This HTML5 document contains 43 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n11http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n21http://localhost/temp/predkladatel/
n20http://purl.org/net/nknouf/ns/bibtex#
n14http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216305%3A26230%2F08%3APU76737%21RIV10-MSM-26230___/
n13http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n12http://linked.opendata.cz/ontology/domain/vavai/
n19https://schema.org/
n9http://linked.opendata.cz/resource/domain/vavai/zamer/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n7http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n18http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n10http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n16http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216305%3A26230%2F08%3APU76737%21RIV10-MSM-26230___
rdf:type
n12:Vysledek skos:Concept
dcterms:description
In this work we're dealing with security in highly distributed systems, namely in peer-to-peer etworks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them against real world data. This should lead to creation of models for peer-to-peer networks defense and for detection of malware spreading. Also we are proposing our system for automatic downloading and detection of new viruses in peer-to-peer networks with all possible extensions. In this work we're dealing with security in highly distributed systems, namely in peer-to-peer etworks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them against real world data. This should lead to creation of models for peer-to-peer networks defense and for detection of malware spreading. Also we are proposing our system for automatic downloading and detection of new viruses in peer-to-peer networks with all possible extensions.
dcterms:title
Peer-to-peer networks security Peer-to-peer networks security
skos:prefLabel
Peer-to-peer networks security Peer-to-peer networks security
skos:notation
RIV/00216305:26230/08:PU76737!RIV10-MSM-26230___
n3:aktivita
n10:Z
n3:aktivity
Z(MSM0021630528)
n3:dodaniDat
n16:2010
n3:domaciTvurceVysledku
n13:6897770 n13:6945090 n13:2034867
n3:druhVysledku
n17:D
n3:duvernostUdaju
n4:S
n3:entitaPredkladatele
n14:predkladatel
n3:idSjednocenehoVysledku
386179
n3:idVysledku
RIV/00216305:26230/08:PU76737
n3:jazykVysledku
n18:eng
n3:klicovaSlova
p2p, peer-to-peer, security<br>
n3:klicoveSlovo
n7:p2p n7:security%3Cbr%3E n7:peer-to-peer
n3:kontrolniKodProRIV
[625652A98EAF]
n3:mistoKonaniAkce
Bucharest
n3:mistoVydani
Bucharest
n3:nazevZdroje
The Third International Conference on Internet Monitoring and Protection
n3:obor
n8:JC
n3:pocetDomacichTvurcuVysledku
3
n3:pocetTvurcuVysledku
3
n3:rokUplatneniVysledku
n16:2008
n3:tvurceVysledku
Hanáček, Petr Malinka, Kamil Schäfer, Jiří
n3:typAkce
n11:WRD
n3:zahajeniAkce
2008-06-29+02:00
n3:zamer
n9:MSM0021630528
s:numberOfPages
6
n20:hasPublisher
IEEE Computer Society
n19:isbn
978-0-7695-3189-2
n21:organizacniJednotka
26230