This HTML5 document contains 48 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n11http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n15http://localhost/temp/predkladatel/
n10http://purl.org/net/nknouf/ns/bibtex#
n22http://linked.opendata.cz/resource/domain/vavai/projekt/
n14http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n23http://linked.opendata.cz/resource/domain/vavai/subjekt/
n4http://linked.opendata.cz/ontology/domain/vavai/
n13http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14330%2F13%3A00067651%21RIV14-MSM-14330___/
n20https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n9http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n17http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n21http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n18http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n12http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14330%2F13%3A00067651%21RIV14-MSM-14330___
rdf:type
n4:Vysledek skos:Concept
dcterms:description
We propose and investigate a new concept for automatic search for attack strategies and demonstrate its use in the area of wireless sensor networks. We exploit mechanisms inspired by the biological evolution, known as Evolutionary Algorithms and we use a combination of simulation (or real system execution) with a candidate attacks generator. Each candidate is evaluated, its success is measured and used as a guiding input for the next generation of candidates. Evolutionary Algorithms perform well in case they evaluate a large number of candidate attack strategies, and thus we have focused on applications where quality can be assessed fast (in order of seconds and optimally less). We propose and investigate a new concept for automatic search for attack strategies and demonstrate its use in the area of wireless sensor networks. We exploit mechanisms inspired by the biological evolution, known as Evolutionary Algorithms and we use a combination of simulation (or real system execution) with a candidate attacks generator. Each candidate is evaluated, its success is measured and used as a guiding input for the next generation of candidates. Evolutionary Algorithms perform well in case they evaluate a large number of candidate attack strategies, and thus we have focused on applications where quality can be assessed fast (in order of seconds and optimally less).
dcterms:title
Evolutionary Design of Attack Strategies Evolutionary Design of Attack Strategies
skos:prefLabel
Evolutionary Design of Attack Strategies Evolutionary Design of Attack Strategies
skos:notation
RIV/00216224:14330/13:00067651!RIV14-MSM-14330___
n4:predkladatel
n23:orjk%3A14330
n3:aktivita
n21:S n21:P
n3:aktivity
P(LG13010), S
n3:dodaniDat
n12:2014
n3:domaciTvurceVysledku
n14:4292715 n14:9095128 n14:7220855
n3:druhVysledku
n18:D
n3:duvernostUdaju
n7:S
n3:entitaPredkladatele
n13:predkladatel
n3:idSjednocenehoVysledku
73816
n3:idVysledku
RIV/00216224:14330/13:00067651
n3:jazykVysledku
n16:eng
n3:klicovaSlova
Attack strategy; Evolutionary Algorithm; Security; Wireless Sensor Network
n3:klicoveSlovo
n17:Evolutionary%20Algorithm n17:Attack%20strategy n17:Security n17:Wireless%20Sensor%20Network
n3:kontrolniKodProRIV
[BD6E378E6680]
n3:mistoKonaniAkce
Cambridge, UK
n3:mistoVydani
Německo
n3:nazevZdroje
Security Protocols XVII - 17th International Workshop, Revised Selected Papers
n3:obor
n19:IN
n3:pocetDomacichTvurcuVysledku
3
n3:pocetTvurcuVysledku
3
n3:projekt
n22:LG13010
n3:rokUplatneniVysledku
n12:2013
n3:tvurceVysledku
Kůr, Jiří Švenda, Petr Matyáš, Václav
n3:typAkce
n11:WRD
n3:zahajeniAkce
2009-01-01+01:00
s:issn
0302-9743
s:numberOfPages
15
n9:doi
10.1007/978-3-642-36213-2_2
n10:hasPublisher
Springer-Verlag
n20:isbn
9783642362125
n15:organizacniJednotka
14330