Your selection contains 527 outcomes. Edit selection.
Filter publications

    2024

    1. LAGRAA, Sofiane, Martin HUSÁK, Hamida SEBA, Satyanarayana VUPPALA, Radu STATE and Moussa OUEDRAOGO. A review on graph-based approaches for network security monitoring and botnet detection. International Journal of Information Security. Springer, 2024, vol. 23, No 1, p. 119-140. ISSN 1615-5262. Available from: https://dx.doi.org/10.1007/s10207-023-00742-7.
    2. RUMAN, Ádám, Martin DRAŠAR, Lukáš SADLEK, Shanchieh Jay YANG and Pavel ČELEDA. Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Online. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. New York, United States: Association for Computing Machinery, 2024, 11 pp. ISBN 979-8-4007-1718-5. Available from: https://dx.doi.org/10.1145/3664476.3664523.
    3. SADLEK, Lukáš and Pavel ČELEDA. Cyber Key Terrain Identification Using Adjusted PageRank Centrality. Online. In Meyer, N., Grocholewska-Czuryło, A. ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Cham: Springer, 2024, p. 293-306. ISBN 978-3-031-56325-6. Available from: https://dx.doi.org/10.1007/978-3-031-56326-3_21.
    4. DAUBNER, Lukáš, Sofija MAKSOVIĆ, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš SEDLÁČEK. Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design. Online. In International Conference on Research Challenges in Information Science (RCIS 2024). Neuveden: Springer, 2024, p. 47–55. ISBN 978-3-031-59467-0. Available from: https://dx.doi.org/10.1007/978-3-031-59468-7_6.
    5. DAUBNER, Lukáš, Sofija MAKSOVIĆ and Tomáš SEDLÁČEK. FREAS: Forensic-Ready Analysis Suite. 2024.
    6. SADLEK, Lukáš, Martin HUSÁK and Pavel ČELEDA. Identification of Device Dependencies Using Link Prediction. Online. In NOMS 2024 - 2024 IEEE/IFIP Network Operations and Management Symposium. IEEE Xplore Digital Library, 2024, 10 pp. Available from: https://dx.doi.org/10.1109/NOMS59830.2024.10575713.
    7. KRÁČMAROVÁ, Tereza, Markéta JASANSKÁ, Daniel BARTÁK, Pavel BREJCHA, Lucie ČEJKOVÁ, Johana JEŠÁTKOVÁ, Ondřej KAŠKA, Jan MARTÍNEK, Eva MEDZIHORSKÁ, Tina MIZEROVÁ, Maria PYTLOVÁ, Tomáš ŘEPA, Adéla SCHREIBEROVÁ, Kateřina SÝKOROVÁ, David ŠPŮREK, Julie VINKLOVÁ and Zuzana VRBECKÁ. Slovník mediální gramotnosti. První vydání. Brno: Nugis Finem Publishing, 2024, 120 pp. ISBN 978-80-7614-009-7.
    8. DRAŠAR, Martin, Ádám RUMAN, Pavel ČELEDA and Yang SCHANCHIEH. The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments. Online. In Sokratis Katsikas et al. ESORICS 2023: Computer Security. ESORICS 2023 International Workshops. Neuveden: Springer Nature Switzerland AG, 2024, p. 738-749. ISBN 978-3-031-54128-5. Available from: https://dx.doi.org/10.1007/978-3-031-54129-2_43.
    9. HUSÁK, Martin, Shanchieh Jay YANG, Joseph KHOURY, Dorde KLISURA and Elias BOU-HARB. Unraveling Network-based Pivoting Maneuvers: Empirical Insights and Challenges. Online. In Sanjay Goel, Paulo Roberto Nunes de Souza. Digital Forensics and Cyber Crime. Cham: Springer, 2024, p. 132-151. ISBN 978-3-031-56582-3. Available from: https://dx.doi.org/10.1007/978-3-031-56583-0_9.

    2023

    1. DAUBNER, Lukáš, Raimundas MATULEVICIUS, Barbora BÜHNOVÁ, Matej ANTOL, Michal RŮŽIČKA and Tomáš PITNER. A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture. Online. In Advanced Information Systems Engineering. Cham: Springer Nature Switzerland, 2023, p. 522-538. ISBN 978-3-031-34559-3. Available from: https://dx.doi.org/10.1007/978-3-031-34560-9_31.
    2. DAUBNER, Lukáš, Matulevičius RAIMUNDAS and Barbora BÜHNOVÁ. A Model of Qualitative Factors in Forensic-Ready Software Systems. Online. In Research Challenges in Information Science: Information Science and the Connected World. Cham: Springer Nature Switzerland, 2023, p. 308-324. ISBN 978-3-031-33079-7. Available from: https://dx.doi.org/10.1007/978-3-031-33080-3_19.
    3. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš PITNER. BPMN4FRSS: An BPMN Extension to Support Risk-Based Development of Forensic-Ready Software Systems. Online. In Evaluation of Novel Approaches to Software Engineering. Cham: Springer Nature Switzerland, 2023, p. 20-43. ISBN 978-3-031-36596-6. Available from: https://dx.doi.org/10.1007/978-3-031-36597-3_2.
    4. BEURAN, Razvan, Jan VYKOPAL, Daniela BELAJOVÁ, Pavel ČELEDA, Yasuo TAN and Yoichi SHINODA. Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. Computers & Security. Elsevier, 2023, vol. 128, No 103120, p. 1-14. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2023.103120.
    5. POLČÁK, Radim, Jakub MÍŠEK, Matěj MYŠKA, Jakub HARAŠTA, Pavel LOUTOCKÝ, Bettina BACHER, Václav STUPKA, Michal KOŠČÍK, David ŠMAHEL, Monika METYKOVÁ, Herbert HRACHOVEC, Andreas KIRCHNER, Alena MACKOVÁ, Jakub MACEK, Dan Jerker Börje SVANTESSON, Erich SCHWEIGHOFER, Hana MACHÁČKOVÁ, Zbyněk LOEBL, Andreas WIEBE, Tamás SZÁDECZKY, Jan HOSPES, Nikolaus FORGÓ, Michal ČERNÝ, Jiří MAREK and Alex IVANČO. Cyberspace 2023. 2023.
    6. DAUBNER, Lukáš and Adam POVAŽANEC. Data Loss Prevention Solution for Linux Endpoint Devices. Online. In ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security. United States: Association for Computing Machinery, 2023, p. 1-10. ISBN 979-8-4007-0772-8. Available from: https://dx.doi.org/10.1145/3600160.3605036.
    7. MIZEROVÁ, Tina and Jakub HARAŠTA. Dostupnost mediálního obsahu: blokování dezinformačních webů (Accessibility of Media Content: Blocking Disinformation Sites). Právník. Praha: Ústav státu a práva AV ČR, 2023, vol. 162, No 5, p. 415-430. ISSN 0231-6625.
    8. ŠPAČEK, Stanislav, Petr VELAN, Martin HOLKOVIČ and Tomáš PLESNÍK. Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic. Online. In 2023 IEEE/IFIP Network Operations and Management Symposium (NOMS 2023). Miami, Florida, USA: IEEE Xplore Digital Library, 2023, p. 1-6. ISBN 978-1-6654-7716-1. Available from: https://dx.doi.org/10.1109/NOMS56928.2023.10154211.
    9. JACKOWSKI, Michał, Michał ARASZKIEWICZ, Adam ZADROŻNY, Andrzej PORĘBSKI, Federico CONSTANTINI, Gijs VAN DIJCK, Martin EBERS, Enrico FRANCESCONI, Saptarshi GHOSH, Jakub HARAŠTA, Marc LAURITSEN, Tomer LIBAL, Juliano MARANHÃO, Masha MEDVEDEVA, Ugo PAGALLO, Ken SATOH, Burkhard SCHAFER, Jaromir SAVELKA, Minghui XIONG, Xiao CHI, Vern R. WALKER, Bernhard WALTL, John ZELEZNIKOW and Tomasz ŻUREK. First Global Report on the State of Artificial Intelligence in Legal Practice. Editions Weblaw, 2023, 128 pp. ISBN 978-3-03916-223-9. Available from: https://dx.doi.org/10.38023/5501c854-14eb-4529-b6b9-44343e477f44.
    10. DAUBNER, Lukáš, Barbora BÜHNOVÁ and Tomáš PITNER. Forensic experts' view of forensic-ready software systems: A qualitative study. Journal of Software: Evolution and Process. John Wiley & Sons Ltd., 2023, Neuveden, e2598, p. 1-23. ISSN 2047-7481. Available from: https://dx.doi.org/10.1002/smr.2598.
    11. POKORNÝ, Jan, Magdaléna KEJSTOVÁ, Vít RUSŇÁK and Simone KRIGLSTEIN. From Bin to Playin’: Give Vintage Objects a New Purpose as Game Controllers. Online. In Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA '23). Hamburg, Germany: Association for Computing Machinery, 2023, p. 1-6. ISBN 978-1-4503-9422-2. Available from: https://dx.doi.org/10.1145/3544549.3585665.
    12. ČERMÁK, Milan and Petr VELAN. How can network traffic lie? DFRWS EU 2023, 2023.
    13. SMEJKALOVÁ, Terezie, Tereza NOVOTNÁ and Jakub HARAŠTA. Kvantitativní přístup v kvalitativní doméně práva: odpověď autorů (Quantitative Approach in a Qualitative Legal Domain: Authors’ Response). Časopis pro pravní vědu a praxi. Brno, 2023, vol. 31, No 2, p. 495-513. ISSN 1210-9126. Available from: https://dx.doi.org/10.5817/CPVP2023-2-11.
    14. HUSÁK, Martin, Pavol SOKOL, Martin ŽÁDNÍK, Václav BARTOŠ and Martin HORÁK. Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. Digital Threats: Research and Practice. Association for Computing Machinery, 2023, vol. 4, No 4, p. 1-11. ISSN 2576-5337. Available from: https://dx.doi.org/10.1145/3611391.
    15. HUSÁK, Martin and Michal JAVORNÍK. Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection. Online. In 2023 IEEE Conference on Communications and Network Security (CNS). New York, NY: IEEE, 2023, p. 1-6. ISBN 979-8-3503-3945-1. Available from: https://dx.doi.org/10.1109/CNS59707.2023.10288665.
    16. HUSÁK, Martin, Joseph KHOURY, Ðorđe KLISURA and Elias BOU-HARB. On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics. Online. In Pierre Collet, Latafat Gardashova, Samer El Zant, Ulviya Abdulkarimova. Complex Computational Ecosystems. Cham, Switzerland: Springer Nature, 2023, p. 167-179. ISBN 978-3-031-44354-1. Available from: https://dx.doi.org/10.1007/978-3-031-44355-8_12.
    17. HARAŠTA, Jakub. Online Public Services. In Frank Hendrickx (general ed.). Information Technology Law in the Czech Republic. 1st ed. Netherlands: Wolters Kluwer, 2023, p. 135-163. International Encyclopaedia of Law/Privacy and Technolgy Law. ISBN 978-94-035-0817-7.
    18. LAŠTOVIČKA, Martin, Martin HUSÁK, Petr VELAN, Tomáš JIRSÍK and Pavel ČELEDA. Passive Operating System Fingerprinting Revisited: Evaluation and Current Challenges. Computer Networks. Netherlands: Elsevier, 2023, vol. 229, No 109782, p. 1-12. ISSN 1389-1286. Available from: https://dx.doi.org/10.1016/j.comnet.2023.109782.
    19. POLČÁK, Radim, Jakub HARAŠTA, Pavel KOUKAL, Tereza KYSELOVSKÁ, Pavel LOUTOCKÝ, Matěj MYŠKA, Michal PETR, Tomáš GŘIVNA, Josef DONÁT, Tomáš ŠČERBA and Miroslav UŘIČAŘ. Privacy and Technology Law Czech Republic: Information Technology Law. 1st ed. Wolter Kluwer: Kluwer Law International B.V., 2023, 345 pp. International Encyclopaedia of Laws: Privacy and Technology Law. ISBN 978-90-411-2188-2.
    20. POLČÁK, Radim, Stanislav SOBOLEVSKY, Amnon REICHMAN, Aurelija LUKOSEVICIENE, Viktoriia REKRUTIAK and Jakub HARAŠTA. Q2 (Quantum Square): Quantum Questions for Social Sciences & Humanities. 2023.
    21. DVOŘÁK, Jan, Jakub HARAŠTA, Pavel LOUTOCKÝ, Jelizaveta JUŘIČKOVÁ, Jiří MULÁK and Václav ŠMEJKAL. Recenze závěrečných prací I/2023 (Thesis Review I/2023). In Revue pro právo a technologie. Brno, 2023, p. 187-217. ISSN 1805-2797.
    22. DVOŘÁK, Jan, Jakub HARAŠTA, Jelizaveta JUŘIČKOVÁ, Pavel LOUTOCKÝ, Jiří MULÁK and Václav ŠMEJKAL. Recenze závěrečných prací I/2023. In Revue pro právo a technologie. 2023, p. 187-217. ISSN 1805-2797.
    23. BOUČEK, Vladimír and Martin HUSÁK. Recommending Similar Devices in Close Proximity for Network Security Management. Online. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Montreal: IEEE, 2023, p. 481-484. ISBN 979-8-3503-3667-2. Available from: https://dx.doi.org/10.1109/WiMob58348.2023.10187729.
    24. ANSAH, Alberta A, Adriana S VIVACQUA, Sailin ZHONG, Susanne BOLL, Marios CONSTANTINIDES, Himanshu VERMA, Abdallah El ALI, Alina LUSHNIKOVA, Hamed ALAVI, Sean RINTEL, Andrew L KUN, Orit SHAER, Anna L COX, Kathrin GERLING, Michael MULLER, Vít RUSŇÁK, Leticia Santos MACHADO, Thomas KOSCH, CHIWORK COLLECTIVE and SIGCHI EXECUTIVE COMMITTEE. Reflecting on Hybrid Events: Learning from a Year of Hybrid Experiences. Online. In Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA '23). New York, NY, USA: Association for Computing Machinery, 2023, p. 1–4, 5 pp. Available from: https://dx.doi.org/10.1145/3544549.3583181.
    25. HARAŠTA, Jakub. Regulation of Cryptography and Dual-Use Goods. In Frank Hendrickx (general ed.). Information Technology Law in the Czech Republic. 1st ed. Netherlands: Wolters Kluwer, 2023, p. 126-133. International Encyclopaedia of Law/Privacy and Technolgy Law. ISBN 978-94-035-0817-7.
    26. HARAŠTA, Jakub. Sector-Specific Obligations. In Frank Hendrickx (general ed.). Information Technology Law in the Czech Republic. 1st ed. Netherlands: Wolters Kluwer, 2023, p. 316-321. International Encyclopaedia of Law/Privacy and Technolgy Law. ISBN 978-94-035-0817-7.
    27. VYKOPAL, Jan, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ and Pavel ČELEDA. Smart Environment for Adaptive Learning of Cybersecurity Skills. IEEE Transactions on Learning Technologies. 2023, vol. 16, No 3, p. 443-456. ISSN 1939-1382. Available from: https://dx.doi.org/10.1109/TLT.2022.3216345.
    28. HUSÁK, Martin, Mohamed-Lamine MESSAI and Hamida SEBA. The 4th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2023). 2023.
    29. RUSŇÁK, Vít and Martin DRAŠAR. Towards a Visual Analytics Workflow for Cybersecurity Simulations. Online. In Christophe Hurter, Helen Purchase, Kadi Bouatouch. Proceedings of VISIGRAPP2023 - Volume3: IVAPP. To appear. Lisbon, Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2023, p. 179-186. ISBN 978-989-758-634-7. Available from: https://dx.doi.org/10.5220/0011695000003417.
    30. HYNEK, Jiří and Vít RUSŇÁK. Towards Interactive Geovisualization Authoring Toolkit for Industry Use Cases. Online. In A. Augusto de Sousa, Vlastimil Havran, Alexis Paljic, Tabitha Peck, Christophe Hurter, Helen Purchase, Giovanni Maria Farinella, Petia Radeva, Kadi Bouatouch. Computer Vision, Imaging and Computer Graphics Theory and Applications. 1st ed. Cham, Switzerland: Springer, 2023, p. 232-256. ISBN 978-3-031-25476-5. Available from: https://dx.doi.org/10.1007/978-3-031-25477-2_11.
    31. ČERMÁK, Milan, Tatiana FRITZOVÁ, Vít RUSŇÁK and Denisa ŠRÁMKOVÁ. Using relational graphs for exploratory analysis of network traffic data. Forensic Science International: Digital Investigation. 2023, vol. 45, S, p. 1-10. ISSN 2666-2825. Available from: https://dx.doi.org/10.1016/j.fsidi.2023.301563.
    32. KRAUS, Lydia, Valdemar ŠVÁBENSKÝ, Martin HORÁK, Václav MATYÁŠ, Jan VYKOPAL and Pavel ČELEDA. Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. Online. In Proceedings of the 28th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'23). New York, NY, USA: ACM, 2023, p. 236-242. ISBN 979-8-4007-0138-2. Available from: https://dx.doi.org/10.1145/3587102.3588862.
    33. HORÁK, Jiří, Katarína FURMANOVÁ, Barbora KOZLÍKOVÁ, Tomáš BRÁZDIL, Petr HOLUB, Martin KAČENGA, Matej GALLO, Rudolf NENUTIL, Jan BYŠKA and Vít RUSŇÁK. xOpat: eXplainable Open Pathology Analysis Tool. COMPUTER GRAPHICS FORUM. England: Wiley, 2023, vol. 42, No 3, p. 63-73. ISSN 0167-7055. Available from: https://dx.doi.org/10.1111/cgf.14812.

    2022

    1. SCHWARZEROVÁ, Jana, Aleš KOSTOVAL, Adam BAJGER, Lucia JAKUBÍKOVÁ, Iro PIERDOU, Lubomír POPELÍNSKÝ, K. SEDLÁŘ and Wolfram WECKWERTH. A Revealed Imperfection in Concept Drift Correction in Metabolomics Modeling. In Ewa Pietka, Pawel Badura, Jacek Kawa, Wojciech Wieclawek. Information Technology in Biomedicine: 9th International Conference, ITIB 2022. Kamien Slaski: Springer, 2022, p. 498-509. ISBN 978-3-031-09134-6. Available from: https://dx.doi.org/10.1007/978-3-031-09135-3_42.
    2. ČEGAN, Jakub, Tomáš PLESNÍK, Daniel TOVARŇÁK, Zdeněk FORMAN and Roman VESELÝ. Analytická studie rozvoje a nasazení SOC (Analytical study of SOC development and deployment). 2022.
    3. PITNER, Tomáš, Otto DOSTÁL, Michal JAVORNÍK, Pavel ANDRES, Aleš ROČEK, Karel SLAVÍČEK, Tomáš KUBALA and Otto DOSTÁL. Analýza systému pro podporu efektivní spolupráce distribuovaných zdravotnických týmů (Analysis of a system to support effective collaboration of distributed healthcare teams). Brno: MU, 2022, 76 pp.
    4. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA and Lydia KRAUS. Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training. Education and Information Technologies. Springer, 2022, vol. 27, No 9, p. 12179 - 12212. ISSN 1360-2357. Available from: https://dx.doi.org/10.1007/s10639-022-11093-6.
    5. BRÁZDIL, Tomáš, Matej GALLO, Rudolf NENUTIL, Andrej KUBANDA, Martin TOUFAR and Petr HOLUB. Automated annotations of epithelial cells and stroma in hematoxylin–eosin-stained whole-slide images using cytokeratin re-staining. The Journal of Pathology: Clinical Research. 2022, vol. 8, No 2, p. 129-142. ISSN 2056-4538. Available from: https://dx.doi.org/10.1002/cjp2.249.
    6. SUFATRIO, Sufatrio, Ee-Chien CHANG and Jan VYKOPAL. Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications. Online. In Australasian Computing Education Conference (ACE '22). New York, NY, USA: Association for Computing Machinery, 2022, p. 114-122. ISBN 978-1-4503-9643-1. Available from: https://dx.doi.org/10.1145/3511861.3511874.
    7. HUSÁK, Martin, Lukáš SADLEK, Stanislav ŠPAČEK, Martin LAŠTOVIČKA, Michal JAVORNÍK and Jana KOMÁRKOVÁ. CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling. Computers & Security. Elsevier, 2022, vol. 115, April, p. 1-19. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2022.102609.
    8. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna, Austria: ACM, 2022, p. 1-8. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3544458.
    9. POLČÁK, Radim, Jakub MÍŠEK, Matěj MYŠKA, Jakub HARAŠTA, Pavel LOUTOCKÝ, Veronika ŽOLNERČÍKOVÁ, Václav STUPKA, Michal KOŠČÍK, Aleš ZAVRŠNIK, Ludwig GRAMLICH, Herbert HRACHOVEC, Andreas KIRCHNER, Kristian DANEBACK, Jakub MACEK, Dan Jerker Börje SVANTESSON, Erich SCHWEIGHOFER, David ŠMAHEL, Miroslav MAREŠ, Andreas WIEBE, Monika METYKOVÁ, Alena MACKOVÁ, Hana MACHÁČKOVÁ, Václav MATYÁŠ, Bettina BACHER, Eva MARTINICOVÁ, Zbyněk LOEBL, Alex IVANČO and Jan KLESLA. Cyberspace 2022. 2022.
    10. DOČKALOVÁ BURSKÁ, Karolína, Vít RUSŇÁK and Radek OŠLEJŠEK. Data-driven insight into the puzzle-based cybersecurity training. Computers & Graphics. Elsevier Science, 2022, vol. 102, February 2022, p. 441-451. ISSN 0097-8493. Available from: https://dx.doi.org/10.1016/j.cag.2021.09.011.
    11. ŠEDA, Pavel, Jan VYKOPAL, Pavel ČELEDA and Igor IGNÁC. Designing Adaptive Cybersecurity Hands-on Training. Online. In 2022 IEEE Frontiers in Education Conference (FIE). Uppsala, Sweden: IEEE, 2022, p. 1-8. ISBN 978-1-6654-6244-0. Available from: https://dx.doi.org/10.1109/FIE56618.2022.9962663.
    12. RUMAN, Ádám and Daniel KOUŘIL. Detection of Malicious Code in SSH programs. In Sborník příspěvků z 54. konference EurOpen.CZ. 2022, p. 115-124.
    13. SCHWARZ, Josef and Vlastimil KREJČÍŘ. Digitalia MUNI ARTS – více než digitální knihovna : výzkumná infrastruktura Filozofické fakulty Masarykovy univerzity a systém Islandora (Digitalia MUNI ARTS - more than a digital library : the research infrastructure of the Faculty of Arts of Masaryk University and the Islandora system). In Archivy, knihovny, muzea v digitálním světě 2022. 2022.
    14. ČELEDA, Pavel, Attila FARKAS, Pavel ŠEDA, Andrej TOMČI, Daniel IĽKOVIČ, Martin ŠVÉDA and Tomáš HRADSKÝ. Dohledové centrum pro monitorování výrobních informačních systémů (Monitoring Center for Manufacturing Execution Systems). 2022.
    15. ŠPAČEK, Stanislav, Petr VELAN, Pavel ČELEDA and Daniel TOVARŇÁK. Encrypted Web Traffic Dataset: Event Logs and Packet Traces. Data in Brief. 2022, vol. 42, June, p. 1-10. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2022.108188.
    16. ŠVÁBENSKÝ, Valdemar, Richard WEISS, Jack COOK, Jan VYKOPAL, Pavel ČELEDA, Jens MACHE, Radoslav CHUDOVSKÝ and Ankur CHATTOPADHYAY. Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. Online. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22). New York, NY, USA: ACM, 2022, p. 787-793. ISBN 978-1-4503-9070-5. Available from: https://dx.doi.org/10.1145/3478431.3499414.
    17. MATYÁŠ, Václav, Kamil MALINKA, Lydia KRAUS, Lenka KNAPOVÁ and Agáta KRUŽÍKOVÁ. Even if users do not read security directives, their behavior is not so catastrophic. Communications of the ACM. New York, NY, USA: ACM, 2022, vol. 65, No 1, p. 37-40. ISSN 0001-0782. Available from: https://dx.doi.org/10.1145/3471928.
    18. KREJČÍŘ, Vlastimil. From DSpace to Islandora : why and how. In Innovative Library in Digital Era (ILIDE) 2022. 2022.
    19. HUSÁK, Martin, Martin LAŠTOVIČKA and Tomáš PLESNÍK. Handling Internet Activism during the Russian Invasion of Ukraine: A Campus Network Perspective. Digital Threats: Research and Practice. New York, NY, USA: ACM, 2022, vol. 3, No 3, p. "17:1-17:5", 5 pp. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3534566.
    20. ŠPAČEK, Stanislav, Petr VELAN, Pavel ČELEDA and Daniel TOVARŇÁK. HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. Online. In 2022 IEEE/IFIP Network Operations and Management Symposium (NOMS 2022). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2022, p. 1-6. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789877.
    21. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Identification of Attack Paths Using Kill Chain and Attack Graphs. Online. In NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2022, p. 1-6. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789803.
    22. RUSŇÁK, Vít, Lenka JANEČKOVÁ, Filip DRGOŇ, Anna-Marie DOMBAJOVÁ and Veronika KUDĚLKOVÁ. Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance. Online. In Ebad Banissi, Anna Ursyn, Mark W. McK. Bannatyne, et al. 2022 26th International Conference Information Visualisation (IV). Vienna, Austria: IEEE, 2022, p. 300-306. ISBN 978-1-6654-9007-8. Available from: https://dx.doi.org/10.1109/IV56949.2022.00058.
    23. ŠMAHEL, David, Lenka DĚDKOVÁ, Lydia KRAUS, Václav MATYÁŠ and Vlasta BUKAČOVÁ. Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences. Human Behavior and Emerging Technologies. 2022, vol. 2022, No 1230344, p. 1-12. ISSN 2578-1863. Available from: https://dx.doi.org/10.1155/2022/1230344.
    24. KRATOCHVÍL, Jiří, Petr SEJK, Filip VAŠÍČEK, Lukáš PLCH, Jana BAČOVSKÁ, Eliška ŠEBESTOVÁ and Petr KŘIVÁNEK. Jak citovat: citační styly (How to Cite: Citation Styles). 1. vyd. Brno: Masarykova univerzita, 2022. Elportál. ISSN 1802-128X.
    25. KRATOCHVÍL, Jiří, Petr SEJK, Filip VAŠÍČEK, Lukáš PLCH, Jana BAČOVSKÁ, Eliška ŠEBESTOVÁ and Petr KŘIVÁNEK. Jak citovat: citační styly (How to Cite: Citation Styles). 1. vyd. Brno: Masarykova univerzita, 2022. Elportál. ISSN 1802-128X.
    26. PUCHOVSKÁ, Anna, Šárka MATOUŠKOVÁ, Irina MATUSEVIČ and Barbora FUKÁRKOVÁ. Jak na vizuální úpravu e-learningového kurzu? (How to visually adjust an e-learning course?). 2022.
    27. TOVARŇÁK, Daniel, Martin HAMERNÍK and Vít RUSŇÁK. Kolaborativní prostředí pro členy bezpečnostních týmů (Collaborative environment for security team members). 2022.
    28. WITTNER, Rudolf, Cecilia MASCIA, Matej GALLO, Francesca FREXIA, Heimo MÜLLER, Markus PLASS, Jörg GEIGER and Petr HOLUB. Lightweight Distributed Provenance Model for Complex Real–world Environments. Scientific Data. Berlin: Nature Research, 2022, vol. 2022, No 9, p. 1-19. ISSN 2052-4463. Available from: https://dx.doi.org/10.1038/s41597-022-01537-6.
    29. JAVORNÍK, Michal and Martin HUSÁK. Mission-centric Decision Support in Cybersecurity via Bayesian Privilege Attack Graph. Engineering Reports. John Wiley & Sons, Inc, 2022, vol. 4, No 12, p. "e12538", 25 pp. ISSN 2577-8196. Available from: https://dx.doi.org/10.1002/eng2.12538.
    30. TOVARŇÁK, Daniel, Michal ČECH, Dušan TICHÝ and Vojtěch DOHNAL. ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence. Online. In Varga, Pal, et al. Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022. USA: IEEE, 2022, p. 1-4. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789882.
    31. HARAŠTA, Jakub, Michael BÁTRLA, Anna BLECHOVÁ, Tereza NOVOTNÁ, Jakub MÍŠEK and Ladislav VYHNÁNEK. Omezení pohybu v souvislosti s řešením krizí způsobených biologickými agens a toxiny (doporučení) (Restrictions on Movement in Crises caused by Biological Agents and Toxins (Recommendations)). Brno: Masarykova univerzita pro Ministerstvo vnitra České republiky, 2022, 17 pp. 1. vydání.
    32. ČEGAN, Jakub, Daniel TOVARŇÁK, Tomáš PLESNÍK, Martin KEPRT and Milan PERNICA. Organizační, technický a právní model sdíleného SOC. 2022.
    33. ČEGAN, Jakub, Martin LEBEDA, Vojtěch HAMERSKÝ, Zdeněk FORMAN, Roman VESELÝ, Robert SCHINDLER, Jaromír EMMER and Kristýna STYBLÍKOVÁ. Platforma pro realizaci kyberbezpečnostních kurzů (Platform for the implementation of cybersecurity courses). 2022.
    34. PORTEŠOVÁ, Šárka, Eva NOVÁKOVÁ, Růžena BLAŽKOVÁ, Michal JABŮREK, Ondřej STRAKA, Michal RŮŽIČKA, Matěj SMETANA, Jaroslav TOČÍK, Jana UNČOVSKÁ, Kateřina KREPSOVÁ, Ondřej DVOŘÁK, Ondřej VORÁČ, Jan KOTTMAN, Zdeněk NOVÁK, Petra BUŠKOVÁ, Jindřiška SVOBODOVÁ, Eva MALACHOVÁ and Tereza HRSTKOVÁ. Podporujeme nadané prvňáčky (We support gifted pupils in the first grades). 2022.
    35. GOVARTS, Eva, Liese GILLES, Stephanie BOPP, Petr HOLUB, Leslie MATALONGA, Roel VERMEULEN, Martine VRIJHEID, Sergi BELTRAN, Mette HARTLEV, Sarah JONES, Laura Rodriguez MARTIN, Arnout STANDAERT, Morris A SWERTZ, Jan THEUNIS, Xenia TRIER, Nina VOGEL, Koert VAN ESPEN, Sylvie REMY and Greet SCHOETERS. Position paper on management of personal data in environment and health research in Europe. Environment International. OXFORD: PERGAMON-ELSEVIER SCIENCE LTD, 2022, vol. 165. ISSN 0160-4120. Available from: https://dx.doi.org/10.1016/j.envint.2022.107334.
    36. VYKOPAL, Jan, Valdemar ŠVÁBENSKÝ, Pavel ŠEDA and Pavel ČELEDA. Preventing Cheating in Hands-on Lab Assignments. Online. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22). New York, NY, USA: ACM, 2022, p. 78-84. ISBN 978-1-4503-9070-5. Available from: https://dx.doi.org/10.1145/3478431.3499420.
    37. BLECHOVÁ, Anna, Kristýna BÓNOVÁ, Martin ERLEBACH, Vojtěch JUŘIČKA, Anežka KARPJÁKOVÁ, Andrej KRIŠTOFÍK, Pavel LOUTOCKÝ, Jakub MÍŠEK, Sofie PETROVÁ, Jan SVOBODA, Jakub VOSTOUPAL, Ondřej WOZNICA and Veronika PŘÍBAŇ ŽOLNERČÍKOVÁ. Přehled aktuální judikatury II/2022 (Overview of the Current Case Law II/2022). In Revue pro právo a technologie. Brno: Masarykova univerzita, 2022, p. 161–194, 33 pp. ISSN 1805-2797. Available from: https://dx.doi.org/10.5817/RPT2022-2-5.
    38. BÁTRLA, Michael and Jakub HARAŠTA. 'Releasing the Hounds?' Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations. In T. Jančárková, G. Visky, I. Winther. 2022 14th International Conference on Cyber Conflict: Keep Moving. Tallinn: NATO CCDCOE Publications, 2022, p. 93-115. ISBN 978-9916-9789-0-0. Available from: https://dx.doi.org/10.23919/CyCon55549.2022.9811074.
    39. KOLOUCH, Jan, Tomáš PLESNÍK and Radovan IGLIAR. Security Operations Center (SOC) aneb nepřeceňujte jeden článek systému (část I.) (Security Operations Center (SOC) or Don't Overestimate One Link in the System (Part I)). Data Security Management. Praha: TATE International s.r.o., 2022, XXVI, No 2, p. 32-37. ISSN 1211-8737.
    40. KOLOUCH, Jan, Tomáš PLESNÍK, Radovan IGLIAR and Andrea KROPÁČOVÁ. Security Operations Center (SOC) aneb nepřeceňujte jeden článek systému (část II.) (Security Operations Center (SOC) or Don't Overestimate One Link in the System (Part II)). Data Security Management. Praha: TATE International s.r.o., 2022, XXVI, No 3, p. 14-20. ISSN 1211-8737.
    41. PLESNÍK, Tomáš, Jan KOLOUCH, Radovan IGLIAR and Andrea KROPÁČOVÁ. Security Operations Center (SOC) aneb nepřeceňujte jeden článek systému (část III.) (Security Operations Center (SOC) or Don't Overestimate One Link in the System (Part III)). Data Security Management. Praha: TATE International s.r.o., 2022, XXVI, No 4, p. 24-30. ISSN 1211-8737.
    42. ČELEDA, Pavel, Igor IGNÁC, Boris JADUŠ, Erik KOČAMBA, Lukáš MAJDAN, Dominik PILÁR, Pavel ŠEDA and Jan VYKOPAL. Software inteligentního asistenta pro hraní bezpečnostních her (Intelligent Assistant Software for Playing Cybersecurity Games). 2022.
    43. TOVARŇÁK, Daniel and Matúš RAČEK. Software pro integrovaný datový pohled na chráněnou infrastrukturu (Software for an integrated data view over the protected infrastructure). 2022.
    44. TOVARŇÁK, Daniel, Vojtěch DOHNAL, Dušan TICHÝ, Benjamin KRÁL and Martin MACHÁČ. Software pro podporu orchestrace bezpečnosti a řízení životního cyklu hrozeb (Software for security orchestration support and threat life-cycle management). 2022.
    45. ANDONIADIS, Kamil, Pavel ČELEDA, Karolína DOČKALOVÁ BURSKÁ, Igor IGNÁC, Martin JUHÁS, Erik KOČAMBA, Radek OŠLEJŠEK, Juraj PALUBA, Dominik PILÁR, Pavel ŠEDA, Michal URBAN and Jan VYKOPAL. Software pro přípravu a realizaci bezpečnostních her (Software for Preparing and Carrying Out Cybersecurity Games). 2022.
    46. ČELEDA, Pavel, Karolína DOČKALOVÁ BURSKÁ, Igor IGNÁC, Martin JUHÁS, Erik KOČAMBA, Radek OŠLEJŠEK, Dominik PILÁR, Pavel ŠEDA and Jan VYKOPAL. Software pro sběr a vyhodnocení dat z bezpečnostních her (Software for Collecting and Evaluating Data from Cybersecurity Games). 2022.
    47. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA, Kristián TKÁČIK and Daniel POPOVIČ. Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering. Education and Information Technologies. Springer, 2022, vol. 27, No 7, p. 9231-9262. ISSN 1360-2357. Available from: https://dx.doi.org/10.1007/s10639-022-10954-4.
    48. DRAŠAR, Martin, Ádám RUMAN and Vít RUSŇÁK. SW pro dynamickou verifikaci bezpečnostních opatření (SW for dynamic verification of security measures). 2022.
    49. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER and Ivo NUTÁR. SW pro ovládání nástrojů ofenzivní bezpečnosti (SW for orchestration of offensive security tools). 2022.
    50. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER, Michal DROBŇÁK and Ivo NUTÁR. SW pro statickou verifikaci bezpečnostních opatření (SW for static verification of security measures). 2022.
    51. FREXIA, Francesca, Cecilia MASCIA, Rudolf WITTNER, Markus PLASS, Heimo MÜLLER, Jörg GEIGER and Petr HOLUB. The Common Provenance Model: Capturing Distributed Provenance in Life Sciences Processes. In Challenges of Trustable AI and Added-Value on Health. 2022. Available from: https://dx.doi.org/10.3233/SHTI220489.
    52. KRAUS, Lydia, Matěj GRABOVSKÝ, Martin UKROP, Katarína GALANSKÁ and Václav MATYÁŠ. Usability Insights from Establishing TLS Connections. In IFIP International Conference on ICT Systems Security and Privacy Protection. Cham, Germany: Springer Verlag, 2022, p. 289-305. ISBN 978-3-031-06974-1. Available from: https://dx.doi.org/10.1007/978-3-031-06975-8_17.
    53. MÍŠEK, Jakub, Anna BLECHOVÁ, Michael BÁTRLA, Tereza NOVOTNÁ, Ladislav VYHNÁNEK and Jakub HARAŠTA. Vliv technologických nástrojů na ústavnost krizových opatření omezujících svobodu pohybu (Impact Of Technological Tools On Constitutionality of Emergency Measures Restricting Freedom of Movement). Brno: Masarykova univerzita pro Ministerstvo vnitra České republiky, 2022, 78 pp. 1. vydání.

    2021

    1. BANKOVIČ, Mikuláš, Vít NOVOTNÝ and Petr SOJKA. Application of Super-Resolution Models in Optical Character Recognition of Czech Medieval Texts. In Horák, Rychlý, Rambousek. Recent Advances in Slavonic Natural Language Processing (RASLAN 2021). Brno: Tribun EU, 2021, p. 11-18. ISBN 978-80-263-1670-1.
    2. REIHS, Robert, Rumyana PROYNOVA, Saher MAQSOOD, Maxmilian ATAIAN, Martin LABLANS, Philip R. QUINLAN, Emma LAWRENCE, Erinna BOWMAN, Esther VAN ENCKEVORT, Dominik František BUČÍK, Heimo MÜLLER and Petr HOLUB. BBMRI-ERIC Negotiator: Implementing Efficient Access to Biobanks. Biopreservation and Biobanking. NEW ROCHELLE: MARY ANN LIEBERT, INC, 2021, 8 pp. ISSN 1947-5535. Available from: https://dx.doi.org/10.1089/bio.2020.0144.
    3. LÍŠKA, Martin, Dávid LUPTÁK, Vít STARÝ NOVOTNÝ, Michal RŮŽIČKA, Boris SHMINKE, Petr SOJKA, Michal ŠTEFÁNIK and Makarius WENZEL. CICM'21 Systems Entries. Online. In 978-3-030-81097-9. INTELLIGENT COMPUTER MATHEMATICS (CICM 2021). CHAM: SPRINGER INTERNATIONAL PUBLISHING AG, 2021, p. 245-248. ISBN 978-3-030-81096-2. Available from: https://dx.doi.org/10.1007/978-3-030-81097-9_20.
    4. TOVARŇÁK, Daniel, Matúš RAČEK and Petr VELAN. Cloud Native Data Platform for Network Telemetry and Analytics. Online. In Müge Sayıt, Stuart Clayman. 17th International Conference on Network and Service Management. Izmir, Turkey (Virtual): IFIP Open Digital Library, IEEE Xplore, 2021, p. 394-396. ISBN 978-3-903176-36-2. Available from: https://dx.doi.org/10.23919/CNSM52442.2021.9615568.
    5. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína DOČKALOVÁ BURSKÁ, Valdemar ŠVÁBENSKÝ, Jan VYKOPAL and Jakub ČEGAN. Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. IEEE Transactions on Visualization and Computer Graphics. 2021, vol. 27, No 8, p. 3425-3437. ISSN 1077-2626. Available from: https://dx.doi.org/10.1109/TVCG.2020.2977336.
    6. PÄIJÄNEN, Jani, Karo SAHARINEN, Jarno SALONEN, Tuomo SIPOLA, Jan VYKOPAL and Tero KOKKONEN. Cyber Range: Preparing for Crisis or Something Just for Technical People?. Online. In Proceeding of the 20th European Conference on Cyber Warfare and Security (ECCWS 2021). Reading, UK: Academic Conferences International Limited, 2021, p. 322-330. ISBN 978-1-912764-99-0.
    7. ŠVÁBENSKÝ, Valdemar, Pavel ČELEDA, Jan VYKOPAL and Silvia BRIŠÁKOVÁ. Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges. Computers & Security. Elsevier, 2021, vol. 102, No 102154, p. 1-14. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2020.102154.
    8. POLČÁK, Radim, Jakub MÍŠEK, Matěj MYŠKA, Jakub HARAŠTA, Pavel LOUTOCKÝ, Veronika ŽOLNERČÍKOVÁ, Václav STUPKA, František KASL, Aleš ZAVRŠNIK, Ludwig GRAMLICH, Herbert HRACHOVEC, Andreas KIRCHNER, Kristian DANEBACK, Jakub MACEK, Dan Jerker Börje SVANTESSON, Erich SCHWEIGHOFER, David ŠMAHEL, Miroslav MAREŠ, Andreas WIEBE, Monika METYKOVÁ, Alena MACKOVÁ, Hana MACHÁČKOVÁ, Lydia KRAUS, Václav MATYÁŠ and Walter HÖTZENDORFER. Cyberspace 2021. 2021.
    9. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ŠEDA and Pavel ČELEDA. Dataset of Shell Commands Used by Participants of Hands-on Cybersecurity Training. Data in Brief. Elsevier, 2021, vol. 38, September, p. 1-9. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2021.107398.
    10. WITTNER, Rudolf, Jörg GEIGER, Cecilia MASCIA, Francesca FREXIA, Heimo MULLER and Petr HOLUB. Enabling Trustworthy and Traceable Research by Non-Repudiable Opaque Provenance in a Distributed Environment. In Provenance Week 2021; Workshop on Provenance for Transparent Research. 2021.
    11. DOČKALOVÁ BURSKÁ, Karolína, Vít RUSŇÁK and Radek OŠLEJŠEK. Enhancing Situational Awareness for Tutors of Cybersecurity Capture the Flag Games. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: IEEE, 2021, p. 235-242. ISBN 978-1-6654-3827-8. Available from: https://dx.doi.org/10.1109/IV53921.2021.00045.
    12. ŠPAČEK, Stanislav, Daniel TOVARŇÁK and Pavel ČELEDA. Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption. In Audun Jøsang, Lynn Futcher, Janne Hagen. ICT Systems Security and Privacy Protection. 1st ed. Oslo: Springer, 2021, p. 302-316. ISBN 978-3-030-78119-4. Available from: https://dx.doi.org/10.1007/978-3-030-78120-0_20.
    13. NOVOTNÝ, Vít, Michal ŠTEFÁNIK, Dávid LUPTÁK, Martin GELETKA, Petr ZELINA and Petr SOJKA. Ensembling Ten Math Information Retrieval Systems: MIRMU and MSM at ARQMath 2021. Online. In Guglielmo Faggioli. CEUR Workshop Proceedings. Bucharest, Romania: M. Jeusfeld c/o Redaktion Sun SITE, Informatik V, RWTH Aachen, 2021, p. 82-106. ISSN 1613-0073.
    14. REHM, Heidi L, Angela J H PAGE, Lindsay SMITH, Jeremy B ADAMS, Gil ALTEROVITZ, Lawrence J BABB, Maxmillian P BARKLEY, Michael BAUDIS, Michael J S BEAUVAIS, Tim BECK, Jacques S BECKMANN, Sergi BELTRAN, David BERNICK, Alexander BERNIER, James K BONFIELD, Tiffany F BOUGHTWOOD, Guillaume BOURQUE, Sarion R BOWERS, Anthony J BROOKES, Michael BRUDNO, Matthew H BRUSH, David BUJOLD, Tony BURDETT, Orion J BUSKE, Moran N CABILI, Daniel L CAMERON, Robert J CARROLL, Esmeralda CASAS-SILVA, Debyani CHAKRAVARTY, Bimal P CHAUDHARI, Shu Hui CHEN, J Michael CHERRY, Justina CHUNG, Melissa CLINE, Hayley L CLISSOLD, Robert M COOK-DEEGAN, Melanie COURTOT, Fiona CUNNINGHAM, Miro CUPAK, Robert M DAVIES, Danielle DENISKO, Megan J DOERR, Lena I DOLMAN, Edward S DOVE, L Jonathan DURSI, Stephanie O M DYKE, James A EDDY, Karen EILBECK, Kyle P ELLROTT, Susan FAIRLEY, Khalid A FAKHRO, Helen V FIRTH, Michael S FITZSIMONS, Marc FIUME, Paul FLICEK, Ian M FORE, Mallory A FREEBERG, Robert R FREIMUTH, Lauren A FROMONT, Jonathan FUERTH, Clara L GAFF, Weiniu GAN, Elena M GHANAIM, David GLAZER, Robert C GREEN, Malachi GRIFFITH, Obi L GRIFFITH, Robert L GROSSMAN, Tudor GROZA, Jaime M Guidry AUVIL, Roderic GUIGO, Dipayan GUPTA, Melissa A HAENDEL, Ada HAMOSH, David P HANSEN, Reece K HART, Dean Mitchell HARTLEY, David HAUSSLER, Rachele M HENDRICKS-STURRUP, Calvin W L HO, Ashley E HOBB, Michael M HOFFMAN, Oliver M HOFMANN, Petr HOLUB, Jacob Shujui HSU, Jean-Pierre HUBAUX, Sarah E HUNT, Ammar HUSAMI, Julius O JACOBSEN, Saumya S JAMUAR, Elizabeth L JANES, Francis JEANSON, Aina JENE, Amber L JOHNS, Yann JOLY, Steven J M JONES, Alexander KANITZ, Kazuto KATO, Thomas M KEANE, Kristina KEKESI-LAFRANCE, Jerome KELLEHER, Giselle KERRY, Seik-Soon KHOR, Bartha M KNOPPERS, Melissa A KONOPKO, Kenjiro KOSAKI, Martin KUBA, Jonathan LAWSON, Rasko LEINONEN, Stephanie LI, Michael F LIN, Mikael LINDEN, Xianglin LIU, Isuru Udara LIYANAGE, Javier LOPEZ, Anneke M LUCASSEN, Michael LUKOWSKI, Alice L MANN, John MARSHALL, Michele MATTIONI, Alejandro METKE-JIMENEZ, Anna MIDDLETON, Richard J MILNE, Fruzsina MOLNAR-GABOR, Nicola MULDER, Monica C MUNOZ-TORRES, Rishi NAG, Hidewaki NAKAGAWA, Jamal NASIR, Arcadi NAVARRO, Tristan H NELSON, Ania NIEWIELSKA, Amy NISSELLE, Jeffrey NIU, Tommi H NYRONEN, Brian D CONNOR, Sabine OESTERLE, Soichi OGISHIMA, Vivian Ota WANG, Laura A D PAGLIONE, Emilio PALUMBO, Helen E PARKINSON, Anthony A PHILIPPAKIS, Angel D PIZARRO, Andreas PRLIC, Jordi RAMBLA, Augusto RENDON, Renee A RIDER, Peter N ROBINSON, Kurt W RODARMER, Laura Lyman RODRIGUEZ, Alan F RUBIN, Manuel RUEDA, Gregory A RUSHTON, Rosalyn S RYAN, Gary I SAUNDERS, Helen SCHUILENBURG, Torsten SCHWEDE, Serena SCOLLEN, Alexander SENF, Nathan C SHEFFIELD, Neerjah SKANTHARAJAH, Albert V SMITH, Heidi J SOFIA, Dylan SPALDING, Amanda B SPURDLE, Zornitza STARK, Lincoln D STEIN, Makoto SUEMATSU, Patrick TAN, Jonathan A TEDDS, Alastair A THOMSON, Adrian THOROGOOD, Timothy L TICKLE, Katsushi TOKUNAGA, Juha TOMROOS, David TORRENTS, Sean UPCHURCH, Alfonso VALENCIA, Roman Valls GUIMERA, Jessica VAMATHEVAN, Susheel VARMA, Danya F VEARS, Coby VINER, Craig VOISIN, Alex H WAGNER, Susan E WALLACE, Brian P WALSH, Marc S WILLIAMS, Eva C WINKLER, Barbara J WOLD, Grant M WOOD, J Patrick WOOLLEY, Chisato YAMASAKI, Andrew D YATES, Christina K YUNG, Lyndon J ZASS, Ksenia ZAYTSEVA, Junjun ZHANG, Peter GOODHAND, Kathryn NORTH and Ewan BIRNEY. GA4GH: International policies and standards for data sharing across genomic research and healthcare. Cell Genomics. AMSTERDAM: Cell Press, 2021, vol. 1, No 2, p. 1-33. ISSN 2666-979X. Available from: https://dx.doi.org/10.1016/j.xgen.2021.100029.
    15. REHM, Heidi, Angela PAGE, Lindsay SMITH, Jeremy ADAMS, Gil ALTEROVITZ, Lawrence BABB, Maxmillian BARKLEY, Michael BAUDIS, Michael BEAUVAIS, Tim BECK, Jacques BECKMANN, Sergi BELTRAN, David BERNICK, Alexander BERNIER, James BONFIELD, Tiffany BOUGHTWOOD, Guillaume BOURQUE, Sarion BOWERS, Anthony BROOKES, Michael BRUDNO, Matthew BRUSH, David BUJOLD, Tony BURDETT, Orion BUSKE, Moran CABILI, Daniel CAMERON, Robert CARROLL, Esmeralda CASAS-SILVA, Debyani CHAKRAVARTY, Bimal CHAUDHARI, Shu Hui CHEN, Michael CHERRY, Justina CHUNG, Melissa CLINE, Hayley CLISSOLD, Robert COOK-DEEGAN, Mélanie COURTOT, Fiona CUNNINGHAM, Miro CUPAK, Robert DAVIES, Danielle DENISKO, Megan DOERR, Lena DOLMAN, Edward DOVE, Jonathan DURSI, Stephanie DYKE, James EDDY, Karen EILBECK, Kyle ELLROTT, Susan FAIRLEY, Khalid FAKHRO, Helen FIRTH, Michael FITZSIMONS, Marc FIUME, Paul FLICEK, Ian FORE, Mallory FREEBERG, Robert FREIMUTH, Lauren FROMONT, Jonathan FUERTH, Clara GAFF, Weiniu GAN, Elena GHANAIM, David GLAZER, Robert GREEN, Malachi GRIFFITH, Obi GRIFFITH, Robert GROSSMAN, Tudor GROZA, Jaime Guidry AUVIL, Roderic GUIGÓ, Dipayan GUPTA, Melissa HAENDEL, Ada HAMOSH, David HANSEN, Reece HART, Dean Mitchell HARTLEY, David HAUSSLER, Rachele HENDRICKS-STURRUP, Calvin HO, Ashley HOBB, Michael HOFFMAN, Oliver HOFMANN, Petr HOLUB, Jacob Shujui HSU, Jean-Pierre HUBAUX, Sarah HUNT, Ammar HUSAMI, Julius JACOBSEN, Saumya JAMUAR, Elizabeth JANES, Francis JEANSON, Aina JENÉ, Amber JOHNS, Yann JOLY, Steven JONES, Alexander KANITZ, Kazuto KATO, Thomas KEANE, Kristina KEKESI-LAFRANCE, Jerome KELLEHER, Giselle KERRY, Seik-Soon KHOR, Bartha KNOPPERS, Melissa KONOPKO, Kenjiro KOSAKI, Martin KUBA, Jonathan LAWSON, Rasko LEINONEN, Stephanie LI, Michael LIN, Mikael LINDEN, Xianglin LIU, Isuru Udara LIYANAGE, Javier LOPEZ, Anneke LUCASSEN, Michael LUKOWSKI, Alice MANN, John MARSHALL, Michele MATTIONI, Alejandro METKE-JIMENEZ, Anna MIDDLETON, Richard MILNE, Fruzsina MOLNÁR-GÁBOR, Nicola MULDER, Monica MUNOZ-TORRES, Rishi NAG, Hidewaki NAKAGAWA, Jamal NASIR, Arcadi NAVARRO, Tristan NELSON, Ania NIEWIELSKA, Amy NISSELLE, Jeffrey NIU, Tommi NYRÖNEN, O Connor BRIAN, Sabine OESTERLE, Soichi OGISHIMA, Vivian Ota WANG, Laura PAGLIONE, Emilio PALUMBO, Helen PARKINSON, Anthony PHILIPPAKIS, Angel PIZARRO, Andreas PRLIC, Jordi RAMBLA, Augusto RENDON, Renee RIDER, Peter ROBINSON, Kurt RODARMER, Laura Lyman RODRIGUEZ, Alan RUBIN, Manuel RUEDA, Gregory RUSHTON, Rosalyn RYAN, Gary SAUNDERS, Helen SCHUILENBURG, Torsten SCHWEDE, Serena SCOLLEN, Alexander SENF, Nathan SHEFFIELD, Neerjah SKANTHARAJAH, Albert SMITH, Heidi SOFIA, Dylan SPALDING, Amanda SPURDLE, Zornitza STARK, Lincoln STEIN, Makoto SUEMATSU, Patrick TAN, Jonathan TEDDS, Alastair THOMSON, Adrian THOROGOOD, Timothy TICKLE, Katsushi TOKUNAGA, Juha TÖRNROOS, David TORRENTS, Sean UPCHURCH, Alfonso VALENCIA, Roman VALLS GUIMERA, Jessica VAMATHEVAN, Susheel VARMA, Danya VEARS, Coby VINER, Craig VOISIN, Alex WAGNER, Susan WALLACE, Brian WALSH, Marc WILLIAMS, Eva WINKLER, Barbara WOLD, Grant WOOD, Patrick WOOLLEY, Chisato YAMASAKI, Andrew YATES, Christina YUNG, Lyndon ZASS, Ksenia ZAYTSEVA, Junjun ZHANG, Peter GOODHAND, Kathryn NORTH and Ewan BIRNEY. GA4GH: International policies and standards for data sharing across genomic research and healthcare. Cell Genomics. Cell Press, 2021, vol. 2021, No 1, p. 1-9. ISSN 2666-979X. Available from: https://dx.doi.org/10.1016/j.xgen.2021.100029.
    16. HYNEK, Jiří, Jakub KACHLÍK and Vít RUSŇÁK. Geovisto: A Toolkit for Generic Geospatial Data Visualization. Online. In Christophe Hurter, Helen Purchase, Jose Braz, Kadi Bouatouch. Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 3 IVAPP: IVAPP. Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2021, p. 101-111. ISBN 978-989-758-488-6. Available from: https://dx.doi.org/10.5220/0010260401010111.
    17. HYNEK, Jiří, Kryštof RYKALA, Jakub KACHLÍK and Vít RUSŇÁK. Geovisto: Toolkit for Generic Geospatial Data Visualization. 2021.
    18. ČERMÁK, Milan and Denisa ŠRÁMKOVÁ. GRANEF: Utilization of a Graph Database for Network Forensics. Online. In Sabrina De Capitani di Vimercati, Pierangela Samarati. Proceedings of the 18th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2021, p. 785-790. ISBN 978-989-758-524-1. Available from: https://dx.doi.org/10.5220/0010581807850790.
    19. TOVARŇÁK, Daniel, Lukáš SADLEK and Pavel ČELEDA. Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021). Washington DC, USA: IEEE, 2021, p. 986-991. ISBN 978-3-903176-32-4.
    20. JIRSÍK, Tomáš and Petr VELAN. Host Behavior in Computer Network: One-Year Study. IEEE Transactions on Network and Service Management. 2021, vol. 18, No 1, p. 822-838. ISSN 1932-4537. Available from: https://dx.doi.org/10.1109/TNSM.2020.3036528.
    21. KRAUS, Lydia, Mária ŠVIDROŇOVÁ and Elizabeth STOBERT. How Do Users Chain Email Accounts Together? In Jøsang A., Futcher L., Hagen J. IFIP International Conference on ICT Systems Security and Privacy Protection. Switzerland: Springer International Publishing, 2021, p. 416-429. ISBN 978-3-030-78119-4. Available from: https://dx.doi.org/10.1007/978-3-030-78120-0_27.
    22. ANTONIADES, Athos, Maria PAPAIOANNOU, Apostolos MALATRAS, Gregory PAPAGREGORIOU, Heimo MULLER, Petr HOLUB, Constantinos DELTAS and Christos N SCHIZAS. Integration of Biobanks in National eHealth Ecosystems Facilitating Long-Term Longitudinal Clinical-Omics Studies and Citizens' Engagement in Research Through eHealthBioR. Online. Frontiers in Digital Health. 2021.
    23. NOVOTNÝ, Vít. Interpretable Document Representations for Fast and Accurate Retrieval of Mathematical Information. Online. In SIGIR '21: Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 2021, p. 2705-2705. ISBN 978-1-4503-3621-5. Available from: https://dx.doi.org/10.1145/3404835.3463269.
    24. WITTNER, Rudolf, Petr HOLUB, Heimo MÜLLER, Joerg GEIGER, Carole GOBLE, Stian SOILAND-REYES, Luca PIREDDU, Francesca FREXIA, Cecilia MASCIA, Elliot FAIRWEATHER, Jason R SWEDLOW, Josh MOORE, Caterina STRAMBIO, David GRUNWALD and Hiroki NAKAE. ISO 23494: Biotechnology – Provenance Information Model for Biological Specimen And Data. In Lecture Notes in Computer Science. Cham: Springer, 2021, p. 222-225. ISBN 978-3-030-80959-1. Available from: https://dx.doi.org/10.1007/978-3-030-80960-7_16.
    25. ŠAVELKA, Jaromír, Hannes WESTERMANN, Karim BENYEKHLEF, Charlotte S. ALEXANDER, Jayla C. GRANT, Restrepo David AMARILES, Rajaa El HAMDANI, Sébastien MEEÙS, Aurore TROUSSEL, Michal ARASZKIEWICZ, Kevin D. ASHLEY, Alexandra ASHLEY, Karl BRANTING, Mattia FALDUTI, Matthias GRABMAIR, Jakub HARAŠTA, Tereza NOVOTNÁ, Elizabeth TIPPETT and Shiwanni JOHNSON. Lex Rosetta: Transfer of Predictive Models Across Languages, Jurisdictions, and Legal Domains. Online. In Eighteenth International Conference on Artificial Intelligence and Law: Proceedings of the Conference. 1st ed. New York: ACM, 2021, p. 129-138. ISBN 978-1-4503-8526-8. Available from: https://dx.doi.org/10.1145/3462757.3466149.
    26. NOVOTNÝ, Vít. Markdown 2.10.0: LaTeX themes & snippets, two flavors of comments, and LuaMetaTeX. TUGboat. Portland, OR 97208-2311, U.S.A: TUG, 2021, roč. 42, No 2, 8 pp. ISSN 0896-3207. Available from: https://dx.doi.org/10.47397/tb/42-2/tb131novotny-markdown.
    27. NOVOTNÝ, Vít. Markdown 2.10.0: LaTeXová témata a snippety (Markdown 2.10.0: LaTeX Themes & Snippets). Zpravodaj CSTUG. Brno: CSTUG, 2021, vol. 31, 1-4, p. 76-82. ISSN 1211-6661. Available from: https://dx.doi.org/10.5300/2021-1-4/76.
    28. HARAŠTA, Jakub. Michal Kolmaš: National Identity and Japanese Revisionism. Mezinárodní vztahy. Ústav mezinárodních vztahů, 2021, vol. 56, No 2, p. 110-114. ISBN 978-0-367-58569-3. Available from: https://dx.doi.org/10.32422/mv-cjir.1777.
    29. FAIRWEATHER, Elliot, Rudolf WITTNER, Martin CHAPMAN, Petr HOLUB and Vasa CURCIN. Non-repudiable provenance for clinical decision support systems. In Lecture Notes in Computer Science. Cham: Springer, 2021, p. 165-182. ISBN 978-3-030-80959-1. Available from: https://dx.doi.org/10.1007/978-3-030-80960-7_10.
    30. NOVOTNÝ, Vít, Eniafe Festus AYETIRAN, Dalibor BAČOVSKÝ, Dávid LUPTÁK, Michal ŠTEFÁNIK and Petr SOJKA. One Size Does Not Fit All: Finding the Optimal Subword Sizes for FastText Models across Languages. In Mitkov, Ruslan and Angelova, Galia. Proceedings of the International Conference on Recent Advances in Natural Language Processing (RANLP 2021). Varna, Bulgaria: INCOMA Ltd., 2021, p. 1068-1074. ISBN 978-954-452-072-4. Available from: https://dx.doi.org/10.26615/978-954-452-072-4_120.
    31. ŠKYŘÍK, Petr and Šárka MATOUŠKOVÁ. Otevřená dílna v knihovně: podpora kreativity, digitálních kompetencí a komunity (Makerspace in the library: support for creativity, digital competences and community). In KISK 4 FUTURE - online. 2021. KISK 4 FUTURE.
    32. NOVOTNÝ, Vít. Overleaf: Kolaborativní webový editor LaTeXu (Overleaf, Collaborative Online LaTeX Editor). Zpravodaj CSTUG. Brno: CSTUG, 2021, vol. 31, 1-4, p. 3-8. ISSN 1211-6661. Available from: https://dx.doi.org/10.5300/2021-1-4/3.
    33. UHLÁR, Juraj, Martin HOLKOVIČ and Vít RUSŇÁK. PCAPFunnel: A Tool for Rapid Exploration of Packet Capture Files. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: The Institute of Electrical and Electronics Engineers, Inc., 2021, p. 69-76. ISBN 978-1-6654-3827-8. Available from: https://dx.doi.org/10.1109/IV53921.2021.00021.
    34. VYHNÁNEK, Ladislav, Anna BLECHOVÁ, Michael BÁTRLA, Jakub MÍŠEK, Tereza NOVOTNÁ and Jakub HARAŠTA. Proporcionalita krizových opatření omezujících svobodu pohybu (Proportionality of Crisis Measures Restricting Freedom of Movement). Brno: Masarykova univerzita pro Ministerstvo vnitra České republiky, 2021, 173 pp. 1. vydání.
    35. RUSŇÁK, Vít, Anna-Marie DOMBAJOVÁ, Veronika KUDĚLKOVÁ and Martin PYŠČUK. Prototypová implementace nástroje pro vizuální analýzu časově orientovaných dat (Prototype implementation of a tool for visual analysis of time-oriented data). 2021.
    36. ŠTEFÁNIK, Michal, Vít NOVOTNÝ and Petr SOJKA. Regressive Ensemble for Machine Translation Quality Evaluation. Online. In Loïc Barrault et al. Proceedings of EMNLP 2021 Sixth Conference on Machine Translation (WMT 21). Online and Punta Cana, Dominican Republi: ACL, 2021, p. 1041-1048. ISBN 978-1-954085-94-7.
    37. ŠEDA, Pavel, Jan VYKOPAL, Valdemar ŠVÁBENSKÝ and Pavel ČELEDA. Reinforcing Cybersecurity Hands-on Training With Adaptive Learning. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637252.
    38. VYKOPAL, Jan, Pavel ČELEDA, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ and Daniel TOVARŇÁK. Scalable Learning Environments for Teaching Cybersecurity Hands-on. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637180.
    39. ČELEDA, Pavel, Andrej TOMČI, Daniel IĽKOVIČ, Martin MADZIA, Jana ZIKOVÁ, Aleš SMRČKA, Tomáš FIEDOR, Martin HRUŠKA, Martin ŠVÉDA and Lubomír POSPÍŠIL. Software pro měření a vyhodnocení výkonnostních parametrů (Software for Measurement and Evaluation of Performance Parameters). 2021.
    40. ČERMÁK, Milan and Pavel ČELEDA. Stream-Based IP Flow Analysis. Online. In Toufik Ahmed, Olivier Festor, Yacine Ghamri-Doudane, Joon-Myung Kang, Alberto E. Schaeffer-Filho, Radu State, Burkhard Stiller. IFIP/IEEE International Symposium on Integrated Network Management, IM 2021. Bordeaux, France: IFIP Open Digital Library, 2021, p. 736-741. ISBN 978-3-903176-32-4.
    41. HUSÁK, Martin, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. Online. In ARES 2021: The 16th International Conference on Availability, Reliability and Security. Virtual Event: Association for Computing Machinery, 2021, p. 1-8. ISBN 978-1-4503-9051-4. Available from: https://dx.doi.org/10.1145/3465481.3470037.
    42. LAWSON, Jonathan, Moran N CABILI, Giselle KERRY, Tiffany BOUGHTWOOD, Adrian THOROGOOD, Pinar ALPER, Sarion R BOWERS, Rebecca R BOYLES, Anthony J BROOKES, Matthew BRUSH, Tony BURDETT, Hayley CLISSOLD, Stacey DONNELLY, Stephanie O M DYKE, Mallory A FREEBERG, Melissa A HAENDEL, Chihiro HATA, Petr HOLUB, Francis JEANSON, Aina JENE, Minae KAWASHIMA, Shuichi KAWASHIMA, Melissa KONOPKO, Irene KYOMUGISHA, Haoyuan LI, Mikael LINDEN, Laura Lyman RODRIGUEZ, Mizuki MORITA, Nicola MULDER, Jean MULLER, Satoshi NAGAIE, Jamal NASIR, Soichi OGISHIMA, Vivian Ota WANG, Laura D PAGLIONE, Ravi N PANDYA, Helen PARKINSON, Anthony A PHILIPPAKIS, Fabian PRASSER, Jordi RAMBLA, Kathy REINOLD, Gregory A RUSHTON, Andrea SALTZMAN, Gary SAUNDERS, Heidi J SOFIA, John D SPALDING, Morris A SWERTZ, Ilia TULCHINSKY, J ESTHER, van ENCKEVORT, Susheel VARMA, Craig VOISIN, Natsuko YAMAMOTO, Chisato YAMASAKI, Lyndon ZASS, M JAIME, Guidry AUVIL, Tommi H NYRÖNEN and Mélanie COURTOT. The Data Use Ontology to streamline responsible access to human biomedical datasets. Cell Genomics. 2021, vol. 1, No 2, p. 1-9, 12 pp. ISSN 2666-979X. Available from: https://dx.doi.org/10.1016/j.xgen.2021.100028.
    43. ŠVÁBENSKÝ, Valdemar and Martin UKROP. The Stack: Unplugged Activities for Teaching Computer Science. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE '21). 2021. ISBN 978-1-4503-8062-1. Available from: https://dx.doi.org/10.1145/3408877.3439569.
    44. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Daniel TOVARŇÁK and Pavel ČELEDA. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637052.
    45. NOVOTNÁ, Tereza and Jakub HARAŠTA. Topic Modelling of Czech Supreme Court Decisions: Evaluation of Legal Experts. In Internationales Rechtsinformatik Symposion IRIS 2021. 2021.
    46. GÁLIKOVÁ, Miriam, Valdemar ŠVÁBENSKÝ and Jan VYKOPAL. Toward Guidelines for Designing Cybersecurity Serious Games. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE '21). 2021. ISBN 978-1-4503-8062-1. Available from: https://dx.doi.org/10.1145/3408877.3439568.
    47. ČEGAN, Jakub, Tomáš KACVINSKÝ, Zdeněk VYDRA, Martin LEBEDA, Jakub Bartolomej KOŠUTH, Petr VELAN, Milan ČERMÁK, Andrej TOMČI, Ivo NUTÁR, Martin LAŠTOVIČKA, Natálie VELECKÁ, Pavla VIZVÁRY, Vojtěch HAMERSKÝ, Daniel KOUŘIL, Ondřej BUDAY, Martin KOTLÍK, Vladimír ROHEL, Jiří SÝKORA, Michal ZVÁNOVEC, Filip GRÉGR and Petr SLAVÍK. Virtualizované prostředí pro trénink CSIRT týmu (Virtual environment for training of the CSIRT teams). 2021.
    48. DOČKALOVÁ BURSKÁ, Karolína, Anna-Marie DOMBAJOVÁ, Jiří HYNEK, Jakub KACHLÍK, Jakub MATUŠKA, Michal PAVÚK, Kryštof RYKALA, Dávid ŽELNÍK and Vít RUSŇÁK. Vizuálně-analytická konzole pro ICS (Visual-analytics console for ICS). 2021.
    49. NOVOTNÁ, Tereza and Jakub HARAŠTA. Vyhledávání české judikatury v praxi: potřeby uživatele vs. aktuální výzkumné metody. In České právo a informační technologie 2021. 2021.
    50. LUPTÁK, Dávid, Vít NOVOTNÝ, Michal ŠTEFÁNIK and Petr SOJKA. WebMIaS on Docker: Deploying Math-Aware Search in a Single Line of Code. In Fairouz Kamareddine and Claudio Sacerdotti-Coen. Intelligent Computer Mathematics: 14th International Conference, CICM 2021, Timisoara, Romania, July 26–31, 2021, Proceedings. LNAI 12833. Timisoara, Romania: Springer, 2021, p. 159-164. ISBN 978-3-030-81096-2. Available from: https://dx.doi.org/10.1007/978-3-030-81097-9_13.
    51. NOVOTNÝ, Vít, Kristýna SEIDLOVÁ, Tereza VRABCOVÁ and Aleš HORÁK. When Tesseract Brings Friends: Layout Analysis, Language Identification, and Super-Resolution in the Optical Character Recognition of Medieval Texts. In Horák, Rychlý, Rambousek. Recent Advances in Slavonic Natural Language Processing (RASLAN 2021). Brno: Tribun EU, 2021, p. 29-39. ISBN 978-80-263-1670-1.
    52. ROČEK, Aleš, Michal JAVORNÍK, Karel SLAVÍČEK and Otto DOSTÁL. Zero Watermarking: Critical Analysis of Its Role in Current Medical Imaging. Journal of Digital Imaging. 2021, vol. 34, No 1, p. 204-211. ISSN 0897-1889. Available from: https://dx.doi.org/10.1007/s10278-020-00396-0.

    2020

    1. ČECH, Michal, Roman CHRENŠŤ, Daniel TOVARŇÁK and Tomáš PLESNÍK. Adaptér pro systém pro správu zdrojů (Asset management adapter). 2020.
    2. ARCLib (software)
      LHOTÁK, Marin, Martin DUDA, Andrea FOJTŮ, Jan HEJZL, Jan HUTAŘ, Filip KERSCH, Jana KŘÍŽOVÁ, Marek MELICHAR, Martina NEZBEDOVÁ, Miroslav PAVELKA, Eliška PAVLÁSKOVÁ, Jan POKORSKÝ, Michal PŠENIČKA, Ivana ŠLAPÁKOVÁ, Zdeněk TICHÝ, Miroslav BARTOŠEK, Jan BILWACHS, Lukáš HEJTMÁNEK, Zdeněk HRUŠKA, Václav JIROUŠEK, Pavlína KOČIŠOVÁ, Vlastimil KREJČÍŘ, Iveta LODROVÁ, Natalie OSTRÁKOVÁ, Michal RŮŽIČKA, Zdeněk VAŠEK and Petr ŽABIČKA. ARCLib. 2020.
    3. DUDOVÁ, Zdenka, Alice HÁLOVÁ, Dalibor VALÍK and Petr HOLUB. BBMRI-CZ as a Partner for Personalized Medicine and Translational Medical Research. In RANK 2020. 2020. ISBN 978-80-87436-17-2.
    4. HOLUB, Petr, Lukasz KOZERA, Francesco FLORINDI, Esther van ENCKEVORT, Morris SWERTZ, Robert REIHS, Andrea WUTTE, Dalibor VALÍK and Michaela Th MAYRHOFER. BBMRI-ERIC’s contributions to research and knowledge exchange on COVID-19. European Journal of Human Genetics. London: Nature Publishing Group, 2020, vol. 28, No 6, p. 728-731. ISSN 1018-4813. Available from: https://dx.doi.org/10.1038/s41431-020-0634-8.
    5. VYKOPAL, Jan, Valdemar ŠVÁBENSKÝ and Ee-Chien CHANG. Benefits and Pitfalls of Using Capture The Flag Games in University Courses. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 752-758. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366893.
    6. NOVOTNÝ, Vít and Marie STARÁ. Cthulhu Hails from Wales: N-gram Frequency Analysis of R'lyehian. In Aleš Horák, Pavel Rychlý, Adam Rambousek. Proceedings of the Fourteenth Workshop on Recent Advances in Slavonic Natural Language Processing, RASLAN 2020. Brno: Tribun EU, 2020, p. 87-92. ISBN 978-80-263-1600-8.
    7. JIRSÍK, Tomáš and Pavel ČELEDA. Cyber Situation Awareness via IP Flow Monitoring. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Hungary: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8.
    8. POLČÁK, Radim, Jakub MÍŠEK, Matěj MYŠKA, Jakub HARAŠTA, Pavel LOUTOCKÝ, Veronika ŽOLNERČÍKOVÁ, Václav STUPKA, František KASL, Aleš ZAVRŠNIK, Ludwig GRAMLICH, Herbert HRACHOVEC, Andreas KIRCHNER, Kristian DANEBACK, Jakub MACEK, Dan Jerker Börje SVANTESSON, Erich SCHWEIGHOFER, David ŠMAHEL, Miroslav MAREŠ, Andreas WIEBE, Monika METYKOVÁ, Alena MACKOVÁ, Hana MACHÁČKOVÁ, Lydia KRAUS, Václav MATYÁŠ and Walter HÖTZENDORFER. Cyberspace 2020. 2020.
    9. JAVORNÍK, Michal, Jana KOMÁRKOVÁ, Lukáš SADLEK and Martin HUSÁK. Decision Support for Mission-Centric Network Security Management. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110261.
    10. KRAUS, Lydia, Martin UKROP, Václav MATYÁŠ and Tobias FIEBIG. Evolution of SSL/TLS Indicators and Warnings in Web Browsers. In Anderson, J., Stajano, F., Christianson, B., Matyáš, V. 27th International Workshop on Security Protocols (SPW 2019). Switzerland: Springer International Publishing, 2020, p. 267-280. ISBN 978-3-030-57042-2. Available from: https://dx.doi.org/10.1007/978-3-030-57043-9_25.
    11. CATCHPOOLE, Daniel R, Francesco FLORINDI, Caitlin AHERN, Debra Leiolani GARCIA, Piper MULLINS, Esther Van ENCKEVORT, Andy ZAAYENGA, Michaela Th MAYRHOFER and Petr HOLUB. Expanding the BBMRI-ERIC Directory into a Global Catalogue of COVID-19–Ready Collections: A Joint Initiative of BBMRI-ERIC and ISBER. Biopreservation and Biobanking. 2020, vol. 18, No 5, p. 479-480. Available from: https://dx.doi.org/10.1089/bio.2020.29075.drc.
    12. MOTSCHNIG, Renate, Michael SILBER and Valdemar ŠVÁBENSKÝ. How Does a Student-Centered Course on Communication and Professional Skills Impact Students in the Long Run?. Online. In 2020 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2020, p. 1-9. ISBN 978-1-7281-8961-1. Available from: https://dx.doi.org/10.1109/FIE44824.2020.9273962.
    13. ČERNÝ, Michal, Natálie VELECKÁ and Barbora FUKÁRKOVÁ. Kurz rozvoje digitálních kompetencí: zkušenost se vzájemným hodnocením v univerzitním online kurzu (Digital competence development course: peer assesment in a university online course). ITLib. Bratislava: Centrum vedecko - technických informácií SR, 2020, No 1, p. 38-44. ISSN 1335-793X.
    14. ČELEDA, Pavel, Jan VYKOPAL, Valdemar ŠVÁBENSKÝ and Karel SLAVÍČEK. KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 1026-1032. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366908.
    15. NOVOTNÝ, Vít. Making Markdown into a microwave meal. TUGboat. Portland, OR 97208-2311, U.S.A: TUG, 2020, roč. 41, No 3, 3 pp. ISSN 0896-3207. Available from: https://dx.doi.org/10.47397/tb/41-3/tb129novotny-frozen.
    16. NOVOTNÝ, Vít. Markdown 2.8.1: Směle k trůnu odlehčeného značkování v TeXu (Markdown 2.8.1: Boldly Unto the Throne of Lightweight Markup in TeX). Zpravodaj CSTUG. Brno: CSTUG, 2020, vol. 30, 1-2, p. 48-56. ISSN 1211-6661. Available from: https://dx.doi.org/10.5300/2020-1-2/48.
    17. ČELEDA, Pavel, Andrej TOMČI, Daniel IĽKOVIČ, Matěj GROMAN and Lubomír POSPÍŠIL. Nástroj pro simulaci chování průmyslových komponent (Tool for Simulating of Industrial Components). 2020.
    18. PLESNÍK, Tomáš and Vít RUSŇÁK. Nettmap2 - Interaktivní nástroj pro zobrazení síťové topologie vizualizující data z Flowmon řešení (Nettmap2 - An interactive tool for displaying network topology using data visualization from Flowmon's solution). 2020.
    19. LAŠTOVIČKA, Martin, Martin HUSÁK and Lukáš SADLEK. Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110394.
    20. VELAN, Petr and Tomáš JIRSÍK. On the Impact of Flow Monitoring Configuration. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Budapešť: IEEE Xplore Digital Library, 2020, p. 1-7. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110361.
    21. JELÍNEK, Kamil, Jan ŠLESINGER and Michal PROCHÁZKA. Právní aspekty sdílení dat v rámci informačních technologií konceptu Smart City v dopravě a jejich dopady do práva veřejných zakázek (xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx). 1st ed. Brno: Masarykova univerzita, Právnická fakulta, 2020, 91 pp. Edice Scientia, sv. 702. ISBN 978-80-210-9777-3.
    22. HUSÁK, Martin and Pavel ČELEDA. Predictions of Network Attacks in Collaborative Environment. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110472.
    23. HUSÁK, Martin, Tomáš BAJTOŠ, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. ACM Transactions on Management Information Systems. Association for Computing Machinery, 2020, vol. 11, No 4, p. 1-16. ISSN 2158-656X. Available from: https://dx.doi.org/10.1145/3386250.
    24. ČELEDA, Pavel, Kamil ANDONIADIS, Attila FARKAS, Jana ZIKOVÁ, Martin MADZIA, Matěj GROMAN, Andrej TOMČI and Lubomír POSPÍŠIL. Simulační prostředí pro testování průmyslových aplikací (Simulation Environment for Testing Industrial Applications). 2020.
    25. LAŠTOVIČKA, Martin, Jakub Bartolomej KOŠUTH, Daniel FILAKOVSKÝ, Antonín DUFKA and Martin HUSÁK. Software pro evidenci zranitelností v počítačové síti (Software for enumerating vulnerabilities in a computer network). 2020.
    26. SADLEK, Lukáš, Michal JAVORNÍK and Martin HUSÁK. Software pro podporu rozhodování při řešení bezpečnostního incidentu (Software for the decision support in the security incident handling). 2020.
    27. HUSÁK, Martin, Tomáš JIRSÍK and Shanchieh Jay YANG. SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security. Online. In Proceedings of the 15th International Conference on Availability, Reliability and Security. New York, NY, United States: Association for Computing Machinery, 2020, p. 1-10. ISBN 978-1-4503-8833-7. Available from: https://dx.doi.org/10.1145/3407023.3407062.
    28. UKROP, Martin, Valdemar ŠVÁBENSKÝ and Imrich NAGY. Teaching Lab: Training Novice Computer Science Teachers. In Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE ’20). 2020. ISBN 978-1-4503-6874-2. Available from: https://dx.doi.org/10.1145/3341525.3393967.
    29. NOVOTNÝ, Vít. The Art of Reproducible Machine Learning: A Survey of Methodology in Word Vector Experiments. In Aleš Horák, Pavel Rychlý, Adam Rambousek. Proceedings of the Fourteenth Workshop on Recent Advances in Slavonic Natural Language Processing, RASLAN 2020. Brno: Tribun EU, 2020, p. 55-64. ISBN 978-80-263-1600-8.
    30. NOVOTNÝ, Vít, Petr SOJKA, Michal ŠTEFÁNIK and Dávid LUPTÁK. Three is Better than One: Ensembling Math Information Retrieval Systems. CEUR Workshop Proceedings. Thessaloniki, Greece: M. Jeusfeld c/o Redaktion Sun SITE, Informatik V, RWTH Aachen., 2020, vol. 2020, No 2696, p. 93-122. ISSN 1613-0073.
    31. NOVOTNÝ, Vít, Michal ŠTEFÁNIK, Dávid LUPTÁK and Petr SOJKA. Towards Useful Word Embeddings: Evaluation on Information Retrieval, Text Classification, and Language Modeling. In Aleš Horák and Pavel Rychlý and Adam Rambousek. Proceedings of the Fourteenth Workshop on Recent Advances in Slavonic Natural Language Processing, RASLAN 2020. Brno: Tribun EU, 2020, p. 37-46. ISBN 978-80-263-1600-8.
    32. TOVARŇÁK, Daniel, Stanislav ŠPAČEK and Jan VYKOPAL. Traffic and Log Data Captured During a Cyber Defense Exercise. Data in Brief. 2020, vol. 31, August, p. 1-11. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2020.105784.
    33. LAŠTOVIČKA, Martin, Stanislav ŠPAČEK, Petr VELAN and Pavel ČELEDA. Using TLS Fingerprints for OS Identification in Encrypted Traffic. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110319.
    34. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL and Pavel ČELEDA. What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 2-8. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366816.
    35. NOVOTNÝ, Vít. When Tesseract Does It Alone: Optical Character Recognition of Medieval Texts. In Aleš Horák, Pavel Rychlý, Adam Rambousek. Proceedings of the Fourteenth Workshop on Recent Advances in Slavonic Natural Language Processing, RASLAN 2020. Brno: Tribun EU, 2020, p. 3-12. ISBN 978-80-263-1600-8.
    36. UKROP, Martin, Lydia KRAUS and Václav MATYÁŠ. Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version). Digital Threats: Research and Practice. New York, NY, USA: Association for Computing Machinery, 2020, vol. 1, No 4, p. 1-29. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3419472.

    2019

    1. ŠVÁBENSKÝ, Valdemar. Analyzing User Interactions with Cybersecurity Games. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). 2019. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3293717.
    2. VELAN, Petr and Pavel ČELEDA. Application-Aware Flow Monitoring. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 701-706. ISBN 978-1-72810-618-2.
    3. SMERIGA, Juraj and Tomáš JIRSÍK. Behavior-Aware Network Segmentation using IP Flows. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2019, p. 1-9. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3339265.
    4. KOVÁŘOVÁ, Pavla and Martin KRČÁL. Budoucnost knihoven. In Duha: Informace o knihách a knihovnách z Moravy. Brno: Moravská zemská knihovna, 2019. 33. ISSN 1804-4255.
    5. DRAŠAR, Martin, Ádám RUMAN, Adam SKRÁŠEK and Matúš GALBA. CEP-Server: Software pro vyhodnocování a dotazování komplexních událostí v doméně ITOA (CEP-Server: Software for evaluation and querying of complex events in the ITOA domain). 2019.
    6. KOVÁŘOVÁ, Pavla. Copyright Literacy of LIS Students in the Czech Republic. Online. In Kurbanoğlu, Serap; Špiranec, Sonja; Ünal, Yurdagül; Boustany, Joumana; Huotari, Maija Leena; Grassian, Esther; Mizrachi, Diane; Roy, Loriene. Information Literacy in Everyday Life. Cham: Springer International Publishing, 2019, p. 585-593. ISBN 978-3-030-13471-6. Available from: https://dx.doi.org/10.1007/978-3-030-13472-3_55.
    7. ŠPAČEK, Stanislav, Martin LAŠTOVIČKA, Martin HORÁK and Tomáš PLESNÍK. Current Issues of Malicious Domains Blocking. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, p. 551-556. ISBN 978-1-7281-0618-2.
    8. JAVORNÍK, Michal, Jana KOMÁRKOVÁ and Martin HUSÁK. Decision Support for Mission-Centric Cyber Defence. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "34:1"-"34:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340522.
    9. ŠPAČEK, Stanislav, Vít RUSŇÁK and Anna-Marie DOMBAJOVÁ. DNS Firewall Data Visualization. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, p. 743-744. ISBN 978-1-7281-0618-2.
    10. ČELEDA, Pavel, Petr VELAN, Benjamin KRÁL and Ondřej KOZÁK. Enabling SSH Protocol Visibility in Flow Monitoring. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 569-574. ISBN 978-1-72810-618-2.
    11. HORÁK, Martin, Václav STUPKA and Martin HUSÁK. GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "36:1"-"36:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340516.
    12. KOVÁŘOVÁ, Pavla. Informační bezpečnost žáků základních škol : lekce v knihovnách (Information Safety of Primary School Pupils : lessons in Libraries). 1st ed. Brno: Masarykova univerzita, 2019, 261 pp. Spisy Filozofické fakulty Masarykovy univerzity, č. 489. ISBN 978-80-210-9270-9. Available from: https://dx.doi.org/10.5817/CZ.MUNI.M210-9271-2019.
    13. KOVÁŘOVÁ, Pavla. Informační bezpečnost žáků základních škol. Lekce v knihovnách (Information Safety of Primary School Pupils. Lessons in Libraries). 1st ed. Brno: Masarykova univerzita, 2019, 261 pp. Spisy Filozofické fakulty Masarykovy univerzity, č. 489. ISBN 978-80-210-9270-9.
    14. KOVÁŘOVÁ, Pavla. Informační bezpečnost žáků základních škol. Lekce v knihovnách (Information Safety of Primary School Pupils. Lessons in Libraries). Online. 1., elektronické vyd. Brno: Masarykova univerzita, 2019, 261 pp. Spisy Filozofické fakulty Masarykovy univerzity, sv. 489. ISBN 978-80-210-9271-6. Available from: https://dx.doi.org/10.5817/CZ.MUNI.M210-9271-2019.
    15. KOVÁŘOVÁ, Pavla. Information Literacy of Masaryk University Students and Evaluation of Campus-Wide Course. Online. In Kurbanoğlu, Serap; Špiranec, Sonja; Ünal, Yurdagül; Boustany, Joumana; Huotari, Maija Leena; Grassian, Esther; Mizrachi, Diane; Roy, Loriene. Information Literacy in Everyday Life. Cham: Springer International Publishing, 2019, p. 399-408. ISBN 978-3-030-13471-6. Available from: https://dx.doi.org/10.1007/978-3-030-13472-3_38.
    16. DRAŠAR, Martin and Tomáš JIRSÍK. IT Operations Analytics: Root Cause Analysis via Complex Event Processing. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 741-742. ISBN 978-1-72810-618-2.
    17. SAUNDERS, Gary, Michael BAUDIS, Regina BECKER, Sergi BELTRAN, Christophe BÉROUD, Ewan BIRNEY, Cath BROOKSBANK, Søren BRUNAK, Marc Van den BULCKE, Rachel DRYSDALE, Salvador CAPELLA-GUTIERREZ, Paul FLICEK, Francesco FLORINDI, Peter GOODHAND, Ivo GUT, Jaap HERINGA, Petr HOLUB, Jef HOOYBERGHS, Nick JUTY, Thomas M KEANE, Jan O KORBEL, Ilkka LAPPALAINEN, Brane LESKOSEK, Gert MATTHIJS, Michaela Th MAYRHOFER, Andres METSPALU, Arcadi NAVARRO, Steven NEWHOUSE, Tommi NYRÖNEN, Angela PAGE, Bengt PERSSON, Aarno PALOTIE, Helen PARKINSON, Jordi RAMBLA, David SALGADO, Erik STEINFELDER, Morris A SWERTZ, Alfonso VALENCIA, Susheel VARMA, Niklas BLOMBERG and Serena SCOLLEN. Leveraging European infrastructures to access 1 million human genomes by 2022. Nature Reviews Genetics. 2019, vol. 20, No 11, p. 692-701, 9 pp. ISSN 1471-0056. Available from: https://dx.doi.org/10.1038/s41576-019-0156-9.
    18. NOVOTNÝ, Vít. Markdown 2.7.0: Towards lightweight markup in TeX. TUGboat. Portland, OR 97208-2311, U.S.A: TUG, 2019, roč. 40, No 1, p. 25-27. ISSN 0896-3207.
    19. RŮŽIČKA, Michal, Andrea MIRANDA, Lukáš HEJTMÁNEK, Zdeněk VAŠEK, Vlastimil KREJČÍŘ and Miroslav BARTOŠEK. Metodika bitové ochrany digitálních dat (The methodology for bit-level preservation of digital dat). 2019.
    20. ČELEDA, Pavel, Jakub ČEGAN, Martin MACHÁČ, Jana MEDKOVÁ, Ivo NUTÁR, Tomáš PLESNÍK, Daniel TOVARŇÁK and Martin VIZVÁRY. Nástroj pro zmírňování a potlačování útoků na kritickou informační infrastrukturu (Tool for mitigation and suppression of attacks on critical information infrastructure). 2019.
    21. ČELEDA, Pavel, Jakub ČEGAN, Martin DRAŠAR, Ivo NUTÁR, Jiří RÁJA, Tomáš REBOK, Andrej TOMČI and Daniel TOVARŇÁK. Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury (Tools for verification of SW/HW security and simulation of attacks on critical information infrastructure). 2019.
    22. MATE, Sebastian, Marvin KAMPF, Wolfgang RÖDLE, Stefan KRAUS, Rumyana PROYNOVA, Kaisa SILANDER, Lars EBERT, Martin LABLANS, Christina SCHÜTTLER, Christian KNELL, Niina EKLUND, Michael HUMMEL, Petr HOLUB and Hans-Ulrich PROKOSCH. Pan-European Data Harmonization for Biobanks in ADOPT BBMRI-ERIC. Appl Clin Inform. 2019, vol. 10, No 04, p. 679-692. Available from: https://dx.doi.org/10.1055/s-0039-1695793.
    23. PETERS, K, J BRADBURY, S BERGMANN, M CAPUCCINI, M CASCANTE, Atauri P DE, TMD EBBELS, C FOGUET, R GLEN, A GONZALEZ-BELTRAN, UL GUNTHER, E HANDAKAS, T HANKEMEIER, K HAUG, S HERMAN, Petr HOLUB, M IZZO, D JACOB, D JOHNSON, F JOURDAN, N KALE, I KARAMAN, B KHALILI, PE KHONSARI, K KULTIMA, S LAMPA, A LARSSON, C LUDWIG, P MORENO, S NEUMANN, JA NOVELLA, O Donovan C, JTM PEARCE, A PELUSO, ME PIRAS, L PIREDDU, MAC REED, P ROCCA-SERRA, P ROGER, A ROSATO, R RUEEDI, C RUTTKIES, N SADAWI, RM SALEK, SA SANSONE, V SELIVANOV, O SPJUTH, D SCHOBER, EA THEVENOT, M TOMASONI, M VAN RIJSWIJK, M VAN VLIET, MR VIANT, RJM WEBER, G ZANETTI and C STEINBECK. PhenoMeNal: processing and analysis of metabolomics data in the cloud. GIGASCIENCE. OXFORD: OXFORD UNIV PRESS, 2019, vol. 8, No 2, 12 pp. ISSN 2047-217X. Available from: https://dx.doi.org/10.1093/gigascience/giy149.
    24. LHOTÁK, Martin, Zdeněk VAŠEK and Michal RŮŽIČKA. Projekt ARCLib – vývoj open-source řešení pro dlouhodobou archivaci digitálních dokumentů pro knihovny a další paměťové instituce – aktuální stav (ARCLib – development of open source system for long-term preservation for library digital collections). In LTP 2019: Nové trendy a východiská pri budovaní LTP archívov: zborník príspevkov zo 4. medzinárodnej konferencie o dlhodobej archivácii. Bratislava: Univerzitná knižnica v Bratislave, 2019, p. 53-63. ISBN 978-80-89303-77-9.
    25. KOVÁŘOVÁ, Pavla. Připravujeme copyright asistenty? In Seminář IVIG: SPRÁVNĚ PRÁVNĚ o copyrightu a plagiátorství. 2019.
    26. JIRSÍK, Tomáš, Štěpán TRČKA and Pavel ČELEDA. Quality of Service Forecasting with LSTM Neural Network. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 251-260. ISBN 978-1-72810-618-2.
    27. SOJKA, Petr, Vít NOVOTNÝ, Eniafe Festus AYETIRAN, Dávid LUPTÁK and Michal ŠTEFÁNIK. Quo Vadis, Math Information Retrieval. In Aleš Horák and Pavel Rychlý and Adam Rambousek. Proceedings of the Thirteenth Workshop on Recent Advances in Slavonic Natural Language Processing, RASLAN 2019. Brno: Tribun EU, 2019, p. 117-128. ISBN 978-80-263-1517-9.
    28. ČERMÁK, Milan, Martin LAŠTOVIČKA and Tomáš JIRSÍK. Real-time Pattern Detection in IP Flow Data using Apache Spark. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 521-526. ISBN 978-1-7281-0618-2.
    29. UKROP, Martin, Valdemar ŠVÁBENSKÝ and Jan NEHYBA. Reflective Diary for Professional Development of Novice Teachers. Online. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). Minneapolis, Minnesota, USA: ACM, 2019, p. 1088-1094. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3287448.
    30. NOVOTNÝ, Vít. Soft Cosine Measure: Capturing Term Similarity in the Bag of Words VSM. 2019.
    31. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Michal BERAN, František HRDINA, Tomáš JIRSÍK, Daniel KOUŘIL, Michal MAZOUREK, Radek OŠLEJŠEK, Michal PROCHÁZKA, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Vadim JANOVSKIJ and Kristína ZÁKOPČANOVÁ. Software pro detekci a analýzu napadení KII (Software for detection and analysis of attacks on critical information infrastructures). 2019.
    32. ČELEDA, Pavel, Jakub ČEGAN, Karolína DOČKALOVÁ BURSKÁ, Jan DUDA, Martin HAMERNÍK, Miroslava JAREŠOVÁ, Erik KOČAMBA, Radek OŠLEJŠEK, Vít RUSŇÁK, Daniel TOVARŇÁK, Hai Duong TRAN, Jan VYKOPAL and Kristína ZÁKOPČANOVÁ. Software pro provádění bezpečnostních cvičení a školení (Software for realization of cybersecurity exercises and trainings). 2019.
    33. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Milan ČERMÁK, Jan DUDA, Vlastimil HOLER, Ľuboš HYŽÁK, Boris JADUŠ, Jakub KADAŠI, David LEŠKA, Martin MACHÁČ, Ivo NUTÁR, Radek OŠLEJŠEK, Dominik PILÁR, Tomáš PLESNÍK, Michal PROCHÁZKA, Tomáš REBOK, Vít RUSŇÁK, Miloslav STANĚK, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Jan VYKOPAL and Tatiana ZBONČÁKOVÁ. Software pro simulaci obecných i kritických informačních infrastruktur (Software for simulation of generic and critical information infrastructures). 2019.
    34. HUSÁK, Martin, Jana KOMÁRKOVÁ, Elias BOU-HARB and Pavel ČELEDA. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys & Tutorials. IEEE, 2019, vol. 21, No 1, p. 640-660. ISSN 1553-877X. Available from: https://dx.doi.org/10.1109/COMST.2018.2871866.
    35. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL and Pavel ČELEDA. Towards Learning Analytics in Cybersecurity Capture the Flag Games. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). 2019. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3293816.
    36. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína BURSKÁ, Valdemar ŠVÁBENSKÝ and Jan VYKOPAL. Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. Online. In Gove R., Arendt D., Kohlhammer J., Angelini M., Lyn Paul, C., Bryan C. McKenna S., Prigent N., Najafi P., Sopan A. 2019 IEEE Symposium on Visualization for Cyber Security (VizSec). Vancouver, BC, Canada: IEEE, 2019, p. 1-11. ISBN 978-1-7281-3876-3. Available from: https://dx.doi.org/10.1109/VizSec48167.2019.9161386.

    2018

    1. HARAŠTA, Jakub, Jaromír ŠAVELKA, František KASL, Adéla KOTKOVÁ, Pavel LOUTOCKÝ, Jakub MÍŠEK, Daniela PROCHÁZKOVÁ, Helena PULLMANNOVÁ, Petr SEMENIŠÍN, Tamara ŠEJNOVÁ, Nikola ŠIMKOVÁ, Michal VOSINEK, Lucie ZAVADILOVÁ and Jan ZIBNER. Annotated Corpus of Czech Case Law for Reference Recognition Tasks. Online. In Sojka, P., Horák, A., Kopeček, I., Pala, K. Text, Speech, and Dialogue: 21st International Conference. Cham: Springer Nature Switzerland AG, 2018, p. 239-250. ISBN 978-3-030-00793-5. Available from: https://dx.doi.org/10.1007/978-3-030-00794-2_26.
    2. HUSÁK, Martin, Nataliia NESHENKO, Morteza SAFAEI POUR, Elias BOU-HARB and Pavel ČELEDA. Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "29:1"-"29:6", 6 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3230837.
    3. LINDEN, Mikael, Michal PROCHÁZKA, Ilkka LAPPALAINEN, Dominik František BUČÍK, Pavel VYSKOČIL, Martin KUBA, Sami SILÉN, Peter BELMANN, Alexander SCZYRBA, Steven NEWHOUSE, Luděk MATYSKA and Tommi NYRÖNEN. Common ELIXIR Service for Researcher Authentication and Authorisation. F1000Research. F1000 Research Ltd., 2018, vol. 7, No 2018, p. 1-16. ISSN 2046-1402. Available from: https://dx.doi.org/10.12688/f1000research.15161.1.
    4. KOMÁRKOVÁ, Jana, Lukáš SADLEK and Martin LAŠTOVIČKA. Community Based Platform for Vulnerability Categorization. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 2 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406125.
    5. PORTESI, Silvia, Václav STUPKA, Philip ANDERSON, François BEAUVOIS, Efthymios LALAS, Catalin PATRASCU, Andreas SFAKIANAKIS, Silvia SIGNORATO and Koen VAN IMPE. Cooperation between CSIRTs and Law Enforcement: interaction with the Judiciary. Greece: European Union Agency for Network and Information Security, 2018, 102 pp. ISBN 978-92-9204-259-2. Available from: https://dx.doi.org/10.2824/274312.
    6. KOMÁRKOVÁ, Jana, Martin HUSÁK, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. CRUSOE: Data Model for Cyber Situation Awareness. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "36:1"-"36:10", 10 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3232798.
    7. LOUTOCKÝ, Pavel, Jakub MÍŠEK and František KASL. Czech Republic. Online. In J.L. da Cruz Vilaça, R. L. Vasconcelos, M. Gorjão-Henriques, A. Saavedra. The internal market and the digital economy: XXVIII FIDE Congress Lisbon/Estoril (23-26 may 2018) Congress proceedings Vol. 1. Coimbra: Almedina, 2018, p. 285-315. Congress proceedings Vol. 1. ISBN 978-972-40-7478-8.
    8. MÍŠEK, Jakub. Data protection impact assessment before open data publication. In IRIS 2018 Internationales Rechtsinformatiksymposium. 2018.
    9. NESHENKO, Nataliia, Martin HUSÁK, Elias BOU-HARB, Pavel ČELEDA, Sameera AL-MULLA and Claude FACHKHA. Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations. Online. In 2018 IEEE Globecom Workshops. Abu Dhabi: IEEE, 2018, p. 1-7. ISBN 978-1-5386-4920-6. Available from: https://dx.doi.org/10.1109/GLOCOMW.2018.8644468.
    10. TROUBIL, Pavel, Hana RUDOVÁ and Petr HOLUB. Dynamic Reconfiguration in Multigroup Multicast Routing under Uncertainty. Journal of Heuristics. Springer, 2018, vol. 24, No 3, p. 395-423. ISSN 1381-1231. Available from: https://dx.doi.org/10.1007/s10732-017-9339-8.
    11. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Milan ČERMÁK and Martin LAŠTOVIČKA. Enhancing Cybersecurity Skills by Creating Serious Games. Online. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'18). Larnaca, Cyprus: ACM, 2018, p. 194-199. ISBN 978-1-4503-5707-4. Available from: https://dx.doi.org/10.1145/3197091.3197123.
    12. HOLUB, Petr, Florian KOHLMAYER, Fabian PRASSER, Michaela Theresia MAYRHOFER, Irene SCHLUNDER, Gillian M. MARTIN, Sara CASATI, Lefteris KOUMAKIS, Andrea WUTTE, Lukas KOZERA, Dominik STRAPAGIEL, Gabriele ANTON, Gianluigi ZANETTI, Osman Ugur SEZERMAN, Maimuna MENDY, Dalibor VALÍK, Marialuisa LAVITRANO, Georges DAGHER, Kurt ZATLOUKAL, GertJan B. VAN OMMEN and Jan-Eric LITTON. Enhancing Reuse of Data and Biological Material in Medical Research: From FAIR to FAIR-Health. Biopreservation and Biobanking. NEW ROCHELLE: MARY ANN LIEBERT, INC, 2018, vol. 16, No 2, p. 97-105. ISSN 1947-5535. Available from: https://dx.doi.org/10.1089/bio.2017.0110.
    13. KOŠČÍK, Michal, Radim POLČÁK, Václav STUPKA, Matěj MYŠKA, Pavel LOUTOCKÝ and Jan ZIBNER. European ICT Law 2018: Texts, Cases, Materials. Brno: Masarykova univerzita, 2018, 404 pp.
    14. OŠLEJŠEK, Radek, Jan VYKOPAL, Karolína BURSKÁ and Vít RUSŇÁK. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. Online. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18). San Jose, California, USA: IEEE, 2018, p. 1-9. ISBN 978-1-5386-1173-9. Available from: https://dx.doi.org/10.1109/FIE.2018.8659299.
    15. ŠVÁBENSKÝ, Valdemar and Jan VYKOPAL. Gathering Insights from Teenagers' Hacking Experience with Authentic Cybersecurity Tools. Online. In 2018 IEEE Frontiers in Education Conference (FIE). San Jose, California, USA: IEEE, 2018, p. 1414-1417. ISBN 978-1-5386-1175-3. Available from: https://dx.doi.org/10.1109/FIE.2018.8658840.
    16. ŠVÁBENSKÝ, Valdemar and Jan VYKOPAL. Challenges Arising from Prerequisite Testing in Cybersecurity Games. Online. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE’18). Baltimore, Maryland, USA: ACM, 2018, p. 56-61. ISBN 978-1-4503-5103-4. Available from: https://dx.doi.org/10.1145/3159450.3159454.
    17. NOVOTNÝ, Vít. Implementation Notes for the Soft Cosine Measure. Online. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM '18). Torino, Italy: Association for Computing Machinery, 2018, p. 1639-1642. ISBN 978-1-4503-6014-2. Available from: https://dx.doi.org/10.1145/3269206.3269317.
    18. KREJČÍŘ, Vlastimil. Indexování a vyhledávání matematických formulí (Math formulae index and search). Online. Praha: Albertina icome Praha, 2018, 6 pp. ISSN 1801-2213.
    19. KOTT, Alexander, Paul THERÓN, Luigi V MANCINI, Martin DRAŠAR, Edlira DUSHKU, Günther HEIKO, Markus KONT, Benoît LEBLANC, Agostino PANICO, Mauno PIHELGAS and Krzysztof RZADCA. Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense. 2018.
    20. LAŠTOVIČKA, Martin, Antonín DUFKA and Jana KOMÁRKOVÁ. Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use?. Online. In IEEE. Proceedings of the 14th International Wireless Communications and Mobile Computing Conference. Limassol, Cyprus: IEEE Xplore Digital Library, 2018, p. 542-547. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450406.
    21. POLČÁK, Radim, Leoš ŠEVČÍK, Michal KOŠČÍK, Jakub KLODWIG and Petr HOLUB. Metodika aplikace GDPR na výzkumná data v prostředí vysokých škol v ČR (Methodology of GDPR Application to Research Data in Czech Republic Universities). 1. vydání. Brno: Neuveden, 2018, 156 pp. Available from: https://dx.doi.org/10.5281/zenodo.2532860.
    22. SOJKA, Petr, Michal RŮŽIČKA and Vít NOVOTNÝ. MIaS: Math-Aware Retrieval in Digital Mathematical Libraries. Online. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management (CIKM '18). Torino, Italy: Association for Computing Machinery, 2018, p. 1923-1926. ISBN 978-1-4503-6014-2. Available from: https://dx.doi.org/10.1145/3269206.3269233.
    23. LAŠTOVIČKA, Martin, Tomáš JIRSÍK, Pavel ČELEDA, Stanislav ŠPAČEK and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Methods in the Jungle of Wireless Networks. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 9 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406262.
    24. LAŠTOVIČKA, Martin and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Prototype Demonstration. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 2 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406128.
    25. POLČÁK, Radim, Matěj MYŠKA, Petr HOSTAŠ, František KASL, Tereza KYSELOVSKÁ, Tomáš LECHNER, Pavel LOUTOCKÝ, Jakub MÍŠEK, Jan TOMÍŠEK, Václav STUPKA and Miroslav UŘIČAŘ. Právo informačních technologií (Information Technology Law). Praha: Wolters Kluwer, 2018, 656 pp. Právní monografie. ISBN 978-80-7598-045-8.
    26. NOVOTNÝ, Vít. Příprava Zpravodaje CSTUG (Preparing the CSTUG Bulletin). Zpravodaj CSTUG. Brno: CSTUG, 2018, vol. 28, 1-4, p. 1-10. ISSN 1211-6661. Available from: https://dx.doi.org/10.5300/2018-1-4/1.
    27. JIRSÍK, Tomáš. Stream4Flow: Real-time IP Flow Host Monitoring using Apache Spark. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE, 2018, p. 1-2. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406132.
    28. ŠPAČEK, Stanislav and Pavel ČELEDA. Threat Detection Through Correlation of Network Flows and Logs. Online. In Burkhard Stiller. Proceedings of the 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018). Neuveden: IFIP, 2018, p. 6-10. ISBN 978-3-903176-12-6.
    29. JIRSÍK, Tomáš, Štěpán TRČKA and Pavol ZAŤKO. Time Series Analyzer: Software for analysis of performance time series. 2018.
    30. VYKOPAL, Jan, Radek OŠLEJŠEK, Karolína BURSKÁ and Kristína ZÁKOPČANOVÁ. Timely Feedback in Unstructured Cybersecurity Exercises. Online. In Proceedings of Special Interest Group on Computer Science Education, Baltimore, Maryland, USA, February 21–24, 2018(SIGCSE’18). New York, NY, USA: ACM, 2018, p. 173-178. ISBN 978-1-4503-5103-4. Available from: https://dx.doi.org/10.1145/3159450.3159561.
    31. JIRSÍK, Tomáš and Pavel ČELEDA. Toward Real-time Network-wide Cyber Situational Awareness. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE, 2018, p. 1-7. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406166.
    32. THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysytof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI and Agostino PANICO. Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. Online. In 2018 International Conference on Military Communications and Information Systems (ICMCIS). Warsaw, Poland: IEEE, 2018, p. 1-9. ISBN 978-1-5386-4559-8. Available from: https://dx.doi.org/10.1109/ICMCIS.2018.8398730.
    33. HUSÁK, Martin and Jaroslav KAŠPAR. Towards Predicting Cyber Attacks Using Information Exchange and Data Mining. Online. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). Limassol: IEEE, 2018, p. 536-541. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450512.
    34. ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR and Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, p. 1-8. ISBN 978-3-903176-09-6. Available from: https://dx.doi.org/10.23919/TMA.2018.8506498.
    35. NOVOTNÝ, Vít and Petr SOJKA. Weighting of Passages in Question Answering. In Aleš Horák, Pavel Rychlý, Adam Rambousek. Proceedings of the Twelfth Workshop on Recent Advances in Slavonic Natural Language Processing, RASLAN 2018. Brno: Tribun EU, 2018, p. 31-40. ISBN 978-80-263-1517-9.

    2017

    1. PROYNOVA, Rumyana, Diogo ALEXANDRE, Martin LABLANS, David VAN ENCKEVORT, Sebastian MATE, Niina EKLUND, Kaisa SILANDER, Michael HUMMEL, Petr HOLUB and Frank ÜCKERT. A Decentralized IT Architecture for Locating and Negotiating Access to Biobank Samples. Stud Health Technol Inform. Netherlands: IOS Press, 2017, vol. 243, p. 75-79, 6 pp. ISSN 0926-9630. Available from: https://dx.doi.org/10.3233/978-1-61499-808-2-75.
    2. ŠPAČEK, Stanislav, Pavel ČELEDA, Martin DRAŠAR and Martin VIZVÁRY. Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. SPI 2017 - Security and Protection of Information 2017. Brno: Univerzita obrany, 2017, p. 143-158. ISBN 978-80-7231-414-0.
    3. PANG, Chao, Fleur KELPIN, David VAN ENCKEVORT, Niina EKLUND, Kaisa SILANDER, Dennis HENDRIKSEN, Mark DE HAAN, Jonathan JETTEN, Tommy DE BOER, Bart CHARBON, Petr HOLUB, Hans HILLEGE and Morris A. SWERTZ. BiobankUniverse: automatic matchmaking between datasets for biobank data discovery and integration. Bioinformatics. Oxford: Oxford University Press, 2017, vol. 33, No 22, p. 3627-3634. ISSN 1367-4803. Available from: https://dx.doi.org/10.1093/bioinformatics/btx478.
    4. HOFER-PICOUT, Philipp, Horst PICHLER, Johann EDER, Sabrina B. NEURURER, Heimo MÜLLER, Robert REIHS, Petr HOLUB, Thomas INSAM and Georg GOEBEL. Conception and Implementation of an Austrian Biobank Directory Integration Framework. Biopreservation and Biobanking. NEW ROCHELLE: MARY ANN LIEBERT, INC, 2017, vol. 15, No 4, p. 332-340. ISSN 1947-5535. Available from: https://dx.doi.org/10.1089/bio.2016.0113.
    5. HUSÁK, Martin, Milan ČERMÁK, Martin LAŠTOVIČKA and Jan VYKOPAL. Exchanging Security Events: Which And How Many Alerts Can We Aggregate?. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 604-607. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987340.
    6. VYKOPAL, Jan and Jakub ČEGAN. Finding Exercise Equilibrium: How to Support the Game Balance at the Very Beginning? 2017. ISBN 978-1-4503-4698-6. Available from: https://dx.doi.org/10.1145/3017680.3022409.
    7. RŮŽIČKA, Michal, Vít NOVOTNÝ, Petr SOJKA, Jan POMIKÁLEK and Radim ŘEHŮŘEK. Flexible Similarity Search of Semantic Vectors Using Fulltext Search Engines. Online. In CEUR Workshop Proceedings, Vol. 1923. Vienna, Austria: Neuveden, 2017, p. 1-12. ISSN 1613-0073.
    8. JIMÉNEZ, Rafael C, Mateusz KUZAK, Monther ALHAMDOOSH, Michelle BARKER, Bérénice BATUT, Mikael BORG, Salvador CAPELLA-GUTIERREZ, Neil Chue HONG, Martin COOK, Manuel CORPAS, Madison FLANNERY, Leyla GARCIA, Josep Ll GELPÍ, Simon GLADMAN, Carole GOBLE, Montserrat González FERREIRO, Alejandra GONZALEZ-BELTRAN, Philippa C GRIFFIN, Björn GRÜNING, Jonas HAGBERG, Petr HOLUB, Rob HOOFT, Jon ISON, Daniel S KATZ, Brane LESKOŠEK, Federico López GÓMEZ, Luis J OLIVEIRA, David MELLOR, Rowland MOSBERGEN, Nicola MULDER, Yasset PEREZ-RIVEROL, Robert PERGL, Horst PICHLER, Bernard POPE, Ferran SANZ, Maria V SCHNEIDER, Victoria STODDEN, Radosław SUCHECKI, Radka SVOBODOVÁ VAŘEKOVÁ, Harry-Anton TALVIK, Ilian TODOROV, Andrew TRELOAR, Sonika TYAGI, Maarten van GOMPEL, Daniel VAUGHAN, Allegra VIA, Xiaochuan WANG, Nathan S WATSON-HAIGH and Crouch STEVE. Four simple recommendations to encourage best practices in research software. F1000Research. 2017, vol. 6, JUN, p. 876-888. ISSN 2046-1402. Available from: https://dx.doi.org/10.12688/f1000research.11407.1.
    9. MEDKOVÁ, Jana, Martin HUSÁK, Martin VIZVÁRY and Pavel ČELEDA. Honeypot Testbed for Network Defence Strategy Evaluation. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 887-888. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987397.
    10. VYKOPAL, Jan, Radek OŠLEJŠEK, Pavel ČELEDA, Martin VIZVÁRY and Daniel TOVARŇÁK. KYPO Cyber Range: Design and Use Cases. Online. In Cardoso J.,Cardoso J.,Maciaszek L.,Maciaszek L.,van Sinderen M.,Cabello E. Proceedings of the 12th International Conference on Software Technologies - Volume 1: ICSOFT. Madrid, Spain: SciTePress, 2017, p. 310-321. ISBN 978-989-758-262-2. Available from: https://dx.doi.org/10.5220/0006428203100321.
    11. VYKOPAL, Jan, Martin VIZVÁRY, Radek OŠLEJŠEK, Pavel ČELEDA and Daniel TOVARŇÁK. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. Online. In 2017 IEEE Frontiers in Education Conference. Indianapolis, IN, USA: IEEE, 2017, p. 1-8. ISBN 978-1-5090-5919-5. Available from: https://dx.doi.org/10.1109/FIE.2017.8190713.
    12. RŮŽIČKA, Michal. Math Information Retrieval for Digital Libraries. Brno: Masaryk University, Faculty of Informatics, 2017, 144 pp. Doctoral Thesis.
    13. KREJČÍŘ, Vlastimil. Mathematics Index and Search in DSpace. In OAI10 DSpace user group meeting (Pre-conference of OAI 10 - The CERN - UNIGE Workshop on Innovations in Scholarly Communication). 2017.
    14. BARTOŠEK, Miroslav, Michal RŮŽIČKA and Václav STUPKA. Nařízení GDPR a jeho implementace na vysokých školách v ČR – jak na to (GDPR Regulation and its Implementation at Universities in the Czech Republic - how to do it). In EUNIS-CZ. Dopad zavedení novely VŠ zákona do IS vysokých škol. 1st ed. Plzeň: Západočeská univerzita v Plzni, 2017, p. 5-14. ISBN 978-80-261-0713-2.
    15. HUSÁK, Martin, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "22:1"-"22:10", 10 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3098981.
    16. DOSTÁL, Otto, Otto DOSTÁL and Michal JAVORNÍK. Právní limity nakládání s údaji o zdravotním stavu. In XIII. mezinárodní kongres informačních technologií ve zdravotnictví. 2017.
    17. STUPKA, Václav, Martin HORÁK and Martin HUSÁK. Protection of personal data in security alert sharing platforms. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "65:1"-"65:8", 8 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3105822.
    18. ROČEK, Aleš, Michal JAVORNÍK, Karel SLAVÍČEK and Otto DOSTÁL. Reversible Watermarking in Medical Imaging with Zero Distortion in ROI. Online. In Proceedings of 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2017). New York: IEEE, 2017, p. 356-359. ISBN 978-1-5386-1911-7. Available from: https://dx.doi.org/10.1109/ICECS.2017.8292071.
    19. RYGL, Jan, Jan POMIKÁLEK, Radim ŘEHŮŘEK, Michal RŮŽIČKA, Vít NOVOTNÝ and Petr SOJKA. Semantic Vector Encoding and Similarity Search Using Fulltext Search Engines. Online. In Proceedings of the 2nd Workshop on Representation Learning for NLP, RepL4NLP 2017 c/o ACL 2017. Vancouver, Canada: Association for Computational Linguistics, ACL, 2017, p. 81-90. ISBN 978-1-945626-62-3. Available from: https://dx.doi.org/10.18653/v1/W17-2611.
    20. LAŠTOVIČKA, Martin and Pavel ČELEDA. Situational Awareness: Detecting Critical Dependencies and Devices in a Network. In Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Zurich (Switzerland): Springer, 2017, p. 173-178. ISBN 978-3-319-60773-3. Available from: https://dx.doi.org/10.1007/978-3-319-60774-0_17.
    21. ŽÁDNÍK, Martin, Jan WRONA, Pavel KROBOT, Pavel MINAŘÍK, Jan BARIENČÍK, Tomáš JIRSÍK, Milan ČERMÁK and Daniel TOVARŇÁK. Systém pro sběr, uchování a analýzu síťových dat velkého rozsahu (System for collecting, storing and analysis of large IP flow data). 2017.
    22. SOJKA, Petr and Vít NOVOTNÝ. TeX na školách? Samozřejmě ano! Příklad užití TeXu na Fakultě informatiky Masarykovy univerzity (TeX in Schools? Just Say Yes: the Use Case of TeX Usage at the Faculty of Informatics, Masaryk University). Zpravodaj CSTUG. Brno: CSTUG, 2017, vol. 27, 3-4, p. 118-137. ISSN 1211-6661. Available from: https://dx.doi.org/10.5300/2017-3-4/118.
    23. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK and Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine. IEEE, 2017, vol. 55, No 7, p. 70-76. ISSN 0163-6804. Available from: https://dx.doi.org/10.1109/MCOM.2017.1600972.
    24. OŠLEJŠEK, Radek, Dalibor TOTH, Zdenek EICHLER and Karolína BURSKÁ. Towards a Unified Data Storage and Generic Visualizations in Cyber Ranges. In Mark Scanlon, Nhien-An Le-Khac. Proceedings of the 16th European Conference on Cyber Warfare and Security ECCWS 2017. UK: Academic Conferences and Publishing International Limited, 2017, p. 298-306. ISBN 978-1-911218-43-2.
    25. NOVOTNÝ, Vít. Using Markdown Inside TeX Documents. TUGboat. Portland, OR 97208-2311, U.S.A: TUG, 2017, roč. 38, No 2, p. 214-217. ISSN 0896-3207.
    26. NOVOTNÝ, Vít. Vector Space Representations in Information Retrieval. Brno: Fakulta Informatiky Masarykovy Univerzity, 2017, 56 pp.
    27. BURSKÁ, Karolína and Radek OŠLEJŠEK. Visual Analytics for Network Security and Critical Infrastructures. In Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Zürich (Switzerland): Springer, 2017, p. 149-152. ISBN 978-3-319-60773-3. Available from: https://dx.doi.org/10.1007/978-3-319-60774-0_13.

    2016

    1. ČERMÁK, Milan, Daniel TOVARŇÁK, Martin LAŠTOVIČKA and Pavel ČELEDA. A Performance Benchmark of NetFlow Data Analysis on Distributed Stream Processing Systems. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 919-924. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502926.
    2. ČERMÁK, Milan and Pavel ČELEDA. Detecting Advanced Network Threats Using a Similarity Search. In Badonnel, Rémi and Koch, Robert and Pras, Aiko and Drašar, Martin and Stiller, Burkhard. Management and Security in the Age of Hyperconnectivity. 9701st ed. Munich, Germany: Springer International Publishing, 2016, p. 137-141. ISBN 978-3-319-39813-6. Available from: https://dx.doi.org/10.1007/978-3-319-39814-3_14.
    3. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting. EURASIP Journal on Information Security. 2016, vol. 2016, No 1, p. 1-14. ISSN 2510-523X. Available from: https://dx.doi.org/10.1186/s13635-016-0030-7.
    4. MEDKOVÁ, Jana and Pavel ČELEDA. Network Defence Using Attacker-Defender Interaction Modelling. In Badonnel, R., Koch, R., Pras, A., Drašar, M., Stiller, B. IFIP International Conference on Autonomous Infrastructure, Management and Security. Munich, Germany: Springer International Publishing, 2016, p. 127-131. ISBN 978-3-319-39813-6. Available from: https://dx.doi.org/10.1007/978-3-319-39814-3_12.
    5. VELAN, Petr, Jana MEDKOVÁ, Tomáš JIRSÍK and Pavel ČELEDA. Network Traffic Characterisation Using Flow-Based Statistics. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. IEEE/IFIP Network Operations and Management Symposium 2016 (NOMS 2016). Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 907-912. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502924.
    6. SEDLÁŘ, Milan, Bin JI, Tomáš KRÁTKÝ, Tomáš REBOK and Rostislav HUZLÍK. Numerical and experimental investigation of three-dimensional cavitating flow around the straight NACA2412 hydrofoil. Ocean Engineering. Elsevier Ltd., 2016, vol. 123, No 123, p. 357-382. ISSN 0029-8018. Available from: https://dx.doi.org/10.1016/j.oceaneng.2016.07.030.
    7. JIRSÍK, Tomáš, Milan ČERMÁK and Pavel ČELEDA. On Information Value of Top N Statistics. In 2016 6th International Conference on IT Convergence and Security (ICITCS). USA: Institute of Electrical and Electronic Engineers, 2016, p. 255-259. ISBN 978-1-5090-3764-3. Available from: https://dx.doi.org/10.1109/ICITCS.2016.7740357.
    8. VYKOPAL, Jan and Miloš BARTÁK. On the Design of Security Games: From Frustrating to Engaging Learning. 2016.
    9. ČERMÁK, Milan, Tomáš JIRSÍK and Martin LAŠTOVIČKA. Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 1019-1020. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502952.
    10. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK, Jakub Samuel PAULOVIČ and Michal ŠTEFÁNIK. Stream4Flow: Software for mining and analysis of the large volumes of network traffic. 2016.

    2015

    1. VELAN, Petr, Milan ČERMÁK, Pavel ČELEDA and Martin DRAŠAR. A Survey of Methods for Encrypted Traffic Classification and Analysis. International Journal of Network Management. John Wiley & Sons, Ltd., 2015, vol. 25, No 5, p. 355-374. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1901.
    2. STUPKA, Václav. Analýza SSL provozu (SSL traffic analysis). In České právo a informační technologie 2015. 2015.
    3. PITNER, Tomáš, Filip PROCHÁZKA, Bruno ROSSI, Barbora BÜHNOVÁ, Stanislav CHREN, Andrea VAŠEKOVÁ, Jan ROSECKÝ and Václav STUPKA. Celkové závěry a doporučení k projektu přípravných rešerší k AMM (Final Report from Preliminary Research for Automated Metering Management). Brno: ČEZ Distribuce, a.s., 2015, 8 pp.
    4. STUPKA, Václav. Data advokátů v cloudu (Attorneys data in the cloud). Data Security Management. TATE International s.r.o., 2015, vol. 19, No 1, p. 34-37. ISSN 1211-8737.
    5. STUPKA, Václav. Data jako důkaz v trestním řízení (Data as evidence in criminal proceedings). In Radim Polčák, František Púry, Jakub Harašta a kolektiv. Elektronické důkazy v trestním řízení. Brno: Masarykova univerzita, 2015, p. 83-114. Spisy Právnické fakulty MU č. 542 (řada teoretická, Edice Scientia). ISBN 978-80-210-8073-7.
    6. SOKOL, Pavol, Martin HUSÁK and František LIPTÁK. Deploying Honeypots and Honeynets: Issue of Privacy. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 397-403. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.91.
    7. BARTÁK, Miloš and Jan VYKOPAL. Detekce zranitelností a útoků pomocí NetFlow dat, validace zranitelností na systému FlowMon (Vulnerability and attack detection using NetFlow, vulnerability testing of FlowMon system). Brno: INVEA-TECH a.s., 2015, 25 pp. 20151113.
    8. STUPKA, Václav. Dokazování odposlechem (Interception of electronic communication as evidence). In Radim Polčák, František Púry, Jakub Harašta a kolektiv. Elektronické důkazy v trestním řízení. Brno: Masarykova univerzita, 2015, p. 181-194. Spisy Právnické fakulty MU č. 542 (řada teoretická, Edice Scientia). ISBN 978-80-210-8073-7.
    9. STUPKA, Václav. Electronic legislation in the Czech Republic. In Central and Eastern European e|Dem and e|Gov Days 2015. Vienna, Austria: Austrian Computer Society, 2015, p. 491 - 500, 9 pp.
    10. STUPKA, Václav. Elektronické důkazní prostředky (Electronic evidence). In Kalvodová, Věra a Milana Hrušáková. Dokazování v trestním řízení - právní, kriminologické a kriminalistické aspekty. 1st ed. Brno: Masarykova univerzita, 2015, p. 311-320. Spisy Právnické fakulty Masarykovy univerzity v Brně, svazek č. 539. ISBN 978-80-210-8072-0.
    11. POLČÁK, Radim, František PÚRY, Jakub HARAŠTA, Tomáš ABELOVSKÝ, Petr KLEMENT, Matěj MYŠKA, Václav STUPKA, Alena PEJČOCHOVÁ and Tomáš ELBERT. Elektronické důkazy v trestním řízení (Electronic evidence in criminal procedure). 1st ed. Brno: Masarykova univerzita, 2015, 254 pp. ISBN 978-80-210-8073-7.
    12. POLČÁK, Radim, František PÚRY, Jakub HARAŠTA, Tomáš ABELOVSKÝ, Petr KLEMENT, Matěj MYŠKA, Václav STUPKA, Alena PEJČOCHOVÁ and Tomáš ELBERT. Elektronické důkazy v trestním řízení (Electronic evidence in criminal procedure). 1st ed. Brno: Masarykova univerzita, 2015, 254 pp. Acta Universitatis Brunensis Iuridica. ISBN 978-80-210-8073-7.
    13. PUŠ, Viktor, Petr VELAN, Lukáš KEKELY, Jan KOŘENEK and Pavel MINAŘÍK. Hardware Accelerated Flow Measurement of 100G Ethernet. Online. In Remi Badonnel, Jin Xiao, Shingo Ata, Filip De Turck, Voicu Groza, Carlos Raniery P. dos Santos. IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Ottawa, Canada: IEEE Xplore Digital Library, 2015, p. 1147-1148. ISBN 978-3-901882-76-0.
    14. VELAN, Petr and Viktor PUŠ. High-Density Network Flow Monitoring. Online. In Remi Badonnel, Jin Xiao, Shingo Ata, Filip De Turck, Voicu Groza, Carlos Raniery P. dos Santos. IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Ottawa, Canada: IEEE Xplore Digital Library, 2015, p. 996-1001. ISBN 978-3-901882-76-0.
    15. TOMÁŠ, Martin, Tomáš REBOK and Christos EFSTATHIOU. Iterative Optimization of a Multi-compartmental Air Quality Modelling System. In Jan Kofroň and Tomáš Vojnar. Tenth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2015). první. Brno: MEMICS 2015, 2015, p. 70-81. ISBN 978-80-214-5254-1.
    16. STUPKA, Václav. Kybernetická bezpečnost v ČR (Cyber security in the Czech Republic). In Kyberbezpečnost v praxi. 2015.
    17. ČELEDA, Pavel, Jakub ČEGAN, Jan VYKOPAL and Daniel TOVARŇÁK. KYPO – A Platform for Cyber Defence Exercises. Online. In STO-MP-MSG-133: M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber Defence. Munich (Germany): NATO Science and Technology Organization, 2015, p. nestránkováno, 12 pp. ISBN 978-92-837-2020-1. Available from: https://dx.doi.org/10.14339/STO-MP-MSG-133-08-doc.
    18. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Radek OŠLEJŠEK, Zdenek EICHLER, Dalibor TOTH, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Václav RAČANSKÝ, Ivo NUTÁR and Dušan LAGO. KYPO - Kybernetický polygon (KYPO - Cybernetic Proving Ground). 2015.
    19. STUPKA, Václav. Legalita penetračního testování (Legality of penetration testing). In Dny práva 2015. 2015.
    20. ČEGAN, Jakub and Martin VIZVÁRY. Lessons Learned from KYPO – Cyber Exercise & Research Platform Project. Online. In Milan Jirsa, Josef Kaderka, Ladislav Hagara, Jaroslav Dočkal. Security and Protection of Information. Brno: University of Defence, 2015, p. 15-26. ISSN 2336-5587.
    21. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 389-396. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.35.
    22. PROCHÁZKA, Filip, Tomáš REBOK and Aleš FARDA. První návrh cílové infrastruktury pro provoz systému IRIS (First draft of the target infrastructure for the IRIS system operation). 2015.
    23. NGUYEN, Filip, Tomáš REBOK, Richard LUDVIGH and Václav TUNKA. Ruby Benchmark Suite using Docker. Online. In M. Ganzha, L. Maciaszek, M. Paprzycki. Annals of Computer Science and Information Systems, Volume 5. 2015th ed. Poland: IEEE, 2015, p. 947-952. ISBN 978-83-60810-66-8. Available from: https://dx.doi.org/10.15439/2015F99.
    24. HUSÁK, Martin, Petr VELAN and Jan VYKOPAL. Security Monitoring of HTTP Traffic Using Extended Flows. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 258-265. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.42.
    25. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Ivo NUTÁR and Dušan LAGO. Software pro konfiguraci a monitorování virtuálního prostředí KYPO (Software for configuration and monitoring of KYPO environment). 2015.
    26. OŠLEJŠEK, Radek, Zdenek EICHLER, Dalibor TOTH, Pavel ČELEDA, Jakub ČEGAN, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Martin VIZVÁRY and Jan VYKOPAL. Software pro vizualizaci virtuálního prostředí KYPO (Software for visualization of KYPO environment). 2015.
    27. PAVOL, Sokol, Kleinová LENKA and Martin HUSÁK. Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. Online. In EUROCON 2015 - International Conference on Computer as a Tool (EUROCON), IEEE. Salamanca, Spain: IEEE, 2015, p. 225-230. ISBN 978-1-4799-8569-2. Available from: https://dx.doi.org/10.1109/EUROCON.2015.7313713.
    28. STUPKA, Václav. Trestněprávní souvislosti bezpečnostních incidentů (Criminal consequences of cyber security incidents). In Konference Security & Networking Bratisava 2015. 2015.
    29. STUPKA, Václav. Trestní odpovědnost při zajišťování kybernetické bezpečnosti (Criminal liability in ensuring cyber security). In Konference Security & Networking Brno 2015. 2015.
    30. PŘENOSIL, Václav, František CVACHOVEC, Pavel ČELEDA and Martin VEŠKRNA. Uspořádání vícecestného dvouparametrického spektrometrického systému (Arrangement of two-parameter multipath spectrometric system). 2015.

    2014

    1. GHAFIR, Ibrahim, Martin HUSÁK and Václav PŘENOSIL. A Survey on Intrusion Detection and Prevention Systems. In Proceedings of student conference Zvůle 2014, IEEE/UREL. Zvůle, Czech Republic: Faculty of Electrical Engineering and Communication, Brno University of Technology, 2014, p. 10-14. ISBN 978-80-214-5005-9.
    2. STUPKA, Václav. Aktuální otázky kyberkriminality II. (Current practice in cybercrime II.). 2014.
    3. STUPKA, Václav. Autorský zákon (Copyright law). In Academic skills 2014. 2014.
    4. JIRSÍK, Tomáš, Martin HUSÁK, Pavel ČELEDA and Zdenek EICHLER. Cloud-based Security Research Testbed: A DDoS Use Case. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-2. ISBN 978-1-4799-0912-4. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838272.
    5. KOUŘIL, Daniel, Tomáš REBOK, Tomáš JIRSÍK, Jakub ČEGAN, Martin DRAŠAR, Martin VIZVÁRY and Jan VYKOPAL. Cloud-based Testbed for Simulation of Cyber Attacks. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-6. ISBN 978-1-4799-0913-1. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838298.
    6. ROČEK, Aleš and Vladimír ZATLOUKAL. Comparative Study of Negative Aspects Elimination of Medical Image Watermarking Methods. International Journal of Information and Electronics Engineering. 2014, vol. 5, No 1, p. 6-9. ISSN 2010-3719.
    7. SCHWARZ, Daniel, Ladislav DUŠEK, Martin BAREŠ, Julie BIENERTOVÁ VAŠKŮ, Jitka FEBEROVÁ, Jiří KOFRÁNEK, Martin KOMENDA, Barbora LUDÍKOVÁ, Jiří MAYER, Jaroslav MAJERNÍK, Radim POLČÁK, Jarmila POTOMKOVÁ, Michal PROCHÁZKA, Adrian RAUDASCHL, Petr ŠTOURAČ, Jaroslav ŠTĚRBA, Stanislav ŠTÍPEK, Čestmír ŠTUKA, Ilja TACHECÍ and Martin VEJRAŽKA. Computer applications systems and networks for medical education : MEFANET: Czech and Slovak Medical Faculties Network. 1st ed. Brno: Masaryk University, Institute of Biostatistics and Analyses : Facta Medica, 2014, 230 pp. ISBN 978-80-904731-9-5. Available from: https://dx.doi.org/10.13140/2.1.1383.0723.
    8. TOVARŇÁK, Daniel and Tomáš PITNER. Continuous Queries over Distributed Streams of Heterogeneous Monitoring Data in Cloud Datacenters. In Andreas Holzinger, Therese Libourel, Leszek Maciaszek and Stephen Mellor. ICSOFT-EA 2014 - Proceedings of the 9th International Conference on Software Engineering and Applications. Portugalsko: SCITEPRESS, 2014, p. 470-481. ISBN 978-989-758-036-9. Available from: https://dx.doi.org/10.5220/0005095504700481.
    9. STUPKA, Václav. Cooperation between CERT and LEA in the Czech republic. In 9th CERT ENISA/EC3 Workshop. 2014.
    10. STUPKA, Václav. Cyber security in the Czech republic. In C4e workshop on cyber security. 2014.
    11. VYKOPAL, Jan. Cybernetic Proving Ground - Cloud-based Testbed for Simulation of Cyber Attacks. 2014.
    12. ČERMÁK, Milan, Pavel ČELEDA and Jan VYKOPAL. Detection of DNS Traffic Anomalies in Large Networks. In Yvon Kermarrec. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg: Springer International Publishing, 2014, p. 215-226. ISBN 978-3-319-13487-1. Available from: https://dx.doi.org/10.1007/978-3-319-13488-8_20.
    13. SLAVÍČEK, Karel, Otto DOSTÁL and Vladimír SCHINDLER. DWY Time Series Decomposition Model. In International Conference on Software, Electronics & Industrial Engineering. Pattaya, Thailand: Planetary Scientific Research Centre, 2014, p. 27-30. ISBN 978-93-84468-10-1.
    14. DRAŠAR, Martin, Tomáš JIRSÍK and Martin VIZVÁRY. Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches. In Sperotto, Anna and Doyen, Guillaume and Latré, Steven and Charalambides, Marinos and Stiller, Burkhard. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin: Springer Berlin Heidelberg, 2014, p. 160-172. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_19.
    15. JIRSÍK, Tomáš and Pavel ČELEDA. Enhancing Network Security: Host Trustworthiness Estimation. In Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Heidelberg: Springer Berlin / Heidelberg, 2014, p. 63-68. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_8.
    16. STUPKA, Václav. e-Sbírka a e-Legislativa (eCollection and eLegislation). Revue pro právo a technologie. Brno: Masarykova univerzita, 2014, vol. 5, No 9, p. 185-198, 267 pp. ISSN 1804-5383.
    17. HOFSTEDE, Rick, Pavel ČELEDA, Brian TRAMMELL, Idilio DRAGO, Ramin SADRE, Anna SPEROTTO and Aiko PRAS. Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. PISCATAWAY: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2014, vol. 16, No 4, p. 2037-2064. ISSN 1553-877X. Available from: https://dx.doi.org/10.1109/COMST.2014.2321898.
    18. VIZVÁRY, Martin and Jan VYKOPAL. Future of DDoS Attacks Mitigation in Software Defined Networks. In Sperotto, Anna and Doyen, Guillaume and Latré, Steven and Charalambides, Marinos and Stiller, Burkhard. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin: Springer Berlin Heidelberg, 2014, p. 123-127. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_15.
    19. JIRSÍK, Tomáš and Pavel ČELEDA. Identifying Operating System Using Flow-based Traffic Fingerprinting. In Yvon Kermarrec. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg: Springer International Publishing, 2014, p. 70-73. ISBN 978-3-319-13487-1. Available from: https://dx.doi.org/10.1007/978-3-319-13488-8_7.
    20. SEDLÁK, Petr and Karel SLAVÍČEK. InstantPACS. 2014.
    21. STUPKA, Václav. Intellectual property on the internet - filesharing and legal protection of the software. In Second summer school in Brno - "IT Law". 2014.
    22. STUPKA, Václav. Jazyková analýza a autorské právo (Language analysis and Copyright). In Autorské právo v prostředí jazykových dat a nástrojů. 2014.
    23. MAREK, Jiří, Hana RUDOVÁ and Petr HOLUB. Local Search Heuristics for Media Streams Planning with Transcoding. Online. In IEEE 13th International Symposium on Network Computing and Applications NCA 2014. USA: IEEE, 2014, p. 167-170. ISBN 978-1-4799-5393-6. Available from: https://dx.doi.org/10.1109/NCA.2014.32.
    24. TROUBIL, Pavel, Hana RUDOVÁ and Petr HOLUB. Media Streams Planning with Uncertain Link Capacities. Online. In IEEE 13th International Symposium on Network Computing and Applications NCA 2014. USA: IEEE, 2014, p. 197-204. ISBN 978-1-4799-5393-6. Available from: https://dx.doi.org/10.1109/NCA.2014.37.
    25. RUSŇÁK, Vít, Lukáš RUČKA, Pavel KAJABA, Desana DAXNEROVÁ, Matej MINÁRIK, Jiří KAREŠ, Michal BÁBEL and Petr HOLUB. MUSE framework 1.5. 2014.
    26. VELAN, Petr and Pavel ČELEDA. Next Generation Application-Aware Flow Monitoring. In Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Heidelberg: Springer Berlin / Heidelberg, 2014, p. 173-178. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_20.
    27. PROCHÁZKA, Michal, Slávek LICEHAMMER and Luděk MATYSKA. Perun – Modern Approach for User and Service Management. Mauritius: IIMC International Information Management Corporation Ltd, 2014, 11 pp. ISBN 978-1-905824-44-1.
    28. HUSÁK, Martin and Jakub ČEGAN. PhiGARo: Automatic Phishing Detection and Incident Response Framework. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on. Fribourg, Switzerland: IEEE, 2014, p. 295-302. ISBN 978-1-4799-4223-7. Available from: https://dx.doi.org/10.1109/ARES.2014.46.
    29. HUSÁK, Martin and Jan VYKOPAL. POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats. 2014.
    30. STUPKA, Václav. Předávání informací mezi CERT a policií (Information exchange between CERT and LEA). In COFOLA 2014. 2014.
    31. VIZVÁRY, Martin, Tomáš PLESNÍK and Jan VYKOPAL. Rozvoj detekčních schopností a platformy sonda/kolektor (Development of detection capabilities and the probe/collector platform). Brno: INVEA-TECH a.s., 2014, 15 pp. 20141231.
    32. ROČEK, Aleš and Michal JAVORNÍK. Securing a Publicly Accessible Database of Medical Images Using Watermarking with Direct Diagnose Capability. Recent Advances in Computer Science. 2014, vol. 13, No 24, p. 79-86. ISSN 1790-5109.
    33. DRAŠAR, Martin, Martin VIZVÁRY and Jan VYKOPAL. Similarity as a central approach to flow-based anomaly detection. International Journal of Network Management. John Wiley & Sons, Ltd., 2014, vol. 24, No 4, p. 318-336. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1867.
    34. GHAFIR, Ibrahim, Jakub SVOBODA and Václav PŘENOSIL. Tor-based Malware and Tor Connection Detection. In Proceedings of International Conference on Frontiers of Communications, Networks and Applications. Kuala Lumpur, Malaysia: IET, 2014, p. 1-6. ISBN 978-1-78561-072-1. Available from: https://dx.doi.org/10.1049/cp.2014.1411.
    35. STUPKA, Václav. Užívání znaků Masarykovy univerzity (Using Masaryk University symbols). In Interface. Brno: Masarykova univerzita, 2014, p. 1-3, 12 pp. ISSN 1803-5248.
    36. BÍL, Michal, Rostislav VODÁK, Jan KUBEČEK, Tomáš REBOK, Tomáš SVOBODA and Petr HLINĚNÝ. Vulnerability analysis methods for road networks. In European Geosciences Union General Assembly 2014 (EGU 2014). 2014.
    37. ČELEDA, Pavel, Iva KREJČÍ and Jan VYKOPAL. 8th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014). 2014.

    2013

    1. ELICH, Martin, Petr VELAN, Tomáš JIRSÍK and Pavel ČELEDA. An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis. Online. In Damla Turgut, Nils Aschenbruck, Jens Tölle. 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). WNM 2013: The 7th IEEE Workshop on Network Measurements. Sydney, Australia: IEEE Xplore Digital Library, 2013, p. 1046-1052. ISBN 978-1-4799-0540-9. Available from: https://dx.doi.org/10.1109/LCNW.2013.6758546.
    2. DOSTÁL, Otto, Karel SLAVÍČEK, Vladimír SCHINDLER, Daniel TOVARŇÁK, Filip PROCHÁZKA and Miroslav GURIČAN. Analýza vývoje telekomunikací pro ČEZ Distribuční služby, s.r.o. (Analysis of the development of telecommunications for CEZ Distribution Services Ltd.). Brno: ČEZ Distribuční služby, s.r.o., 2013, 55 pp. Výzkumná zpráva 112013.
    3. SÝKORA, Martin, Filip BURŠÍK, Martin HENEŠ, Tomáš MENCLÍK and Karel SLAVÍČEK. Aplikace pro mobilní telefon pro ovládání externích videokonferenčních zařízení (Smartphone application for external videoconference equipment control). 2013.
    4. SLOUP, Petr and Tomáš REBOK. Automatic reconstruction of Norway spruce tree models from LiDAR data. In ISPRS2013-SSG. 2013.
    5. SLOUP, Petr, Tomáš REBOK and Jan HANUŠ. Automatic Tree Reconstruction from its Laser Scan [poster]. In Global Change and Resilience. 2013.
    6. HOLUB, Petr, Ondřej VOJTÍŠEK, Dalibor VALÍK, Kristína GREPLOVÁ, Dana KNOFLÍČKOVÁ and Rudolf NENUTIL. BBMRI_CZ Index Service. 2013.
    7. CoUniverse 1.0 (software)
      TROUBIL, Pavel, Jiří MAREK, Petr HOLUB and Miloš LIŠKA. CoUniverse 1.0. 2013.
    8. VELAN, Petr, Tomáš JIRSÍK and Pavel ČELEDA. Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement. In Thomas Bauschert. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8115. Heidelberg: Springer Berlin / Heidelberg, 2013, p. 136-147. ISBN 978-3-642-40551-8. Available from: https://dx.doi.org/10.1007/978-3-642-40552-5_13.
    9. STUPKA, Václav. Důvody vzniku Zákona o kybernetické bezpečnoti (Reasons for creating Act on cyber security). In Kybernetická bezpečnost státu 2013. 2013.
    10. STUPKA, Václav. E-government v České republice: právní a technologické aspekty. Revue pro právo a technologie. Brno: Masarykova univerzita, 2013, vol. 4, No 7. ISSN 1804-5383.
    11. DOYEN, Guillaume, Martin WALDBURGER, Pavel ČELEDA, Anna SPEROTTO and Burkhard STILLER. Emerging Management Mechanisms for the Future Internet, 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013. In Lecture Notes in Computer Science 7943. Heidelberg: Springer Berlin / Heidelberg, 2013, 161 pp. ISBN 978-3-642-38997-9. Available from: https://dx.doi.org/10.1007/978-3-642-38998-6.
    12. KOŠČÍK, Michal, Libor KYNCL, Matěj MYŠKA, Radim POLČÁK, Václav STUPKA and Jaromír ŠAVELKA. European ICT Law 2013 Texts, Cases, Materials. Brno: Tribun EU, 2013, 365 pp. ISBN 978-80-263-0396-1.
    13. ČELEDA, Pavel and Vojtěch KRMÍČEK. Flow Data Collection in Large Scale Networks. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. 1st ed. Stuttgart: Fraunhofer Verlag, 2013, p. 30-40. ISBN 978-3-8396-0474-8.
    14. VYKOPAL, Jan, Martin DRAŠAR and Philipp WINTER. Flow-based Brute-force Attack Detection. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. Stuttgart: Fraunhofer Verlag, 2013, p. 41-51. ISBN 978-3-8396-0474-8.
    15. VIZVÁRY, Martin and Jan VYKOPAL. Flow-based detection of RDP brute-force attacks. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, p. 131-138. ISBN 978-80-7231-922-0.
    16. HUSÁK, Martin and Martin DRAŠAR. Flow-based Monitoring of Honeypots. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, p. 63-70. ISBN 978-80-7231-922-0.
    17. VELAN, Petr. FlowMon - TCP Input Filter Plugin. 2013.
    18. SLOUP, Petr, Tomáš REBOK and Jan HANUŠ. Fully-automated Occlusion-insensitive Norway Spruce Tree Reconstructions from 3D Point Cloud Data [poster]. In ISPRS2013-SSG. 2013.
    19. HOLUB, Petr, Martin ŠROM, Martin PULEC, Jiří MATELA and Martin JIRMAN. GPU-accelerated DXT and JPEG compression schemes for low-latency network transmissions of HD, 2K, and 4K video. Future Generation Computer Systems. Amsterdam, The Netherlands: Elsevier Science, 2013, vol. 29, No 8, p. 1991-2006. ISSN 0167-739X. Available from: https://dx.doi.org/10.1016/j.future.2013.06.006.
    20. ČEGAN, Jakub and Jan SOUKAL. Incident response automation in the Masaryk University network. 2013.
    21. SCHINDLER, Vladimír and Aleš ROČEK. Influence of the TCP packet setting and encryption for data transfer in medical applications. In Nikos Mastorakis. Recent Advances in Circuits, Systems, Telecommunications & Control. Paris, FR: WSEAS Press, 2013, p. 96-101. ISBN 978-960-474-341-4.
    22. JAVORNÍK, Michal, Karel SLAVÍČEK and Otto DOSTÁL. Integration Concept in Regional Medical Imaging. In Joyce deng. Koncept integrace regionálního zpracování medicínských obrazových informací. Singapore: IACSIT Press, 2013, p. 26-31. ISBN 978-981-07-8391-4.
    23. URBAN, František, Milan HOLÍK, Petr NESVADBA and Karel SLAVÍČEK. Jednotka pro vyhodnocování optického spektra (Optical spectrum evaluation module). 2013.
    24. SLAVÍČEK, Karel, Vladimír SCHINDLER, Otto DOSTÁL and Martin SÝKORA. Kalman filter improvement for gyroscopic mouse movement smoothing. In Z. Thaweesak, P.S. Sandhu. IIE Int'l Proceedings of International Conference on Research in Science, Engineering and Technology. Kuala Lumpur: International Institute of Engineers, 2013, p. 43-48. ISBN 978-93-82242-47-5.
    25. ČELEDA, Pavel, Petr VELAN, Martin RÁBEK, Rick HOFSTEDE and Aiko PRAS. Large-Scale Geolocation for NetFlow. Online. In Filip De Turck, Yixin Diao, Choong Se on Hong, Deep Medhi, Ramin Sadre. IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Ghent, Belgium: IEEE Xplore Digital Library, 2013, p. 1015-1020. ISBN 978-1-4673-5229-1.
    26. HUSÁK, Martin and Jan SOUKAL. libanim - JavaScript animation library. 2013.
    27. MAREK, Jiří, Petr HOLUB and Hana RUDOVÁ. Local Search Heuristics for Media Streams Planning Problem. In Leonard Barolli, Fatos Xhafa, Makoto Takizawa, Tomoya Enokido, Hui-Huang Hsu. Proceedings of the 7th IEEE International Conference on Advanced Information Networking and Applications. Washington: IEEE Computer Society, 2013, p. 945-953. ISBN 978-0-7695-4953-8. Available from: https://dx.doi.org/10.1109/AINA.2013.132.
    28. TROUBIL, Pavel, Hana RUDOVÁ and Petr HOLUB. Media Streams Planning with Transcoding. Online. In 12th IEEE International Symposium on Network Computing and Applications (NCA 2013). USA: IEEE, 2013, p. 41-48. ISBN 978-0-7685-5043-6. Available from: https://dx.doi.org/10.1109/NCA.2013.46.
    29. SLAVÍČEK, Karel, Michal JAVORNÍK and Otto DOSTÁL. MEDIMED Shared Regional PACS Center. In Dongqing Wang. COMPUTED TOMOGRAPHY. 1st ed. Croatia: InTech, 2013, p. 43-62. ISBN 978-953-51-1102-3.
    30. BARTOŠ, Václav, Pavel ČELEDA, Tomáš KREUZWIESER, Viktor PUŠ, Petr VELAN and Martin ŽÁDNÍK. Monitoring, Detection and Reporting of Security Incidents in CESNET NREN. 2013.
    31. RUSŇÁK, Vít, Lukáš RUČKA, Martin ĽUPTÁK and Petr HOLUB. MUSE framework 1.1.1. 2013.
    32. SEBESTIÁNOVÁ, Zora, Michal PROCHÁZKA, Slávek LICEHAMMER, Michal ŠŤAVA and Pavel ZLÁMAL. Perun - user and resources management system. 2013.
    33. ČEGAN, Jakub, Tomáš ŠÍMA, Jan SOUKAL and Martin DRAŠAR. PhiGARo HTTP(S) – tool for phishing incident processing. 2013.
    34. HUSÁK, Martin and Martin VIZVÁRY. POSTER: Reflected attacks abusing honeypots. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York, NY, USA: ACM, 2013, p. 1449-1452. ISBN 978-1-4503-2477-9. Available from: https://dx.doi.org/10.1145/2508859.2512523.
    35. VELAN, Petr. Practical experience with IPFIX flow collectors. Online. In Filip De Turck, Yixin Diao, Choong Se on Hong, Deep Medhi, Ramin Sadre. IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Ghent, Belgium: IEEE Xplore Digital Library, 2013, p. 1021-1026. ISBN 978-1-4673-5229-1.
    36. DRAŠAR, Martin. Protocol-independent Detection of Dictionary Attacks. In Thomas Bauschert. Advances in Communication Networking. Berlin: Springer Berlin Heidelberg, 2013, p. 304-309. ISBN 978-3-642-40551-8. Available from: https://dx.doi.org/10.1007/978-3-642-40552-5_30.
    37. MATELA, Jiří, Martin JIRMAN and Petr HOLUB. Real-time JPEG2000 for Digital Cinema and Large-Scale Image Archiving. San Jose, CA, USA: NVIDIA Corporation, 2013. GPU Technology Conference.
    38. PROCHÁZKA, Michal and Daniel KOUŘIL. RemSig - Bezpečné úložiště digitálních certifikátů (RemSig - Secure digital certificate storage). 2013.
    39. DOYEN, Guillaume, Martin WALDBURGER, Anna SPEROTTO, Pavel ČELEDA, Juan-Luis GORRICHO, Thomas SCHAAF and Joan SERRAT. Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet. Journal of Network and Systems Management. Springer US, 2013, vol. 22, No 2, p. 289-296. ISSN 1573-7705. Available from: https://dx.doi.org/10.1007/s10922-013-9298-9.
    40. VYKOPAL, Jan. SimFlow - a similarity-based detection of brute-force attacks. 2013.
    41. DRAŠAR, Martin, Martin HUSÁK, Jakub ČEGAN, Martin VIZVÁRY, Milan ČERMÁK and Tomáš PLESNÍK. Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií (System for automatic handling of reports from anomaly detection tools). 2013.
    42. SÝKORA, Martin, Filip BURŠÍK, Martin HENEŠ, Tomáš MENCLÍK and Karel SLAVÍČEK. Systém pro ovládání videokonferenčních zařízení (Videoconferencing control system). 2013.
    43. SOCHOR, Jan, Petr HOLUB and Ondřej VOJTÍŠEK. THALAMOSS Data Management Platform. 2013.
    44. SCHINDLER, Vladimír and Aleš ROČEK. The possibilities of using single-board computers for medical data transmission security. Przeglad Elektrotechniczny. Wydawnictwo Czasopism i Ksiażek Technicznych Sigma NOT, 2013, vol. 2013, No 6, p. 56-60. ISSN 0033-2097.
    45. REBOK, Tomáš, Petr SLOUP, Jan HANUŠ and Věroslav KAPLAN. Three-dimensional Tree Reconstructions from Terrestrial LiDAR Scans. In National Grid Infrastructure Yearbook 2011-12. 2013, p. 91-95. ISBN 978-80-904689-7-9.
    46. REJCHRT, Jan, Tomáš JIRSÍK and Jan VYKOPAL. Time Series Solver. 2013.
    47. RUSŇÁK, Vít, Lukáš RUČKA and Petr HOLUB. Towards User-Aware Multi-Touch Interaction Layer for Group Collaborative Systems. In Kučera, A.; Henzinger, Th.A.; Nešetřil, J.; Vojnar, T.; Antoš, D. Lecture Notes in Computer Science Volume 7721. Revised Selected Papers. Berlin Heidelberg: Springer-Verlag Berlin / Heidelberg, 2013, p. 200-212. ISBN 978-3-642-36044-2. Available from: https://dx.doi.org/10.1007/978-3-642-36046-6_19.
    48. trendMonitoring (software)
      VIZVÁRY, Martin. trendMonitoring. 2013.
    49. STUPKA, Václav. Uchovávání provozních údajů pro účely vyúčtování poskytnutých služeb elektronických komunikací (Data retention for billing purposes). Revue pro právo a technologie. Brno: Masarykova univerzita, 2013, vol. 4, No 8. ISSN 1804-5383.
    50. KÁCHA, Pavel, Andrea KROPÁČOVÁ and Jan VYKOPAL. WARDEN: realtime sharing of detected threats between CSIRT teams. 2013.
    51. KŘENEK, Aleš, Petr HOLUB, Vlastimil HOLER, Daniel KOUŘIL, Filip PROCHÁZKA, Zdeněk HEJNA, Miroslav GURIČAN and František MULLER. 3.5 Million Smartmeters in the Cloud. Online. In Simon Lin. Proceedings ISGC 2013. Trieste: PoS - Proceedings of Science, 2013, p. 180-189. ISSN 1824-8039.

    2012

    1. VYKOPAL, Jan. Army & Academia Cyber Security Research in Czech Republic. 2012.
    2. KRMÍČEK, Vojtěch and Jan VYKOPAL. Automatic Network Protection Scenarios Using NetFlow. 2012.
    3. ČELEDA, Pavel, Štěpán FRIEDL, Martin ČECH and Martin VEŠKRNA. COMBOI-ADC. 2012.
    4. SADRE, Ramin, Jiří NOVOTNÝ, Pavel ČELEDA, Martin WALDBURGER and Burkhard STILLER. Dependable Networks and Services, 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012. In Lecture Notes in Computer Science 7279. Heidelberg: Springer Berlin / Heidelberg, 2012, 160 pp. ISBN 978-3-642-30632-7. Available from: https://dx.doi.org/10.1007/978-3-642-30633-4.
    5. SLAVÍČEK, Karel, Michal JAVORNÍK and Otto DOSTÁL. Extension of the Shared Regional PACS CenterMeDiMed to Smaller Healthcare Institutions. In Pascal Lorenz; Tibor Gyires; Iwona Pozniak-Koszalka. The Eleventh International Conference on Networks. Saint Gilles, Reunion Island: IARIA, 2012, p. 83-87. ISBN 978-1-61208-183-0.
    6. ČELEDA, Pavel, Radek KREJČÍ and Vojtěch KRMÍČEK. Flow-Based Security Issue Detection in Building Automation and Control Networks. In Róbert Szabó, Attila Vidács. Lecture Notes in Computer Science 7479. Heidelberg: Springer Berlin / Heidelberg, 2012, p. 64-75. ISBN 978-3-642-32807-7. Available from: https://dx.doi.org/10.1007/978-3-642-32808-4_7.
    7. ČELEDA, Pavel and Josef KADERKA. Geolokace a bezpečnost počítačových sítí (Geolocation and Computer Networks Security). Data Security Management. Praha: TATE International, s.r.o., 2012, vol. 16, No 3, p. 18-21. ISSN 1211-8737.
    8. DOSTÁL, Otto, Karel SLAVÍČEK, Michal JAVORNÍK and Pavel BUDIŠ. ICT Systems Monitoring. Saarbrucken: LAMBERT Academic Publishing, 2012, 167 pp. ISBN 978-3-8473-7231-8.
    9. ROČEK, Aleš. Medical image data security based on principles of digital watermarking methods. In V. M. Marques, A. Dmitriev. Advances in Data Networks, Communications, Computers and Materials. Malta: WAEAS Press, 2012, p. 47-52. ISBN 978-1-61804-118-0.
    10. ROČEK, Aleš. Metody zabezpečení medicínských obrazových informací využívající principů digitálního vodoznačení (Methods of Medical Data Image Security Based on Principals of Digital Watermarking). Bezpečnostní teorie a praxe. Praha: Policejní akademie České republiky, 2012, vol. 2012, No 4, p. 113-122. ISSN 1801-8211.
    11. KOUTNÝ, Martin, Jiří MIŠUREC, Petr MLÝNEK and Karel SLAVÍČEK. Modelling of part medium access methods in the HomePlug. Przeglad Elektrotechniczny. Polsko, 2012, vol. 88, No 1, p. 225-229. ISSN 0033-2097.
    12. ČELEDA, Pavel and Martin RÁBEK. NetFlow and IPFIX Geolocation Tools. 2012.
    13. ČEGAN, Jakub, Jan SOUKAL, Martin DRAŠAR and Jan VYKOPAL. PhiGARo – tool for phishing incident processing. 2012.
    14. VIZVÁRY, Martin and Jan VYKOPAL. RdpMonitor - RDP authentication attack detection plugin. 2012.
    15. ČELEDA, Pavel, Radek KREJČÍ and Vojtěch KRMÍČEK. Revealing and Analysing Modem Malware. Online. In 2012 IEEE International Conference on Communications (ICC). Ottawa, Canada: IEEE, 345 E 47TH ST, NEW YORK, NY 10017 USA, 2012, p. 971-975. ISBN 978-1-4577-2053-6. Available from: https://dx.doi.org/10.1109/ICC.2012.6364598.
    16. ZATLOUKAL, Vladimír and Aleš ROČEK. Secure medical multimedia DICOM data transfers over Internet. In World Scientific and Engineering Academy and Society. ADVANCES in DATA NETWORKS, COMMUNICATIONS, COMPUTERS and MATERIALS. Sliema, Malta: WSEAS Press, 2012, p. 104-108. ISBN 978-1-61804-118-0.
    17. JAVORNÍK, Michal, Karel SLAVÍČEK and Otto DOSTÁL. Sharing of knowledge and resources in regional medical imaging. In 2nd International Conference on Biomedical Engineering & Assistive Technologies. Jalandhar: Dr. B. R. AMBEDKAR NATIONAL INSTITUTE OF TECHNOLOGY JALANDHAR – 144 011, India, 2012, p. 304-308. ISBN 978-81-925454-1-7.
    18. VYKOPAL, Jan and Martin VIZVÁRY. SSH brute-force attack detection plugin. 2012.
    19. KREJČÍ, Radek, Pavel ČELEDA and Jakub DOBROVOLNÝ. Traffic Measurement and Analysis of Building Automation and Control Networks. In Ramin Sadre, Jiří Novotný, Pavel Čeleda, Martin Waldburger, Burkhard Stiller. Lecture Notes in Computer Science 7279. Heidelberg: Springer Berlin / Heidelberg, 2012, p. 62-73. ISBN 978-3-642-30632-7. Available from: https://dx.doi.org/10.1007/978-3-642-30633-4_9.
    20. VYKOPAL, Jan. Výzkum v oblasti kybernetické bezpečnosti na Masarykově univerzitě od roku 2008 (Cyber Security Research at Masaryk University since 2008). 2012.

    2011

    1. VYKOPAL, Jan. A Flow-Level Taxonomy and Prevalence of Brute Force Attacks. In Advances in Computing and Communications. Berlin: Springer Berlin Heidelberg, 2011, p. 666-675. ISBN 978-3-642-22714-1. Available from: https://dx.doi.org/10.1007/978-3-642-22714-1_69.
    2. ČELEDA, Pavel and Radek KREJČÍ. An Analysis of the Chuck Norris Botnet 2. 2011.
    3. ČELEDA, Pavel and Radek KREJČÍ. BACnet Monitoring Plugins. 2011.
    4. ČELEDA, Pavel and Radek KREJČÍ. Bezpečnost řídicích systémů inteligentních budov (Intelligent Building Control Systems Security). Data Security Management. Praha: TATE International, s.r.o., 2011, vol. 15, No 3, p. 14-17. ISSN 1211-8737.
    5. ELICH, Martin and Pavel ČELEDA. Bezpečnostní nástrahy protokolu IPv6 (The Security Pitfalls of the IPv6 Protocol). Data Security Management. Praha: TATE International, s.r.o., 2011, vol. 15, No 1, p. 10-13. ISSN 1211-8737.
    6. VYKOPAL, Jan, Vojtěch KRMÍČEK and Pavel ČELEDA. Flow-based Network Protection as an Integral Part of an Early Warning System. 2011.
    7. ČELEDA, Pavel, Radek KREJČÍ, Jan BARIENČÍK, Martin ELICH and Vojtěch KRMÍČEK. HAMOC - Hardware-Accelerated Monitoring Center. In Ladislav Lhotka, Pavel Satrapa. Networking Studies V : Selected Technical Reports. Prague: CESNET, z.s.p.o., 2011, p. 107-133. ISBN 978-80-904689-1-7.
    8. ELICH, Martin, Pavel ČELEDA and Matěj GRÉGR. Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX. In Jordi Domingo-Pascal, Yuval Shavitt, Steve Uhlig. Traffic Monitoring and Analysis LNCS 6613. Berlin (D): Springer Berlin / Heidelberg, 2011, p. 64-71. ISBN 978-3-642-20304-6. Available from: https://dx.doi.org/10.1007/978-3-642-20305-3.
    9. VYKOPAL, Jan and Jan SOUKAL. Phishing at your own risk. 2011.
    10. PISKAČ, Pavel, Michal TRUNEČKA and Jan VYKOPAL. Plugin for detecting of time variation in network connections. 2011.
    11. ČELEDA, Pavel, Radek KREJČÍ and Vojtěch KRMÍČEK. Revealing Botnets Using Network Traffic Statistics. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2011. 1st ed. Brno (CZ): University of Defence, 2011, p. 7-16. ISBN 978-80-7231-777-6.
    12. ČELEDA, Pavel and Vojtěch KRMÍČEK. Virtual Network Monitoring in FEDERICA Project. In Ladislav Lhotka, Pavel Satrapa. Networking Studies V : Selected Technical Reports. Prague: CESNET, z.s.p.o., 2011, p. 183-196. ISBN 978-80-904689-1-7.

    2010

    1. DRAŠAR, Martin, Jan VYKOPAL, Radek KREJČÍ and Pavel ČELEDA. Aspect-based Attack Detection in Large-scale Networks. In Recent Advances in Intrusion Detection. Berlin: Springer Berlin / Heidelberg, 2010, p. 488 - 489. ISBN 978-3-642-15511-6.
    2. ČELEDA, Pavel, Radek KREJČÍ, Jan VYKOPAL and Martin DRAŠAR. Embedded Malware - An Analysis of the Chuck Norris Botnet. In European Conference on Computer Network Defense. 1st ed. Los Alamitos, CA: IEEE Computer Society, 2010, p. 3-10. ISBN 978-1-4244-9377-7. Available from: https://dx.doi.org/10.1109/EC2ND.2010.15.
    3. KRMÍČEK, Vojtěch, Pavel ČELEDA and Jiří NOVOTNÝ. FEDERICA User Tutorial: Monitoring slices. 2010.
    4. VYKOPAL, Jan and Pavel MINAŘÍK. From Signature-Based Towards Behaviour-Based Anomaly Detection. In RTO-MP-IST-091 PRE-RELEASE: Information Assurance and Cyber Defence. Neuveden: NATO Research and Technology Organisation, 2010, 4 pp. ISBN 978-92-835-0115-2.
    5. ČELEDA, Pavel, Radek KREJČÍ, Jan BARIENČÍK, Martin ELICH and Vojtěch KRMÍČEK. HAMOC - Hardware-Accelerated Monitoring Center. 2010.
    6. NOVOTNÝ, Jiří, Pavel ČELEDA and Radek KREJČÍ. Hardware Acceleration: An Essential Part of Cyber Security in High-Speed Networks. Vídeň, Rakousko: DeepSec GmbH, 2010. DeepSec - In Depth Security Conference 2010.
    7. NOVOTNÝ, Jiří, Pavel ČELEDA, Tomáš DEDEK and Radek KREJČÍ. Hardware Acceleration for Cyber Security. Online. In IST-091 - Information Assurance and Cyber Defence. Tallinn, Estonia: NATO Research and Technology Organization, 2010, p. 86-101, 15 pp. ISBN 978-92-837-0115-6.
    8. ČELEDA, Pavel, Jiří NOVOTNÝ, Jan VYKOPAL and Tomáš PLESNÍK. Hardware-Accelerated and Security Research at Masaryk University. 2010.
    9. KADERKA, Josef and Pavel ČELEDA. Chuck Norris aneb Odkud přijde útok? (Chuck Norris or Where the attack comes from?). Praha: Prezentační a informační centrum Ministerstva obrany, 2010.
    10. ČELEDA, Pavel, Radek KREJČÍ and Jan VYKOPAL. Chuck Norris Botnet. 1st ed. 2010.
    11. PLESNÍK, Tomáš, Michal TRUNEČKA, Pavel PISKAČ, Jan VYKOPAL and Pavel ČELEDA. Chuck Norris botnet detection plugin. 2010.
    12. DRAŠAR, Martin, Martin JUŘEN, Daniel KOUŘIL, Pavel MINAŘÍK, Michal PROCHÁZKA and Jan VYKOPAL. Intelligent logging server. Warsaw: SECURE 2010, 2010.
    13. ČELEDA, Pavel, Jan VYKOPAL, Tomáš PLESNÍK, Michal TRUNEČKA and Vojtěch KRMÍČEK. Malware Detection From The Network Perspective Using NetFlow Data. 2010.
    14. ČELEDA, Pavel, Radek KREJČÍ and Josef KADERKA. Na stopě Chucka Norrise (On the Trail of Chuck Norris). Data Security Management. Praha: TATE International, s.r.o., 2010, vol. 14, No 2, p. 30-33. ISSN 1211-8737.
    15. KREJČÍ, Radek and Pavel ČELEDA. (Ne)bezpečné HTTPS - část I ((In)Secure HTTPS - part I). Data Security Management. Praha: TATE International, s.r.o., 2010, vol. 14, No 3, p. 38-41. ISSN 1211-8737.
    16. KREJČÍ, Radek and Pavel ČELEDA. (Ne)bezpečné HTTPS - část II ((In)Secure HTTPS - part II). Data Security Management. Praha: TATE International, s.r.o., 2010, vol. 14, No 4, p. 22-27, 5 pp. ISSN 1211-8737.
    17. KRMÍČEK, Vojtěch, Pavel ČELEDA and Jiří NOVOTNÝ. NfSen Plugin Supporting the Virtual Network Monitoring. 2010.
    18. KRMÍČEK, Vojtěch, Josef KADERKA and Pavel ČELEDA. Projekt obranného výzkumu "CYBER" - bezpečnost informačních a komunikačních systému AČR (Defence Research Project "CYBER" - Security of Information and Communication Systems in AČR). In Bezpečnostní konference KIS. první. Brno: Univerzita obrany, 2010, p. 43-50. ISBN 978-80-7231-721-9.
    19. ČELEDA, Pavel and Vojtěch KRMÍČEK. Virtual Network Monitoring in FEDERICA Project. 2010.

    2009

    1. REHÁK, Martin, Michal PĚCHOUČEK, Martin GRILL, Jan STIBOREK, Karel BARTOŠ and Pavel ČELEDA. Adaptive Multiagent System for Network Traffic Monitoring. IEEE Intelligent Systems. Los Alamitos, CA, USA: IEEE Computer Society, 2009, vol. 24, No 3, p. 16-25. ISSN 1541-1672.
    2. ČELEDA, Pavel, Vojtěch KRMÍČEK and Jan VYKOPAL. Analýza bezpečnostních rizik počítačové sítě pomocí NetFlow (Computer Network Security Risk Analysis Using NetFlow). 2009.
    3. REHÁK, Martin, Pavel ČELEDA, Michal PĚCHOUČEK and Jiří NOVOTNÝ. CAMNEP: Multistage Collective Network Behavior Analysis System with Hardware Accelerated NetFlow Probes. 2009.
    4. REHÁK, Martin, Michal PĚCHOUČEK, Martin GRILL, Karel BARTOŠ, Vojtěch KRMÍČEK and Pavel ČELEDA. Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes. International Journal of Electronic Security and Digital Forensics. Ženeva: Inderscience Publishers, 2009, vol. 2, No 1, p. 35-48. ISSN 1751-911X.
    5. ČELEDA, Pavel, Martin REHÁK, Vojtěch KRMÍČEK and Karel BARTOŠ. Flow Based Security Awareness Framework for High-Speed Networks. In Security and Protection of Information 2009. Brno: University of Defence, 2009, p. 3-13. ISBN 978-80-7231-641-0.
    6. ČELEDA, Pavel, Martin ŽÁDNÍK and Lukáš SOLANKA. Hardware-Accelerated Flexible Flow Measurement. 2009.
    7. MINAŘÍK, Pavel, Vojtěch KRMÍČEK and Jan VYKOPAL. Improving Host Profiling With Bidirectional Flows. In 2009 International Conference on Computational Science and Engineering. Vancouver, Canada: IEEE Computer Society, 2009, p. 231-237. ISBN 978-0-7695-3823-5.
    8. KREJČÍ, Radek, Pavel ČELEDA, Vojtěch KRMÍČEK and Jiří NOVOTNÝ. IPFIX Based Virtual Network Monitoring. In TERENA Networking Conference TNC2009. 2009.
    9. KRMÍČEK, Vojtěch, Jan VYKOPAL and Radek KREJČÍ. Netflow Based System for NAT Detection. In Co-Next Student Workshop '09: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies. New York, NY, USA: ACM, 2009, p. 23-24. ISBN 978-1-60558-751-6.
    10. VYKOPAL, Jan. NetFlow, monitorování IP toků a bezpečnost sítě (NetFlow, IP flow monitoring and network security). In Sborník příspěvků z 35. konference EurOpen.CZ, 4.-7. října 2009. první. Plzeň: EurOpen.CZ, 2009, p. 63-70. ISBN 978-80-86583-17-4.
    11. KRMÍČEK, Vojtěch, Pavel ČELEDA and Jiří NOVOTNÝ. NetFlow-based monitoring in the FEDERICA project. 2009.
    12. VYKOPAL, Jan, Tomáš PLESNÍK and Pavel MINAŘÍK. Network-based Dictionary Attack Detection. In Proceedings of International Conference on Future Networks (ICFN 2009). Los Alamitos, CA, USA: IEEE Computer Society, 2009, p. 23-27. ISBN 978-0-7695-3567-8.
    13. ČELEDA, Pavel, Karel BARTOŠ, Vojtěch KRMÍČEK and Pavel MINAŘÍK. Projekt CAMNEP - systém detekce průniku ve vysokorychlostních počítačových sítích (CAMNEP project - intrusion detection system for high-speed networks). Brno: Masarykova Univerzita, 2009.
    14. VYKOPAL, Jan, Tomáš PLESNÍK and Pavel MINAŘÍK. Validation of the Network-based Dictionary Attack Detection. In Security and Protection of Information 2009, Proceeding of the Conference. Brno: University of Defence, 2009, p. 128-136, 190 pp. ISBN 978-80-7231-641-0.

    2008

    1. REHÁK, Martin, Michal PĚCHOUČEK, Pavel ČELEDA, Jiří NOVOTNÝ and Pavel MINAŘÍK. CAMNEP: Agent-Based Network Intrusion Detection System. In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008) - Industrial and Applications Track. 1st ed. Estoril: Inesc-Id, 2008, p. 133-136. ISBN 978-0-9817381-3-0.
    2. REHÁK, Martin, Michal PĚCHOUČEK, Karel BARTOŠ, Martin GRILL, Pavel ČELEDA and Vojtěch KRMÍČEK. CAMNEP: An intrusion detection system for high-speed networks. Progress in Informatics. 2008, vol. 2008, No 5, p. 65-74. ISSN 1349-8614.
    3. REHÁK, Martin, Michal PĚCHOUČEK, Martin GRILL, Karel BARTOŠ, Pavel ČELEDA and Vojtěch KRMÍČEK. Collaborative Approach to Network Behavior Analysis. In Global E-Security. Berlín: Springer, 2008, p. 153-160. ISBN 978-3-540-69402-1.
    4. BARTOŠ, Karel, Martin GRILL, Vojtěch KRMÍČEK, Martin REHÁK and Pavel ČELEDA. Flow Based Network Intrusion Detection System using Hardware-Accelerated NetFlow Probes. In CESNET Conference 2008 : security, middleware, and virtualization – glue of future networks. Prague: CESNET, z. s. p. o, 2008, p. 49-56. ISBN 978-80-904173-0-4.
    5. NOVOTNÝ, Jiří and Pavel ČELEDA. Hardware Acceleration of NetFlow Monitoring. 2008. 25th NMRG Meeting in Munich.
    6. KRMÍČEK, Vojtěch, Pavel ČELEDA and Radek KREJČÍ. Hardware-Accelerated Framework for Flow Monitoring of 10Gbit Networks. In TERENA Networking Conference TNC2008. 2008.
    7. NOVOTNÝ, Jiří, Pavel ČELEDA and Martin ŽÁDNÍK. Hardware-Accelerated Framework for Security in High-Speed Networks. In RTO-MP-IST-076 Information Assurance for Emerging and Future Military Systems. 2008.
    8. REHÁK, Martin, Michal PĚCHOUČEK, Karel BARTOŠ, Martin GRILL, Pavel ČELEDA and Vojtěch KRMÍČEK. Improving Anomaly Detection Error Rate by Collective Trust Modeling. In Recent Advances in Intrusion Detection. Berlin: Springer Berlin / Heidelberg, 2008, p. 398-399. ISBN 978-3-540-87402-7.
    9. REHÁK, Martin, Michal PĚCHOUČEK, Pavel ČELEDA, Vojtěch KRMÍČEK, Karel BARTOŠ and Martin GRILL. Multi-Agent Approach to Network Intrusion Detection (Demo Paper). In Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008) - Industrial and Applications Track. 1st ed. Estoril: Inesc-Id, 2008, p. 1695-1696. ISBN 978-0-9817381-3-0.
    10. KREJČÍ, Radek and Pavel ČELEDA. NETCONF - Secure FlowMon Probe Remote Configuration. In TERENA Networking Conference 2008. 2008.
    11. VYKOPAL, Jan and Tomáš MRÁZEK. Packet Capture Benchmark on 1 GE. 2008.
    12. ČELEDA, Pavel. Projekt Liberouter - hardwarová akcelerace pro sledování a analyzování provozu ve vysokorychlostních sítích (Liberouter Project - Hardware Acceleration For Monitoring and Traffic Analysis In High-Speed Networks). Workshop pracovní skupiny CSIRT.CZ, 2008.
    13. KREJČÍ, Radek, Ladislav LHOTKA, Pavel ČELEDA and Petr ŠPRINGL. Secure Remote Configuration of Network Devices - a Case Study. In CESNET Conference 2008. Prague: CESNET, z. s. p. o., 2008, p. 77-84. ISBN 978-80-904173-0-4.

    2007

    1. KRMÍČEK, Vojtěch, Pavel ČELEDA, Martin REHÁK and Michal PĚCHOUČEK. Agent-Based Network Intrusion Detection System. In Intelligent Agent Technology. Los Alamitos, California: IEEE Computer Society, 2007, p. 528-531. ISBN 0-7695-3027-3.
    2. REHÁK, Martin, Michal PĚCHOUČEK, Pavel ČELEDA, Vojtěch KRMÍČEK, Pavel MINAŘÍK and David MEDVIGY. Collaborative Attack Detection in High-Speed Networks. In Multi-Agent Systems and Applications V. Berlin: Springer Berlin / Heidelberg, 2007, p. 73-82. ISBN 978-3-540-75253-0.
    3. BUREŠ, Zbyněk, František CVACHOVEC, Pavel ČELEDA, Jiří KROUPA, Bohumil OŠMERA and Severin POŠTA. Digital Multiparameter System for Characterizing the Neutron-Gamma Field in the LR-O Experimental Reactor. Journal of ASTM International (JAI). 2007, vol. 4, No 4, 5 pp. ISSN 1546-962X.
    4. ČELEDA, Pavel, Milan KOVÁČIK, Tomáš KONÍŘ, Vojtěch KRMÍČEK, Petr ŠPRINGL and Martin ŽÁDNÍK. FlowMon Probe. Příbram: PB tisk, s.r.o., 2007. Network Studies: Selected Technical Reports. ISBN 978-80-239-9285-4.
    5. ČELEDA, Pavel, Martin ŽÁDNÍK and Juraj IVANKO. Hardware Accelerated FlowMon Probe. In TERENA Networking Conference TNC2007. 2007.
    6. ČELEDA, Pavel, Martin ŽÁDNÍK and Vojtěch KRMÍČEK. Hardware Accelerated FlowMon Probe. 2007. FTW - Telecommunications Forum.
    7. REHÁK, Martin, Michal PĚCHOUČEK, Pavel ČELEDA, Vojtěch KRMÍČEK, Jiří MONINEC, Tomáš DYMÁČEK and David MEDVIGY. High-Performance Agent System for Intrusion Detection in Backbone Networks. In Cooperative Information Agents XI. Berlin: Springer Berlin / Heidelberg, 2007, p. 134-148. ISBN 978-3-540-75118-2.
    8. ČELEDA, Pavel, Vojtěch KRMÍČEK, Martin REHÁK and David MEDVIGY. High-Speed Network Traffic Acquisition for Agent Systems. In Intelligent Agent Technology. Los Alamitos, California: IEEE Computer Society, 2007, p. 477-480. ISBN 978-0-7695-3027-7.
    9. ČELEDA, Pavel, Vojtěch KRMÍČEK and Martin ŽÁDNÍK. Monitorování provozu ve vysokorychlostních sítích na bázi IP toků (Monitoring of high-speed networks based on IP flow monitoring). In Širokopásmové sítě a jejich aplikace. Olomouc: Univerzita Palackého v Olomouci, 2007, p. 35-44. ISBN 978-80-244-1687-8.
    10. REHÁK, Martin, Michal PĚCHOUČEK, Karel BARTOŠ, Martin GRILL and Pavel ČELEDA. Network Intrusion Detection by Means of Community of Trusting Agents. In Intelligent Agent Technology. Los Alamitos, California: IEEE Computer Society, 2007, p. 498-504. ISBN 978-0-7695-3027-7.
    11. PŘENOSIL, Václav and Pavel ČELEDA. Software Diagnostics for Embedded Systems. In Transport Science and Technology Congress - TRANSTEC Prague 2007. první. Praha: Czech Technical University, Faculty of Transportation Sciences and University of California Santa Barbara, 2007, p. 41-46. ISBN 978-80-01-03782-9.

    2006

    1. ČELEDA, Pavel and Václav PŘENOSIL. Diagnostika programového vybavení pomocí inteligentních diagnostických časovačů (Software Diagnostics Using Intelligent Watchdog Timers). In Opotřebení, spolehlivost, diagnostika 2006. 1st ed. Brno: UO Brno, 2006, p. 217-222. ISBN 80-7231-165-4.
    2. ČELEDA, Pavel and Tomáš KONÍŘ. Open-source programové vybavení pro průmyslové systémy (Open-source software for industry applications). Automa - časopis pro automatizační techniku. Praha: FCC Public s. r. o., 2006, vol. 12, No 3, p. 106-108. ISSN 1210-9592.

    2000

    1. BARTOŠEK, Miroslav, Petr PIŠTĚK and Václav RAČANSKÝ. Počítačová studovna MU zahájila provoz. Univerzitní noviny, List Masarykovy univerzity a Nadace Universitas Masarykiana. Brno: Nadace MU, 2000, roč. 7, No 11, p. 36-38. ISSN 1211-6866.

    1986

    1. RAČANSKÝ, Václav. Computation Rules Using Memory I. Scripta Facultatis Scientiarum Naturalium Universitatis Purkynianae Brunensis - Mathematica. Brno: Přírodovědecká fakulta Univerzity J.E. Purkyně, 1986, p. 483-493.

    1978

    1. RAČANSKÝ, Václav. Computation of Recursive Programs. Scripta Facultatis Scientiarum Naturalium Universitatis Purkynianae Brunensis - Mathematica. Brno: Přírodovědecká fakulta Univerzity J.E. Purkyně, 1978, p. 59-62.
Display details
Displayed: 30/7/2024 14:24