Masarykova univerzita

Výpis publikací

česky | in English

Filtrování publikací

    2024

    1. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Martin HORÁK, Martin HOFBAUER a Pavel ČELEDA. From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24) [to appear]. New York, NY, USA. 7 s. ISBN 979-8-4007-0600-4. Dostupné z: https://dx.doi.org/10.1145/3649217.3653639
    2. VYKOPAL, Jan, Pavel ČELEDA, Valdemar ŠVÁBENSKÝ, Martin HOFBAUER a Martin HORÁK. Research and Practice of Delivering Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24) [to appear]. New York, NY, USA. 7 s. ISBN 979-8-4007-0600-4. Dostupné z: https://dx.doi.org/10.1145/3649217.3653642

    2023

    1. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA a Ján DOVJAK. Automated Feedback for Participants of Hands-on Cybersecurity Training. Online. Education and Information Technologies. Springer, roč. 2023, č. 11, s. 1-30. ISSN 1360-2357. Dostupné z: https://dx.doi.org/10.1007/s10639-023-12265-8
    2. BEURAN, Razvan, Jan VYKOPAL, Daniela BELAJOVÁ, Pavel ČELEDA, Yasuo TAN a Yoichi SHINODA. Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. Online. Computers & Security. Elsevier, roč. 128, č. 103120, s. 1-14. ISSN 0167-4048. Dostupné z: https://dx.doi.org/10.1016/j.cose.2023.103120
    3. VYKOPAL, Jan, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ a Pavel ČELEDA. Smart Environment for Adaptive Learning of Cybersecurity Skills. Online. IEEE Transactions on Learning Technologies. roč. 16, č. 3, s. 443-456. ISSN 1939-1382. Dostupné z: https://dx.doi.org/10.1109/TLT.2022.3216345
    4. KRAUS, Lydia, Valdemar ŠVÁBENSKÝ, Martin HORÁK, Václav MATYÁŠ, Jan VYKOPAL a Pavel ČELEDA. Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. Online. In Proceedings of the 28th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'23). New York, NY, USA: ACM. s. 236-242. ISBN 979-8-4007-0138-2. Dostupné z: https://dx.doi.org/10.1145/3587102.3588862

    2022

    1. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA a Lydia KRAUS. Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training. Online. Education and Information Technologies. Springer, roč. 27, č. 9, s. 12179 - 12212. ISSN 1360-2357. Dostupné z: https://dx.doi.org/10.1007/s10639-022-11093-6
    2. SUFATRIO, Sufatrio, Ee-Chien CHANG a Jan VYKOPAL. Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications. Online. In Australasian Computing Education Conference (ACE '22). New York, NY, USA: Association for Computing Machinery. s. 114-122. ISBN 978-1-4503-9643-1. Dostupné z: https://dx.doi.org/10.1145/3511861.3511874
    3. ŠEDA, Pavel, Jan VYKOPAL, Pavel ČELEDA a Igor IGNÁC. Designing Adaptive Cybersecurity Hands-on Training. Online. In 2022 IEEE Frontiers in Education Conference (FIE). Uppsala, Sweden: IEEE. s. 1-8. ISBN 978-1-6654-6244-0. Dostupné z: https://dx.doi.org/10.1109/FIE56618.2022.9962663
    4. ŠVÁBENSKÝ, Valdemar, Richard WEISS, Jack COOK, Jan VYKOPAL, Pavel ČELEDA, Jens MACHE, Radoslav CHUDOVSKÝ a Ankur CHATTOPADHYAY. Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. Online. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22). New York, NY, USA: ACM. s. 787-793. ISBN 978-1-4503-9070-5. Dostupné z: https://dx.doi.org/10.1145/3478431.3499414
    5. VYKOPAL, Jan, Valdemar ŠVÁBENSKÝ, Pavel ŠEDA a Pavel ČELEDA. Preventing Cheating in Hands-on Lab Assignments. Online. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22). New York, NY, USA: ACM. s. 78-84. ISBN 978-1-4503-9070-5. Dostupné z: https://dx.doi.org/10.1145/3478431.3499420
    6. ČELEDA, Pavel, Igor IGNÁC, Boris JADUŠ, Erik KOČAMBA, Lukáš MAJDAN, Dominik PILÁR, Pavel ŠEDA a Jan VYKOPAL. Software inteligentního asistenta pro hraní bezpečnostních her. Online
    7. ANDONIADIS, Kamil, Pavel ČELEDA, Karolína DOČKALOVÁ BURSKÁ, Igor IGNÁC, Martin JUHÁS, Erik KOČAMBA, Radek OŠLEJŠEK, Juraj PALUBA, Dominik PILÁR, Pavel ŠEDA, Michal URBAN a Jan VYKOPAL. Software pro přípravu a realizaci bezpečnostních her. Online
    8. ČELEDA, Pavel, Karolína DOČKALOVÁ BURSKÁ, Igor IGNÁC, Martin JUHÁS, Erik KOČAMBA, Radek OŠLEJŠEK, Dominik PILÁR, Pavel ŠEDA a Jan VYKOPAL. Software pro sběr a vyhodnocení dat z bezpečnostních her. Online
    9. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA, Kristián TKÁČIK a Daniel POPOVIČ. Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering. Online. Education and Information Technologies. Springer, roč. 27, č. 7, s. 9231-9262. ISSN 1360-2357. Dostupné z: https://dx.doi.org/10.1007/s10639-022-10954-4

    2021

    1. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína DOČKALOVÁ BURSKÁ, Valdemar ŠVÁBENSKÝ, Jan VYKOPAL a Jakub ČEGAN. Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. Online. IEEE Transactions on Visualization and Computer Graphics. roč. 27, č. 8, s. 3425-3437. ISSN 1077-2626. Dostupné z: https://dx.doi.org/10.1109/TVCG.2020.2977336
    2. PÄIJÄNEN, Jani, Karo SAHARINEN, Jarno SALONEN, Tuomo SIPOLA, Jan VYKOPAL a Tero KOKKONEN. Cyber Range: Preparing for Crisis or Something Just for Technical People?. Online. In Proceeding of the 20th European Conference on Cyber Warfare and Security (ECCWS 2021). Reading, UK: Academic Conferences International Limited. s. 322-330. ISBN 978-1-912764-99-0
    3. ŠVÁBENSKÝ, Valdemar, Pavel ČELEDA, Jan VYKOPAL a Silvia BRIŠÁKOVÁ. Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges. Online. Computers & Security. Elsevier, roč. 102, č. 102154, s. 1-14. ISSN 0167-4048. Dostupné z: https://dx.doi.org/10.1016/j.cose.2020.102154
    4. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ŠEDA a Pavel ČELEDA. Dataset of Shell Commands Used by Participants of Hands-on Cybersecurity Training. Online. Data in Brief. Elsevier, roč. 38, September, s. 1-9. ISSN 2352-3409. Dostupné z: https://dx.doi.org/10.1016/j.dib.2021.107398
    5. ŠEDA, Pavel, Jan VYKOPAL, Valdemar ŠVÁBENSKÝ a Pavel ČELEDA. Reinforcing Cybersecurity Hands-on Training With Adaptive Learning. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE. s. 1-9. ISBN 978-1-6654-3851-3. Dostupné z: https://dx.doi.org/10.1109/FIE49875.2021.9637252
    6. VYKOPAL, Jan, Pavel ČELEDA, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ a Daniel TOVARŇÁK. Scalable Learning Environments for Teaching Cybersecurity Hands-on. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE. s. 1-9. ISBN 978-1-6654-3851-3. Dostupné z: https://dx.doi.org/10.1109/FIE49875.2021.9637180
    7. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Daniel TOVARŇÁK a Pavel ČELEDA. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE. s. 1-9. ISBN 978-1-6654-3851-3. Dostupné z: https://dx.doi.org/10.1109/FIE49875.2021.9637052
    8. GÁLIKOVÁ, Miriam, Valdemar ŠVÁBENSKÝ a Jan VYKOPAL. Toward Guidelines for Designing Cybersecurity Serious Games. Online. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE '21). ISBN 978-1-4503-8062-1. Dostupné z: https://dx.doi.org/10.1145/3408877.3439568

    2020

    1. VYKOPAL, Jan, Valdemar ŠVÁBENSKÝ a Ee-Chien CHANG. Benefits and Pitfalls of Using Capture The Flag Games in University Courses. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM. s. 752-758. ISBN 978-1-4503-6793-6. Dostupné z: https://dx.doi.org/10.1145/3328778.3366893
    2. ČELEDA, Pavel, Jan VYKOPAL, Valdemar ŠVÁBENSKÝ a Karel SLAVÍČEK. KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM. s. 1026-1032. ISBN 978-1-4503-6793-6. Dostupné z: https://dx.doi.org/10.1145/3328778.3366908
    3. TOVARŇÁK, Daniel, Stanislav ŠPAČEK a Jan VYKOPAL. Traffic and Log Data Captured During a Cyber Defense Exercise. Online. Data in Brief. roč. 31, August, s. 1-11. ISSN 2352-3409. Dostupné z: https://dx.doi.org/10.1016/j.dib.2020.105784
    4. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL a Pavel ČELEDA. What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM. s. 2-8. ISBN 978-1-4503-6793-6. Dostupné z: https://dx.doi.org/10.1145/3328778.3366816

    2019

    1. ČELEDA, Pavel, Jakub ČEGAN, Karolína DOČKALOVÁ BURSKÁ, Jan DUDA, Martin HAMERNÍK, Miroslava JAREŠOVÁ, Erik KOČAMBA, Radek OŠLEJŠEK, Vít RUSŇÁK, Daniel TOVARŇÁK, Hai Duong TRAN, Jan VYKOPAL a Kristína ZÁKOPČANOVÁ. Software pro provádění bezpečnostních cvičení a školení. Online
    2. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Milan ČERMÁK, Jan DUDA, Vlastimil HOLER, Ľuboš HYŽÁK, Boris JADUŠ, Jakub KADAŠI, David LEŠKA, Martin MACHÁČ, Ivo NUTÁR, Radek OŠLEJŠEK, Dominik PILÁR, Tomáš PLESNÍK, Michal PROCHÁZKA, Tomáš REBOK, Vít RUSŇÁK, Miloslav STANĚK, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Jan VYKOPAL a Tatiana ZBONČÁKOVÁ. Software pro simulaci obecných i kritických informačních infrastruktur. Online
    3. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL a Pavel ČELEDA. Towards Learning Analytics in Cybersecurity Capture the Flag Games. Online. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). ISBN 978-1-4503-5890-3. Dostupné z: https://dx.doi.org/10.1145/3287324.3293816
    4. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína BURSKÁ, Valdemar ŠVÁBENSKÝ a Jan VYKOPAL. Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. Online. In Gove R., Arendt D., Kohlhammer J., Angelini M., Lyn Paul, C., Bryan C. McKenna S., Prigent N., Najafi P., Sopan A. 2019 IEEE Symposium on Visualization for Cyber Security (VizSec). Vancouver, BC, Canada: IEEE. s. 1-11. ISBN 978-1-7281-3876-3. Dostupné z: https://dx.doi.org/10.1109/VizSec48167.2019.9161386

    2018

    1. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Milan ČERMÁK a Martin LAŠTOVIČKA. Enhancing Cybersecurity Skills by Creating Serious Games. Online. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'18). Larnaca, Cyprus: ACM. s. 194-199. ISBN 978-1-4503-5707-4. Dostupné z: https://dx.doi.org/10.1145/3197091.3197123
    2. OŠLEJŠEK, Radek, Jan VYKOPAL, Karolína BURSKÁ a Vít RUSŇÁK. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. Online. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18). San Jose, California, USA: IEEE. s. 1-9. ISBN 978-1-5386-1173-9. Dostupné z: https://dx.doi.org/10.1109/FIE.2018.8659299
    3. ŠVÁBENSKÝ, Valdemar a Jan VYKOPAL. Gathering Insights from Teenagers' Hacking Experience with Authentic Cybersecurity Tools. Online. In 2018 IEEE Frontiers in Education Conference (FIE). San Jose, California, USA: IEEE. s. 1414-1417. ISBN 978-1-5386-1175-3. Dostupné z: https://dx.doi.org/10.1109/FIE.2018.8658840
    4. ŠVÁBENSKÝ, Valdemar a Jan VYKOPAL. Challenges Arising from Prerequisite Testing in Cybersecurity Games. Online. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE’18). Baltimore, Maryland, USA: ACM. s. 56-61. ISBN 978-1-4503-5103-4. Dostupné z: https://dx.doi.org/10.1145/3159450.3159454
    5. VYKOPAL, Jan, Radek OŠLEJŠEK, Karolína BURSKÁ a Kristína ZÁKOPČANOVÁ. Timely Feedback in Unstructured Cybersecurity Exercises. Online. In Proceedings of Special Interest Group on Computer Science Education, Baltimore, Maryland, USA, February 21–24, 2018(SIGCSE’18). New York, NY, USA: ACM. s. 173-178. ISBN 978-1-4503-5103-4. Dostupné z: https://dx.doi.org/10.1145/3159450.3159561

    2017

    1. HUSÁK, Martin, Milan ČERMÁK, Martin LAŠTOVIČKA a Jan VYKOPAL. Exchanging Security Events: Which And How Many Alerts Can We Aggregate?. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE. s. 604-607. ISBN 978-3-901882-89-0. Dostupné z: https://dx.doi.org/10.23919/INM.2017.7987340
    2. VYKOPAL, Jan a Jakub ČEGAN. Finding Exercise Equilibrium: How to Support the Game Balance at the Very Beginning?. Online. ISBN 978-1-4503-4698-6. Dostupné z: https://dx.doi.org/10.1145/3017680.3022409
    3. VYKOPAL, Jan, Radek OŠLEJŠEK, Pavel ČELEDA, Martin VIZVÁRY a Daniel TOVARŇÁK. KYPO Cyber Range: Design and Use Cases. Online. In Cardoso J.,Cardoso J.,Maciaszek L.,Maciaszek L.,van Sinderen M.,Cabello E. Proceedings of the 12th International Conference on Software Technologies - Volume 1: ICSOFT. Madrid, Spain: SciTePress. s. 310-321. ISBN 978-989-758-262-2. Dostupné z: https://dx.doi.org/10.5220/0006428203100321
    4. VYKOPAL, Jan, Martin VIZVÁRY, Radek OŠLEJŠEK, Pavel ČELEDA a Daniel TOVARŇÁK. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. Online. In 2017 IEEE Frontiers in Education Conference. Indianapolis, IN, USA: IEEE. s. 1-8. ISBN 978-1-5090-5919-5. Dostupné z: https://dx.doi.org/10.1109/FIE.2017.8190713

    2016

    1. VYKOPAL, Jan a Miloš BARTÁK. On the Design of Security Games: From Frustrating to Engaging Learning. Online

    2015

    1. VYKOPAL, Jan. Break your network. Responsibly.. Online
    2. BARTÁK, Miloš a Jan VYKOPAL. Detekce zranitelností a útoků pomocí NetFlow dat, validace zranitelností na systému FlowMon. Online. Brno: INVEA-TECH a.s. 25 s. 20151113
    3. ČELEDA, Pavel, Jakub ČEGAN, Jan VYKOPAL a Daniel TOVARŇÁK. KYPO – A Platform for Cyber Defence Exercises. Online. In STO-MP-MSG-133: M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber Defence. Munich (Germany): NATO Science and Technology Organization. s. nestránkováno, 12 s. ISBN 978-92-837-2020-1. Dostupné z: https://dx.doi.org/10.14339/STO-MP-MSG-133-08-doc
    4. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Radek OŠLEJŠEK, Zdenek EICHLER, Dalibor TOTH, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Václav RAČANSKÝ, Ivo NUTÁR a Dušan LAGO. KYPO - Kybernetický polygon. Online
    5. HUSÁK, Martin, Petr VELAN a Jan VYKOPAL. Security Monitoring of HTTP Traffic Using Extended Flows. Online. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE. s. 258-265. ISBN 978-1-4673-6590-1. Dostupné z: https://dx.doi.org/10.1109/ARES.2015.42
    6. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Ivo NUTÁR a Dušan LAGO. Software pro konfiguraci a monitorování virtuálního prostředí KYPO. Online
    7. OŠLEJŠEK, Radek, Zdenek EICHLER, Dalibor TOTH, Pavel ČELEDA, Jakub ČEGAN, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Martin VIZVÁRY a Jan VYKOPAL. Software pro vizualizaci virtuálního prostředí KYPO. Online

    2014

    1. KOUŘIL, Daniel, Tomáš REBOK, Tomáš JIRSÍK, Jakub ČEGAN, Martin DRAŠAR, Martin VIZVÁRY a Jan VYKOPAL. Cloud-based Testbed for Simulation of Cyber Attacks. Online. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library. s. 1-6. ISBN 978-1-4799-0913-1. Dostupné z: https://dx.doi.org/10.1109/NOMS.2014.6838298
    2. VYKOPAL, Jan. Cybernetic Proving Ground - Cloud-based Testbed for Simulation of Cyber Attacks. Online
    3. ČERMÁK, Milan, Pavel ČELEDA a Jan VYKOPAL. Detection of DNS Traffic Anomalies in Large Networks. Online. In Yvon Kermarrec. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg: Springer International Publishing. s. 215-226. ISBN 978-3-319-13487-1. Dostupné z: https://dx.doi.org/10.1007/978-3-319-13488-8_20
    4. VIZVÁRY, Martin a Jan VYKOPAL. Future of DDoS Attacks Mitigation in Software Defined Networks. Online. In Sperotto, Anna and Doyen, Guillaume and Latré, Steven and Charalambides, Marinos and Stiller, Burkhard. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin: Springer Berlin Heidelberg. s. 123-127. ISBN 978-3-662-43861-9. Dostupné z: https://dx.doi.org/10.1007/978-3-662-43862-6_15
    5. HUSÁK, Martin a Jan VYKOPAL. POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats. Online
    6. VIZVÁRY, Martin, Tomáš PLESNÍK a Jan VYKOPAL. Rozvoj detekčních schopností a platformy sonda/kolektor. Online. Brno: INVEA-TECH a.s. 15 s. 20141231
    7. DRAŠAR, Martin, Martin VIZVÁRY a Jan VYKOPAL. Similarity as a central approach to flow-based anomaly detection. Online. International Journal of Network Management. John Wiley & Sons, Ltd., roč. 24, č. 4, s. 318-336. ISSN 1055-7148. Dostupné z: https://dx.doi.org/10.1002/nem.1867
    8. ČELEDA, Pavel, Iva KREJČÍ a Jan VYKOPAL. 8th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014). Online

    2013

    1. VYKOPAL, Jan, Martin DRAŠAR a Philipp WINTER. Flow-based Brute-force Attack Detection. Online. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. Stuttgart: Fraunhofer Verlag. s. 41-51. ISBN 978-3-8396-0474-8
    2. VIZVÁRY, Martin a Jan VYKOPAL. Flow-based detection of RDP brute-force attacks. Online. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany. s. 131-138. ISBN 978-80-7231-922-0
    3. VYKOPAL, Jan. Network security monitoring working group. Online
    4. VYKOPAL, Jan. SimFlow - a similarity-based detection of brute-force attacks. Online
    5. REJCHRT, Jan, Tomáš JIRSÍK a Jan VYKOPAL. Time Series Solver. Online
    6. KÁCHA, Pavel, Andrea KROPÁČOVÁ a Jan VYKOPAL. WARDEN: realtime sharing of detected threats between CSIRT teams. Online

    2012

    1. VYKOPAL, Jan. Army & Academia Cyber Security Research in Czech Republic. Online
    2. KRMÍČEK, Vojtěch a Jan VYKOPAL. Automatic Network Protection Scenarios Using NetFlow. Online
    3. DRAŠAR, Martin a Jan VYKOPAL. Bruteforcing in the Shadows - Evading Automated Detection. Online
    4. HUSÁK, Martin a Jan VYKOPAL. Honeynet monitoring plugin. Online
    5. ČEGAN, Jakub, Jan SOUKAL, Martin DRAŠAR a Jan VYKOPAL. PhiGARo – tool for phishing incident processing. Online
    6. VIZVÁRY, Martin a Jan VYKOPAL. RdpMonitor - RDP authentication attack detection plugin. Online
    7. VYKOPAL, Jan a Martin VIZVÁRY. SSH brute-force attack detection plugin. Online
    8. VYKOPAL, Jan. Výzkum v oblasti kybernetické bezpečnosti na Masarykově univerzitě od roku 2008. Online

    2011

    1. VYKOPAL, Jan. A Flow-Level Taxonomy and Prevalence of Brute Force Attacks. Online. In Advances in Computing and Communications. Berlin: Springer Berlin Heidelberg. s. 666-675. ISBN 978-3-642-22714-1. Dostupné z: https://dx.doi.org/10.1007/978-3-642-22714-1_69
    2. VYKOPAL, Jan, Vojtěch KRMÍČEK a Pavel ČELEDA. Flow-based Network Protection as an Integral Part of an Early Warning System. Online
    3. VYKOPAL, Jan a Jan SOUKAL. Phishing at your own risk. Online
    4. PISKAČ, Pavel, Michal TRUNEČKA a Jan VYKOPAL. Plugin for detecting of time variation in network connections. Online

    2010

    1. DRAŠAR, Martin, Jan VYKOPAL, Radek KREJČÍ a Pavel ČELEDA. Aspect-based Attack Detection in Large-scale Networks. Online. In Recent Advances in Intrusion Detection. Berlin: Springer Berlin / Heidelberg. s. 488 - 489. ISBN 978-3-642-15511-6
    2. ČELEDA, Pavel, Radek KREJČÍ, Jan VYKOPAL a Martin DRAŠAR. Embedded Malware - An Analysis of the Chuck Norris Botnet. Online. In European Conference on Computer Network Defense. 1. vyd. Los Alamitos, CA: IEEE Computer Society. s. 3-10. ISBN 978-1-4244-9377-7. Dostupné z: https://dx.doi.org/10.1109/EC2ND.2010.15
    3. VYKOPAL, Jan a Pavel MINAŘÍK. From Signature-Based Towards Behaviour-Based Anomaly Detection. Online. In RTO-MP-IST-091 PRE-RELEASE: Information Assurance and Cyber Defence. Neuveden: NATO Research and Technology Organisation. 4 s. ISBN 978-92-835-0115-2
    4. ČELEDA, Pavel, Jiří NOVOTNÝ, Jan VYKOPAL a Tomáš PLESNÍK. Hardware-Accelerated and Security Research at Masaryk University. Online
    5. ČELEDA, Pavel, Radek KREJČÍ a Jan VYKOPAL. Chuck Norris Botnet. Online. 1. vyd
    6. PLESNÍK, Tomáš, Michal TRUNEČKA, Pavel PISKAČ, Jan VYKOPAL a Pavel ČELEDA. Chuck Norris botnet detection plugin. Online
    7. DRAŠAR, Martin, Martin JUŘEN, Daniel KOUŘIL, Pavel MINAŘÍK, Michal PROCHÁZKA a Jan VYKOPAL. Intelligent logging server. Online. Warsaw: SECURE 2010
    8. ČELEDA, Pavel, Jan VYKOPAL, Tomáš PLESNÍK, Michal TRUNEČKA a Vojtěch KRMÍČEK. Malware Detection From The Network Perspective Using NetFlow Data. Online

    2009

    1. ČELEDA, Pavel, Vojtěch KRMÍČEK a Jan VYKOPAL. Analýza bezpečnostních rizik počítačové sítě pomocí NetFlow. Online
    2. MINAŘÍK, Pavel, Vojtěch KRMÍČEK a Jan VYKOPAL. Improving Host Profiling With Bidirectional Flows. Online. In 2009 International Conference on Computational Science and Engineering. Vancouver, Canada: IEEE Computer Society. s. 231-237. ISBN 978-0-7695-3823-5
    3. KRMÍČEK, Vojtěch, Jan VYKOPAL a Radek KREJČÍ. Netflow Based System for NAT Detection. Online. In Co-Next Student Workshop '09: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies. New York, NY, USA: ACM. s. 23-24. ISBN 978-1-60558-751-6
    4. VYKOPAL, Jan. NetFlow, monitorování IP toků a bezpečnost sítě. Online. In Sborník příspěvků z 35. konference EurOpen.CZ, 4.-7. října 2009. první. Plzeň: EurOpen.CZ. s. 63-70. ISBN 978-80-86583-17-4
    5. KRMÍČEK, Vojtěch, Jan VYKOPAL, Tomáš PLESNÍK, Andrej RUŽIČKA, Pavel ČELEDA a Michal TRUNEČKA. NetFlow-based NAT detection module. Online
    6. VYKOPAL, Jan, Tomáš PLESNÍK a Pavel MINAŘÍK. Network-based Dictionary Attack Detection. Online. In Proceedings of International Conference on Future Networks (ICFN 2009). Los Alamitos, CA, USA: IEEE Computer Society. s. 23-27. ISBN 978-0-7695-3567-8
    7. VYKOPAL, Jan, Tomáš PLESNÍK a Pavel MINAŘÍK. Validation of the Network-based Dictionary Attack Detection. Online. In Security and Protection of Information 2009, Proceeding of the Conference. Brno: University of Defence. s. 128-136, 190 s. ISBN 978-80-7231-641-0

    2008

    1. VYKOPAL, Jan a Tomáš MRÁZEK. Packet Capture Benchmark on 1 GE. Online
Zobrazit podrobně
Zobrazeno: 24. 4. 2024 11:27