The production of biogas in wastewater treatment plants (WWTPs), often considered critical facilities, is a significant element of energy and environmental security. Given increasing demands to reduce greenhouse gas emissions and the pursuit of energy self-sufficiency, the role of biogas in the energy sector keeps steadily growing, granting it strategic potential. In Poland and other European Union countries, biogas production is supported by policies promoting renewable energy sources, enhancing its importance in the energy transition process. This study analyses biogas yields and their impact on achieving energy and environmental security goals. Additionally, the use of meta-regression methods and machine learning aims to improve biogas yield prediction based on a range of proces parameters.
This paper investigates the obstacles and resolutions concerning the security of communication in the Internet of Things (IoT). It commences with a discussion of the remarkable proliferation of internet-connected devices, ranging from personal computers to mobile devices, and now to the era of IoT and IoE. The paper illuminates the impact of IoT on network addresses, leading to the depletion of IPv4 addresses and the necessity for address translation services. Subsequently, the article delves into the risks confronted by IoT systems, encompassing physical and digital assaults, unauthorized access, system failures, as well as diverse forms of malicious software. The significance of IoT security in industrial and agricultural systems is underscored. Finally, the paper concludes by presenting strategies to combat these risks, including antivirus countermeasures, safeguards against Distributed Denial-of-Service (DDoS) attacks, and security considerations in IoT systems for agriculture. In essence, this paper offers valuable insights into the challenges and solutions associated with ensuring the security of IoT communication.
This research paper investigates the cyber warfare between Russia and Ukraine, an essential aspect of the ongoing conflict since 2014. It examines the historical context, emphasizing the increase in cyberattacks following the annexation of Crimea. The paper provides a detailed analysis of significant cyber incidents, including the attack on Ukraine's power grid in 2015 and the Petya. A ransomware attack in 2017, exploring their methods, targets, and impacts. It also looks into the strategies and techniques used by Russian hacker groups, such as phishing, malware, DDoS attacks, and advanced persistent threats (APT). The research underscores the importance of comprehensive defense strategies, international cooperation, and the adoption of advanced technologies to mitigate cyber threats and protect national security.
In the paper an example of an integrated Software-Defined Network (SDN) system with heterogeneous technological instances based on the Linux platform will be shown. For this purpose, two research testing stands with a POX controller and OVS (Open vSwitch) switches were used. In the first testing stand, the research based on the ICMP traffic was done while in the second one, MQTT traffic was analysed. The capabilities of these systems were examined in terms of responding to detected incidents and traffic anomalies. In particular, their appropriate responses to anomalies were tested, as well as the possibility of continuous monitoring of packet transfer between separate network components. The aim of the paper is to investigate the effectiveness of SDN in enhancing the security and adaptability of critical infrastructure systems. For isolation and optimised resource management, some components, such as POX or the MQTT broker, were run in Docker containers. The test environment used both hardware cases and prepared software, enabling comprehensive design and testing of networks based on the OpenFlow protocol used in SDN architecture, enabling the separation of control from traffic in computer networks. The results of this research make it possible to implement anomaly detection solutions in critical infrastructure systems that will adapt on the fly to changing conditions that arise, for example, in the case of an attack on such infrastructure or physical damage to it at a selected node.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.