National Repository of Grey Literature 77 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Organization protection against malware design
Vykydal, Tomáš ; Vykydal, Miloslav (referee) ; Ondrák, Viktor (advisor)
The object of this bachelor work is to design a solution for places, where any imperfection were found.in an analysis of the current state of malware protection in a monitored company. solutions are designed for individual places, where any Result of this work is a design, which significantly increases the level of protection against malware and a description of the current situation in the problematics of malware and protection against it.
E-commerce and its Marketing
Musilová, Veronika ; Dvořák,, Jiří (referee) ; Dvořák, Jiří (advisor)
I will attend to creation suitable model of e-marketing for e-shop with flowers in my diploma work. The aim will by join the possible instruments of online marketing in order that the company can succesfully work on the Internet. and ensure the betterposition before the competition. I will focus on e-marketing and its individua instruments. I will make some analysis of the company, by virtue of I will propose what kind of e-marketing can company use. Last but not least I will attend to the aims, which company should achieve and own potential which should valorize.
Model e-advertising Segment of the Selected e-commerce
Smrž, Marek ; Kovář, Libor (referee) ; Dvořák, Jiří (advisor)
Master’s thesis describes plus evaluates small firm that the deal with production plus sale ceramic performances. Work is divided on several part, in which survey especially on analysis e - commerce that the firm employs plus on his inadequacies, largely in the area e- advertising. Feature plus scope of employment is suggest mock - up e- advertising, that shall in connection with his costs viable.
Machine Learning Text Classifier for Short Texts Category Prediction
Drápela, Karel ; Křena, Bohuslav (referee) ; Šimková, Hana (advisor)
This thesis deals with categorization of short spam texts from SMS messages. First part summarizes current methods for text classification and~it's followed by description of several commonly used classifiers. In following chapters test data analysis, program implementation and results are described. The program is able to predict text categories based on predefined set of classes and also estimate classification accuracy on training data. For the two category types, that I designed, classifier reached accuracy of 82% and 92% . Both preprocessing and feature selection had a positive impact on resulting accuracy. It is possible to improve this accuracy further by removing portion of samples, which are difficult to classify. With 80\% recall it is possible to increase accuracy by 8-10%.
Typology of spam email written in Czech language
Vejda, Prokop ; Mňuková, Dominika (advisor) ; Podzimek, Jan (referee)
The presented thesis proposes a new typology system for Czech-language email spam. Its categorization is based primarily on the persuasive method used. Particular factors relevant for the classification are derived from subsurface observations via the method of semiotic analysis. The multi-layered typology differentiates between spam sales and imitation spam, between identity-imitating and situation-imitating spam. Another layer of categorization identifies the area of incentive for the desired action. The areas are finance, health, sexuality, and consumption. Ideological spam is recognized as a separate category. The typology derives validity from its application to a sample of Czech spam emails originating between January and April 2023. The method used is quantitative content analysis, which allowed the observed characteristics to be presented in a statistical context. Furthermore, it made it possible to elementarily map the nature of spam appearing in the email inboxes of Czech-speaking recipients at the beginning of 2023. The research is based upon a survey of existing typological systems and cases of the application of semiotic analysis to email spam. Theoretical research pillars are the concepts of the social role, speech acts, mythology, and uncertainty of meanings in communication. The...
A proposal of a method to detect spam from information messages
Rickwood, M. ; Oujezský, V.
This paper presents a spam detection algorithm that uses solely traffic flow logs in the form of Netflow messages. Internet service providers must detect spam in order for their entire subnets not to be marked as spamming stations. The algorithm was drafted based on an analysis of various datasets containing Netflow records. These datasets consist of valid e-mails, spam and common non e-mail related traffic. The algorithm uses domain name system blacklist verification as the first step of identifying a spamming station. Furthermore, theoretical models of valid clients and spammers have been laid out. In continuation of this work, the dataset will be studied to find correlation with the models. Included in the tracked parameters one can find the number of incoming and outcoming messages, timestamps amongst others.
Antispam software plugin for e-mail filtering based on geolocation of the sender
Kovařík, Martin ; Komosný, Dan (referee) ; Caha, Tomáš (advisor)
This thesis deals with the creation of a module for antispam software providing email filtering using sender geolocation. The theoretical part of the thesis describes spam in general and the threats that spread through email communication, such as social engineering and malware. Then the principle of email and email headers, email filters and their methods to filter messages are described and lastly IP geolocation and machine location methods are described.The created filtering module Geolock was designed for the SpamAssassin antispam software and uses the IP2Location geolocation database. The embedding of the module into SpamAssassin is shown and the module itself and its different parts are described. The module is tested on a dataset and a real-life application is outlined. The Geolock module is published on GitHub under the MIT license (https://github.com/MartinKovarik/Geolock).
Unsolicited advertising in Czech and German law
Vacková, Linda ; Patěk, Daniel (advisor) ; Horáček, Vít (referee)
Unsolicited advertising in Czech and German law This thesis, entitled "Unsolicited advertising in Czech and German law", comprehensively analyses the issue of unsolicited advertising in the legal system of the Czech Republic and the Federal Republic of Germany. Unsolicited advertising represents a certain interference with the personal or commercial sphere of its addressee or third parties, and in the context of the development of modern means of communication appears increasingly and in various forms. Even though advertising in general is a reflection of freedom to conduct a business and freedom of expression, its legal regulation is needed, especially in case advertisement is undesired and harassing. The text of this thesis is systematically divided into four consecutive parts. The first part constitutes an initial reflection on the need and reason for a legal regulation of unsolicited advertising. The second part is divided into four chapters and provides the basis for regulation of unsolicited advertising and an outline of its current form. The first chapter deals with the historical background of regulation of unsolicited advertising. The second chapter places unsolicited advertising into a wider legal framework of constitutional law. In the following third chapter the issue of unsolicited...
Recegnition of Repeating SMS Patterns
Kočalka, Jakub ; Češka, Milan (referee) ; Holík, Lukáš (advisor)
Vďaka pokroku v rozpoznávaní spamu v e-mailoch a zvyšovaní povedomia používateľov smerujú spameri k menej preskúmaným médiám. Jedným z nich je \emph{short messaging service} (SMS). Táto služba poskytuje užívateľom možnosť reagovať na správy v krátkom čase a v skoro ľubovolnom prostredí. Tieto vlastnosti sú atraktívne aj pre legitímne podniky, ktoré potrebujú svojim klinetom zasielať krátke hromadné správy. Aj keď sú tieto správy z pohladu koncového užívateľa vyžiadané, pre poskytovateľa služieb SMS môžu predstavovať stratu, pretože tieto podniky často zneužívajú neobmedzené SMS plány určené pre bežných zákazníkov, aby sa vyhli plateniu za pre nich určené, ale drahšie produkty. Je preto žiaduce vedieť rozpoznať nevyžiadané aj vyžiadané hromadné správy. Hromadné správy sa zvyčajne generujú zo šablóny. Cieľom tejto práce je navrhnúť zhlukovací algoritmus ktorý správy analyzuje ako sekvencie lexikálnych jednotiek (slov), a vyhodnotiť jeho efektivitu v porovnaní s \emph{locality sensitivity hashing} metódou ktorá správy analyzuje ako reťazce symbolov. Práca vyhodnocuje vhodnosť algoritmu Smith-Waterman pre túto úlohu. Práca popisuje, prečo je Smith-Waterman (a ďalšie lokálne zarovnávania) nevhodný, a ako je možné ho nahradiť algoritmom Needleman-Wunsch (globálnym zarovnávaním), aby sa dosiahli oveľa lepšie výsledky. Výsledný algoritmus dokáže uspokojivo zhlukovať skutočné správy do kampaní a funguje dobre aj v situáciách, kde \emph{locality sensitivity hashing} kampane fragmentuje.

National Repository of Grey Literature : 77 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.