National Repository of Grey Literature 39 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Device Location in Wireless Network
Szabó, Peter ; Malinka, Kamil (referee) ; Kačic, Matej (advisor)
This thesis deals with the issue of locating devices in wireless networks. It takes existing solutions as example and extends them using additional approaches. This thesis designs and describes the implementation of a prototype of a new proprietary indoor localization system used for locating devices within a WiFi network. In the final part of the thesis the testing of this system is described and its results are analysed and compared with another localization systems based on similar technologies.
Application for Detection of Plagiarism
Kačic, Matej ; Přikryl, Zdeněk (referee) ; Lukáš, Roman (advisor)
Main goal of this thesis is to create application, which can detect plagiarism in program code of projects without skeleton. It describes constructions of C/C++ language and their usage for detection of plagiarism. Projetcs are analysed by preprocesor, lexical analyse and phase of making structure of compare. After that they are compared one to each another by statistical test and Body test depends on Longest common subsequence.
Security Metrics of SAP Platform
Třeštíková, Lenka ; Barabas, Maroš (referee) ; Kačic, Matej (advisor)
Main goal of this thesis is analyzing potential security risks of the SAP NetWeaver platform and identifying various vulnerabilities, that are results of poor system configuration, incorrect segregation of duties or insufficient patch management. Methodology for platform evaluation is defined by vulnerabilities, security requirements and controls will be created.
Tool for AutoCAD Sketches Protection
Smejkal, Adam ; Kačic, Matej (referee) ; Ovšonka, Daniel (advisor)
The main goal of this thesis is to develop a tool that helps to protect sensitive data in drawings created by AutoCAD 2016 using methods employed by information rights management systems (IRM). It studies general principles of data leak prevention, closely describes IRM systems and analyzes suitable methods to extend the functionality of AutoCAD with a goal of integrating it into an IRM system as a client application.
Wireless Intrusion Detection System Based on Data Mining
Dvorský, Radovan ; Malinka, Kamil (referee) ; Kačic, Matej (advisor)
Widespread use of wireless networks has made security a serious issue. This thesis proposes misuse based intrusion detection system for wireless networks, which applies artificial neural network to captured frames for purpose of anomalous patterns recognition. To address the problem of high positive alarm rate, this thesis presents a method of applying two artificial neural networks.
Frame Generator Based on 802.11 Standard
Švanda, Pavel ; Hanáček, Petr (referee) ; Kačic, Matej (advisor)
This thesis describes the design and implementation of the generator frames used for information transfer in wireless networks. At the beginning of the thesis there is described the introduction to the issue of data transmission in wireless networks 802.11 and the analysis of existing tools. Then it is designed language for describing the structure of their own frames and designed their own tools. The work also deals with the subsequent implementation of the resulting tool. Finally the results of the test are mentioned.
Analysis of User Behavior in the Wireless Networks
Jacko, Michal ; Homoliak, Ivan (referee) ; Kačic, Matej (advisor)
This paper deals with a problem of analysys of user behavior in the wireless networks. Paper describes design and implementation of a method, which can classify users by their behavior.
Ransomware Obfuscation Techniques
Jacko, Jerguš ; Barabas, Maroš (referee) ; Kačic, Matej (advisor)
This master's thesis seeks to design, implement, and point out new techniques for obfuscation of ransomware activity using the entropy principles of data that do not fall within the detection capabilities of known anti-ransomware and anti-virus tools. The proposed techniques are aimed at changing the ransomware activity in the downgrading phase (encryption or obfuscation) of files on the infected system.
Case Study of Selected Network Vulnerabilities
Kolajová, Jana ; Kačic, Matej (referee) ; Homoliak, Ivan (advisor)
The main goal of this thesis is to deal with databases of vulnerable code bases and vulnerable applications, and to implement a tool for autonomous search and saving data from those databases to a local one. The thesis is divided into theoretical and practical parts. The theoretical part deals with my current knowledge of the main topic and creates a foundation for the implementation. Various kinds of vulnerabilities and network attacks are described in detail in this part. The practical part describes implementation of the tool and its real use.
Analysis of wireless network attacks
Kačic, Matej ; Dočkal,, Jaroslav (referee) ; Zbořil, František (referee) ; Hanáček, Petr (advisor)
This work describes security mechanisms of wireless network based on 802.11 standard and security enhancement 802.11i of these networks known as WPA2, where the analysis of vulnerabilities and attacks on these networks were performed. The work discusses two major security issues. The first is unsecure management frames responsible for vulnerability with direct impact on availability and the other is the vulnerability that allows executing the impersonalize type of attacks. The system for generation attacks was designed to realize any attack very fast and efficient. The core of the thesis is the design of a system for attack analysis using the principle of trust and reputation computation. The conclusion of the work is devoted to experimenting with the proposed system, especially with the selection of suitable metrics for calculating the trust value.

National Repository of Grey Literature : 39 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.