Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Sanna Pasanen"'
Autor:
Anna Pulakka, Tuija Leskinen, Jaana Pentti, Jussi Vahtera, Sari Stenholm, Jaana I Halonen, Yan Kestens, Sanna Pasanen, Benoit Thierry, Ruben Brondeel
Publikováno v:
BMJ Open, Vol 11, Iss 5 (2021)
Objectives We examined sedentary time and physical activity in different contexts among ageing workers, between their workdays and days off, and recent retirees, between their weekdays and weekend days.Design Cross-sectional study.Setting Finnish Ret
Externí odkaz:
https://doaj.org/article/1242b906530a42d4a283780a2df009f5
Autor:
Ruben Brondeel, Anna Pulakka, Sanna Pasanen, Sari Stenholm, Tuija Leskinen, Yan Kestens, Benoit Thierry, Jussi Vahtera, Jaana Pentti, Jaana I. Halonen
Publikováno v:
BMJ Open, Vol 11, Iss 5 (2021)
BMJ Open
BMJ Open
ObjectivesWe examined sedentary time and physical activity in different contexts among ageing workers, between their workdays and days off, and recent retirees, between their weekdays and weekend days.DesignCross-sectional study.SettingFinnish Retire
Publikováno v:
Impact Assessment and Project Appraisal. 28:15-27
This article presents and compares findings of two EIA quality studies conducted in Finland. First a survey was targeted at competent authorities and environmental consultants to investigate their perceptions of the quality of Finnish EIAs. Second, 1
Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine ne
Publikováno v:
Bluetooth Security Attacks ISBN: 9783642406454
The basic Bluetooth security configuration is done by the user who decides how a Bluetooth device will implement its connectability and discoverability options.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::38919bc4c3e6b7f7f1b0f0fa4ff85fa6
https://doi.org/10.1007/978-3-642-40646-1_2
https://doi.org/10.1007/978-3-642-40646-1_2
Publikováno v:
SpringerBriefs in Computer Science ISBN: 9783642406454
Bluetooth Security Attacks
Bluetooth Security Attacks
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cd78d8e26bd3ced1d76d99f5ea4041c7
https://doi.org/10.1007/978-3-642-40646-1
https://doi.org/10.1007/978-3-642-40646-1
Publikováno v:
Bluetooth Security Attacks ISBN: 9783642406454
As an interconnection technology, Bluetooth has to address all the traditional security problems, well known from distributed networks [25].
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f4df07caf19b08fef2e6d855f7d5cae0
https://doi.org/10.1007/978-3-642-40646-1_4
https://doi.org/10.1007/978-3-642-40646-1_4
Publikováno v:
Bluetooth Security Attacks ISBN: 9783642406454
Overall security in Bluetooth networks is based on the security of the Bluetooth medium, the security of Bluetooth protocols, and the security parameters used in Bluetooth communication. There are several weaknesses in the Bluetooth medium, Bluetooth
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6aab22afb2ee35264fa3635bf55b560c
https://doi.org/10.1007/978-3-642-40646-1_3
https://doi.org/10.1007/978-3-642-40646-1_3
Publikováno v:
Bluetooth Security Attacks ISBN: 9783642406454
Based on our findings and practical experiments on Big NAK attacks as well as our research work on proposing an Intrusion Detection and Prevention System for Bluetooth networks (see Sect. 6.1), we propose a new attack called a Big POLL attack, which
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::77698abcf91d1ac45574883b23e0fcec
https://doi.org/10.1007/978-3-642-40646-1_7
https://doi.org/10.1007/978-3-642-40646-1_7
Publikováno v:
Bluetooth Security Attacks ISBN: 9783642406454
Our MITM attacks on SSP, BT-Nino-MITM attack [2, 20], BT-SSP-OOB-MITM attack [2, 22], BT-SSP-Printer-MITM attack [2, 21], and BT-SSP-HS/HF-MITM attack [2, 22] as well as a SSP MITM attack of Suomalainen et al. [19], are described in Sect. 5.1. Sectio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::880326d69ab50bb1316fbfba1360bcb3
https://doi.org/10.1007/978-3-642-40646-1_5
https://doi.org/10.1007/978-3-642-40646-1_5