Logo

Publikacije (82)

Nazad
Miralem Mehic, P. Fazio, M. Voznák, E. Chromý

As research in quantum key distribution network technologies grows larger and more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. In this paper, we described the design of simplified simulation environment of the quantum key distribution network with multiple links and nodes. In such simulation environment, we analyzed several routing protocols in terms of the number of sent routing packets, goodput and Packet Delivery Ratio of data traffic flow using NS-3 simulator.

Miralem Mehic, J. Slachta, M. Voznák

Summary Denial of service (DoS) attack is an attempt of the attacker to disable victim's machine by depleting network or computing resources. If this attack is performed with more than one machine, it is called distributed denial of service (DDoS) attack. Covert channels are those channels which are used for information transmission even though they are neither designed nor intended to transfer information at all. In this article, we investigated the possibility of using of DDoS attack for purposes of hiding data or concealing the existing covert channel. In addition, in this paper we analyzed the possibility of detection of such covert communication with the well-known statistical method. Also, we proposed the coordination mechanisms of the attack which may be used. A lot of research has been done in order to describe and prevent DDoS attacks, yet research on steganography on this field is still scarce.

Miroslav Voznák, Ivo Zbranek, Miralem Mehic, D. Komosny, Homero Toral-Cruz, Jerry Chun Wei Lin

of unused packet fields and information encoding in traffic behaviour. The first element

M. Voznák, Ivo Zbranek, M. Mehic, D. Komosny, H. Toral-Cruz, Jerry Chun‐wei Lin

of unused packet fields and information encoding in traffic behaviour. The first element

Miralem Mehic, Marcin Niemiec, M. Voznák

Quantum key distribution (QKD) is based on the laws of quantum physics and therefore it can guarantee the highest level of security. It is used to establish the key that is used for further symmetrical encryption. Since QKD consists of several phases in which the key is reduced, it is necessary to define the equation by which the length of the raw key is calculated. In this paper, we analyse all QKD phases with an emphasis on the explanation of the process of shortening the initial key. The results are verified with a large number of tests using a quantum cryptography simulator. DOI: http://dx.doi.org/10.5755/j01.eee.21.6.13768

M. Voznák, M. Prokeš, L. Sevcik, J. Frnda, Homero Toral-Cruz, S. Jakovlev, P. Fazio, M. Mehić et al.

Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem’s occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting – Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.

P. Partila, M. Voznák, T. Peterek, M. Penhaker, V. Novák, J. Továrek, M. Mehić, L. Vojtech

Emotional states of humans and their impact on physiological and neurological characteristics are discussed in this paper. This problem is the goal of many teams who have dealt with this topic. Nowadays, it is necessary to increase the accuracy of methods for obtaining information about correlations between emotional state and physiological changes. To be able to record these changes, we focused on two majority emotional states. Studied subjects were psychologically stimulated to neutral - calm and then to the stress state. Electrocardiography, Electroencephalography and blood pressure represented neurological and physiological samples that were collected during patient’s stimulated conditions. Speech activity was recording during the patient was reading selected text. Feature extraction was calculated by speech processing operations. Classifier based on Gaussian Mixture Model was trained and tested using Mel-Frequency Cepstral Coefficients extracted from the patient's speech. All measurements were performed in a chamber with electromagnetic compatibility. The article discusses a method for determining the influence of stress emotional state on the human and his physiological and neurological changes.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više