National Repository of Grey Literature 21 records found  1 - 10nextend  jump to record: Search took 0.01 seconds. 
Technology of Online Voting Systems
Kováč, Michal ; Sedláček, Pavel (referee) ; Froehling, Kenneth (advisor)
Tato práce pojednává o konceptu volení online. Krátce popisuje jaké další volební metody se v demokratických zemí používají. Detailně popisuje země které používají online volení (celostátně a částečně) a take země, které pilotovali nebo zkoušeli používat online volby a také z jakého důvodu přestali. V posledních dvou částech se práce zabývá pozitivy a negativy které online volební systémy mohou představovat, včetně analýzy volebních dat z Estonska.
Evaluation of Legislative Regulations for Special Road Transport Between the Czech Republic, Austria, Germany, the Benelux States and Great Britain
Handová, Jitka ; Libertín, Josef (referee) ; Kudláček, Jaroslav (advisor)
The diploma thesis is focused on the evaluation of legislation for special transport between the Czech Republic and some member states of the European Union. The term special transport comprises the transport of very heavy and oversize loads which exceed limits allowed by the legislation of member states and the European Union itself. The diploma thesis is preferentially concentrated on regulations providing limit dimensions, transport conditions and elements that ensure safe transport of loads to the target destinations – Germany, Austria, Belgium, Luxembourg, the Netherlands, the United Kingdom. The final document is going to become the overview of information for freighters who can apply it in the process of preparation and the following ensuring of oversize loads to the countries, see above. The results of the diploma thesis can be applied by the institutions in the branch of international freight, the police or the institutions of the public administration.
Security risks of wireless access networks
Špidla, Milan ; Hošek, Jiří (referee) ; Polívka, Michal (advisor)
Master´s thesis „Security risks of wireless access networks“ deals with wireless access networks, which are the most widespread in this time. The main target is realization of attacks wireless access networks protected by various using methods. This thesis shows main securities gaps, which originate from project this networks. These securities gaps are used for realization attacts in practical part. In the next part I took attention of network´s monitoring possibilities.
The examination of computer network and a proposal for changes
Žaloudek, Jan ; Bárta, František (referee) ; Dydowicz, Petr (advisor)
This work is consider a computer network of a company. It describes present situation, tries to locate problems and propose the solutions to solve them.
HTTP-Request-Based Identification
Jeleň, Jakub ; Pluskal, Jan (referee) ; Polčák, Libor (advisor)
This bachelor thesis deals with the identification using HTTP requests in network traffic. It explains principles of HTTP communications and identification. Additionally the application design is created, which identifies web browser and then this application is implemented. The application is designed as a separate module which can be integrated into projects Moderní prostředky pro boj s kybernetickou kriminalitou na Internetu nové generace. Then are executed experiments with that tool to verify the functionality and utility of this tool.
Evaluation of Legislative Regulations for Special Road Transport between the Czech Republic and North Europe
Kuře, Arnošt ; Novotný, Jiří (referee) ; Kudláček, Jaroslav (advisor)
he project evaluates legislative regulations for special road transport between the Czech Republic and Northern Europe. The main purpose of the project is to formulate a basic methodology for non-standard shipment’s transit. Work observes destination of the Czech Republic - Denmark, Finland, Norway and Sweden. There exist differences in legislative conditions for the particularly heavy and oversized loads transport in these countries. The main objective is to evaluate these conditions and recommend utilization for Czech carriers. The thesis aims to enumerate the various national legal standards for excessive transportation and recommend implementation outputs for correct and a quick orientation in the rights and obligations during executing carriage for the Czech carriers. The basic metodology how to transport oversized loads results from this project.
Application that supports penetration tests of web applications
Holovová, Simona ; Švikruha, Patrik (referee) ; Martinásek, Zdeněk (advisor)
This master´s thesis is about the security of web applications and penetration testing. The main goal is to gain knowledge about testing methodologies OWASP Testing Guide and ASVS and to implement this knowledge into a web application to assist during manual penetration testing. The theoretical part of the thesis describes both methodologies and web technologies used during the development of the application. The practical part of the thesis is about the design of the application based on the specification, its implementation, and security hardening.
Information System Assessment and Proposal for ICT Modification
Lapuníková, Eva ; PhD, Lucie Ciencialová, (referee) ; Koch, Miloš (advisor)
Assessing the company’s information system, this thesis deals with an analysis and proposal to changes, that lead to improvement of a company‘s current situation. In the introductory part there is a theoretic explanation regarding the issue of information systems and also a description of some analytical tools. In the next part there is an acquaintance with a company and an analysis of a current state of IS/ICT using several methods. The results of this analytical part then serve as proposal to changes including benefits evaluation, which the company can use and therefore improve its current position on the market.
Biomethrics authentization methods
Flídr, Jakub ; Martinásek, Zdeněk (referee) ; Sobotka, Jiří (advisor)
The first part of this bachelor thesis includes description of elementary terms in biometrics. Different biometric methods are also described and classified there. It describes the principles of the methods and their approximate performance characteristics. In the second part, practical safety of three different biometric methods is tested. Their performance characteristics and properties are described and also the principle of attempting to mislead the methods and its success is demonstrated. The results are evaluated and recommendations for practical use of the methods is given there. The last part of the thesis evaluates the experience gained in the design of a safe authentication system.
Machine Learning-based Anomaly Detection in Industrial Control Systems
Tsymbal, Kateryna ; Holasová, Eva (referee) ; Pospíšil, Ondřej (advisor)
The main goal of this thesis is to design a system for anomaly and intrusion detection in industrial control systems using machine learning. The theoretical part of the thesis provides a basic theoretical overview of industrial control systems and their security. Furthermore, knowledge about anomaly detection techniques and potential challenges in this area are discussed. Lastly, the theoretical part has reviewed various solutions for anomaly detection in industrial control systems using machine learning. In the practical part, machine learning algorithms are applied to the selected HAI dataset. Finally, the findings on the suitability of the used algorithms and the possibilities for further research are summarized. The purpose of this thesis is to improve the security of industrial control systems, and the results can serve as a basis for the future development of more effective methods for anomaly detection in this area.

National Repository of Grey Literature : 21 records found   1 - 10nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.