at proposing the holistic (all hazard) approach addressing all the domains at once

    Authentication with Time Features for Keystroke Dynamics on Touchscreens

    No full text
    Part 3: Extended AbstractsInternational audienceKeystroke authentication is a well known method to secure the mobile devices. Especially, the increasing amount of personal and sensitive data stored on these devices makes a secure authentication system necessary. Traditional security techniques like the four-digit PIN-input are insufficient and do not correspond to the present password standards. A keystroke behavior based authentication system could increase the security. Different researches have been published based on keystroke authentication systems with traditional PC keypads. But the keystroke behavior on touchscreens, as they are nowadays used on smartphones, are not analysed before
    corecore