National Repository of Grey Literature 458 records found  beginprevious21 - 30nextend  jump to record: Search took 0.00 seconds. 
Using of Data Mining Method for Analysis of Social Networks
Novosad, Andrej ; Očenášek, Pavel (referee) ; Bartík, Vladimír (advisor)
Thesis discusses data mining the social media. It gives an introduction about the topic of data mining and possible mining methods. Thesis also explores social media and social networks, what are they able to offer and what problems do they bring. Three different APIs of three social networking sites are examined with their opportunities they provide for data mining. Techniques of text mining and document classification are explored. An implementation of a web application that mines data from social site Twitter using the algorithm SVM is being described. Implemented application is classifying tweets based on their text where classes represent tweets' continents of origin. Several experiments executed both in RapidMiner software and in implemented web application are then proposed and their results examined.
System For Monitoring of Network Servers and Services
Holubec, Petr ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
This bachelor's thesis deals with creation of a monitoring system that provides active periodic monitoring of servers and their specific services and a variety of notification methods exceeded the monitored value. In addition, displays statistics and graphs of monitored values and provides monitoring of system resources (assuming you start a monitoring agent). To control the system serves a client application that is available for standard desktop operating systems and mobile system Android.
Analysis of Malicious Encrypted Network Traffic
Dubec, Branislav ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis deals with the analysis of malicious encrypted network traffic using artificial intelligence methods. A solution is to create a system for detecting security intrusions using detection analysis methods. Theoretical part describes methods of anomaly detection, and explains the concept of artificial neural network. In the practical part, it experiments with various anomaly detection techniques in order to obtain the best results.
A Tool for Robustness Testing of Web-Services
Zelinka, Tomáš ; Očenášek, Pavel (referee) ; Rychlý, Marek (advisor)
This project deals with testing of web services. The result of this work will be a tool for load testing of web services using fault injection in their communication. The first part of the project discusses the basic aspects of testing web services. The second part of the work is more focused on testing high loads in combination with fault injection. The tool will allow automated run of the tests. The distributed model of the tool was designed to simulate real loads. In the last chapter are summarized achieved results.
Support for Whiteboard in Kopete
Pohl, Lukáš ; Očenášek, Pavel (referee) ; Mlích, Jozef (advisor)
The aim of this master thesis is to design and create the whiteboard application which allows to draw and share multimedia content in realtime using protocol XMPP between two users in the network environment. Application is a part of the open source IM client Kopete in KDE and operation system Linux.
Camera Recording Management System
Šulc, Ondřej ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
The aim of this bachelor thesis is to create a network security system focusing on compatibility with the widest possible group of IP cameras from various manufacturers and support for remote access to records even from places outside the local network. This problem is solved using two closely cooperating applications. The first application runs on a device in the local network (in our case miniPC Raspberry Pi). The application creates the records by receiving and storing RTSP transmissions from individual cameras. It then modifies these records into a form usable for display on websites and sends the second application from which the user can access them. This application is referred to in the text as agent or agent application. The second application has a web user interface and serves the end user as a tool to manage agents, IP cameras and captured records. By principle of the application, it is important for it to be accessible on a publicly available domain. This application is referred to in the text as web or web application. The use of this architecture does not violate any of the network communication standards, which include, in particular, the initialization of communication from the network behind the NAT service.
Analysis of Selected Security Protocols
Malecký, Marek ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The subject of this thesis is to study available security protocols and tools for their verification. The first part is devoted to briefly describe the concepts related to the area of security protocols and verification logics. The second part directly lists various protocols, along with attacks and errors found in design. Next chapter describes the most important tools for automatic analysis of security protocols in more detail. The main part deals with verification of security protocols selected in the chosen tool called Scyther. In conclusion, examples of multiprotocol attacks along with a summary table are displayed.
Behavioral Analysis of DDoS Network Attacks
Kvasnica, Ondrej ; Homoliak, Ivan (referee) ; Očenášek, Pavel (advisor)
This bachelor thesis deals with anomaly detection in computer networks using artificial intelligence method. Main focus is on the detection of DDoS attacks based on the information from the lower layers of the OSI model. The target is to design and implement a system that is capable of detecting different types of DDoS attacks and characterize common features among them. Selected attacks are SYN flood, UDP flood and ICMP flood. Description and feature selection of the attacks is included. Furthermore, a system is designed that evaluates whether the network traffic (organized into flows) is a DDoS attack or not. Attacks are detected using the XGBoost method, which uses supervised learning. The final model is validated using cross-validation and tested on attacks generated by the author.
Mobile Application for Sports Training
Dohnalík, Pavel ; Bartík, Vladimír (referee) ; Očenášek, Pavel (advisor)
The aim of the thesis is to create a mobile application that allows planning of training plans, sharing them in the team and subsequent evaluation of sports activities that will be entered or measured in the application. The application is implemented for the Android operating system. The thesis describes the programming theory for mobile operating systems. The practical part describes the design, implementation and testing. For implementation, NativeScript was used, linking XML and JavaScript or TypeScript. The resulting app allows the user to create training schedules and record sports activities.
Specification Languages and Tools for Analysis and Verification of Security Protocols
Ptáček, Michal ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This diploma thesis is focused on the analysis of security tools, which are commonly used for automatic verification of security protocols mainly. These security protocols are used for creation of private communication channells in insecured networks. Security will never be perfect, so finding of weaknesses in security protocols is always necessary and we need to improve these protocols. In this diploma thesis I have focused on looking for various verification tools on Internet. Subsequently, I have described each tool in this thesis, in way that each reader can easily find out, which tool is for him useful and which is not. I have summarized main benefits and drawbacks of each tool at the end of his description.

National Repository of Grey Literature : 458 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.