Wik et al., 1999 - Google Patents
Electromagnetic terrorism and adverse effects of high power electromagnetic environmentsWik et al., 1999
- Document ID
- 1301934249756914576
- Author
- Wik M
- Gardner R
- Radasky W
- Publication year
- Publication venue
- 13th International Zurich Symposium and Technical Exhibition on Electromagnetic Compatibility
External Links
Snippet
Electromagnetic Terrorism is defined here as the intentional malicious generation of electromagnetic energy introducing noise or signals into electric and electronic systems, thus disrupting, confusing or damaging these systems for terrorist or criminal purposes. The …
- 230000002411 adverse 0 title description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/10—Jamming or countermeasure used for a particular application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/45—Jamming having variable characteristics characterized by including monitoring of the target or target signal, e.g. in reactive jammers or follower jammers for example by means of an alternation of jamming phases and monitoring phases, called "look-through mode"
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/41—Jamming having variable characteristics characterized by the control of the jamming activation or deactivation time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Caplan | Cyber War: the Challenge to National Security. | |
| Sabath | What can be learned from documented Intentional Electromagnetic Interference (IEMI) attacks? | |
| Hamamah et al. | Concerns on the risk of Malaysian civil and defense systems due to intentional electromagnetic interference | |
| Wik et al. | Electromagnetic terrorism and adverse effects of high power electromagnetic environments | |
| Hunker | Cyber war and cyber power. Issues for NATO doctrine | |
| Arnesen et al. | Overview of the European project ‘HIPOW’ | |
| Gardner | Electromagnetic Terrorism a Real Danger | |
| Radasky et al. | Overview of the threat of intentional electromagnetic interference (IEMI) | |
| Radasky | The threat of intentional interference (IEMI) to wired and wireless systems | |
| van de Beek et al. | Current intentional EMI studies in Europe with a focus on STRUCTURES | |
| Auddy et al. | Tempest: Magnitude of threat and mitigation techniques | |
| Punitha et al. | Impact of an electromagnetic threat on cyberspace and cyber security against EM threat | |
| Wik et al. | The threat of intentional electromagnetic interference | |
| Månsson et al. | Intentional EMI against critical infrastructures, a discussion on mitigation philosophy | |
| Bommakanti | India and cyber power: the imperative of offensive cyber operations | |
| Georgiades et al. | Crisis on impact: Responding to cyber attacks on critical information infrastructures | |
| Berger | The end of the war as we know it: How an act of cyber warfare could impact the US energy grid | |
| Wik et al. | Intentional Electromagnetic Interference (EMI)-What is the Threat and What Can we do about It? Report of Working Group E2 | |
| Hoad et al. | Electromagnetic (EM) threats to information security–Applicability of the EMC directive and information security guidelines | |
| O’Connell | Critical infrastructure & the emerging market for domestic terrorism | |
| Bujek | Cybersecurity as the basis for state and society security in the 21st century | |
| Hosen et al. | Evaluation of Cyber Security in Smart Grid Networks | |
| Van Niekerk et al. | Relevance of information warfare models to critical infrastructure protection | |
| Sabath | Lecture Script:" EMI Risk Management" | |
| Dvilyanskiy et al. | Evaluation of damage to objects of critical information infrastructure under the influence of destructive electromagnetic radiation based on hierarchical rank approach |