This HTML5 document contains 43 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n16http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F63839172%3A_____%2F13%3A10129975%21RIV14-MSM-63839172/
n11http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n9http://linked.opendata.cz/resource/domain/vavai/projekt/
n15http://linked.opendata.cz/resource/domain/vavai/subjekt/
n14http://linked.opendata.cz/ontology/domain/vavai/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n5http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n13http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n8http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n18http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F63839172%3A_____%2F13%3A10129975%21RIV14-MSM-63839172
rdf:type
skos:Concept n14:Vysledek
dcterms:description
The paper aims at gathering information about attacks from real internet infrastructure and their analysis. The article describes each honeypot used,brings an analysis of observed malicious activity and a design of the honeypot cloud concept. The paper aims at gathering information about attacks from real internet infrastructure and their analysis. The article describes each honeypot used,brings an analysis of observed malicious activity and a design of the honeypot cloud concept.
dcterms:title
Threat Prevention and Intrusion Detection in VoIP Infrastructures Threat Prevention and Intrusion Detection in VoIP Infrastructures
skos:prefLabel
Threat Prevention and Intrusion Detection in VoIP Infrastructures Threat Prevention and Intrusion Detection in VoIP Infrastructures
skos:notation
RIV/63839172:_____/13:10129975!RIV14-MSM-63839172
n14:predkladatel
n15:ico%3A63839172
n4:aktivita
n7:P
n4:aktivity
P(LM2010005)
n4:cisloPeriodika
1
n4:dodaniDat
n18:2014
n4:domaciTvurceVysledku
n11:3174182 n11:7890230 n11:8051283
n4:druhVysledku
n8:J
n4:duvernostUdaju
n17:S
n4:entitaPredkladatele
n16:predkladatel
n4:idSjednocenehoVysledku
111018
n4:idVysledku
RIV/63839172:_____/13:10129975
n4:jazykVysledku
n13:eng
n4:klicovaSlova
VoIP honeypot; VoIP attacks; Kippo; Honeypot network; Dionaea
n4:klicoveSlovo
n5:Dionaea n5:Honeypot%20network n5:Kippo n5:VoIP%20attacks n5:VoIP%20honeypot
n4:kodStatuVydavatele
US - Spojené státy americké
n4:kontrolniKodProRIV
[C3E253AD3DE6]
n4:nazevZdroje
International Journal of Mathematics and Computers in Simulation
n4:obor
n12:IN
n4:pocetDomacichTvurcuVysledku
3
n4:pocetTvurcuVysledku
3
n4:projekt
n9:LM2010005
n4:rokUplatneniVysledku
n18:2013
n4:svazekPeriodika
7
n4:tvurceVysledku
Vozňák, Miroslav Řezáč, Filip Šafařík, Jakub
s:issn
1998-0159
s:numberOfPages
8