首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 77 毫秒
1.
纪亮 《法人》2006,(8):68-68
VoIP又称IP电话或IP网络电话,是Voice over IP的缩写,即基于IP的语音服务。VoIP网络电话是通过对语音信号进行编码数字化、压缩处理成压缩帧,然后转换为IP数据包在IP网络上进行传输,从而达到在IP网络上进行语音通信的目的。  相似文献   

2.
数字微波中继一体机,即是数字微波中继一体机在网络连接中起到中继的作用,能实现信号的中继和放大,从而延伸无线网络的覆盖范围。无线分布式系统(WDS)的无线中继模式,就是在WDS上可以让无线AP之间通过无线信号进行桥接中继,在这同时并不影响其无线AP覆盖的功能,提供了全新的无线组网模式。无线中继技术就是利用AP的无线接力功能,将无线信号从一个中继点接力传递到下一  相似文献   

3.
深圳爱意无线科技有限公司创立于1999年,是中国安防领域最早致力于无线音视频传输监控技术开发及应用的专业制造商之一。企业主要以无线传输技术为核心,并依托图象处理技术和智能控制技术,专注于监控技术在民用,商用,警用领域的应用和拓展,业务已形成了涵盖无线监控产品,网络监控产品以及警用监控产品三大类专业产品体系。爱意无线(AEE Wireless)座落于深圳西丽阳光工业区爱意无线  相似文献   

4.
无线报警系统主要由无线报警主机、无线遥控器、无线探测器等组成,随着无线报警技术的不断提升,特别是在家居报警市场和联网报警运营市场的占有率越来越高,无线安防产品因其无需布线,安装方便简捷,深得用户喜爱。本文将以迪卫智能系统有限公司代理的VISONIC系列无线报警产品(PowerG技术)为例,对无线系统在民用家居市场的应用做一些分析对于民用市场而言,无线报警产品的稳定性,便捷性,以及可靠性都是用户需要首先考虑的内容。  相似文献   

5.
何遥 《刑警与科技》2014,(16):110-112
随着无线技术应用的兴起,WiFi、3G、微波等无线传输技术已较成功地应用于无线安防各领域当中,弥补了传统有线部署的缺点。特别是去年年底4G牌照的发放,为无线高清视频监控的发展带来更大的机遇。  相似文献   

6.
由于现在局域网建网的地域越来越复杂,很多地方应用了无线技术来建设局域网,但是由于无线网络应用电磁波作为传输媒介,因此安全问题就显得尤为突出。本文通过对危害无线局域网的一些因素的叙述,提出了应对的安全措施,以保证无线局域网能够安全,正常的运行。  相似文献   

7.
何遥 《刑警与科技》2014,(12):90-96
随着无线技术应用的普及,WiFi、3G、微波等无线传输技术已较成功地应用于视频监控各领域当中,弥补了传统有线部署的缺点。无线技术开辟了视频监控系统的新亮点。在无线安防兴起的过程中,如何构建安全的无线安防系统成为必须面对的问题。本期栏目邀请了几位资深专业人士,共同探讨无线安防系统的应用特点及安全构建。  相似文献   

8.
技术     
《刑警与科技》2013,(Z2):24+26
CEM推出具有革新意义的emeraldTM智能访问终端【本刊讯】日前,泰科安防设备(Tyco Security Products)旗下的CEMSystems今天宣布发布emeraldTM,该产品是业界功能最齐全的智能访问终端。emeraldTM将IP读卡器和控制器合为一体,采用内置网络电话(VoIP)对讲系统和一系列远程应用程序,是一款多位一体的强大集成设备。  相似文献   

9.
技术     
《刑警与科技》2013,(Z2):24-24
<正>CEM推出具有革新意义的emeraldTM智能访问终端【本刊讯】日前,泰科安防设备(Tyco Security Products)旗下的CEMSystems今天宣布发布emeraldTM,该产品是业界功能最齐全的智能访问终端。emeraldTM将IP读卡器和控制器合为一体,采用内置网络电话(VoIP)对讲系统和一系列远程应用程序,是一款多位一体的强大集成设备。  相似文献   

10.
无线移动通讯网络的发展,为各种智能设备的远程无线通讯提供了新的手段,也成为了嵌入式系统应用的一个重要领域。无线移动视频监控系统是将监控前端设备的音视频数据通过无线移动通讯网络传送到监控中心,从而实现实时的远程图像传送和移动监控的目的。本文论述一般车载式无线移动视频监控系统的组成、原理,公共安全突发事件无线移动智能视频监控车应具备的智能化功能及其实现方案,以及这种监控车的应用范围。  相似文献   

11.
This paper discusses the use of communication technology to commit crimes, including crime facts and crime techniques. The analysis focuses on the security of voice over Internet protocol (VoIP), a prevention method against VoIP call attack and the attention points for setting up an Internet phone. The importance of digital evidence and digital forensics are emphasised. This paper provides the VoIP digital evidence forensics standard operating procedures (DEFSOP) to help police organisations and establishes an experimental platform to simulate phone calls, hacker attacks and forensic data. Finally, this paper provides a general discussion of a digital evidence strategy that includes VoIP for crime investigators who are interested in digital evidence forensics.  相似文献   

12.
分析了目前无线局域网主要使用的基本安全机制的主要技术特点和缺点,介绍了最新发展的无线局域网安全机制,展望了无限局域网安全的发展方向。  相似文献   

13.
Cardiac Implantable Medical devices (IMD) are increasingly being used by patients to benefit from their therapeutic and life-saving functions. These medical devices are surgically implanted into patient's bodies and wirelessly configured by prescribing physicians and healthcare professionals using external programmers. However, these devices are threatened by a set of lethal attacks, due to the use of vulnerable wireless communication and security protocols, and the lack of security protection mechanisms deployed on IMDs.In this paper, we propose a digital investigation system for the postmortem analysis of lethal attack scenarios on cardiac IMDs. After developing a set of techniques allowing the secure storage of digital evidence logs which track the executed sensitive events, we implement an in-depth security solution allowing the protection of cardiac IMDs. An inference system integrating a library of medical rules is proposed to automatically infer potential medical scenarios that caused the patient's death, or that created heart-related emergency situations (through the occurrence of ventricular tachycardia for example). A Model Checking based formal technique to reconstruct potential technical attack scenarios on a cardiac IMD, starting from the collected evidence, is also proposed. The results obtained by the two proposed reasoning techniques (i.e., the inference system and the Model Checking based algorithm) are correlated to prove whether a potential attack scenario is responsible of the occurrence of heart-related emergency situations or the death of a patient. Based on the proposed techniques, we design a decision-support system that reconciles in the same framework the medical and technical investigation aspects.  相似文献   

14.
Due to the popularity of Android devices and applications (apps), Android forensics is one of the most studied topics within mobile forensics. Communication apps, such as instant messaging and Voice over IP (VoIP), are one popular app category used by mobile device users, including criminals. Therefore, a taxonomy outlining artifacts of forensic interest involving the use of Android communication apps will facilitate the timely collection and analysis of evidentiary materials from such apps. In this paper, 30 popular Android communication apps were examined, where a logical extraction of the Android phone images was collected using XRY, a widely used mobile forensic tool. Various information of forensic interest, such as contact lists and chronology of messages, was recovered. Based on the findings, a two‐dimensional taxonomy of the forensic artifacts of the communication apps is proposed, with the app categories in one dimension and the classes of artifacts in the other dimension. Finally, the artifacts identified in the study of the 30 communication apps are summarized using the taxonomy. It is expected that the proposed taxonomy and the forensic findings in this paper will assist forensic investigations involving Android communication apps.  相似文献   

15.
The premise of discourse theory in environmental policy is that realities are shaped by language. One discourse that is gaining popularity is the concept of environmental security, a discourse that presupposes environmental threats as urgent. The attempt to cast environmental issues as security issues has resulted in the common use of security jargon, idioms, and metaphors in policymakers’ and politicians’ statements. Various analyses attempt to identify why natural resources are discussed in terms and language of security. However, far fewer studies have attempted to identify differences in the manner in which different types of resources are incorporated into such a discourse by different actors and what variables contribute to this process. This study examines the construction of the security references, security arguments, and language in the statements of the Commission on Sustainable Development dealing with energy and water. We found that international organizations and Non-governmental Organizations were somewhat more likely than state actors to use security references to discuss sustainability issues. The issues securitized are not the traditional high political ones such as regime stability and conflicts, but rather issues more associated with human security, such as access to renewable energy, affordable food, and clean water. The fact that in many statements examined the use of security references was not associated with any existential threat and hence did not comply with the conditions of the Copenhagen School raises some doubts as to whether security language in these statements implies a true securitization move. We also examined whether the use of the term “security” by states was correlated with greater resource scarcity or vulnerability. In the case of water-related sessions, the evidence was mixed, depending on the choice of dependent variable. The results from energy security regressions, however, were inconsistent with the hypothesis that greater scarcity or vulnerability induces more use of security language.  相似文献   

16.
This paper examines security networks in a context where security is increasingly regarded as a problem of intelligence. Data are derived from interviews with officers in criminal intelligence units in Ontario, Canada. A conceptual framework is developed to understand the limits of security intelligence within an emerging security network paradigm, focussing on the normative dimensions governing security networking, and the mechanisms and technologies limiting information deployment among public security agencies. Despite efforts to address security through the sharing of actionable information, security intelligence maintains an exclusive value. Technologies of control promoting this exclusivity also function to prevent intelligence from becoming common knowledge. Because of its limited value, intelligence is ill-suited for export into security governance writ large.  相似文献   

17.
This paper presents work conducted as part the ‘Shades of Grey’ (EP/H02302X/1) research project that aims to develop scientific interventions for the detection of suspicious behaviors in public spaces. To provide an understanding of security and counter-terrorism work in different contexts the project adopted a human factors approach as part of a program of user requirements gathering exercises. These activities focussed on the needs of different end-users and stakeholders, ranging from frontline security personnel, managers and strategic security policy makers. By taking a user-centred approach, the discipline of human factors can be integrated into the security/counter-terrorism domain to support the design of practical security solutions. This paper presents a case study investigation using data collected from three security agencies. Common themes are explored, ranging from ‘the importance of temporal measures’ to ‘enhancing positive user experiences’. These factors are discussed in relation to the practical application of human factors methods within security research.  相似文献   

18.
Today, passengers at every major Western airport are subjected to heightened levels of security screening that not only are inconvenient, but also raise important questions about the treatment of members of specific groups that are seen as presenting special security risks. Our study examines the importance of ethnic identity in explaining perceptions of legitimacy in airport screening among a random sample of Jewish and Arab passengers in Israel. The main hypothesis of our study is that ethnicity will play a major role in predicting passengers’ attitudes toward the airport security process. In fact, our survey shows that Israeli Arab passengers are, on average, significantly more negative regarding the legitimacy of security checks than Israeli Jewish passengers are. However, using a multivariate model, we find that ethnicity (Arab versus Jew) disappears as a significant predictor of legitimacy when we included factors of procedural justice and controlled for specific characteristics of the security process. The results of our research indicate that differences in legitimacy perceptions are by and large the result of the processes used in airport screening and not a direct result of ethnic identity. In concluding, we argue that profiling strategies aimed at preventing terrorism, which often include embarrassing public procedures, may actually jeopardize passengers’ trust in airport security. Such security is dependent on the cooperation of citizens, and heightened security procedures focused on particular groups may compromise legitimacy evaluations and thus the cooperation of the public.  相似文献   

19.
在欧美国家的高校安保制度当中,以美国、英国、加拿大、瑞典最具代表性。英国的高校安保制度主要由驻校警察模式、法令特别授权警察模式和安保外包模式这几种类型构成;美国则是典型的校园警察模式为主导;加拿大的高校安保系统采用校园社区警务模式;而瑞典的高校安保模式则呈现出"行政化"和"社会化"的特征。在亚洲邻国的高校安保制度当中,以日本、新加坡最具代表性。这当中,日本以"青少年警察"的安保模式为主,而新加坡的高校的安保主要由安全、健康和环境办公室和校园保卫办公室以及外包保安公司三者构成。借鉴国外高等教育发达国家的高校安保制度对我国新时期的高校安保制度意义重大。  相似文献   

20.
In response to continued concerns over crime and violence, schools are increasingly employing visible security measures such as cameras, metal detectors, and security personnel. These security measures are not mutually exclusive, but few studies have considered the relationship between the use of multiple forms of security and youth’s exposure to drugs, fighting, property crime, and firearms at school. To address this issue, we analyzed nationally representative school administrator-reported data from the School Survey on Crime & Safety, using a quasi-experimental design with propensity scores to adjust for potential confounding factors. The results indicated that utilization of multiple security measures reduced the likelihood of exposure to property crime in high schools, but most other security utilization patterns were associated with poorer school safety outcomes. Our findings provide guidance to policymakers in considering whether to use – or expand – visible school security measures in schools.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号