National Repository of Grey Literature 29,580 records found  beginprevious29571 - 29580  jump to record: Search took 1.17 seconds. 

Data capture for creation of DTM
Ondráček, Daniel ; Šváb,, Tomáš (referee) ; Kalvoda, Petr (advisor)
This thesis deals with the the capture of data for digital terrain model. The specified location was measured in cooperation with the student Tomáš Kobližek. Surveying networks were auxiliary survey points that were measured by GNSS. Measurements were connected to the system Uniform Trigonometric Cadastral Network and Baltic height system after the settlement. Detailed points were measured by tacheometry and comply with third accuracy class and have been tested by CSN 01 3410. The main result of this thesis is special map at scale of 1:500.

Webmail Traffic Reconstruction
Slivka, Miroslav ; Ryšavý, Ondřej (referee) ; Veselý, Vladimír (advisor)
Webmail applications are very popular these days. Besides typical usage, thanks to ciphered communication, they can be used for malicious activity like confidential data loss. This thesis discusses webmail events detection based on common webmail signatures in captured network traffic. Also there will be discussed SSL/TLS interception and decryption for further data analysis. The modules in this thesis are designed and implemented for Netfox.Framework forensics analysis tool. The Netfox project is developed at FIT BUT under security research project SEC6NET.

Reconstruction of Captured Communication on iOS Platform
Letavay, Viliam ; Kmeť, Martin (referee) ; Pluskal, Jan (advisor)
These days our mobile devices along with social networks are giving us an opportunity to be in touch with our friends and family at any time. Howerver they could be also used for criminal activity. This thesis therefore deals with reconstruction of communication of the iOS applications Google Hangouts, Twitter and Facebook Messenger for use of forensics analysis with the main focus on an abillity to recover their chat communication. Later it also deals with the implementation of Netfox Detective tool extensions, allowing the reconstruction of this communication.

Mathematical modelling of HTTP network traffic
Miklica, Jan ; Vajsar, Pavel (referee) ; Molnár, Karol (advisor)
The aim of this thesis is to capture network tradic on the HTTP protocol. Then from the captured tradic to analyze parameters using selected models and compare them with the achal properties of real network traffic. This bachelor´s thesis describes the HTTP protokol and mathematical modeling, and simulation models developed for it. The document described the capture of data tradic on HTTP using Wireshark. In the next part are performed elemental analysis of selected models. In conclusion the analysis results of the selected models are described.

Trans-European energy networks - selected issues
Kočí, Luboš ; Němcová, Ingeborg (advisor) ; Vošta, Milan (referee)
This thesis deals with Trans-European energy networks (TEN-E), a program of the EU which has recently undergone significant changes. The main objective of this thesis is to capture the impact of activities of The EU in the framework of TEN-E and energy policy on the status and development of Europe's energy infrastructure and apply the findings to energy networks of the Czech Republic. The thesis is divided into four chapters. The first one deals with network industries and their economic specifics. The second chapter deals with energy policy of the EU and development of the internal energy market. The third chapter focuses on TEN-E program and final chapter brings the issues of Czech energy networks.

Network Attack Capture Using Honeyd Tool
Bláha, Lukáš ; Chmelař, Petr (referee) ; Drozd, Michal (advisor)
The bachelor thesis deals with Honeyd tool and its effectivity in capturing network attacks. At the beginning, there is a description of honeypots and its utilization in network security. An important part of the thesis is constituted by a practical implementation of network attacks and their analysis. The main goal is to create an extension for Honeyd tool which can emulate file sharing in operation systems Microsoft Windows XP, especially its free accessible part called null session. As results there are tests evaluating the level of detection of computer attacks by the created tool.

Monitoring of network attacks with honeypot systems
Krula, Jiří ; Vasilenko, Alexandr (advisor) ; Rostislav , Rostislav (referee)
This thesis focuses on the topic of honeypots technology and their use for network attacks monitoring. It theoretically analyzes the honeypots and their variants honeynet and honeytoken. The practical part describes how to deploy two open source solutions of honeypot, Kippo and Dionaea. Kippo honeypot can be classified, despite its limitations, as a high interactive honeypot. This solution emulates the SSH service and it is primarily intended for the detection and capture of brute force attacks on the service. Dionaea is a honeypot designed primarily for capturing malware. It aims to capture malware in the trap using the vulnerabilities of offered and exposed network services with the aim to obtain a copy of the malware for subsequent analysis. Data obtained from the real deployment of the proposed solutions are presented and measures in relation to the SIEM instruments are proposed as well as improved security of the protected network.

Network activity monitor for higher traffic
Horký, Jiří ; Obdržálek, David (referee) ; Forst, Libor (advisor)
Aim of this work is to design and implement real-time network monitoring application for higher traffic. Application will be intended for network administrators, who can't or don't want to monitor network directly, using active network equipment such as routers or switches. One of main e ort would be to minimalize system resource requirements - application should be usable on common server hardware. Application will allow to con gure amount of captured data (ports, MAC addresses) and thus lower the statistic data size. Integral part of this work will be graphical frontend enabling to e ectively observe captured data and statistics in the form of user-de ned charts and tables. Application will be programmed in C language and it will be aimed to UNIX systems.

Voice chat
Novák, Hynek ; Bednárek, David (referee) ; Štanclová, Jana (advisor)
VoiceChat is program intended for voice and chat communication between several computers with the Windows operating system. Command and chat messages are sent over the network using TCP protocol. Voice is captured and played by DirectSound and transferred with UDP protocol. GSM 6.10 codec is used to lower data transfer rate.

Cultural and market-economic Aspects of transmission Opera Performances from Metropolitan Opera in New York (Met)
Krejča, Tomáš ; ŠTILEC, Jiří (advisor) ; BĚLOR, Roman (referee)
This B.A. thesis Cultural and market-economic aspects of transmission opera performances from Metropolitan Opera in New York(Met) aims to map one of the products the Metropolitan Opera in New York, the product of live broadcasts of opera performances in high quality image resolutin, the product Live in HD. Its aim is to capture the successful product development applying in the cultural field at a time close to his creation, but also a sufficient distance to enable him to capture the development and performance. Compares the conditions for applying the product (in the broader context of cultural functioning of the market) in theU.S. and Republic, explains the principles of operation of the product, examines the distribution and promotional network needed for its spread and points to certain elements and moments as a possible source of inspiration for the cultural market in the Czech Republic. This work is in the Czech Republic in this range yet unique.