Analysis of protection technologies radio fire alarm systems against unauthorized access
نویسندگان
چکیده
منابع مشابه
A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability
Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource modifications. The protecting ARP which relies on hosts caching reply messages can be the primary method...
متن کاملA pattern language for fire alarm systems
After an object-oriented framework for micro-processor based fire alarm systems had been implemented and the first instantiated system had reached product status an effort was undertaken to clearly document the architecture embedded in the framework. The result of this effort was a small pattern language which is presented in this paper. Important patterns in this language are the Point pattern...
متن کاملSpeech Intelligibility and Fire Alarm Systems
Introduction Messages broadcast over Emergency Voice Communication Systems (EVCS) can provide information to help occupants decide what actions to take for different event scenarios, such as fires, weather events, or terrorist attacks. It is imperative, therefore, that people receive content that is comprehensible. Such understanding can be influenced by the message itself, the talker and liste...
متن کاملRemote Control and Monitoring of Fire Alarm Systems
Most of the actual fire alarm systems used in small and medium size places in the market works as a standalone systems without the possibility of remote monitoring or configuration. This article shows a new development that provided for one hand, an Alarms and Events Reception System (AERS) that provide remote monitoring of fire alarm systems status based on a LabVIEW application and an additio...
متن کاملRobust Detection of Unauthorized Wireless Access Points
Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SPIIRAS Proceedings
سال: 2016
ISSN: 2078-9599,2078-9181
DOI: 10.15622/sp.47.2