[go: up one dir, main page]

Wik et al., 1999 - Google Patents

Electromagnetic terrorism and adverse effects of high power electromagnetic environments

Wik et al., 1999

Document ID
1301934249756914576
Author
Wik M
Gardner R
Radasky W
Publication year
Publication venue
13th International Zurich Symposium and Technical Exhibition on Electromagnetic Compatibility

External Links

Snippet

Electromagnetic Terrorism is defined here as the intentional malicious generation of electromagnetic energy introducing noise or signals into electric and electronic systems, thus disrupting, confusing or damaging these systems for terrorist or criminal purposes. The …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/45Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/41Jamming having variable characteristics characterized by the control of the jamming activation or deactivation time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources

Similar Documents

Publication Publication Date Title
Caplan Cyber War: the Challenge to National Security.
Sabath What can be learned from documented Intentional Electromagnetic Interference (IEMI) attacks?
Hamamah et al. Concerns on the risk of Malaysian civil and defense systems due to intentional electromagnetic interference
Wik et al. Electromagnetic terrorism and adverse effects of high power electromagnetic environments
Hunker Cyber war and cyber power. Issues for NATO doctrine
Arnesen et al. Overview of the European project ‘HIPOW’
Gardner Electromagnetic Terrorism a Real Danger
Radasky et al. Overview of the threat of intentional electromagnetic interference (IEMI)
Radasky The threat of intentional interference (IEMI) to wired and wireless systems
van de Beek et al. Current intentional EMI studies in Europe with a focus on STRUCTURES
Auddy et al. Tempest: Magnitude of threat and mitigation techniques
Punitha et al. Impact of an electromagnetic threat on cyberspace and cyber security against EM threat
Wik et al. The threat of intentional electromagnetic interference
Månsson et al. Intentional EMI against critical infrastructures, a discussion on mitigation philosophy
Bommakanti India and cyber power: the imperative of offensive cyber operations
Georgiades et al. Crisis on impact: Responding to cyber attacks on critical information infrastructures
Berger The end of the war as we know it: How an act of cyber warfare could impact the US energy grid
Wik et al. Intentional Electromagnetic Interference (EMI)-What is the Threat and What Can we do about It? Report of Working Group E2
Hoad et al. Electromagnetic (EM) threats to information security–Applicability of the EMC directive and information security guidelines
O’Connell Critical infrastructure & the emerging market for domestic terrorism
Bujek Cybersecurity as the basis for state and society security in the 21st century
Hosen et al. Evaluation of Cyber Security in Smart Grid Networks
Van Niekerk et al. Relevance of information warfare models to critical infrastructure protection
Sabath Lecture Script:" EMI Risk Management"
Dvilyanskiy et al. Evaluation of damage to objects of critical information infrastructure under the influence of destructive electromagnetic radiation based on hierarchical rank approach