National Repository of Grey Literature 49 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Malicious Tor Exit Node Detection
Firc, Anton ; Zobal, Lukáš (referee) ; Polčák, Libor (advisor)
The main goal of this bachelor's thesis is to study and implement detection for malicious Tor exit nodes. This work contains information about existing solutions for detecting malicious exit nodes and techniques used for Tor malicious exit nodes detection. This work also discusses design of system for detecting malicious Tor exit nodes tampering with encrypted HTTPS communication when accessing any of the worldwide most visited websites. It describes the process of implementation and testing of designed detection tool. It also deals with detection of malicious exit nodes using implemented tool and describes incident which led to the detection and reporting of a malicious exit node.
Detection of Weapons in 2D Image
Demčák, Ján ; Spurný, Martin (referee) ; Drahanský, Martin (advisor)
This bachelor thesis deals with detection of weapons in 2D image. In the theoretical part of the thesis the term weapon was defined and the possibilities of detection of weapons in image with using classic methods and deep neural networks were mentioned there. The key steps of image processing, objects classification and detection were described. The overview of frameworks, libraries was presented. To implement the pratical part of the thesis, 3 models were chosen. The first classic model with using HOG transformation. The second CNN model with priority target detection accuracy and with two different neural network architectures as classifiers. The third model with YOLO network architecture had as priority target real-time detection. The essential part of each model was choice, or more precisely creating suitable dataset. What followed was the construction and implementation of models and the evaluation of obtained data.
Typing of bacterial populations based on methylation site detection
Hlavatá, Kristína ; Sedlář, Karel (referee) ; Škutková, Helena (advisor)
Táto bakalárska práca sa zameriava na detekciu metylácií DNA a vývoj metodiky typizácie bakteriálnych kmeňov. DNA metylácie hrajú kľúčovú úlohu ako regulačný mechanizmus v genóme, ktorý ovplyvňuje konečné vlastnosti organizmov. Použili sme DeepSignal2 na detekciu metylačných vzorov v 10 kmeňoch Klebsielly pneumoniae. Okrem toho sme navrhli metódu typizácie na základe identifikovaných metylácií pre kategorizáciu bakteriálnych kmeňov. Táto práca prispieva k zlepšeniu našeho chápania regulačných mechanizmov v bakteriálnych genómoch a predstavuje nový prístup k typizácii kmeňov pomocou vzorov metylácie DNA. Poskytuje cenné poznatky o charakterizácii a klasifikácii bakteriálnych kmeňov na základe ich metylómov.
Typing of bacterial populations based on methylation site detection
Hlavatá, Kristína ; Sedlář, Karel (referee) ; Škutková, Helena (advisor)
Táto bakalárska práca sa zameriava na detekciu metylácií DNA a vývoj metodiky typizácie bakteriálnych kmeňov. DNA metylácie hrajú kľúčovú úlohu ako regulačný mechanizmus v genóme, ktorý ovplyvňuje konečné vlastnosti organizmov. Použili sme DeepSignal2 na detekciu metylačných vzorov v 10 kmeňoch Klebsielly pneumoniae. Okrem toho sme navrhli metódu typizácie na základe identifikovaných metylácií pre kategorizáciu bakteriálnych kmeňov. Táto práca prispieva k zlepšeniu našeho chápania regulačných mechanizmov v bakteriálnych genómoch a predstavuje nový prístup k typizácii kmeňov pomocou vzorov metylácie DNA. Poskytuje cenné poznatky o charakterizácii a klasifikácii bakteriálnych kmeňov na základe ich metylómov.
Monitoring and Reporting Tool for Cloned Vulnerabilities across Open-Source Projects
Remeň, Matúš ; Tamaškovič, Marek (referee) ; Holop, Patrik (advisor)
Predkladaná práca sa zaoberá zraniteľnosťami v projektoch s otvoreným zdrojovým kódom, so zameraním na šírenie zdrojového kódu medzi projektami klonovaním. V rámci tejto práce sú diskutované typy klonov a postupy ich detekcie. Bol navrhnutý a implementovaný nástroj umožňujúci vyhodnotenie a spustenie spomínaných detekčných metód. Nástroj a detekčné metódy boli vyhodnotené a testované na príkladoch z reálneho sveta.
Detection, Extraction and Measurement of the Length and Width of the Metacarpal Bones in Images
Paul, Daniel ; Dvořák, Michal (referee) ; Drahanský, Martin (advisor)
Ľudské telo bolo po celé storočia bodom mnohých štúdií. Chceme zistiť všetko, čo je možné sa o nás dozvedieť, o tom, ako fungujeme a prečo tak fungujeme. Vedci nám poskytujú výskumy, ktoré objasňujú tieto otázky. Mali by sme byť súčasťou tohto výskumu a obohatiť naše vedomosti prispievaním do vedy. Preto bude táto práca zameraná na detekciu, extrakciu a meranie metakarpálnych kostí na obrázkoch. Táto práca poskytne čitateľovi vedomosti o určitých metódach spracovania obrazu a záprstných kostiach. Predstaví proces extrakcie ich kontúr a ukáže spôsob, ako merať ich šírku a výšku.
Comparison of technologies for vehicle passage detection
Mareková, Martina ; Frolka, Jakub (referee) ; Krajsa, Ondřej (advisor)
System for vehicle detection and speed measurement system is an important part in traffic control as well as in providing data for intelligent and automated traffic signs. These technologies are divided into two types: intrusive and non-intrusive methods. Traditional traffic control is based on inductive loops. This method is intrusive and therefore requires intervention under the road and higher maintenance requirements. We can avoid this problem with non-intrusive methods, including video analysis, microwave radars, geomagnetic radars, weighing sensors and laser sensors, but these are more expensive alternatives. By implementing radars we performed measurements on road sections, on the basis of which the output data from microwave, weigh-in-motion sensors and induction loops were displayed. We receive processed and unprocessed output data of measurements from each sensors. For processing of those data is created software solution for graph rendering and direct measurement of the sensor accuracy in comparison with competing technology. The results of the measurements showed that the efficiency of the individually implemented sensors is sufficient for use in traffic control. As well we can consider the implementation of microwave radars and cameras for video analysis as a replacement for the conventional method of induction loops.
Detection of Boxes in Image
Soroka, Matej ; Zlámal, Adam (referee) ; Herout, Adam (advisor)
The aim of this work is to experiment and evaluate algorithms with different approaches to computer vision in order to automatically detect boxes-blocks in the image. To this end, neural network-based approaches were used in the solution. Experiments were performed with classification using our own data set, classification using our own convolutional neural network, detection using a window, YOLO detector and in the final iteration the use of U-net network for detection of boxes in the image.
Browser Fingerprinting Detection
Saloň, Marek ; Burget, Radek (referee) ; Polčák, Libor (advisor)
The main goal of this thesis is to design and implement a mechanism that provides protection against stateless tracking with browser fingerprint. Implemented tool has a form of module that takes part of JavaScript Restrictor extension. The module allows to specify heuristics used for evaluation of visited sites that may contain browser fingerprint extraction. If suspicious activity is detected, all subsequent HTTP requests from that site are blocked to prevent the extracted fingerprint from being sent to the server. The implementation and defined heuristics were tested. The resulting module represents an effective tool against stateless tracking. The main limitation of the implementation is possible corruption of sites by blocking HTTP requests.
HTTP Application Anomaly Detection
Rádsetoulal, Vlastimil ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
The goal of this work is to introduce anomaly detection principles and review its possibilities, as one of the intrusion detection methods in HTTP traffic. This work contains theoretical background crucial for performing an anomaly detection on HTTP traffic, and for utilising neural networks in achieving this goal. The work proposes tailored design of an anomaly detection model for concrete web server implementation, describes its implementation and evaluates the results. The result of this work is successful initial experiment, of modeling normal behavior of HTTP traffic and creation of the mechanism, capable of detection of anomalies within future traffic.

National Repository of Grey Literature : 49 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.