National Repository of Grey Literature 221 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Financial Protocol Simulator
Vymlátil, Martin ; Pluskal, Jan (referee) ; Veselý, Vladimír (advisor)
This paper deals with the creation of a simulator for financial protocols ISO8583 and SPDH.The simulator was designed and implemented in C++ language based on the analysis of the financial protocols. The simulator was tested on pre-prepared authorization messages and was also tested against the real POS terminal. Possible extensions for the simulator were discussed at the end of this thesis.
VoIP in Jabber Client
Kulička, Vojtěch ; Veselý, Vladimír (referee) ; Mlích, Jozef (advisor)
Práce se zabývá možnostmi implementace VoIP do existujícího XMPP programu se sdílenou tabulí. Analyzuje možnosti využití současných technologií pro podporu VoIP.  Cílem je nahrazení stávajících komunikačních knihoven klienta za telepathy. Dále také přidání VoIP.
Webmail Traffic Reconstruction
Slivka, Miroslav ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
Webmail applications are very popular these days. Besides typical usage, thanks to ciphered communication, they can be used for malicious activity like confidential data loss. This thesis discusses webmail events detection based on common webmail signatures in captured network traffic. Also there will be discussed SSL/TLS interception and decryption for further data analysis. The modules in this thesis are designed and implemented for Netfox.Framework forensics analysis tool. The Netfox project is developed at FIT BUT under security research project SEC6NET.
Deanonymization Heuristics for Cryptocurrencies
Anton, Matyáš ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
The cryptocurrencies are growing more and more popular, both due to their independency on institutions and the feeling of anonymity they provide. This is, however, also accompanied by an increasing number of their abuse for criminal activities. This thesis explores the principles of current cryptocurrencies as well as techniques used for increasing anonymity of their usage. Based on the findings, it proposes a solution attemping to deanonymise activity in select cryptocurrencies.
Modelling and Reliability Analysis of Campus Network at the BUT
Kraus, Zdeněk ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
This thesis informs about technologies and architecture of computer network at BUT.  It describes chosen technologies and some of theirs variants.  Further, it contains simulation model design of a network switch device.  That is followed by the model implementation with detailed description of model parts. Then, the model is tested on a set of simulation scenarios and it is evaluated in comparison with theoretical basis and real devices.  In conclusion, thesis suggests future model development and improvements.
Network Forensic Analytical Web-Based Platform
Ambrož, Tomáš ; Veselý, Vladimír (referee) ; Pluskal, Jan (advisor)
At present a big part of communication passes through computer network. Amount of the communication increases every year. That is why the claims on computing power raise. The procedure of the communication processing for forensic purposes is worth paralleling to increase the computing power. Research group NES@FIT created an instrument Netfox Detective in one of its projects. From this instrument it is planned to create a distributed system for the processing of intercepted communication for the purpose of forensic analysis. Interface is one of the parts, with its help the distributed system will be operated. In my theses I will concern with the creation of the web interface for the instrument Netfox Detective which is a desktop application presently. Web interface, after little modifications, will be used for paralleled version of application. Web interface will mediate the same informations as the desktop version. To obtain information for forensic analysis it will use framework Netfox Framework identically as the desktop version. Advantage of web interface compared to the desktop version is that a user who approaches web interface will need a device with web browser. It means that a user can work with any operation system.
Metadata Analysis of Cracking Password Task
Pokorný, Šimon ; Hranický, Radek (referee) ; Veselý, Vladimír (advisor)
This thesis deals with the design and implementation of the analytical web dashboard for remote administration of the Fitcrack system. This system is used for distributed password recovery. Web administration is a single-page application which is divided into a server and client part. These parts communicate with each other. There is a lot of information across the system that logged into a database for later analysis or displayed in real-time for the user. The best form to show data is a graphical element of various types (arrow, graph, table, square) and different colors showing what is happening.
Password Recovery in Distributed Environment
Kos, Ondřej ; Veselý, Vladimír (referee) ; Hranický, Radek (advisor)
The goal of this thesis is to design and implement a framework allowing password recovery in a distributed environment. The research is therefore focused on analyzing the security of passwords, techniques used for attacks on them and also presents methods preventing attacks on passwords. Described is the Wrathion tool which is allowing password recovery using acceleration on graphic cards through the integration of OpenCL framework. Conducted is also an analysis of available environments providing means to run computing tasks on multiple devices, based on which the OpenMPI platform is chosen for extending Wrathion. Disclosed are various modifications and added components, and the entire system is also subjected to experiments aiming at the measuring of scalability and network traffic performance. The financial side of the use of Wrathion tool is also discussed in terms of its usability in cloud based distributed environment.
Identification of Useful Data for Lawful Interception
Holomek, Tomáš ; Veselý, Vladimír (referee) ; Polčák, Libor (advisor)
This thesis deals with the identification of useful data in lawful interception. First part summarizes the standards related to computer networks and lawful intercepts. Next part of the project focuses mainly on the HTTP application protocol, which is described in version 1.1. The work also specifies the classes into which the data traffic can be divided according to the importance to law enforcement agency. It introduces several methods of distribution of data streams into the proposed classes. Finally, the implementation of this methods has been tested for usability in network lines used today.
Modeling and Simulation of Spanning-Tree Protocol
Poláčeková, Simona ; Marek, Marcel (referee) ; Veselý, Vladimír (advisor)
This term project deals with the functionality of Spanning Tree protocols, especially the Rapid Spanning Tree Protocol, and the Multiple Spanning Tree Protocol. The primary usage of spanning tree protocols is the prevention of loops within the data link layer, the prevention of a broadcast storm, and also dealing with redundancy in the network. Moreover, the project contains the description of configuration of these protocols on Cisco devices. The main goal of this thesis is to implement the Multiple Spanning Tree protocol into INET framework within the OMNeT++ simulation system. Then, the implemented solution is tested and it's functionality is compared with the referential behavior in a Cisco network.

National Repository of Grey Literature : 221 records found   1 - 10nextend  jump to record:
See also: similar author names
20 VESELÝ, Vojtěch
3 Veselý, V.
1 Veselý, Viktor
2 Veselý, Vladan
2 Veselý, Vladislav
1 Veselý, Vlastimil
20 Veselý, Vojtěch
1 Veselý, Vratislav
26 Veselý, Václav
5 Veselý, Vít
2 Veselý, Vítek
2 Veselý, Vítězslav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.