National Repository of Grey Literature 33 records found  beginprevious24 - 33  jump to record: Search took 0.01 seconds. 
Detection of attacks targeted at web applications
Jégrová, Eliška ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
This thesis is dealing with vulnerabilities of web applications. The aim of the work is to create tools for attack detection of certain attacks, specifically Same Origin Method Execution (SOME), XML Signature Wrapping attack, XPATH Injection, HTTP Response Smuggling and Server-Side Includes (SSI) injection. Another aim is to create logs that display detected attacks. In the first part, the theory is analyzed and vulnerabilities of chosen attacks are described including their misuse. In the next section there are web application implemented which contain vulnerabilities for successful execution of the attacks. Furthermore, in Python language detection methods are designed and developed for these attacks, which are accompanied by a log entry.
Actions on bridges caused by the water flow and floating items
Řezník, Jindřich ; Duchan, David (referee) ; Špano, Miroslav (advisor)
The subject of this thesis is the enumeration and analysis methods applicable to the calculation of loads on bridges from water and water-borne objects. It involves a hydrodynamics loads, loads from captured debris and from impacts of the individual water-borne objects and their clusters. It includes an assessment of the current situation, the teoretical analysis and model calculations on the concrete bridge with the evaluation of usable methods.
Neural Network Based Edge Detection
Jamborová, Soňa ; Grézl, František (referee) ; Švub, Miroslav (advisor)
This work is about suggestion and implementation of the software for detection of edges in images using neurons network. It defines basic terms for this topic and focusing mainly at preperation imaging imformation for detection using nerons network. Describing and comparing different aproachings for using implemented software on synthetic and real set of images,  including experiments.
Distributed Brute Force Attacks Protection
Richter, Jan ; Čejka, Rudolf (referee) ; Lampa, Petr (advisor)
This project deals with analysis of brute force attacks focused on breaking authentication of common services (especially ssh) of Linux and xBSD operating systems. It also examines real attacks, actual tools and ways of detection of theese attacks. Finaly there are designed new mechanisms of coordination and evaluation of distributed brute force attacks in distributed environment. These mechanisms are then implemented in distributed system called DBFAP.
Message Logging System
Vrzal, Miroslav ; Křivka, Zbyněk (referee) ; Zendulka, Jaroslav (advisor)
This master's thesis in the first part describes the AS/400 and its message system and concentrates especially on the following areas: predefinition of messages and their storing, types of messages and levels of their importance, work with variables included in message text and ways of sending messages. On the basis of AS/400 message system is designed and implemented message log system for the application loggin for Aegis. s.r.o. The analysis of the message log systems is also a part of the work. The syslog and syslog-ngused in UNIX systems are described, concerning types of messages, importance of messages and filtering and storing of messages. It further describes possibilities of application logging based on Java in the specific case of the Log4jutility. In the second part thesis describes own log message systems design and implementation.
System Log Analysis
Ščotka, Jan ; Peringer, Petr (referee) ; Smrčka, Aleš (advisor)
The goal of this master thesis is to make possible to perform system log analysis in more general way than well-known host-based instrusion detection systems (HIDS). The way how to achieve this goal is via proposed user-friendly regular expressions. This thesis deals with making regular expressions possible to use in the field of log analysis, and mainly by users unfamiliar with formal aspects of computer science.
Probability-based model for network traffic
Bednár, Peter ; Jelínek, Mojmír (referee) ; Molnár, Karol (advisor)
This work identifies sevral basic types of traffic in IP networks and describes main characteristics of each type of the basic netowrk service focusing on HTTP and VoIP protocols.
Probability-based model for network traffic
Bednár, Peter ; Jelínek, Mojmír (referee) ; Molnár, Karol (advisor)
This work identifies several basic types of traffic in IP networks and describes main features. The basic network services such as HTTP, VoIP and electronic mail are discussed focusing mainly on HTTP and VoIP probability-based models for network traffic which are applied to the software simulation of real network.
Mobile Wood Splitter
Stuchlík, Jakub ; Malášek, Jiří (referee) ; Škopán, Miroslav (advisor)
This bachelor´s thesis deals with the issues of the mobile wood splitter. The first part describes the basic division of splitters in the market. I am going to choose the most suitable solution for my assignment. In the second part I am going to focus on the calculation of strength and checking of chosen type of the splitter.
PPension - technological phase coarse upper construction
Řihák, Pavel ; Henek, Vladan (referee) ; Henková, Svatava (advisor)
The thesis is focused on construction srubového pension. It deals with issues of selected technological part of the project, which are: technical report biotic pests of wood, wood protection, technological process timber harvester, log walls, ceilings, roof, site facilities, the construction schedule, naazení machines, inspection and test plan, safety and health protection at work.

National Repository of Grey Literature : 33 records found   beginprevious24 - 33  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.