Analysis of protection technologies radio fire alarm systems against unauthorized access

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability

Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource modifications. The protecting ARP which relies on hosts caching reply messages can be the primary method...

متن کامل

A pattern language for fire alarm systems

After an object-oriented framework for micro-processor based fire alarm systems had been implemented and the first instantiated system had reached product status an effort was undertaken to clearly document the architecture embedded in the framework. The result of this effort was a small pattern language which is presented in this paper. Important patterns in this language are the Point pattern...

متن کامل

Speech Intelligibility and Fire Alarm Systems

Introduction Messages broadcast over Emergency Voice Communication Systems (EVCS) can provide information to help occupants decide what actions to take for different event scenarios, such as fires, weather events, or terrorist attacks. It is imperative, therefore, that people receive content that is comprehensible. Such understanding can be influenced by the message itself, the talker and liste...

متن کامل

Remote Control and Monitoring of Fire Alarm Systems

Most of the actual fire alarm systems used in small and medium size places in the market works as a standalone systems without the possibility of remote monitoring or configuration. This article shows a new development that provided for one hand, an Alarms and Events Reception System (AERS) that provide remote monitoring of fire alarm systems status based on a LabVIEW application and an additio...

متن کامل

Robust Detection of Unauthorized Wireless Access Points

Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SPIIRAS Proceedings

سال: 2016

ISSN: 2078-9599,2078-9181

DOI: 10.15622/sp.47.2