National Repository of Grey Literature 33 records found  beginprevious21 - 30next  jump to record: Search took 0.01 seconds. 
Git Reporting Tool
Nečas, Vojtěch ; Hruška, Martin (referee) ; Vojnar, Tomáš (advisor)
This bachelor thesis is about an implementation of the software tool dedicated for creation and visualization of statistical information files work. It also refers about Git version control system. System Git does not have any functions to display graphical statistics (graph or chart), therefore the output of the changes of the files is available in command line only. Such data, especially in a large amount of specific files, are not easy to analyze without using other existing statistic tools. There are couple of tools available which are capable of getting information of changes in Git, classify the statistics and display the results. The main disadvantage of such tools is a very long time needed to obtain the results. These tools support only very brief statistics and the user interface does not provide sufficient comfort either. The tool elaborated in this paper is offering more effective access to the changes information from Git using the saved data database. This database, compare to a single command line, is offering quick access to all information and timeline while there is only one time demanding operation - setting up the database. User-friendly interface is enabling an easy operation of the tool itself using window based interface. As a result there are various statistics (graphs and charts) which are user-editable. On the top of that the tool is equipped with an approximate estimation of the project work trends (mathematical-statistical method of the least squares).
A Tool for Post-Mortem Debugging
Kapičák, Peter ; Peringer, Petr (referee) ; Smrčka, Aleš (advisor)
The goal of this work is checking specific properties in trace which program should meet or which it shouldn't meet. Properties and their description are basis of this tool for post-mortem debbuging. Properties are transformed to deterministic finite automaton for checking in trace and their description is important for searching events in trace. Events are pass to automaton as input. Output of a tool is report if properties are meet or not. Solution provides check of properties regardless of log format and shows events that preceded violation of the properties.
Conception of a conical splitter for wood
Stejskal, Jan ; Pokorný, Přemysl (referee) ; Hloušek, David (advisor)
This bachelor thesis consists of an introductory research part and a structural draft of a conical wood splitter with typed technical parameters and maximal log length and width. The thesis contains computing and strength examination of chosen components and final evaluation of designed construction from the law standards viewpoint.
Detection of attacks targeted at web applications
Jégrová, Eliška ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis is dealing with vulnerabilities of web applications. The aim of the work is to create tools for attack detection of certain attacks, specifically Same Origin Method Execution (SOME), XML Signature Wrapping attack, XPATH Injection, HTTP Response Smuggling and Server-Side Includes (SSI) injection. Another aim is to create logs that display detected attacks. In the first part, the theory is analyzed and vulnerabilities of chosen attacks are described including their misuse. In the next section there are web application implemented which contain vulnerabilities for successful execution of the attacks. Furthermore, in Python language detection methods are designed and developed for these attacks, which are accompanied by a log entry.
Actions on bridges caused by the water flow and floating items
Řezník, Jindřich ; Duchan, David (referee) ; Špano, Miroslav (advisor)
The subject of this thesis is the enumeration and analysis methods applicable to the calculation of loads on bridges from water and water-borne objects. It involves a hydrodynamics loads, loads from captured debris and from impacts of the individual water-borne objects and their clusters. It includes an assessment of the current situation, the teoretical analysis and model calculations on the concrete bridge with the evaluation of usable methods.
Neural Network Based Edge Detection
Jamborová, Soňa ; Grézl, František (referee) ; Švub, Miroslav (advisor)
This work is about suggestion and implementation of the software for detection of edges in images using neurons network. It defines basic terms for this topic and focusing mainly at preperation imaging imformation for detection using nerons network. Describing and comparing different aproachings for using implemented software on synthetic and real set of images,  including experiments.
Distributed Brute Force Attacks Protection
Richter, Jan ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
This project deals with analysis of brute force attacks focused on breaking authentication of common services (especially ssh) of Linux and xBSD operating systems. It also examines real attacks, actual tools and ways of detection of theese attacks. Finaly there are designed new mechanisms of coordination and evaluation of distributed brute force attacks in distributed environment. These mechanisms are then implemented in distributed system called DBFAP.
Message Logging System
Vrzal, Miroslav ; Křivka, Zbyněk (referee) ; Zendulka, Jaroslav (advisor)
This master's thesis in the first part describes the AS/400 and its message system and concentrates especially on the following areas: predefinition of messages and their storing, types of messages and levels of their importance, work with variables included in message text and ways of sending messages. On the basis of AS/400 message system is designed and implemented message log system for the application loggin for Aegis. s.r.o. The analysis of the message log systems is also a part of the work. The syslog and syslog-ngused in UNIX systems are described, concerning types of messages, importance of messages and filtering and storing of messages. It further describes possibilities of application logging based on Java in the specific case of the Log4jutility. In the second part thesis describes own log message systems design and implementation.
System Log Analysis
Ščotka, Jan ; Peringer, Petr (referee) ; Smrčka, Aleš (advisor)
The goal of this master thesis is to make possible to perform system log analysis in more general way than well-known host-based instrusion detection systems (HIDS). The way how to achieve this goal is via proposed user-friendly regular expressions. This thesis deals with making regular expressions possible to use in the field of log analysis, and mainly by users unfamiliar with formal aspects of computer science.
Probability-based model for network traffic
Bednár, Peter ; Jelínek, Mojmír (referee) ; Molnár, Karol (advisor)
This work identifies sevral basic types of traffic in IP networks and describes main characteristics of each type of the basic netowrk service focusing on HTTP and VoIP protocols.

National Repository of Grey Literature : 33 records found   beginprevious21 - 30next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.