Attributes | Values |
---|
rdf:type
| |
Description
| - This paper describes the security system for the critical infrastructure based on the wireless network. The wireless network is the expanding platform that brings the major advantages inside the cable-less connection. This feature brings the potential security issue flowing from the principle of the wireless communication; the communication provides by the electromagnetic waves has hardly limited range of connection. The next problem flowing from the encryption standard; the network is secure as secure is the password for this network. The next thread is in wide range of intruders attack area. With high-gain antenna is possible to break the secured network from huge distance (in many cases more than 2-5 km). The paper describes the active counter-intruder solution for protecting network. The designed solution has method for intruder detection and active localization routines. The next part of this solution is totally break-down of any communication, when the system detect unwanted communication or initial phases of the attack.
- This paper describes the security system for the critical infrastructure based on the wireless network. The wireless network is the expanding platform that brings the major advantages inside the cable-less connection. This feature brings the potential security issue flowing from the principle of the wireless communication; the communication provides by the electromagnetic waves has hardly limited range of connection. The next problem flowing from the encryption standard; the network is secure as secure is the password for this network. The next thread is in wide range of intruders attack area. With high-gain antenna is possible to break the secured network from huge distance (in many cases more than 2-5 km). The paper describes the active counter-intruder solution for protecting network. The designed solution has method for intruder detection and active localization routines. The next part of this solution is totally break-down of any communication, when the system detect unwanted communication or initial phases of the attack. (en)
|
Title
| - Wireless Network Self Defence System
- Wireless Network Self Defence System (en)
|
skos:prefLabel
| - Wireless Network Self Defence System
- Wireless Network Self Defence System (en)
|
skos:notation
| - RIV/70883521:28140/13:43870366!RIV14-MSM-28140___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/70883521:28140/13:43870366
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - security, wireless, IDS, network, intruder, malware, exploit (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of the 17th WSEAS International Conference on Computers (part of CSCC´13)
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Jasek, Roman
- Malaník, David
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
issn
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |