Monograph: "Advanced IT systems - studies of selected cases" (pl. Zaawansowane systemy informatyczne – studia wybranych przypadków) contains two chapters of our department employees: M.Sc Alicja Gerka and M.Sc Piotr Hadaj
The monograph concerns four complex issues of modern IT systems: (1) data stream processing, (2) parallel and distributed programming, (3) ICT protection of Smart Grid networks and (4) analysis of complex networks.
Chapter 3: "ICT Protection Methods of Smart Power Grids" by M.Sc Alicja Gerka is a very interesting fragment of the monograph on cybersecurity issues in the field of electricity transmission at the level of all participants of such a process. The author presents the Smart Grid idea, and then threats in the main areas: breach of the integrity, confidentiality, availability and authenticity of information.
Chapter 4: "Topological parameters of graphs of complex networks ”by M.Sc Piotr Hadaj deals with vast and complex computer networks treated as graph structures. Both the theory of computer networks and the theory of graphs have been known for several decades, however, only the development of sophisticated techniques and Data Science tools made it possible to solve problems of high complexity, reaching networks with a number of millions of elements. The author writes about software packages such as: Gephi, Network Workbench, yEd (yWorks), NetworkX enabling the analysis of the operation of such structures.
The publication can be purchased in the Publishing House of Rzeszów University of Technology in building no. F at M. Skłodowskiej-Curie street.
We presents the chapters summary of our employees:
A.Gerka: "ICT Protection Methods of Smart Power Grids":
The third chapter discusses the BG communication infrastructure and the resulting threats: violations of (1) consistency, (2) confidentiality, (3) availability, (4) authenticity of information. The attention was paid to coordinated attacks and Advanced Persistent Threat (APT), which cover various types of violations and constitute one of the most serious cyber threats, such as in cyberterrorism. The measures of protection against specific types of threats and methods of monitoring the operation of Border Guard were presented, along with a short description of an exemplary infrastructure of data processing networks. The paper presents an analysis of the risk of threats related to SG based on the OWASP (Open Web Application Security Project) Risk Rating methodology and compares the most popular techniques of protection against threats, comparing them in terms of comprehensive protection.
P.Hadaj: "Topological parameters of graphs of complex networks":
Each network is a complex system consisting of nodes and a structure of connections between them. Such a structure can be ubiquitous social networks, global Internet connections or even an analysis is necessary to understand the characteristics and functioning of such a structure, which is not difficult for networks with a small number of nodes. The analysis of a structure with a multimillion elements becomes problematic. Software packages such as Gephi, Network Workbench, yEd (yWorks) and NetworkX, developed in the last twenty years, have opened up unprecedented opportunities for research into the structure and behaviour of complex networks of virtually unlimited size. The results of the research allow us to understand the essence of such behaviours as self-organization of mass traffic on the Internet or, with some similarity, predict social unrest thanks to the current analysis of data from social networks. Parameters of each graph, regardless of its size (number of nodes), allow to determine its characteristics in many ways. The paper contains a short introduction to the theory of complex networks and related concepts, presents the most popular software currently used to analyse graphs of large networks and defines the most important parameters of graphs according to the author. Thanks to the progress in the development of software and computational power for network analysis and visualization, it has become possible to study previously unrecognized interactions in complex network structures.