. . "secure internet, remote data acquisition, data communication, LAN"@en . . "Ml\u00FDnek, Petr" . "The eventuality attacks onto LAN communication unit for remote collection of data in energetics"@en . "2"^^ . "978-80-214-3718-0" . "Neuveden" . . . . . . . . . "2008-09-08+02:00"^^ . . "P(1ET110530523), P(2E08035), Z(MSM0021630513)" . . "The eventuality attacks onto LAN communication unit for remote collection of data in energetics" . "[9D982E4B1EF7]" . "26220" . "The remote data acquisition is modern trend for metering of energy, gas, water, heating steam etc. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the meters. The data transmission over the LAN and Internet can be subject of various attacks. The understanding of attack methods is the most important for secure transfer of data and for alone unit and its settings. The protection against the hackers is not complicated, but requires a lot of attention. Component composition for attacks simulation is described in this paper. The one part is focused on scanning for hosts and ports. The other part of this article is focused on the denial of service attacks and man in the middle attacks."@en . . "The eventuality attacks onto LAN communication unit for remote collection of data in energetics"@en . . "RIV/00216305:26220/08:PU77642" . . . "RIV/00216305:26220/08:PU77642!RIV10-MSM-26220___" . . . "Mi\u0161urec, Ji\u0159\u00ED" . "The remote data acquisition is modern trend for metering of energy, gas, water, heating steam etc. The advantage of the remote data collection is possibility of frequent readings without a physical presence at the meters. The data transmission over the LAN and Internet can be subject of various attacks. The understanding of attack methods is the most important for secure transfer of data and for alone unit and its settings. The protection against the hackers is not complicated, but requires a lot of attention. Component composition for attacks simulation is described in this paper. The one part is focused on scanning for hosts and ports. The other part of this article is focused on the denial of service attacks and man in the middle attacks." . . "Proceedings of the International Conference on Teleinformatics and Elecromagnetic Field" . "Pa\u0159\u00ED\u017E" . "6"^^ . "Paris" . "2"^^ . . "366893" . "The eventuality attacks onto LAN communication unit for remote collection of data in energetics" .