National Repository of Grey Literature 40 records found  beginprevious31 - 40  jump to record: Search took 0.01 seconds. 
Network Protection Using NetFlow Data
Czudek, Marek ; Tobola, Jiří (referee) ; Žádník, Martin (advisor)
This thesis deals with the possibility of greater security of network based on NetFlow protocol. Specifically, the detecting network scans based on predefined rules to found this anomaly in the NetFlow data. Next part is the possibility of retrospective data analysis, thereby achieving more  accurate detection of attacks on the network. In this work designed application uses predetermined rules to detect the scans and then looks the flows towards the ports witch are protected by the application and than compares with detected scans. In this way, more accurate detection of attacks is achieved.
Braille Reader
Fabík, Jiří ; Svoboda, Pavel (referee) ; Maršík, Lukáš (advisor)
This thesis deals with image processing, specifically scanned Braille documents. It is about recognition of Braille cells, followed by transferring to plain text. Braille dots are recognized on the basis of bright and dark parts, which are created during scanning. After connection to the characters, they are converted to plain text by means of the character set. It also locates positions of possible errors to make it easier to correct the final text.
Protecting Local Network Using NetFlow
Hanousek, Vít ; Polčák, Libor (referee) ; Matoušek, Petr (advisor)
This bachelor's thesis deals with the use of NetFlow data for monitoring local networks. There is an analysis of the best known threads for a local network in the first part of the thesis. Detection algorithms based on signature NetFlow detection were implemented for the chosen threads. Four plugins for an open-source application NfSen are outputs of this thesis. These plugins detects the following threads: vertical and horizontal scans, dictionary based attacks on SSH protocol, spam machines.
Network Protection Using NetFlow Data
Čegan, Jakub ; Žádník, Martin (referee) ; Tobola, Jiří (advisor)
This thesis deals with the using of NetFlow data for computer network protection. First are described some types of network security threats. After study of these threats and many experiments were designed detection rules for them. New detection form were designed too. It is working with two step detection of threats.
Detection and Isolation of Attackers Using Neflow Data
Grégr, Matěj ; Žádník, Martin (referee) ; Matoušek, Petr (advisor)
This thesis deals with using NetFlow records for detection network scanning. Anonymized NetFlow records from backbone VUT network are used as the source. Based on statistics created from these records, several Bash and Python scripts are implemented. With these scripts it is possible to detect network scanning even in large academics networks.
Coordinate measuring machines
Palásek, Vítězslav ; Zachoval, Luboš (referee) ; Zachoval, Luboš (referee) ; Pernikář, Jiří (advisor)
This graduation work is about co-ordinal measuring machines (CMM) with optical reader system and optical CMM. In accordance with submission and in terms of survival well known contactless systems the direction is to make methodology objective classification of rating with granting summary of these systems. The first part contains optical principles for visual scanner in CMM and optical CMM. Ist is described there principle of contactless obtaining steric digital version of measured object with using laser and optical facilities. The second part contains brief makes survey of these contactless systems and their component which are used for co-ordinal measuring. The survey is devided into optical readers, which are put on CMM brake or on mobile measuring brake and on optical CMM, which localize position measuring/sensing head in the space or they read measured object from specific distance – fotogrammetric. Characteristic of offered systems and chart with technical data are mentioned with each maker. The third and fourth part is about submission methodology for objective choice suitable sort of reader, optical CMM in target of characteristic reader system quality. And from this methodology is given the choice of suitable exponent stationary measuring machine with contact and contactless way of reading and their comparison.
3D scanning methods
Čermák, Jan ; Matyáš, Pavel (referee) ; Marada, Tomáš (advisor)
In the first part of this thesis there is a task of taxonomy of the 3D scanners. It explains some principles of the 3D scanners functioning. Then in the second part there are described two particular technologies of the 3D scanning in the more complex way. In the chapters of both of these methods there is described procedure of scanning and compared several commercially available sensors. In the end there is comparison of these two methods.
Vulnerability assesment tools
Charvát, Michal ; Veber, Jaromír (advisor) ; Klíma, Tomáš (referee)
This bachelor thesis is focused on a specific area of information systems security, which is called vulnerability assesment. Vulnerability assesment is executed with special tools called vulnerability scanners. In the the beginning of the first part I will introdukce the area of information systems security and its breaf history, the basic terms of vulnerability assesment and related topics, such as penetration testing. In the following part few test will be executed using some of the chosen available and free tools and then analyze its results. The main criteria will be the number and criticality of the given vulnerabilities. Finally the user-friedly aspect of each tool will be evalueted, which could be a little subjective matter.
Accuracy of the facade of the historic building - methods, possibilities, conditions
DVOŘÁKOVÁ, Jitka
This thesis deals with methods of surveying the facade of the historic building. The introductory section is a brief history of measurement and guidelines, as well as various methods are described from oldest to youngest, including their accuracy in targeting the facade. In more detail, a method for scanning and photogrammetry, which is currently the youngest methods used in surveying facades. In conclusion, the evaluation methods in terms of accuracy and usability. The aim is to describe and evaluace different methods of surveying from history to the present, including the necessary instruments and their accuracy.
The possible direction of the spatial division of small buildings
BÍSKOVÁ, Jaroslava
The aim of the thesis is to describe and evaluate the use and accuracy of the individual geodetic methods and their development focus for the spatial division of small structures, such as monuments, fountains, statues and other objects. Describes the aforementioned methods and necessary equipment for geodetic measurements from eklimetru at table methods to modern laser scanners. Are described in detail methods of photogrammetry and laser scanning. In the laser scanning is very interesting its rapid development. We already have the possibility to use very advanced technology, so we can obtain three-dimensional images useful mainly for documentation of monuments and other buildings.

National Repository of Grey Literature : 40 records found   beginprevious31 - 40  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.