-
Laying the Groundwork for Cybersecurity Autonomy: Training Environments and Structured Challenges C - Kapitola resp. kapitoly v odborné knizeDRAŠAR, Martin; Ádám RUMAN a Lukáš SADLEK. Laying the Groundwork for Cybersecurity Autonomy: Training Environments and Structured Challenges. Springer, 2026. Emerging Technologies in Cybersecurity.Podrobněji: https://is.muni.cz/publication/2564079/cs
-
Attack Surface Management: State of the Art and Operational Challenges D - Stať ve sborníkuHUSÁK, Martin a Lukáš SADLEK. Attack Surface Management: State of the Art and Operational Challenges. Online. In 2025 IEEE 11th International Conference on Network Softwarization (NetSoft). New York, NY: IEEE, 2025, s. 597-602. ISBN 979-8-3315-4346-4. Dostupné z: https://doi.org/10.1109/NetSoft64993.2025.11080588.Podrobněji: https://is.muni.cz/publication/2498322/cs
-
Fast and Configurable Detection of Device Dependencies in Network Traffic D - Stať ve sborníkuDUSIL, Jakub; Martin HUSÁK a Lukáš SADLEK. Fast and Configurable Detection of Device Dependencies in Network Traffic. Online. In Walter Cerroni, Mauro Tortonesi, Davide Borsatti, Alberto Egon Schaeffer-Filho, Daphné Tuncer, Jérôme François, Martin Husák. 21st International Conference on Network and Service Management. New York, NY: IEEE, 2025, s. 1-6. ISBN 978-3-903176-75-1. Dostupné z: https://doi.org/10.23919/CNSM67658.2025.11297543.Podrobněji: https://is.muni.cz/publication/2529244/cs
-
Funkční vzorek platformy pro testování autonomních kyberbezpečnostních systémů, jenž byl využit pro realizaci kyberbezpečnostní soutěže G - Technicky realizované výsledky (prototyp, funkční vzorek)DRAŠAR, Martin; Ádám RUMAN a Lukáš SADLEK. Funkční vzorek platformy pro testování autonomních kyberbezpečnostních systémů, jenž byl využit pro realizaci kyberbezpečnostní soutěže. 2025.Podrobněji: https://is.muni.cz/publication/2564078/cs
-
Severity-Based Triage of Cybersecurity Incidents Using Kill Chain Attack Graphs J - Článek v odborném periodikuSADLEK, Lukáš; Muhammad Mudassar YAMIN; Pavel ČELEDA a Basel KATT. Severity-Based Triage of Cybersecurity Incidents Using Kill Chain Attack Graphs. Journal of Information Security and Applications. Elsevier, 2025, roč. 89, March 2025, s. 1-18. ISSN 2214-2126. Dostupné z: https://doi.org/10.1016/j.jisa.2024.103956.Podrobněji: https://is.muni.cz/publication/2468764/cs
-
The Resilmesh Architecture: Situation Aware Enabled Cyber Resilience for Dispersed, Heterogenous Cyber Systems D - Stať ve sborníkuBERNAL BERNABE, Jorge; Brian LEE; Martin HUSÁK; Lukáš SADLEK; Branka STOJANOVIĆ; Michael SOMMA; Jorgeley Inacio DE OLIVEIRA; Ekam PURI NIETO; Pablo FERNANDEZ SAURA; Antonio SKARMETA a Vinh HOA LA. The Resilmesh Architecture: Situation Aware Enabled Cyber Resilience for Dispersed, Heterogenous Cyber Systems. Online. In 2025 IEEE 11th International Conference on Network Softwarization (NetSoft). New York, NY: IEEE, 2025, s. 621-626. ISBN 979-8-3315-4345-7. Dostupné z: https://doi.org/10.1109/NetSoft64993.2025.11080622.Podrobněji: https://is.muni.cz/publication/2498321/cs
-
Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification D - Stať ve sborníkuRUMAN, Ádám; Martin DRAŠAR; Lukáš SADLEK; Shanchieh Jay YANG a Pavel ČELEDA. Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Online. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. New York, United States: Association for Computing Machinery, 2024, s. 1-11. ISBN 979-8-4007-1718-5. Dostupné z: https://doi.org/10.1145/3664476.3664523.Podrobněji: https://is.muni.cz/publication/2407277/cs
-
Cyber Key Terrain Identification Using Adjusted PageRank Centrality D - Stať ve sborníkuSADLEK, Lukáš a Pavel ČELEDA. Cyber Key Terrain Identification Using Adjusted PageRank Centrality. Online. In Meyer, N., Grocholewska-Czuryło, A. ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Cham: Springer, 2024, s. 293-306. ISBN 978-3-031-56325-6. Dostupné z: https://doi.org/10.1007/978-3-031-56326-3_21.Podrobněji: https://is.muni.cz/publication/2303643/cs
-
Hierarchical Modeling of Cyber Assets in Kill Chain Attack Graphs D - Stať ve sborníkuSADLEK, Lukáš; Martin HUSÁK a Pavel ČELEDA. Hierarchical Modeling of Cyber Assets in Kill Chain Attack Graphs. Online. In Varga, P; Celeda, P; Wauters, T; Tortonesi, M; Francois, J; Jimenez, JG. 2024 20th International Conference on Network and Service Management (CNSM). New York, NY: IFIP Open Digital Library, IEEE Xplore, 2024, s. 1-5. ISBN 978-3-903176-66-9. Dostupné z: https://doi.org/10.23919/CNSM62983.2024.10814501.Podrobněji: https://is.muni.cz/publication/2441297/cs
-
Identification of Device Dependencies Using Link Prediction D - Stať ve sborníkuSADLEK, Lukáš; Martin HUSÁK a Pavel ČELEDA. Identification of Device Dependencies Using Link Prediction. Online. In Hong, JWK; Seok, SJ; Nomura, Y; Wang, YC; Choi, BY; Kim, MS; Riggio, R; Tsai, MH; DosSantos, CRP. PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024. Seoul, South Korea: IEEE Xplore Digital Library, 2024, s. 1-10. ISBN 979-8-3503-2794-6. Dostupné z: https://doi.org/10.1109/NOMS59830.2024.10575713.Podrobněji: https://is.muni.cz/publication/2368109/cs
-
The Evolution of the CRUSOE Toolset: Enhancing Decision Support in Network Security Management D - Stať ve sborníkuHUSÁK, Martin; Lukáš SADLEK; Martin HESKO; Vít ŠEBELA a Stanislav ŠPAČEK. The Evolution of the CRUSOE Toolset: Enhancing Decision Support in Network Security Management. Online. In Varga, P; Celeda, P; Wauters, T; Tortonesi, M; Francois, J; Jimenez, JG. 2024 20th International Conference on Network and Service Management (CNSM). New York, NY: IEEE, 2024, s. 1-3. ISBN 979-8-3315-0515-8. Dostupné z: https://doi.org/10.23919/CNSM62983.2024.10814288.Podrobněji: https://is.muni.cz/publication/2445466/cs
-
Workshop on designing cybersecurity challenges for autonomous agents W - Uspořádání workshopuDRAŠAR, Martin; Ádám RUMAN a Lukáš SADLEK. Workshop on designing cybersecurity challenges for autonomous agents. 2024.Podrobněji: https://is.muni.cz/publication/2564037/cs
-
CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling J - Článek v odborném periodikuHUSÁK, Martin; Lukáš SADLEK; Stanislav ŠPAČEK; Martin LAŠTOVIČKA; Michal JAVORNÍK a Jana KOMÁRKOVÁ. CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling. Computers & Security. Elsevier, 2022, roč. 115, April, s. 1-19. ISSN 0167-4048. Dostupné z: https://doi.org/10.1016/j.cose.2022.102609.Podrobněji: https://is.muni.cz/publication/1822842/cs
-
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations D - Stať ve sborníkuSADLEK, Lukáš; Pavel ČELEDA a Daniel TOVARŇÁK. Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna, Austria: ACM, 2022, s. 1-8. ISBN 978-1-4503-9670-7. Dostupné z: https://doi.org/10.1145/3538969.3544458.Podrobněji: https://is.muni.cz/publication/1862998/cs
-
Identification of Attack Paths Using Kill Chain and Attack Graphs D - Stať ve sborníkuSADLEK, Lukáš; Pavel ČELEDA a Daniel TOVARŇÁK. Identification of Attack Paths Using Kill Chain and Attack Graphs. Online. In NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2022, s. 1-6. ISBN 978-1-6654-0601-7. Dostupné z: https://doi.org/10.1109/NOMS54207.2022.9789803.Podrobněji: https://is.muni.cz/publication/1844382/cs
-
Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations D - Stať ve sborníkuTOVARŇÁK, Daniel; Lukáš SADLEK a Pavel ČELEDA. Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021). Washington DC, USA: IEEE, 2021, s. 986-991. ISBN 978-3-903176-32-4.Podrobněji: https://is.muni.cz/publication/1786631/cs
-
Decision Support for Mission-Centric Network Security Management D - Stať ve sborníkuJAVORNÍK, Michal; Jana KOMÁRKOVÁ; Lukáš SADLEK a Martin HUSÁK. Decision Support for Mission-Centric Network Security Management. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, s. 1-6. ISBN 978-1-7281-4973-8. Dostupné z: https://doi.org/10.1109/NOMS47738.2020.9110261.Podrobněji: https://is.muni.cz/publication/1627838/cs
-
Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks D - Stať ve sborníkuLAŠTOVIČKA, Martin; Martin HUSÁK a Lukáš SADLEK. Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2020, s. 1-6. ISBN 978-1-7281-4973-8. Dostupné z: https://doi.org/10.1109/NOMS47738.2020.9110394.Podrobněji: https://is.muni.cz/publication/1605419/cs
-
Software pro podporu rozhodování při řešení bezpečnostního incidentu (software) R - SoftwareSADLEK, Lukáš; Michal JAVORNÍK a Martin HUSÁK. Software pro podporu rozhodování při řešení bezpečnostního incidentu. 2020.Podrobněji: https://is.muni.cz/publication/1724737/cs
-
Community Based Platform for Vulnerability Categorization D - Stať ve sborníkuKOMÁRKOVÁ, Jana; Lukáš SADLEK a Martin LAŠTOVIČKA. Community Based Platform for Vulnerability Categorization. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, s. nestránkováno, 2 s. ISBN 978-1-5386-3416-5. Dostupné z: https://doi.org/10.1109/NOMS.2018.8406125.Podrobněji: https://is.muni.cz/publication/1407187/cs