National Repository of Grey Literature 28 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Evidence securing in virtual environment
Havlová, Miluše ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
The bachelor thesis deals with evidence securing in virtual environment. The main goal is to suggest suitable virtual environment for evidence securing which can be used in prosecution. As the next the tools that are suitable for safe securing of evidence are described. With the help of selected tools the sample of malware is secured and then the sample is analyzed and described. The suggested environment is used to evidence gathering within the frame of simulated security incident.
File Manager in 3D
Martinák, Ondřej ; Sumec, Stanislav (referee) ; Beran, Vítězslav (advisor)
This thesis concentrates on a design of 3D user interface for interaction with a file system. It presents a short description of 3D user interfaces and techniques used for their design and implementation. It also presents a brief description of libraries which might be used for development of virtual reality applications and a description od device which was used for graphical output and an acquisition of informations about user's head movements.
Georthythm
Roček, Jakub ; Kořínek, David (referee) ; Mikyta, Svätopluk (advisor)
Video instalation which is focused on virtual space, in gnoseology context.
Analysis of malware
Bláha, Michael ; Caha, Tomáš (referee) ; Člupek, Vlastimil (advisor)
The aim of my bachelor thesis is to design a safe environment for the analysis of malicious software. In the theoretical part of the work, I deal with the basic division of computer viruses. Next, I describe two main procedures for malware analysis, namely static and dynamic analysis. I describe why they are used and what tools fall into these categories. I also present my methodology for secure malware analysis. In the practical part of the work, I focus on creating an analytical environment on Windows 10 and Fedora platforms. I use a graphical environment and a command line to create virtual machines. For the analysis of network traffic, I create the so-called "Fake Internet" program with the INetSim program. In the last part of the work, I deal with a sample analysis of selected types of computer viruses. I follow the described methodology. For each analysis, I describe a brief summary and results. At the end of the work, I describe a possible defense against malicious software.
Communiacation software for terminal clients of a Linux server
Hanák, Karel ; Jeřábek, Jan (referee) ; Jelínek, Mojmír (advisor)
The thesis contains a proposal and implementation of an environment convenient for operation of network client applications which use common terminals. It also consists of implemented examples where the way of their usage is presented. The centralized way of communication is the basis. The approach is used also for the possibility of their joining with managing subsystems, i.e. unlimited ways of regulation of systems for real estate management, access to devices, user authority access to access data points to the devices. The environment is based on operation system Linux and database MySQL. Their realization is supposed on a server, in the network environment. This relates also to the overall security policy and this work also focused on social treatment of clients possibilities.
Detection of Malware Communication in Network Flows
Korvas, Václav ; Matoušek, Petr (referee) ; Ryšavý, Ondřej (advisor)
This thesis deals with the issue of network communication of malicious code, methods of their analysis and especially the comparison of accuracy of different machine learning algorithms among themselves. The paper presents a comparison of the accuracy of different machine learning algorithms, both on test data and when used in real life. Accuracy, F1-score and false positive rate were used as metrics to evaluate the results. On the test data, the Random Forest and XGBoost algorithms were found to be the most accurate, achieving 99.2% accuracy with a rate of false positivity of 0.6%. In real-life experiments, approximately 9% of flows were incorrectly detected and classified as malware. When the computer was compromised, the rate of flows classified as malware increased to 18%, and several indicators of compromise were captured and confirmed the infection of the computer.
Simulation of component assembly in virtual reality
Škubal, Karel ; Lacko, Branislav (referee) ; Hůlka, Tomáš (advisor)
Virtual reality is created by tricking the brain by displaying a single scene on a two-dimensional plane, generating an image from a slightly shifted perspective for each eye. This creates the illusion of a three-dimensional space, with which, by the help of suitable software, it is also possible to simulate interactions with virtual objects. Possible interactions between objects include their assembly, from simple stacking of cubes on top of each other, to various linking of objects by determining link conditions. In the theoretical part of this thesis, some possibilities of working with objects in virtual reality are explained, including examples of possible uses. After that there is a comparison of some software tools for creating a virtual environment. In the practical part, the process of creating models and the conditions for their assembly is more detailed, including the specific procedure used to create a simulation of the assembly of three test computer builds with different combinations of selected components with designated restrictions.
EEG correlates of egocentric and allocentric distance estimates in virtual environment in humans
Kalinová, Jana ; Vlček, Kamil (advisor) ; Telenský, Petr (referee)
Cognitive processes associated with spatial orientation can use different reference frames: egocentric, centered on observer and allocentric, centered on objects in the environment. In this thesis, we use EEG to investigate the dynamics of brain processes accompanying spatial orientation based on these reference frames. Participants were instructed to estimate distances between objects or themselves and objects located in a virtual circular arena; this task was presented in both 2D and 3D displays. Task-related EEG changes were analyzed using a time-frequency analysis and event-related potential analysis of 128-channel EEG recordings. Through time-frequency analysis we found significant power differences in delta, theta, alpha, beta and gamma bands amongst the control, egocentric and allocentric testing conditions. We noted a decrease in alpha power in occipital and parietal regions, while a significantly stronger decrease was observed for the allocentric condition compared to both egocentric and control conditions. A similar pattern was also detectable for the beta band. We also report an increase in theta and delta power in temporal, fronto-temporal and lateral frontal regions that was significantly stronger for the egocentric condition compared to control and, in some electrodes, even...
Analysis of malware
Bláha, Michael ; Caha, Tomáš (referee) ; Člupek, Vlastimil (advisor)
The aim of my bachelor thesis is to design a safe environment for the analysis of malicious software. In the theoretical part of the work, I deal with the basic division of computer viruses. Next, I describe two main procedures for malware analysis, namely static and dynamic analysis. I describe why they are used and what tools fall into these categories. I also present my methodology for secure malware analysis. In the practical part of the work, I focus on creating an analytical environment on Windows 10 and Fedora platforms. I use a graphical environment and a command line to create virtual machines. For the analysis of network traffic, I create the so-called "Fake Internet" program with the INetSim program. In the last part of the work, I deal with a sample analysis of selected types of computer viruses. I follow the described methodology. For each analysis, I describe a brief summary and results. At the end of the work, I describe a possible defense against malicious software.

National Repository of Grey Literature : 28 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.