National Repository of Grey Literature 7 records found  Search took 0.00 seconds. 
Computer Identification Using Time Information
Jirásek, Jakub ; Grégr, Matěj (referee) ; Polčák, Libor (advisor)
This work deals with the identification of a remote computer by monitoring TCP timestamps of the tracked device. It is possible to determine computer's clock skew from these timestamps as the clock skew is unique for every device. We are able to differentiate devices even though they have changed location, network address or connection type. Passive data capturing ensures that the identification process is invisible to the fingerprinted computer. It is necessary that the network communication of fingerprinted computer is visible to the observing device. We are able to utilise only TCP traffic with timestamps enabled.
Analysis and Demonstration of Selected Network Attacks
Jirásek, Jakub ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The aim of this Bachelor thesis is to describe and realize selected network attacks which are taught at the FIT, Brno University of Technology. The thesis includes demonstration exercises that can be used for teaching computer network security. First part of this work discusses theory for each attack and possible security solutions. In the second part the practical realizations (for each network attack) are described.
Lithofacies and cyclic pattern of the upper part of the Poruba Member (Serpukhovian) in the eastern part of the Ostrava-Karviná coalfield
Michlová, Nikol ; Opluštil, Stanislav (advisor) ; Jirásek, Jakub (referee)
The diploma thesis studies lithofacies and cyclic pattern of about 200 m thick upper part of the Poruba Member (Serpukhovian) in the Karviná area of the Ostrava-Karviná coalfield. The objective of this thesis is to identify laterally persistent cycles from the local ones by the set of cross-sections and to better understand their formation, especially the role of glacio- eustatic sea level changes. Set of cross-sections constructed from boreholes were used for this study. The three genetic cycles were identified in the thesis based on previous studies of Gastaldo et al. (2009). From base to top the cycles are the (i) Max, (ii) Otakar a (iii) Gaebler. Their thickness fluctuates between 19.9 and 109.9 meters. The genetic cycles are bounded, with one exception, by a transgressive erosional surface of important faunal marine bands. From the set of cross-sections and maps of thickness and sand content (%), constructed for individual genetic cycles, it is obvious that the area of maximum thickness corresponds to area of increased content of medium- and coarse-grained sandstone. Maxima of sand content and thicknesses follow NNE-SSW direction, which is in agreement with basin axis. These maxima are interpreted as areas occupied by fluvial channels that are responsible for deposition of coarse- grained...
Landscape in Kelly Reichardt's movies
Jirásek, Jakub ; PAVLÍČEK, Tomáš (advisor) ; RAMPAL DZURENKO, Viktória (referee)
This thesis describes the work and inspiration of one of the most significant directors of the American contemporary independent cinema, Kelly Reichardt. The objective is to acquaint the reader with her work, especially with the use of landscape in her movies. The analysis is provided on Wendy and Lucy, Meek’s Cutoff and Certain Women. These movies have been chosen to represent the most important parts of Reichardt’s career.
Analysis and Demonstration of Selected Network Attacks
Jirásek, Jakub ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
The aim of this Bachelor thesis is to describe and realize selected network attacks which are taught at the FIT, Brno University of Technology. The thesis includes demonstration exercises that can be used for teaching computer network security. First part of this work discusses theory for each attack and possible security solutions. In the second part the practical realizations (for each network attack) are described.
Computer Identification Using Time Information
Jirásek, Jakub ; Grégr, Matěj (referee) ; Polčák, Libor (advisor)
This work deals with the identification of a remote computer by monitoring TCP timestamps of the tracked device. It is possible to determine computer's clock skew from these timestamps as the clock skew is unique for every device. We are able to differentiate devices even though they have changed location, network address or connection type. Passive data capturing ensures that the identification process is invisible to the fingerprinted computer. It is necessary that the network communication of fingerprinted computer is visible to the observing device. We are able to utilise only TCP traffic with timestamps enabled.

See also: similar author names
1 Jirásek, J.
3 Jirásek, Jan
3 Jirásek, Jan Evangelista
1 Jirásek, Jaroslav,
5 Jirásek, Jiří
2 Jirásek, Jozef
Interested in being notified about new results for this query?
Subscribe to the RSS feed.