Search Results - "Gallus, Petr"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    K problematice stejnopohlavních vztahů: Manželství a partnerství by Gallus, Petr

    Published in Teologická reflexe (17-09-2024)
    “…The article is based on the differentiation between marriage as the institutional dimension and partnership as the relational dimension of an intimate relation…”
    Get full text
    Journal Article
  2. 2

    Teologická antropologie v době biotechnologického boomu by Gallus, Petr

    Published in Teologická reflexe (01-11-2021)
    “…Human 2.0? Theological anthropology in the times of bio-technological boom The ques-tion of human being is inevitable, yet the answer was and is always…”
    Get full text
    Journal Article
  3. 3

    The use of Pantherpix pixel detector in radiotherapy QA by Dudas, Denis, Semmler, Milan, Průša, Petr, Neue, Gordon, Koniarova, Irena, Peterkova, Katerina, Gallus, Petr, Koncek, Ondrej, Vrba, Vaclav

    Published in Physica medica (01-02-2021)
    “…•New radiation detector for medical physics.•Characterization of a radiotherapy radiation detector.•Photon counting hybrid pixel detectors for…”
    Get full text
    Journal Article
  4. 4

    Security analysis of the Raspbian Linux operating system and its settings to increase resilience against attacks via network interface by Gallus, Petr, Frantis, Petr

    “…The Internet, originally an academic network for the rapid exchange of information, has moved over time into the commercial media, business and later…”
    Get full text
    Conference Proceeding
  5. 5

    Generative Neural Networks as a Tool for Web Applications Penetration Testing by Gallus, Petr, Stepanek, Marcel, Racil, Tomas, Frantis, Petr

    “…The scientific paper delves into the potential of generative neural networks as a powerful tool for web application penetration testing. By leveraging the…”
    Get full text
    Conference Proceeding
  6. 6

    Macro Malware Development Issuses by Tai, Dang Quy, Gallus, Petr, Frantis, Petr

    “…Since the term "phishing" first appeared in the 1990s, it is by far the most common attack performed by cybercriminals. Phishing exploits "social engineering"…”
    Get full text
    Conference Proceeding