Národní úložiště šedé literatury Nalezeno 4 záznamů.  Hledání trvalo 0.01 vteřin. 
Wireless networks security and possible attacks on these networks
Vlček, Peter ; Vymazal, Michal (oponent) ; Vychodil, Petr (vedoucí práce)
The first of the main objectives of this work was to examine and study the different types of attacks on wireless networks. This work is focused on the most commonly occurring types of attacks such as WEP/WPA/WPA2 cracking, a Man in the Middle attack (MIM), Dictionary attacks, MAC spoofing and finally Denial of Service attacks. Description of individual attacks is also accompanied by detailed instructions on how to carry out these attacks on the Windows platform. It is described how to detect various attacks and identified. It is then implemented software that is able to identify possible risk of selected types of attacks. This software belongs to a group of wireless intrusion prevention system (WIDS). It focuses on attacks WEP/WPA/WPA2 type of cracking, Dictionary attacks and MAC spoofing. For the implementation of defense against attack by a Man in the Middle (MIM) and Denial of Service attack would need special monitoring equipment.
Methods Decoding Convolucional Code
Vlček, Peter ; Zezula, Radek (oponent) ; Křivánek, Vítězslav (vedoucí práce)
Convolutional codes belongs to among linear tree codes. There are codes used for channel coding. At build - up project, then comparison separate algorithms were gateway into the account Viterbiho algorithm, Stack algorithm, Stack- bucket algorithm, Fano algorithm and Feedback decoding. Was built-up suggestion convolutional encoder and decoder, which at his activities make use of Viterbiho algorithm and Stack algorithm, what serves for contrast of both methods. It turned out, that the Viterbiho algorithm get past in the main for codes with smaller compulsory longitude, because has stand-by cost quantity calculated effect. At Stack algorithms is quantity calculated effect dependent on longitude received sequence, what may result in much smaller number calculated effect, however at very noisy channel is able to state, that the calculated effect will much more as with Viterbiho algorithm. Nothing less is Stack algorithm or his variation Stack- bucket algorithm used primarily on codes with bigger compulsory longitude.  Feedback decoding is gainst for simple construction decoder acceptable alternative toward decoding most likely and to sequential decoding.
Methods Decoding Convolucional Code
Vlček, Peter ; Zezula, Radek (oponent) ; Křivánek, Vítězslav (vedoucí práce)
Convolutional codes belongs to among linear tree codes. There are codes used for channel coding. At build - up project, then comparison separate algorithms were gateway into the account Viterbiho algorithm, Stack algorithm, Stack- bucket algorithm, Fano algorithm and Feedback decoding. Was built-up suggestion convolutional encoder and decoder, which at his activities make use of Viterbiho algorithm and Stack algorithm, what serves for contrast of both methods. It turned out, that the Viterbiho algorithm get past in the main for codes with smaller compulsory longitude, because has stand-by cost quantity calculated effect. At Stack algorithms is quantity calculated effect dependent on longitude received sequence, what may result in much smaller number calculated effect, however at very noisy channel is able to state, that the calculated effect will much more as with Viterbiho algorithm. Nothing less is Stack algorithm or his variation Stack- bucket algorithm used primarily on codes with bigger compulsory longitude.  Feedback decoding is gainst for simple construction decoder acceptable alternative toward decoding most likely and to sequential decoding.
Wireless networks security and possible attacks on these networks
Vlček, Peter ; Vymazal, Michal (oponent) ; Vychodil, Petr (vedoucí práce)
The first of the main objectives of this work was to examine and study the different types of attacks on wireless networks. This work is focused on the most commonly occurring types of attacks such as WEP/WPA/WPA2 cracking, a Man in the Middle attack (MIM), Dictionary attacks, MAC spoofing and finally Denial of Service attacks. Description of individual attacks is also accompanied by detailed instructions on how to carry out these attacks on the Windows platform. It is described how to detect various attacks and identified. It is then implemented software that is able to identify possible risk of selected types of attacks. This software belongs to a group of wireless intrusion prevention system (WIDS). It focuses on attacks WEP/WPA/WPA2 type of cracking, Dictionary attacks and MAC spoofing. For the implementation of defense against attack by a Man in the Middle (MIM) and Denial of Service attack would need special monitoring equipment.

Viz též: podobná jména autorů
15 VLČEK, Pavel
21 VLČEK, Petr
15 Vlček, Pavel
2 Vlček, Pavol
21 Vlček, Petr
5 Vlček, Přemysl
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.