National Repository of Grey Literature 65 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Coding Conventions Management System
Orlíček, Michal ; Koutenský, Michal (referee) ; Pluskal, Jan (advisor)
The goal of this thesis is to design and implement coding conventions management system for project. Prior to the creation of the system itself, the research of coding conventions benefits, the analysis of used technologies in open source projects at GitHub service, and the analysis of existing technologies managing coding conventions was done. On the basis of that, usage scenarios were designed, requirements were specified and system architecture was determined. Then the system was implemented as web application based on Blazor and EditorConfig technologies. The main aim was to create a system that would allow to store all types of programming conventions and at the same time allows users to automatically control and generate them. It is published under an open source license within the GitHub service and deployed on the Azure cloud platform.
Room Occupancy Detection with IoT Sensors
Kolarčík, Tomáš ; Jeřábek, Kamil (referee) ; Pluskal, Jan (advisor)
The aim of this work was to create a module for home automation tools Home Assistant. The module is able to determine  which room is inhabited and estimate more accurate position of people inside the room. Known GPS location cannot be used for this purpose because it is inaccurate inside buildings and therefore one of the indoor location techniques needs to be used. Solution based on Bluetooth Low Energy wireless technology was chosen. The localization technique is the fingerprinting method, which is based on estimating the position according to the signal strength at any point in space, which are compared with a database of these points using machine learning. The system can be supplemented with motion sensors that ensure a quick response when entering the room. This system can be deployed within a house, apartment or small to medium-sized company to determine the position of people in the building and can serve as a very powerful element of home automation.  
Bulk Operation Orchestration in Multirepo CI/CD Environments
Víšek, Jakub ; Pluskal, Jan (referee) ; Koutenský, Michal (advisor)
Multirepo model přístupu ke správě a verzování zdrojového kódu, jež zahrnuje použití mnoha oddělených repozitářů verzovacích systémů, je poslední dobou často zmiňován v odborné literatuře. Jednou z jeho nevýhod je množství zdlouhavých, nezajímavých a repetitivních úkonů, které je nutno provádět při hromadných operacích tvořících transakce napříč těmito repozitáři. Multirepo repozitáře navíc umožňují využití široké škály technologií, což jen umocňuje riziko lidské chyby, ke které při ručně prováděných hromadných operacích může dojít. V rámci této práce je navrženo, implementováno a otestováno řešení pro automatizaci operací prováděných napříč množstvím repozitářů uspořádaných v multirepo modelu, což s nimi uživatelům zlepšuje zkušenost.
WiFi Attacks Using ESP32/8266
Stehlík, Richard ; Zobal, Lukáš (referee) ; Pluskal, Jan (advisor)
The goal of this thesis is an exploration of the possibilities of Espressif's ESP32 chips in combination with Espressif IoT Development Framework with intention of implementing well-known Wi-Fi attacks on this platform. In this work, multiple implementation proposals were done for deauthentication attack in two variants followed by WPA/WPA2 handshake capture, attack on PMKID, creation of rogue MitM access point, or brute-force attack on WPS PIN, and more. A universal penetration tool ESP32 Wi-Fi Penetration Tool was proposed and implemented, including deauthentication attacks with WPA/WPA2 handshake capture. This tool provides an easy way to configure and run malicious Wi-Fi attacks without any domain knowledge required from the user. The outcome of this work opens new attack vectors for the attacker, thanks to cheap, ultra-low powered, and lightweight ESP32 chips.
Network Forensics Tools Survey and Taxonomy
Zembjaková, Martina ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
Táto diplomová práca sa zaoberá prieskumom a taxonómiou sieťových forenzných nástrojov. Popisuje základné informácie o sieťovej forenznej analýze, vrátane procesných modelov, techník a zdrojov dát používaných pri forenznej analýze. Ďalej práca obsahuje prieskum existujúcich taxonómií sieťových forenzných nástrojov vrátane ich porovnania, na ktorý naväzuje prieskum sieťových forenzných nástrojov. Diskutované sieťové nástroje obsahujú okrem nástrojov spomenutých v prieskume taxonómií aj niektoré ďalšie sieťové nástroje. Následne sú v práci detailne popísané a porovnané datasety, ktoré sú podkladom pre analýzu jednotlivými sieťovými nástrojmi. Podľa získaných informácií z vykonaných prieskumov sú navrhnuté časté prípady použitia a nástroje sú demonštrované v rámci popisu jednotlivých prípadov použitia. Na demonštrovanie nástrojov sú okrem verejne dostupných datasetov použité aj novo vytvorené datasety, ktoré sú detailne popísane vo vlastnej kapitole. Na základe získaných informácií je navrhnutá nová taxonómia, ktorá je založená na prípadoch použitia nástrojov na rozdiel od ostatných taxonómií založených na NFAT a NSM nástrojoch, uživateľskom rozhraní, zachytávaní dát, analýze, či type forenznej analýzy.
Migration and Refactorization of Netfox Detective for .NET 5
Pokorný, Šimon ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
Every second, there are many attempts to attack various entities on the Internet. This is why high-quality, fast, and up-to-date tools are needed to easily analyze network traffic. Netfox Detective is one of such tools. Specifically, it is used for forensic analysis of network communication. The aim of this work is to migrate Netfox Detective to the newest version of .NET platform (.NET 5), including refactoring with respect to user experience and correct use of software design patterns. This thesis deals not only with the migration itself, but is listing common mistakes programmers make along with possible solutions to these mistakes. The chapters contain a detailed decision log that can help guide other developers to better solutions. Furthermore, the work deals with analysis and creation of unit tests and with correct use of tools for CI/CD. Fully migrated project is not the only output of this thesis. A development environment for the project has been prepared in GitLab and it is ready to be used.
RQA System Anomaly Detection
Lorenc, Jan ; Jeřábek, Kamil (referee) ; Pluskal, Jan (advisor)
The aim of the theses is to design and implement a machine learning model for anomaly detection in Y Soft's RQA system. Owing to the microservice architecture, an anomaly is considered to be a recurring occurrence of outliers in durations of service requests or a considerable variance in error rate. The thesis outlines the current data collection process in the system and defines what kind of data describe the state of the system. It devises a suitable format of data storage for its subsequent analysis. It presents algorithms commonly used to solve anomaly detection problems. The anomaly detection is designed and implemented using cluster analysis and statistical methods. Finally, the thesis evaluates the quality of the detection and the achieved results.
Generating Blazor Components from C# Classes
Špavor, Dávid ; Koutenský, Michal (referee) ; Pluskal, Jan (advisor)
This thesis focuses on the possibility of automatic generation of views in dynamic web applications using Blazor technology. The task is to analyze parts of the user interface of web applications, Blazor technology and select such views that could be automatically generated, thus simplifying and streamlining development. For this task, I designed and implemented a framework that contains components that support the generation of views based on context in the form of a model of data contained in the C# class. These components support parameters that can be used to customize views directly within the code. The result of the work are implemented two extensive C# libraries, which are available online as an open-source project and also as packages for the possibility of integrating into existing Blazor applications.
Automatic Honeypots Deployment and Data Gathering
Ďuriš, Tomáš ; Pluskal, Jan (referee) ; Zobal, Lukáš (advisor)
This work deals with honeypots deployment automation, data collection from honeypots and the deployment of a monitoring system with alerts. The aim was to study the issue of honeypots, choose tools for their deployment, maintenance and collection of provided data together with creation of automatic deployment system for multiple types of honeypots. The first part of the work is devoted to the theory of honeypots, their distribution and type. Furthermore, the work mentions the comparison of individual configuration tools. The practical part is devoted to the use of a selected configuration tool Ansible in cooperation with existing open-source applications to build a fully automated system for the deployment and monitoring of honeypots, collection of provided data and their visualization. Puppet
A Gateway for Xiaomi Aqara Devices
Urbánek, Petr ; Koutenský, Michal (referee) ; Pluskal, Jan (advisor)
This paper deals with creating gateway for smart devices of brand Aqara.    There is discussed ecosystem of Aqara devices, which are used for testing and reverse-engineering of communication.    The Gateway is implemented on platform ESP32, which is using cc2530 system-on-chip.   Newly made gateway makes a bridge between ZigBee and MQTT protocol, which provides connectivity betweeen sensors and actors from Aqara and Home Assistant. Thanks to the Home Assistant are all data about home safe and creating new home automatizations is a lot easier.

National Repository of Grey Literature : 65 records found   1 - 10nextend  jump to record:
See also: similar author names
2 Pluskal, Jaroslav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.