This thesis is about semiautomatic network protocol diagnostics and creating protocol description from eavesdropped communication. Several network eavesdropping techniques and some common programs for network analysis are introduced. Well-known network protocols are described, with focus on their communication messages. Some already existing methods for creating models from examples are mentioned and their characteristics defined. Next we design architecture of developed tool and some methods, that create protocol description. After that we explain implementation of this tool and finally the tool is tested and experimented with
The goal of this work is to analyze possible ways of network protocol into application protocol enca...
AbstractWe propose a run-time monitoring and checking architecture for network protocols called Netw...
This thesis describes and explains network attacks and provides solutions how to defend against thes...
Bachelor's thesis describes an implementation of a network analyzer with an easy graphical web inter...
The master Thesis deals with an overview of issues necessary for design of custom network analyzer. ...
This thesis focuses on description of the current state of research in the detection of network atta...
This dissertation demonstrates and evaluates the use of passive run-time monitoring to test black-bo...
This dissertation demonstrates and evaluates the use of passive run-time monitoring to test black-bo...
This thesis is focused on design and implementation of tool for data extraction from captured networ...
International audienceCommunication protocols enable structured information exchanges between differ...
This master's thesis deals with the recognition of used protocols in a network using machine learnin...
Bachelor's thesis deals with analysis of chosen network protocols, finding their vulnerabilities and...
This bachelor thesis deals with the design of 5 laboratory tutorials where the basic principles of c...
The diploma thesis is focused on the basic properties of network protocols. The main task is to crea...
With the increasing reliance of computing on communication, it has become important to be able to re...
The goal of this work is to analyze possible ways of network protocol into application protocol enca...
AbstractWe propose a run-time monitoring and checking architecture for network protocols called Netw...
This thesis describes and explains network attacks and provides solutions how to defend against thes...
Bachelor's thesis describes an implementation of a network analyzer with an easy graphical web inter...
The master Thesis deals with an overview of issues necessary for design of custom network analyzer. ...
This thesis focuses on description of the current state of research in the detection of network atta...
This dissertation demonstrates and evaluates the use of passive run-time monitoring to test black-bo...
This dissertation demonstrates and evaluates the use of passive run-time monitoring to test black-bo...
This thesis is focused on design and implementation of tool for data extraction from captured networ...
International audienceCommunication protocols enable structured information exchanges between differ...
This master's thesis deals with the recognition of used protocols in a network using machine learnin...
Bachelor's thesis deals with analysis of chosen network protocols, finding their vulnerabilities and...
This bachelor thesis deals with the design of 5 laboratory tutorials where the basic principles of c...
The diploma thesis is focused on the basic properties of network protocols. The main task is to crea...
With the increasing reliance of computing on communication, it has become important to be able to re...
The goal of this work is to analyze possible ways of network protocol into application protocol enca...
AbstractWe propose a run-time monitoring and checking architecture for network protocols called Netw...
This thesis describes and explains network attacks and provides solutions how to defend against thes...