This HTML5 document contains 40 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n17http://localhost/temp/predkladatel/
n9http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n14http://linked.opendata.cz/ontology/domain/vavai/
n18http://linked.opendata.cz/resource/domain/vavai/zamer/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n12http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216305%3A26230%2F09%3APU82614%21RIV10-MSM-26230___/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n15http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n13http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n5http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n6http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216305%3A26230%2F09%3APU82614%21RIV10-MSM-26230___
rdf:type
n14:Vysledek skos:Concept
dcterms:description
In this work we're dealing with security in highly distributed systems, specifically peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them with real world data. This could be useful for creating models of peer-to-peer networks' defense and malware spreading. Also we are proposing our new system for automatic downloading and detection of new viruses in peer-to-peer networks, together with all possible extensions. In this work we're dealing with security in highly distributed systems, specifically peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them with real world data. This could be useful for creating models of peer-to-peer networks' defense and malware spreading. Also we are proposing our new system for automatic downloading and detection of new viruses in peer-to-peer networks, together with all possible extensions.
dcterms:title
Peer-to-peer Networks: Security Analysis Peer-to-peer Networks: Security Analysis
skos:prefLabel
Peer-to-peer Networks: Security Analysis Peer-to-peer Networks: Security Analysis
skos:notation
RIV/00216305:26230/09:PU82614!RIV10-MSM-26230___
n4:aktivita
n13:Z
n4:aktivity
Z(MSM0021630528)
n4:cisloPeriodika
1
n4:dodaniDat
n6:2010
n4:domaciTvurceVysledku
n9:6945090 n9:2034867 n9:6897770
n4:druhVysledku
n8:J
n4:duvernostUdaju
n16:S
n4:entitaPredkladatele
n12:predkladatel
n4:idSjednocenehoVysledku
332981
n4:idVysledku
RIV/00216305:26230/09:PU82614
n4:jazykVysledku
n7:eng
n4:klicovaSlova
Peer-to-peer Networks, Security
n4:klicoveSlovo
n15:Security n15:Peer-to-peer%20Networks
n4:kodStatuVydavatele
US - Spojené státy americké
n4:kontrolniKodProRIV
[BBACC01BC2C8]
n4:nazevZdroje
International Journal On Advances in Security.
n4:obor
n5:JC
n4:pocetDomacichTvurcuVysledku
3
n4:pocetTvurcuVysledku
3
n4:rokUplatneniVysledku
n6:2009
n4:svazekPeriodika
2009
n4:tvurceVysledku
Hanáček, Petr Malinka, Kamil Schäfer, Jiří
n4:zamer
n18:MSM0021630528
s:issn
1942-2636
s:numberOfPages
9
n17:organizacniJednotka
26230