This HTML5 document contains 49 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n17http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n18http://localhost/temp/predkladatel/
n8http://purl.org/net/nknouf/ns/bibtex#
n20http://linked.opendata.cz/resource/domain/vavai/projekt/
n13http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n21http://linked.opendata.cz/ontology/domain/vavai/
n22http://linked.opendata.cz/resource/domain/vavai/zamer/
n5https://schema.org/
n15http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14610%2F10%3A00050701%21RIV12-MO0-14610___/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n19http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n12http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n11http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n10http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n7http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14610%2F10%3A00050701%21RIV12-MO0-14610___
rdf:type
skos:Concept n21:Vysledek
dcterms:description
These days the problem of cyber security is of utmost importance. Massive cyber attacks targeting government and mission critical servers can swiftly become an issue of national security. Various approaches for cyber defence and cyber security used to date have been based on software solutions without hardware acceleration. With the increasing number of network users, services and the current generation of multi-gigabit network links, the amount of transferred data has increased significantly. These facts have rendered many current solutions for network security obsolete. This paper presents hardware-accelerated system for cyber security. The time and performance critical parts are processed in hardware and only the relevant traffic parts are processed in software. Such approach allows us to use current security tools in multi-gigabit networks under worst-case scenarios like a distributed denial-of-service attacks. These days the problem of cyber security is of utmost importance. Massive cyber attacks targeting government and mission critical servers can swiftly become an issue of national security. Various approaches for cyber defence and cyber security used to date have been based on software solutions without hardware acceleration. With the increasing number of network users, services and the current generation of multi-gigabit network links, the amount of transferred data has increased significantly. These facts have rendered many current solutions for network security obsolete. This paper presents hardware-accelerated system for cyber security. The time and performance critical parts are processed in hardware and only the relevant traffic parts are processed in software. Such approach allows us to use current security tools in multi-gigabit networks under worst-case scenarios like a distributed denial-of-service attacks.
dcterms:title
Hardware Acceleration for Cyber Security Hardware Acceleration for Cyber Security
skos:prefLabel
Hardware Acceleration for Cyber Security Hardware Acceleration for Cyber Security
skos:notation
RIV/00216224:14610/10:00050701!RIV12-MO0-14610___
n3:aktivita
n9:Z n9:P
n3:aktivity
P(OVMASUN200801), Z(MSM6383917201)
n3:dodaniDat
n7:2012
n3:domaciTvurceVysledku
n13:7316100 n13:6606288 n13:2286904
n3:druhVysledku
n11:D
n3:duvernostUdaju
n19:S
n3:entitaPredkladatele
n15:predkladatel
n3:idSjednocenehoVysledku
261207
n3:idVysledku
RIV/00216224:14610/10:00050701
n3:jazykVysledku
n12:eng
n3:klicovaSlova
COMBO; FPGA; hardware-acceleration; NIFIC; NETCONF; network monitoring
n3:klicoveSlovo
n4:hardware-acceleration n4:COMBO n4:NIFIC n4:network%20monitoring n4:NETCONF n4:FPGA
n3:kontrolniKodProRIV
[B0D573D685C0]
n3:mistoKonaniAkce
Tallinn, Estonia
n3:mistoVydani
Tallinn, Estonia
n3:nazevZdroje
IST-091 - Information Assurance and Cyber Defence
n3:obor
n10:IN
n3:pocetDomacichTvurcuVysledku
3
n3:pocetTvurcuVysledku
4
n3:projekt
n20:OVMASUN200801
n3:rokUplatneniVysledku
n7:2010
n3:tvurceVysledku
Dedek, Tomáš Krejčí, Radek Čeleda, Pavel Novotný, Jiří
n3:typAkce
n17:WRD
n3:zahajeniAkce
2010-11-22+01:00
n3:zamer
n22:MSM6383917201
s:numberOfPages
15
n8:hasPublisher
NATO Research and Technology Organization
n5:isbn
978-92-837-0115-6
n18:organizacniJednotka
14610