Your selection contains 260 outcomes. Edit selection.
Filter publications

    2024

    1. SADLEK, Lukáš and Pavel ČELEDA. Cyber Key Terrain Identification Using Adjusted PageRank Centrality. Online. In Meyer, N., Grocholewska-Czuryło, A. ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Cham: Springer, 2024, p. 293-306. ISBN 978-3-031-56325-6. Available from: https://dx.doi.org/10.1007/978-3-031-56326-3_21.
    2. MALINKA, Kamil, Libuše VODOVÁ, Martina JANČOVÁ, Lenka SOBKOVÁ and Vladimír SCHINDLER. Evaluation of the Pedagogical Impact of the Educational Usage of 3D Printing in Czech Lower Secondary and Grammar Schools. European Journal of Educational Research. 2024, vol. 13, No 2, p. 631-649. ISSN 2165-8714.
    3. SADLEK, Lukáš, Martin HUSÁK and Pavel ČELEDA. Identification of Device Dependencies Using Link Prediction. Online. In NOMS 2024 - 2024 IEEE/IFIP Network Operations and Management Symposium (to appear). IEEE Xplore Digital Library, 2024, 10 pp.
    4. DRAŠAR, Martin, Ádám RUMAN, Pavel ČELEDA and Yang SCHANCHIEH. The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments. Online. In Sokratis Katsikas et al. ESORICS 2023: Computer Security. ESORICS 2023 International Workshops. Neuveden: Springer Nature Switzerland AG, 2024, p. 738-749. ISBN 978-3-031-54128-5. Available from: https://dx.doi.org/10.1007/978-3-031-54129-2_43.

    2023

    1. BEURAN, Razvan, Jan VYKOPAL, Daniela BELAJOVÁ, Pavel ČELEDA, Yasuo TAN and Yoichi SHINODA. Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. Computers & Security. Elsevier, 2023, vol. 128, No 103120, p. 1-14. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2023.103120.
    2. ŠPAČEK, Stanislav, Petr VELAN, Martin HOLKOVIČ and Tomáš PLESNÍK. Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic. Online. In 2023 IEEE/IFIP Network Operations and Management Symposium (NOMS 2023). Miami, Florida, USA: IEEE Xplore Digital Library, 2023, p. 1-6. ISBN 978-1-6654-7716-1. Available from: https://dx.doi.org/10.1109/NOMS56928.2023.10154211.
    3. POKORNÝ, Jan, Magdaléna KEJSTOVÁ, Vít RUSŇÁK and Simone KRIGLSTEIN. From Bin to Playin’: Give Vintage Objects a New Purpose as Game Controllers. Online. In Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA '23). Hamburg, Germany: Association for Computing Machinery, 2023, p. 1-6. ISBN 978-1-4503-9422-2. Available from: https://dx.doi.org/10.1145/3544549.3585665.
    4. ČERMÁK, Milan and Petr VELAN. How can network traffic lie? DFRWS EU 2023, 2023.
    5. DOSEDLA, Martin, Zdeněk HODIS, Martina JANČOVÁ, Jiří LEDVINKA, Leni LVOVSKÁ, Kamil MALINKA, Darina MÍSAŘOVÁ, Pavla PITNEROVÁ, Vladimír SCHINDLER, Vojtěch STANĚK, Libuše VODOVÁ and Tomáš STAUDEK. Integration of 3D printing technology into teaching in primary and secondary schools. Certified Methodology. Online. 1st ed. Brno: Masaryk University Press, 2023. odborné a technické vzdělávání. ISBN 978-80-280-0350-0.
    6. SZABÓ-TAKÁCS, BEÁTA, TAMÁS TAKÁCS and Aleš ROČEK. Meteo Read: Client Software for Inserting Observed Atmospheric Data into MySQLTM Database. Vol. 2. London: B P International, 2023, 176 pp. 2023/BP/6972E. ISBN 978-81-969141-9-6. Available from: https://dx.doi.org/10.9734/bpi/taer/v2.
    7. LAŠTOVIČKA, Martin, Martin HUSÁK, Petr VELAN, Tomáš JIRSÍK and Pavel ČELEDA. Passive Operating System Fingerprinting Revisited: Evaluation and Current Challenges. Computer Networks. Netherlands: Elsevier, 2023, vol. 229, No 109782, p. 1-12. ISSN 1389-1286. Available from: https://dx.doi.org/10.1016/j.comnet.2023.109782.
    8. DRAŠAR, Martin. Perception of the Environment. Online. In Kott, Alexander. Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide. 1st ed. Cham: Springer International Publishing, 2023, p. 47-61. Advances in Information Security, 87. ISBN 978-3-031-29269-9. Available from: https://dx.doi.org/10.1007/978-3-031-29269-9_3.
    9. ANSAH, Alberta A, Adriana S VIVACQUA, Sailin ZHONG, Susanne BOLL, Marios CONSTANTINIDES, Himanshu VERMA, Abdallah El ALI, Alina LUSHNIKOVA, Hamed ALAVI, Sean RINTEL, Andrew L KUN, Orit SHAER, Anna L COX, Kathrin GERLING, Michael MULLER, Vít RUSŇÁK, Leticia Santos MACHADO, Thomas KOSCH, CHIWORK COLLECTIVE and SIGCHI EXECUTIVE COMMITTEE. Reflecting on Hybrid Events: Learning from a Year of Hybrid Experiences. Online. In Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA '23). New York, NY, USA: Association for Computing Machinery, 2023, p. 1–4, 5 pp. Available from: https://dx.doi.org/10.1145/3544549.3583181.
    10. VYKOPAL, Jan, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ and Pavel ČELEDA. Smart Environment for Adaptive Learning of Cybersecurity Skills. IEEE Transactions on Learning Technologies. 2023, vol. 16, No 3, p. 443-456. ISSN 1939-1382. Available from: https://dx.doi.org/10.1109/TLT.2022.3216345.
    11. RUSŇÁK, Vít and Martin DRAŠAR. Towards a Visual Analytics Workflow for Cybersecurity Simulations. Online. In Christophe Hurter, Helen Purchase, Kadi Bouatouch. Proceedings of VISIGRAPP2023 - Volume3: IVAPP. To appear. Lisbon, Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2023, p. 179-186. ISBN 978-989-758-634-7. Available from: https://dx.doi.org/10.5220/0011695000003417.
    12. HYNEK, Jiří and Vít RUSŇÁK. Towards Interactive Geovisualization Authoring Toolkit for Industry Use Cases. Online. In A. Augusto de Sousa, Vlastimil Havran, Alexis Paljic, Tabitha Peck, Christophe Hurter, Helen Purchase, Giovanni Maria Farinella, Petia Radeva, Kadi Bouatouch. Computer Vision, Imaging and Computer Graphics Theory and Applications. 1st ed. Cham, Switzerland: Springer, 2023, p. 232-256. ISBN 978-3-031-25476-5. Available from: https://dx.doi.org/10.1007/978-3-031-25477-2_11.
    13. DOSEDLA, Martin, Zdeněk HODIS, Martina JANČOVÁ, Jiří LEDVINKA, Leni LVOVSKÁ, Kamil MALINKA, Darina MÍSAŘOVÁ, Pavla PITNEROVÁ, Vladimír SCHINDLER, Vojtěch STANĚK, Libuše VODOVÁ and Petr VYBÍRAL. Výuková pomůcka - soubor výukových pomůcek pro integraci technologie 3D tisku do výuky na základních a středních školách (Teaching aid - a set of teaching aids for the integration of 3D printing technology into teaching at primary and secondary schools). Online. Brno: Masarykova univerzita, 2023.
    14. KRAUS, Lydia, Valdemar ŠVÁBENSKÝ, Martin HORÁK, Václav MATYÁŠ, Jan VYKOPAL and Pavel ČELEDA. Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. Online. In Proceedings of the 28th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'23). New York, NY, USA: ACM, 2023, p. 236-242. ISBN 979-8-4007-0138-2. Available from: https://dx.doi.org/10.1145/3587102.3588862.
    15. HORÁK, Jiří, Katarína FURMANOVÁ, Barbora KOZLÍKOVÁ, Tomáš BRÁZDIL, Petr HOLUB, Martin KAČENGA, Matej GALLO, Rudolf NENUTIL, Jan BYŠKA and Vít RUSŇÁK. xOpat: eXplainable Open Pathology Analysis Tool. COMPUTER GRAPHICS FORUM. England: Wiley, 2023, vol. 42, No 3, p. 63-73. ISSN 0167-7055. Available from: https://dx.doi.org/10.1111/cgf.14812.

    2022

    1. ČEGAN, Jakub, Tomáš PLESNÍK, Daniel TOVARŇÁK, Zdeněk FORMAN and Roman VESELÝ. Analytická studie rozvoje a nasazení SOC (Analytical study of SOC development and deployment). 2022.
    2. PITNER, Tomáš, Otto DOSTÁL, Michal JAVORNÍK, Pavel ANDRES, Aleš ROČEK, Karel SLAVÍČEK, Tomáš KUBALA and Otto DOSTÁL. Analýza systému pro podporu efektivní spolupráce distribuovaných zdravotnických týmů (Analysis of a system to support effective collaboration of distributed healthcare teams). Brno: MU, 2022, 76 pp.
    3. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA and Lydia KRAUS. Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training. Education and Information Technologies. Springer, 2022, vol. 27, No 9, p. 12179 - 12212. ISSN 1360-2357. Available from: https://dx.doi.org/10.1007/s10639-022-11093-6.
    4. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš PITNER. Business Process Model and Notation for Forensic-Ready Software Systems. Online. In Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering. Setúbal, Portugal: SciTePress, 2022, p. 95-106. ISBN 978-989-758-568-5. Available from: https://dx.doi.org/10.5220/0011041000003176.
    5. SUFATRIO, Sufatrio, Ee-Chien CHANG and Jan VYKOPAL. Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications. Online. In Australasian Computing Education Conference (ACE '22). New York, NY, USA: Association for Computing Machinery, 2022, p. 114-122. ISBN 978-1-4503-9643-1. Available from: https://dx.doi.org/10.1145/3511861.3511874.
    6. HUSÁK, Martin. Complex Networks in Cybersecurity: Applications and Challenges. In ACONTA'22 : First European Conference on Augmented Complex Networks - Trustworthy Analysis. 2022.
    7. HUSÁK, Martin, Lukáš SADLEK, Stanislav ŠPAČEK, Martin LAŠTOVIČKA, Michal JAVORNÍK and Jana KOMÁRKOVÁ. CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling. Computers & Security. Elsevier, 2022, vol. 115, April, p. 1-19. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2022.102609.
    8. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna, Austria: ACM, 2022, p. 1-8. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3544458.
    9. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI and Barbora BÜHNOVÁ. Cybersecurity Analysis via Process Mining: A Systematic Literature Review. Online. In Advanced Data Mining and Applications. Cham, Switzerland: Springer, 2022, p. 393-407. ISBN 978-3-030-95404-8. Available from: https://dx.doi.org/10.1007/978-3-030-95405-5_28.
    10. DOČKALOVÁ BURSKÁ, Karolína, Vít RUSŇÁK and Radek OŠLEJŠEK. Data-driven insight into the puzzle-based cybersecurity training. Computers & Graphics. Elsevier Science, 2022, vol. 102, February 2022, p. 441-451. ISSN 0097-8493. Available from: https://dx.doi.org/10.1016/j.cag.2021.09.011.
    11. ŠEDA, Pavel, Jan VYKOPAL, Pavel ČELEDA and Igor IGNÁC. Designing Adaptive Cybersecurity Hands-on Training. Online. In 2022 IEEE Frontiers in Education Conference (FIE). Uppsala, Sweden: IEEE, 2022, p. 1-8. ISBN 978-1-6654-6244-0. Available from: https://dx.doi.org/10.1109/FIE56618.2022.9962663.
    12. ŽÁDNÍK, Martin, Jan WRONA, Karel HYNEK, Tomáš ČEJKA and Martin HUSÁK. Discovering coordinated groups of IP addresses through temporal correlation of alerts. IEEE Access. IEEE, 2022, vol. 10, No 1, p. 82799-82813. ISSN 2169-3536. Available from: https://dx.doi.org/10.1109/ACCESS.2022.3196362.
    13. ČELEDA, Pavel, Attila FARKAS, Pavel ŠEDA, Andrej TOMČI, Daniel IĽKOVIČ, Martin ŠVÉDA and Tomáš HRADSKÝ. Dohledové centrum pro monitorování výrobních informačních systémů (Monitoring Center for Manufacturing Execution Systems). 2022.
    14. ŠPAČEK, Stanislav, Petr VELAN, Pavel ČELEDA and Daniel TOVARŇÁK. Encrypted Web Traffic Dataset: Event Logs and Packet Traces. Data in Brief. 2022, vol. 42, June, p. 1-10. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2022.108188.
    15. ŠVÁBENSKÝ, Valdemar, Richard WEISS, Jack COOK, Jan VYKOPAL, Pavel ČELEDA, Jens MACHE, Radoslav CHUDOVSKÝ and Ankur CHATTOPADHYAY. Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. Online. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22). New York, NY, USA: ACM, 2022, p. 787-793. ISBN 978-1-4503-9070-5. Available from: https://dx.doi.org/10.1145/3478431.3499414.
    16. MATYÁŠ, Václav, Kamil MALINKA, Lydia KRAUS, Lenka KNAPOVÁ and Agáta KRUŽÍKOVÁ. Even if users do not read security directives, their behavior is not so catastrophic. Communications of the ACM. New York, NY, USA: ACM, 2022, vol. 65, No 1, p. 37-40. ISSN 0001-0782. Available from: https://dx.doi.org/10.1145/3471928.
    17. MACÁK, Martin, Lukáš DAUBNER, Júlia JAMNICKÁ and Barbora BÜHNOVÁ. Game Achievement Analysis: Process Mining Approach. Online. In Advanced Data Mining and Applications. Cham: Springer International Publishing, 2022, p. 68-82. ISBN 978-3-030-95407-9. Available from: https://dx.doi.org/10.1007/978-3-030-95408-6_6.
    18. HUSÁK, Martin, Martin LAŠTOVIČKA and Tomáš PLESNÍK. Handling Internet Activism during the Russian Invasion of Ukraine: A Campus Network Perspective. Digital Threats: Research and Practice. New York, NY, USA: ACM, 2022, vol. 3, No 3, p. "17:1-17:5", 5 pp. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3534566.
    19. ŠPAČEK, Stanislav, Petr VELAN, Pavel ČELEDA and Daniel TOVARŇÁK. HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. Online. In 2022 IEEE/IFIP Network Operations and Management Symposium (NOMS 2022). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2022, p. 1-6. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789877.
    20. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Identification of Attack Paths Using Kill Chain and Attack Graphs. Online. In NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2022, p. 1-6. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789803.
    21. RUSŇÁK, Vít, Lenka JANEČKOVÁ, Filip DRGOŇ, Anna-Marie DOMBAJOVÁ and Veronika KUDĚLKOVÁ. Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance. Online. In Ebad Banissi, Anna Ursyn, Mark W. McK. Bannatyne, et al. 2022 26th International Conference Information Visualisation (IV). Vienna, Austria: IEEE, 2022, p. 300-306. ISBN 978-1-6654-9007-8. Available from: https://dx.doi.org/10.1109/IV56949.2022.00058.
    22. ČERMÁK, Milan. Incident Investigation: From Packets to Graph-Based Analysis. In International Workshop on Graph-based network Security (GraSec) in conjunction with IEEE/IFIP Network Operations and Management Symposium NOMS 2022. 2022.
    23. ŠMAHEL, David, Lenka DĚDKOVÁ, Lydia KRAUS, Václav MATYÁŠ and Vlasta BUKAČOVÁ. Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences. Human Behavior and Emerging Technologies. 2022, vol. 2022, No 1230344, p. 1-12. ISSN 2578-1863. Available from: https://dx.doi.org/10.1155/2022/1230344.
    24. DOSTÁL, Otto, Karel SLAVÍČEK, Vladimír SCHINDLER, Miloslav FILKA, David GRENAR, Martin KYSELÁK and Jiří VÁVRA. Kaskádní zapojení sady PM vláknových senzorů v DWDM rastru 50GHz. 2022.
    25. TOVARŇÁK, Daniel, Martin HAMERNÍK and Vít RUSŇÁK. Kolaborativní prostředí pro členy bezpečnostních týmů (Collaborative environment for security team members). 2022.
    26. DOSTÁL, Otto, Karel SLAVÍČEK, Aleš ROČEK, Martin KYSELÁK, Jiří VÁVRA, Jan MASCHKE, David GRENAR and Milan ČUCKA. Kombinovaná jednotka postavená na PM vláknovém senzoru a FGB (Combined unit based on PM fiber sensor and FGB). 2022.
    27. ŠUĽAN, Samuel and Martin HUSÁK. Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "22:1"-"22:6", 6 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3539007.
    28. JAVORNÍK, Michal and Martin HUSÁK. Mission-centric Decision Support in Cybersecurity via Bayesian Privilege Attack Graph. Engineering Reports. John Wiley & Sons, Inc, 2022, vol. 4, No 12, p. "e12538", 25 pp. ISSN 2577-8196. Available from: https://dx.doi.org/10.1002/eng2.12538.
    29. TOVARŇÁK, Daniel, Michal ČECH, Dušan TICHÝ and Vojtěch DOHNAL. ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence. Online. In Varga, Pal, et al. Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022. USA: IEEE, 2022, p. 1-4. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789882.
    30. ČEGAN, Jakub, Daniel TOVARŇÁK, Tomáš PLESNÍK, Martin KEPRT and Milan PERNICA. Organizační, technický a právní model sdíleného SOC. 2022.
    31. VYKOPAL, Jan, Valdemar ŠVÁBENSKÝ, Pavel ŠEDA and Pavel ČELEDA. Preventing Cheating in Hands-on Lab Assignments. Online. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22). New York, NY, USA: ACM, 2022, p. 78-84. ISBN 978-1-4503-9070-5. Available from: https://dx.doi.org/10.1145/3478431.3499420.
    32. ČELEDA, Pavel, Igor IGNÁC, Boris JADUŠ, Erik KOČAMBA, Lukáš MAJDAN, Dominik PILÁR, Pavel ŠEDA and Jan VYKOPAL. Software inteligentního asistenta pro hraní bezpečnostních her (Intelligent Assistant Software for Playing Cybersecurity Games). 2022.
    33. TOVARŇÁK, Daniel and Matúš RAČEK. Software pro integrovaný datový pohled na chráněnou infrastrukturu (Software for an integrated data view over the protected infrastructure). 2022.
    34. TOVARŇÁK, Daniel, Vojtěch DOHNAL, Dušan TICHÝ, Benjamin KRÁL and Martin MACHÁČ. Software pro podporu orchestrace bezpečnosti a řízení životního cyklu hrozeb (Software for security orchestration support and threat life-cycle management). 2022.
    35. ANDONIADIS, Kamil, Pavel ČELEDA, Karolína DOČKALOVÁ BURSKÁ, Igor IGNÁC, Martin JUHÁS, Erik KOČAMBA, Radek OŠLEJŠEK, Juraj PALUBA, Dominik PILÁR, Pavel ŠEDA, Michal URBAN and Jan VYKOPAL. Software pro přípravu a realizaci bezpečnostních her (Software for Preparing and Carrying Out Cybersecurity Games). 2022.
    36. ČELEDA, Pavel, Karolína DOČKALOVÁ BURSKÁ, Igor IGNÁC, Martin JUHÁS, Erik KOČAMBA, Radek OŠLEJŠEK, Dominik PILÁR, Pavel ŠEDA and Jan VYKOPAL. Software pro sběr a vyhodnocení dat z bezpečnostních her (Software for Collecting and Evaluating Data from Cybersecurity Games). 2022.
    37. HUSÁK, Martin and Milan ČERMÁK. SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "25:1"-"25:10", 10 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3538981.
    38. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA, Kristián TKÁČIK and Daniel POPOVIČ. Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering. Education and Information Technologies. Springer, 2022, vol. 27, No 7, p. 9231-9262. ISSN 1360-2357. Available from: https://dx.doi.org/10.1007/s10639-022-10954-4.
    39. DRAŠAR, Martin, Ádám RUMAN and Vít RUSŇÁK. SW pro dynamickou verifikaci bezpečnostních opatření (SW for dynamic verification of security measures). 2022.
    40. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER and Ivo NUTÁR. SW pro ovládání nástrojů ofenzivní bezpečnosti (SW for orchestration of offensive security tools). 2022.
    41. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER, Michal DROBŇÁK and Ivo NUTÁR. SW pro statickou verifikaci bezpečnostních opatření (SW for static verification of security measures). 2022.
    42. HUSÁK, Martin and Hamida SEBA. The 3rd International Workshop on Graph-based network Security (GraSec 2022). 2022.
    43. ČERMÁK, Milan. Toward Graph-Based Network Traffic Analysis and Incident Investigation. In DFRWS EU 2022. 2022.
    44. KRAUS, Lydia, Matěj GRABOVSKÝ, Martin UKROP, Katarína GALANSKÁ and Václav MATYÁŠ. Usability Insights from Establishing TLS Connections. In IFIP International Conference on ICT Systems Security and Privacy Protection. Cham, Germany: Springer Verlag, 2022, p. 289-305. ISBN 978-3-031-06974-1. Available from: https://dx.doi.org/10.1007/978-3-031-06975-8_17.
    45. DOSTÁL, Otto, Jiří VÁVRA, Martin KYSELÁK, Karel SLAVÍČEK, Vladimír SCHINDLER and David GRENAR. Vyhodnocovací elektronika včetně řídícího SW (Evaluation electronics including control software). 2022.

    2021

    1. MATTA, Lukáš and Martin HUSÁK. A Dashboard for Cyber Situational Awareness and Decision Support in Network Security Management. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, p. 716-717. ISBN 978-3-903176-32-4.
    2. TOVARŇÁK, Daniel, Matúš RAČEK and Petr VELAN. Cloud Native Data Platform for Network Telemetry and Analytics. Online. In Müge Sayıt, Stuart Clayman. 17th International Conference on Network and Service Management. Izmir, Turkey (Virtual): IFIP Open Digital Library, IEEE Xplore, 2021, p. 394-396. ISBN 978-3-903176-36-2. Available from: https://dx.doi.org/10.23919/CNSM52442.2021.9615568.
    3. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína DOČKALOVÁ BURSKÁ, Valdemar ŠVÁBENSKÝ, Jan VYKOPAL and Jakub ČEGAN. Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. IEEE Transactions on Visualization and Computer Graphics. 2021, vol. 27, No 8, p. 3425-3437. ISSN 1077-2626. Available from: https://dx.doi.org/10.1109/TVCG.2020.2977336.
    4. PÄIJÄNEN, Jani, Karo SAHARINEN, Jarno SALONEN, Tuomo SIPOLA, Jan VYKOPAL and Tero KOKKONEN. Cyber Range: Preparing for Crisis or Something Just for Technical People?. Online. In Proceeding of the 20th European Conference on Cyber Warfare and Security (ECCWS 2021). Reading, UK: Academic Conferences International Limited, 2021, p. 322-330. ISBN 978-1-912764-99-0.
    5. ŠVÁBENSKÝ, Valdemar, Pavel ČELEDA, Jan VYKOPAL and Silvia BRIŠÁKOVÁ. Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges. Computers & Security. Elsevier, 2021, vol. 102, No 102154, p. 1-14. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2020.102154.
    6. POLČÁK, Radim, Jakub MÍŠEK, Matěj MYŠKA, Jakub HARAŠTA, Pavel LOUTOCKÝ, Veronika ŽOLNERČÍKOVÁ, Václav STUPKA, František KASL, Aleš ZAVRŠNIK, Ludwig GRAMLICH, Herbert HRACHOVEC, Andreas KIRCHNER, Kristian DANEBACK, Jakub MACEK, Dan Jerker Börje SVANTESSON, Erich SCHWEIGHOFER, David ŠMAHEL, Miroslav MAREŠ, Andreas WIEBE, Monika METYKOVÁ, Alena MACKOVÁ, Hana MACHÁČKOVÁ, Lydia KRAUS, Václav MATYÁŠ and Walter HÖTZENDORFER. Cyberspace 2021. 2021.
    7. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ŠEDA and Pavel ČELEDA. Dataset of Shell Commands Used by Participants of Hands-on Cybersecurity Training. Data in Brief. Elsevier, 2021, vol. 38, September, p. 1-9. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2021.107398.
    8. PITNER, Tomáš, Otto DOSTÁL, Otto DOSTÁL, Pavel LOUTOCKÝ, František KASL and Pavel ANDRES. Dílčí projekt „CovidCareShare – Bezpečné sdílení medicínských dat v období pandemie Covid19“ Výsledek V1 – Architektura systému pro bezpečné sdílení medicínských dat (Sub-project "CovidCareShare - Secure medical data sharing in the Covid19 pandemic" Deliverable V1 - System architecture for secure medical data sharing). Brno: Neuveden, 2021, 20 pp. Dílčí projekt CovidCareShare.
    9. PITNER, Tomáš, Otto DOSTÁL, Otto DOSTÁL, Pavel LOUTOCKÝ, František KASL and Pavel ANDRES. Dílčí projekt „CovidCareShare – Bezpečné sdílení medicínských dat v období pandemie Covid19“ Výsledek V2 – Studie proveditelnosti (Sub-project "CovidCareShare - Secure medical data sharing in the Covid19 pandemic" Deliverable V2 - Feasibility study). Brno: Neuveden, 2021, 8 pp. Dílčí projekt CovidCareShare.
    10. DOČKALOVÁ BURSKÁ, Karolína, Vít RUSŇÁK and Radek OŠLEJŠEK. Enhancing Situational Awareness for Tutors of Cybersecurity Capture the Flag Games. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: IEEE, 2021, p. 235-242. ISBN 978-1-6654-3827-8. Available from: https://dx.doi.org/10.1109/IV53921.2021.00045.
    11. ŠPAČEK, Stanislav, Daniel TOVARŇÁK and Pavel ČELEDA. Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption. In Audun Jøsang, Lynn Futcher, Janne Hagen. ICT Systems Security and Privacy Protection. 1st ed. Oslo: Springer, 2021, p. 302-316. ISBN 978-3-030-78119-4. Available from: https://dx.doi.org/10.1007/978-3-030-78120-0_20.
    12. HYNEK, Jiří, Jakub KACHLÍK and Vít RUSŇÁK. Geovisto: A Toolkit for Generic Geospatial Data Visualization. Online. In Christophe Hurter, Helen Purchase, Jose Braz, Kadi Bouatouch. Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 3 IVAPP: IVAPP. Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2021, p. 101-111. ISBN 978-989-758-488-6. Available from: https://dx.doi.org/10.5220/0010260401010111.
    13. HYNEK, Jiří, Kryštof RYKALA, Jakub KACHLÍK and Vít RUSŇÁK. Geovisto: Toolkit for Generic Geospatial Data Visualization. 2021.
    14. ČERMÁK, Milan and Denisa ŠRÁMKOVÁ. GRANEF: Utilization of a Graph Database for Network Forensics. Online. In Sabrina De Capitani di Vimercati, Pierangela Samarati. Proceedings of the 18th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2021, p. 785-790. ISBN 978-989-758-524-1. Available from: https://dx.doi.org/10.5220/0010581807850790.
    15. TOVARŇÁK, Daniel, Lukáš SADLEK and Pavel ČELEDA. Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021). Washington DC, USA: IEEE, 2021, p. 986-991. ISBN 978-3-903176-32-4.
    16. ČERMÁK, Milan. Graph-based Network Traffic Analysis for Incident Investigation. In The 16th International Conference on Availability, Reliability and Security. 2021.
    17. JIRSÍK, Tomáš and Petr VELAN. Host Behavior in Computer Network: One-Year Study. IEEE Transactions on Network and Service Management. 2021, vol. 18, No 1, p. 822-838. ISSN 1932-4537. Available from: https://dx.doi.org/10.1109/TNSM.2020.3036528.
    18. KRAUS, Lydia, Mária ŠVIDROŇOVÁ and Elizabeth STOBERT. How Do Users Chain Email Accounts Together? In Jøsang A., Futcher L., Hagen J. IFIP International Conference on ICT Systems Security and Privacy Protection. Switzerland: Springer International Publishing, 2021, p. 416-429. ISBN 978-3-030-78119-4. Available from: https://dx.doi.org/10.1007/978-3-030-78120-0_27.
    19. DOSTÁL, Otto, Karel SLAVÍČEK, Jaroslav LEDVINKA, COMIMPEX spol. s.r.o. DUŠAN PAROULEK, COMIMPEX spol. s.r.o. MICHAL STRNAD, Mediatrade s.r.o. PAVEL TÁBORSKÝ and VŠB-TUO MARTIN AUGUSTÝNEK. Integrovaný aktivní monitorovací systém pro pacienty s externími kardiostimulátory (Integrated active monitoring system for patients with external pacemakers). 2021.
    20. UHLÁR, Juraj, Martin HOLKOVIČ and Vít RUSŇÁK. PCAPFunnel: A Tool for Rapid Exploration of Packet Capture Files. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: The Institute of Electrical and Electronics Engineers, Inc., 2021, p. 69-76. ISBN 978-1-6654-3827-8. Available from: https://dx.doi.org/10.1109/IV53921.2021.00021.
    21. HUSÁK, Martin, Václav BARTOŠ, Pavol SOKOL and Andrej GAJDOŠ. Predictive Methods in Cyber Defense: Current Experience and Research Challenges. Future Generation Computer Systems. Elsevier, 2021, vol. 115, February, p. 517-530. ISSN 0167-739X. Available from: https://dx.doi.org/10.1016/j.future.2020.10.006.
    22. RUSŇÁK, Vít, Anna-Marie DOMBAJOVÁ, Veronika KUDĚLKOVÁ and Martin PYŠČUK. Prototypová implementace nástroje pro vizuální analýzu časově orientovaných dat (Prototype implementation of a tool for visual analysis of time-oriented data). 2021.
    23. ŠEDA, Pavel, Jan VYKOPAL, Valdemar ŠVÁBENSKÝ and Pavel ČELEDA. Reinforcing Cybersecurity Hands-on Training With Adaptive Learning. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637252.
    24. VYKOPAL, Jan, Pavel ČELEDA, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ and Daniel TOVARŇÁK. Scalable Learning Environments for Teaching Cybersecurity Hands-on. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637180.
    25. ČELEDA, Pavel, Andrej TOMČI, Daniel IĽKOVIČ, Martin MADZIA, Jana ZIKOVÁ, Aleš SMRČKA, Tomáš FIEDOR, Martin HRUŠKA, Martin ŠVÉDA and Lubomír POSPÍŠIL. Software pro měření a vyhodnocení výkonnostních parametrů (Software for Measurement and Evaluation of Performance Parameters). 2021.
    26. VELAN, Petr, Petr ŠPRINGL, Jan FRÜHBAUER, Tomáš JÁNSKÝ and Boris PARÁK. Software pro správu a řízení měření v cloudovém prostředí (Software for control and management of network monitoring in a cloud environment). 2021.
    27. ČERMÁK, Milan and Pavel ČELEDA. Stream-Based IP Flow Analysis. Online. In Toufik Ahmed, Olivier Festor, Yacine Ghamri-Doudane, Joon-Myung Kang, Alberto E. Schaeffer-Filho, Radu State, Burkhard Stiller. IFIP/IEEE International Symposium on Integrated Network Management, IM 2021. Bordeaux, France: IFIP Open Digital Library, 2021, p. 736-741. ISBN 978-3-903176-32-4.
    28. HUSÁK, Martin, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. Online. In ARES 2021: The 16th International Conference on Availability, Reliability and Security. Virtual Event: Association for Computing Machinery, 2021, p. 1-8. ISBN 978-1-4503-9051-4. Available from: https://dx.doi.org/10.1145/3465481.3470037.
    29. ŠVÁBENSKÝ, Valdemar and Martin UKROP. The Stack: Unplugged Activities for Teaching Computer Science. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE '21). 2021. ISBN 978-1-4503-8062-1. Available from: https://dx.doi.org/10.1145/3408877.3439569.
    30. LAGRAA, Sofiane, Radu STATE, Hamida SEBA and Martin HUSÁK. The 2nd International Workshop on Graph-based network Security (GraSec 2021). 2021.
    31. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Daniel TOVARŇÁK and Pavel ČELEDA. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637052.
    32. GÁLIKOVÁ, Miriam, Valdemar ŠVÁBENSKÝ and Jan VYKOPAL. Toward Guidelines for Designing Cybersecurity Serious Games. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE '21). 2021. ISBN 978-1-4503-8062-1. Available from: https://dx.doi.org/10.1145/3408877.3439568.
    33. HUSÁK, Martin. Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. Online. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI). San Antonio: IEEE, 2021, p. 1-6. ISBN 978-1-6654-3838-4. Available from: https://dx.doi.org/10.1109/ISI53945.2021.9624774.
    34. HUSÁK, Martin, Giovanni APRUZZESE, Shanchieh YANG and Gordon WERNER. Towards an Efficient Detection of Pivoting Activity. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, p. 980-985. ISBN 978-3-903176-32-4.
    35. ČEGAN, Jakub, Tomáš KACVINSKÝ, Zdeněk VYDRA, Martin LEBEDA, Jakub Bartolomej KOŠUTH, Petr VELAN, Milan ČERMÁK, Andrej TOMČI, Ivo NUTÁR, Martin LAŠTOVIČKA, Natálie VELECKÁ, Pavla VIZVÁRY, Vojtěch HAMERSKÝ, Daniel KOUŘIL, Ondřej BUDAY, Martin KOTLÍK, Vladimír ROHEL, Jiří SÝKORA, Michal ZVÁNOVEC, Filip GRÉGR and Petr SLAVÍK. Virtualizované prostředí pro trénink CSIRT týmu (Virtual environment for training of the CSIRT teams). 2021.
    36. DOČKALOVÁ BURSKÁ, Karolína, Anna-Marie DOMBAJOVÁ, Jiří HYNEK, Jakub KACHLÍK, Jakub MATUŠKA, Michal PAVÚK, Kryštof RYKALA, Dávid ŽELNÍK and Vít RUSŇÁK. Vizuálně-analytická konzole pro ICS (Visual-analytics console for ICS). 2021.
    37. ROČEK, Aleš, Michal JAVORNÍK, Karel SLAVÍČEK and Otto DOSTÁL. Zero Watermarking: Critical Analysis of Its Role in Current Medical Imaging. Journal of Digital Imaging. 2021, vol. 34, No 1, p. 204-211. ISSN 0897-1889. Available from: https://dx.doi.org/10.1007/s10278-020-00396-0.

    2020

    1. ČECH, Michal, Roman CHRENŠŤ, Daniel TOVARŇÁK and Tomáš PLESNÍK. Adaptér pro systém pro správu zdrojů (Asset management adapter). 2020.
    2. KOTT, Alexander, Paul THERON, Luigi MANCINI, Edlira DUSHKU, Agostino PANICO, Martin DRAŠAR, Benoit LEBLANC, Paul LOSIEWICZ, Alessandro GUARINO, Mauno PIHELGAS and Krzysztof RZADCA. An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. THOUSAND OAKS: SAGE PUBLICATIONS INC, 2020, vol. 17, No 1, p. 51-54. ISSN 1548-5129. Available from: https://dx.doi.org/10.1177/1548512919886163.
    3. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Daniel TOVARŇÁK, Pavel ZEZULA, Martin MACÁK, Matúš GUOTH, Matej BABEJ, Dávid BRILLA and Martin KAŽIMÍR. ANALYZA – Datový sklad (ANALYZA – Dara Warehouse). 2020.
    4. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Jarešová MIROSLAVA, Barbora KOZLÍKOVÁ, Kristína ZÁKOPČANOVÁ, Pavel ZEZULA, Katarína FURMANOVÁ, Marko ŘEHÁČEK, Jozef BÁTRNA and Daniel PLAKINGER. ANALYZA – Vizualizační komponenta – Visilant (ANALYZA – Visualization Component – Visilant). 2020.
    5. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Barbora KOZLÍKOVÁ, Vladimír MÍČ, Filip NÁLEPA, David NOVÁK, Daniel TOVARŇÁK, Pavel ZEZULA, Jakub PESCHEL, Kasanič DENIS, Denisa ŠRÁMKOVÁ, Erik HRICIŠÁK, Vladimír LAZÁRIK and Kristián GUTIČ. ANALYZA – Výpočetní a orchestrační subsystém (ANALYZA – Computation and Orchestration Subsystem). 2020.
    6. VYKOPAL, Jan, Valdemar ŠVÁBENSKÝ and Ee-Chien CHANG. Benefits and Pitfalls of Using Capture The Flag Games in University Courses. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 752-758. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366893.
    7. KYSELÁK, Martin, Jan MASCHKE, Marco PANASCI, Karel SLAVÍČEK, Otto DOSTÁL, David GRENAR, Milan ČUČKA and Miloslav FILKA. Birefringence influence on polarization changes and frequency on optical fiber. Online. In Proceedings of SPIE. online: SPIE, 2020, p. 1-13. ISBN 978-1-5106-3889-1. Available from: https://dx.doi.org/10.1117/12.2573696.
    8. JIRSÍK, Tomáš and Pavel ČELEDA. Cyber Situation Awareness via IP Flow Monitoring. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Hungary: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8.
    9. POLČÁK, Radim, Jakub MÍŠEK, Matěj MYŠKA, Jakub HARAŠTA, Pavel LOUTOCKÝ, Veronika ŽOLNERČÍKOVÁ, Václav STUPKA, František KASL, Aleš ZAVRŠNIK, Ludwig GRAMLICH, Herbert HRACHOVEC, Andreas KIRCHNER, Kristian DANEBACK, Jakub MACEK, Dan Jerker Börje SVANTESSON, Erich SCHWEIGHOFER, David ŠMAHEL, Miroslav MAREŠ, Andreas WIEBE, Monika METYKOVÁ, Alena MACKOVÁ, Hana MACHÁČKOVÁ, Lydia KRAUS, Václav MATYÁŠ and Walter HÖTZENDORFER. Cyberspace 2020. 2020.
    10. HUSÁK, Martin, Martin ŽÁDNÍK, Václav BARTOŠ and Pavol SOKOL. Dataset of intrusion detection alerts from a sharing platform. Data in Brief. Elsevier, 2020, vol. 33, December, p. 1-12. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2020.106530.
    11. JAVORNÍK, Michal, Jana KOMÁRKOVÁ, Lukáš SADLEK and Martin HUSÁK. Decision Support for Mission-Centric Network Security Management. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110261.
    12. KRAUS, Lydia, Martin UKROP, Václav MATYÁŠ and Tobias FIEBIG. Evolution of SSL/TLS Indicators and Warnings in Web Browsers. In Anderson, J., Stajano, F., Christianson, B., Matyáš, V. 27th International Workshop on Security Protocols (SPW 2019). Switzerland: Springer International Publishing, 2020, p. 267-280. ISBN 978-3-030-57042-2. Available from: https://dx.doi.org/10.1007/978-3-030-57043-9_25.
    13. HUSÁK, Martin. Graph-based models in prediction and projection of cyber attacks. In The 1st International Workshop on Graph-based network Security. 2020.
    14. MOTSCHNIG, Renate, Michael SILBER and Valdemar ŠVÁBENSKÝ. How Does a Student-Centered Course on Communication and Professional Skills Impact Students in the Long Run?. Online. In 2020 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2020, p. 1-9. ISBN 978-1-7281-8961-1. Available from: https://dx.doi.org/10.1109/FIE44824.2020.9273962.
    15. ČELEDA, Pavel, Jan VYKOPAL, Valdemar ŠVÁBENSKÝ and Karel SLAVÍČEK. KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 1026-1032. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366908.
    16. FRIÁK, Martin, Dušan LAGO, Nikola KOUTNÁ, David HOLEC, Tomáš REBOK and Mojmír ŠOB. Multi-phase ELAStic Aggregates (MELASA) software tool for modeling anisotropic elastic properties of lamellar composites. Computer Physics Communications. Amsterdam: Elsevier, 2020, vol. 247, FEB 2020, p. 1-9. ISSN 0010-4655. Available from: https://dx.doi.org/10.1016/j.cpc.2019.106863.
    17. ČELEDA, Pavel, Andrej TOMČI, Daniel IĽKOVIČ, Matěj GROMAN and Lubomír POSPÍŠIL. Nástroj pro simulaci chování průmyslových komponent (Tool for Simulating of Industrial Components). 2020.
    18. PLESNÍK, Tomáš and Vít RUSŇÁK. Nettmap2 - Interaktivní nástroj pro zobrazení síťové topologie vizualizující data z Flowmon řešení (Nettmap2 - An interactive tool for displaying network topology using data visualization from Flowmon's solution). 2020.
    19. LAŠTOVIČKA, Martin, Martin HUSÁK and Lukáš SADLEK. Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110394.
    20. VELAN, Petr and Tomáš JIRSÍK. On the Impact of Flow Monitoring Configuration. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Budapešť: IEEE Xplore Digital Library, 2020, p. 1-7. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110361.
    21. HUSÁK, Martin and Pavel ČELEDA. Predictions of Network Attacks in Collaborative Environment. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110472.
    22. HUSÁK, Martin, Tomáš BAJTOŠ, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. ACM Transactions on Management Information Systems. Association for Computing Machinery, 2020, vol. 11, No 4, p. 1-16. ISSN 2158-656X. Available from: https://dx.doi.org/10.1145/3386250.
    23. THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysztof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI and Fabio DE GASPARI. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems. Online. In Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman. Adaptive Autonomous Secure Cyber Systems. Cham: Springer International Publishing, 2020, p. 1-21. ISBN 978-3-030-33432-1. Available from: https://dx.doi.org/10.1007/978-3-030-33432-1_1.
    24. DRAŠAR, Martin, Stephen MOSKAL, Shanchieh Jay YANG and Pavol ZAŤKO. Session-level Adversary Intent-Driven Cyberattack Simulator. Online. In Dusan Maga, Jiri Haek. DS-RT '20: Proceedings of the IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications. Praha: IEEE, 2020, p. 7-15. ISBN 978-1-7281-7343-6.
    25. ČELEDA, Pavel, Kamil ANDONIADIS, Attila FARKAS, Jana ZIKOVÁ, Martin MADZIA, Matěj GROMAN, Andrej TOMČI and Lubomír POSPÍŠIL. Simulační prostředí pro testování průmyslových aplikací (Simulation Environment for Testing Industrial Applications). 2020.
    26. LAŠTOVIČKA, Martin, Jakub Bartolomej KOŠUTH, Daniel FILAKOVSKÝ, Antonín DUFKA and Martin HUSÁK. Software pro evidenci zranitelností v počítačové síti (Software for enumerating vulnerabilities in a computer network). 2020.
    27. VELAN, Petr, Petr ŠPRINGL, Jan FRÜHBAUER, Tomáš JÁNSKÝ and Boris PARÁK. Software pro generování IP toků v cloudovém prostředí (Software for IP flow generation in a cloud environment). 2020.
    28. SADLEK, Lukáš, Michal JAVORNÍK and Martin HUSÁK. Software pro podporu rozhodování při řešení bezpečnostního incidentu (Software for the decision support in the security incident handling). 2020.
    29. VELAN, Petr, Petr ŠPRINGL, Jan FRÜHBAUER and Miloš DOLINSKÝ. Software pro sběr dat z vestavěných monitorovacích služeb cloudových platforem (Software for data collection from built-in monitoring services of cloud platforms). 2020.
    30. HUSÁK, Martin, Tomáš JIRSÍK and Shanchieh Jay YANG. SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security. Online. In Proceedings of the 15th International Conference on Availability, Reliability and Security. New York, NY, United States: Association for Computing Machinery, 2020, p. 1-10. ISBN 978-1-4503-8833-7. Available from: https://dx.doi.org/10.1145/3407023.3407062.
    31. UKROP, Martin, Valdemar ŠVÁBENSKÝ and Imrich NAGY. Teaching Lab: Training Novice Computer Science Teachers. In Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE ’20). 2020. ISBN 978-1-4503-6874-2. Available from: https://dx.doi.org/10.1145/3341525.3393967.
    32. TOVARŇÁK, Daniel, Stanislav ŠPAČEK and Jan VYKOPAL. Traffic and Log Data Captured During a Cyber Defense Exercise. Data in Brief. 2020, vol. 31, August, p. 1-11. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2020.105784.
    33. LAŠTOVIČKA, Martin, Stanislav ŠPAČEK, Petr VELAN and Pavel ČELEDA. Using TLS Fingerprints for OS Identification in Encrypted Traffic. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110319.
    34. MATTA, Lukáš and Martin HUSÁK. Webová aplikace pro vizualizaci bezpečnostní situace v počítačové síti (Web application for the visualization of security situation in computer network). 2020.
    35. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL and Pavel ČELEDA. What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 2-8. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366816.
    36. UKROP, Martin, Lydia KRAUS and Václav MATYÁŠ. Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version). Digital Threats: Research and Practice. New York, NY, USA: Association for Computing Machinery, 2020, vol. 1, No 4, p. 1-29. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3419472.

    2019

    1. VODÁK, Rostislav, Michal BÍL, Tomáš SVOBODA, Zuzana KŘIVÁNKOVÁ, Jan KUBEČEK, Tomáš REBOK and Petr HLINĚNÝ. A deterministic approach for rapid identification of the critical links in networks. PLOS ONE. United States: Public Library of Science, 2019, vol. 14, No 7, p. 1-18. ISSN 1932-6203. Available from: https://dx.doi.org/10.1371/journal.pone.0219658.
    2. HUSÁK, Martin and Jaroslav KAŠPAR. AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "81:1"-"81:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340513.
    3. TOVARŇÁK, Daniel. An Algorithm for Message Type Discovery in Unstructured Log Data. Online. In Proceedings of the 14th International Conference on Software Technologies - Volume 1: ICSOFT. Prague: SciTePress, 2019, p. 665-676. ISBN 978-989-758-379-7. Available from: https://dx.doi.org/10.5220/0007919806650676.
    4. ŠVÁBENSKÝ, Valdemar. Analyzing User Interactions with Cybersecurity Games. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). 2019. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3293717.
    5. VELAN, Petr and Pavel ČELEDA. Application-Aware Flow Monitoring. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 701-706. ISBN 978-1-72810-618-2.
    6. SMERIGA, Juraj and Tomáš JIRSÍK. Behavior-Aware Network Segmentation using IP Flows. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2019, p. 1-9. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3339265.
    7. REBOK, Tomáš. Big Data - overview, basic concepts and practical use in research. In Alliance4Life 5th project meeting. 2019.
    8. BOU-HARB, Elias, Martin HUSÁK, Mourad DEBBABI and Chadi ASSI. Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Transactions on Big Data. IEEE, 2019, vol. 5, No 4, p. 439-453. ISSN 2332-7790. Available from: https://dx.doi.org/10.1109/TBDATA.2017.2723398.
    9. DRAŠAR, Martin, Ádám RUMAN, Adam SKRÁŠEK and Matúš GALBA. CEP-Server: Software pro vyhodnocování a dotazování komplexních událostí v doméně ITOA (CEP-Server: Software for evaluation and querying of complex events in the ITOA domain). 2019.
    10. JAVORNÍK, Michal, Jana KOMÁRKOVÁ and Martin HUSÁK. Decision Support for Mission-Centric Cyber Defence. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "34:1"-"34:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340522.
    11. KYSELÁK, Martin, Miloslav FILKA, DAvid GRENAR, Karel SLAVÍČEK, Čestmír VLČEK, Milan ČUČKA and Jiří VÁVRA. Defensive perimeter detection by polarization change of the fibre optic signal. In SPIE Remote Sensing Technologies and Applications in Urban Environments. Online. In SPIE Remote Sensing Technologies and Applications in Urban Environments IV. 2019. Strasbourg: SPIE, 2019, p. 1-6. ISBN 978-1-5106-3017-8. Available from: https://dx.doi.org/10.1117/12.2532529.
    12. ŠPAČEK, Stanislav, Vít RUSŇÁK and Anna-Marie DOMBAJOVÁ. DNS Firewall Data Visualization. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, p. 743-744. ISBN 978-1-7281-0618-2.
    13. ČELEDA, Pavel, Petr VELAN, Benjamin KRÁL and Ondřej KOZÁK. Enabling SSH Protocol Visibility in Flow Monitoring. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 569-574. ISBN 978-1-72810-618-2.
    14. SLAVÍČEK, Karel and Otto DOSTÁL. Ensuring security of a telemedicine project in compliance with GDPR. 2019.
    15. KOŠČÍK, Michal, Radim POLČÁK, Václav STUPKA, Matěj MYŠKA, Pavel LOUTOCKÝ and Jan ZIBNER. European ICT law - thirteenth edition. Plzeň: Vydavatelství Aleš Čeněk, 2019.
    16. MAMULA, Ondřej, David HRYCEJ, Martin STŘELEC, Tomáš PITNER, František KASL, Václav STUPKA and Filip PROCHÁZKA. Flexibilita známá a neznámá (Flexibility known and unknown). All for Power. Praha: AF POWER agency, a.s., 2019, vol. 13, No 4, p. 57-61. ISSN 1802-8535.
    17. HORÁK, Martin, Václav STUPKA and Martin HUSÁK. GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "36:1"-"36:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340516.
    18. DRAŠAR, Martin and Tomáš JIRSÍK. IT Operations Analytics: Root Cause Analysis via Complex Event Processing. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 741-742. ISBN 978-1-72810-618-2.
    19. DOSTÁL, Otto, Karel SLAVÍČEK and Otto DOSTÁL. MeDiMed. Elektrorevue. International Society for Science and Engineering o.s., 2019, vol. 21, No 4, p. 114-119. ISSN 1213-1539.
    20. HORA, Tomáš, Pavel PIPERIS and Karel SLAVÍČEK. Měřící modul pro testování závislosti spektrální citlivosti fotodetektoru na prostředí (Measurement module for testing of dependency of photodetector spectral sensitivity on environment). 2019.
    21. HORA, Tomáš, Pavel PIPERIS and Karel SLAVÍČEK. Modul pro měření závislosti optickcýh vlastností infračervené diody na prostředí (Measurement module for testing of dependency of infrared diode transmission specta on environment). 2019.
    22. ČELEDA, Pavel, Jakub ČEGAN, Martin MACHÁČ, Jana MEDKOVÁ, Ivo NUTÁR, Tomáš PLESNÍK, Daniel TOVARŇÁK and Martin VIZVÁRY. Nástroj pro zmírňování a potlačování útoků na kritickou informační infrastrukturu (Tool for mitigation and suppression of attacks on critical information infrastructure). 2019.
    23. ČELEDA, Pavel, Jakub ČEGAN, Martin DRAŠAR, Ivo NUTÁR, Jiří RÁJA, Tomáš REBOK, Andrej TOMČI and Daniel TOVARŇÁK. Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury (Tools for verification of SW/HW security and simulation of attacks on critical information infrastructure). 2019.
    24. TOVARŇÁK, Daniel and Tomáš PITNER. Normalization of Unstructured Log Data into Streams of Structured Event Objects. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 671-676. ISBN 978-1-72810-618-2.
    25. JIRSÍK, Tomáš, Štěpán TRČKA and Pavel ČELEDA. Quality of Service Forecasting with LSTM Neural Network. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 251-260. ISBN 978-1-72810-618-2.
    26. ČERMÁK, Milan, Martin LAŠTOVIČKA and Tomáš JIRSÍK. Real-time Pattern Detection in IP Flow Data using Apache Spark. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 521-526. ISBN 978-1-7281-0618-2.
    27. UKROP, Martin, Valdemar ŠVÁBENSKÝ and Jan NEHYBA. Reflective Diary for Professional Development of Novice Teachers. Online. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). Minneapolis, Minnesota, USA: ACM, 2019, p. 1088-1094. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3287448.
    28. GRENAR, David, Martin KYSELÁK and Karel SLAVÍČEK. Sensor system for measuring temperature changes using alternative detection of polarization changes. Online. In SPIE Future Sensing Technologies. Tokyo: SPIE, 2019, p. 1-3. ISBN 978-1-5106-3111-3. Available from: https://dx.doi.org/10.1117/12.2547319.
    29. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Michal BERAN, František HRDINA, Tomáš JIRSÍK, Daniel KOUŘIL, Michal MAZOUREK, Radek OŠLEJŠEK, Michal PROCHÁZKA, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Vadim JANOVSKIJ and Kristína ZÁKOPČANOVÁ. Software pro detekci a analýzu napadení KII (Software for detection and analysis of attacks on critical information infrastructures). 2019.
    30. HUSÁK, Martin, Jaroslav KAŠPAR and Milan ŽIARAN. Software pro inteligentní analýzu bezpečnostních událostí (iABU) (Software for the intelligent analysis of security events (iABU)). 2019.
    31. ČELEDA, Pavel, Jakub ČEGAN, Karolína DOČKALOVÁ BURSKÁ, Jan DUDA, Martin HAMERNÍK, Miroslava JAREŠOVÁ, Erik KOČAMBA, Radek OŠLEJŠEK, Vít RUSŇÁK, Daniel TOVARŇÁK, Hai Duong TRAN, Jan VYKOPAL and Kristína ZÁKOPČANOVÁ. Software pro provádění bezpečnostních cvičení a školení (Software for realization of cybersecurity exercises and trainings). 2019.
    32. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Milan ČERMÁK, Jan DUDA, Vlastimil HOLER, Ľuboš HYŽÁK, Boris JADUŠ, Jakub KADAŠI, David LEŠKA, Martin MACHÁČ, Ivo NUTÁR, Radek OŠLEJŠEK, Dominik PILÁR, Tomáš PLESNÍK, Michal PROCHÁZKA, Tomáš REBOK, Vít RUSŇÁK, Miloslav STANĚK, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Jan VYKOPAL and Tatiana ZBONČÁKOVÁ. Software pro simulaci obecných i kritických informačních infrastruktur (Software for simulation of generic and critical information infrastructures). 2019.
    33. HUSÁK, Martin, Jana KOMÁRKOVÁ, Elias BOU-HARB and Pavel ČELEDA. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys & Tutorials. IEEE, 2019, vol. 21, No 1, p. 640-660. ISSN 1553-877X. Available from: https://dx.doi.org/10.1109/COMST.2018.2871866.
    34. BARTOŠ, Václav, Martin ŽÁDNÍK, Pavel KROBOT, Lukáš HUTÁK, Martin HUSÁK, Jaroslav KAŠPAR and Petr VELAN. Systém pro sdílení a analýzu bezpečnostních událostí (System for sharing and analysis of network security alerts). 2019.
    35. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL and Pavel ČELEDA. Towards Learning Analytics in Cybersecurity Capture the Flag Games. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). 2019. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3293816.
    36. ČERMÁK, Milan. Trace-Share: Towards Provable Network Traffic Measurement and Analysis. 2019.
    37. MAMULA, Ondřej, David HRYCEJ, Martin STŘELEC, Tomáš PITNER, František KASL, Václav STUPKA and Filip PROCHÁZKA. Uplatnění agregované flexibility pro PpS a na trzích s energiemi bez negativního vlivu na provozní parametry sítí (Applying aggregated flexibility for auxiliary services and energy markets without adversely affecting network operating parameters). Energetika. Praha: Český svaz zaměstnavatelů v energetice, 2019, vol. 69, No 5, p. 308-311. ISSN 0375-8842.
    38. POLČÁK, Radim, František KASL, Pavel LOUTOCKÝ, Jakub MÍŠEK and Václav STUPKA. Virtualizace právních vztahů a nové regulatorní metody v pozitivním právu (Virtualization of Legal Relations and New Regulatory Methods in Positive Law). Právník. AV ČR, Ústav státu a práva, 2019, vol. 158, No 1, p. 86-98. ISSN 0231-6625.
    39. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína BURSKÁ, Valdemar ŠVÁBENSKÝ and Jan VYKOPAL. Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. Online. In Gove R., Arendt D., Kohlhammer J., Angelini M., Lyn Paul, C., Bryan C. McKenna S., Prigent N., Najafi P., Sopan A. 2019 IEEE Symposium on Visualization for Cyber Security (VizSec). Vancouver, BC, Canada: IEEE, 2019, p. 1-11. ISBN 978-1-7281-3876-3. Available from: https://dx.doi.org/10.1109/VizSec48167.2019.9161386.

    2018

    1. HARAŠTA, Jakub, Jaromír ŠAVELKA, František KASL, Adéla KOTKOVÁ, Pavel LOUTOCKÝ, Jakub MÍŠEK, Daniela PROCHÁZKOVÁ, Helena PULLMANNOVÁ, Petr SEMENIŠÍN, Tamara ŠEJNOVÁ, Nikola ŠIMKOVÁ, Michal VOSINEK, Lucie ZAVADILOVÁ and Jan ZIBNER. Annotated Corpus of Czech Case Law for Reference Recognition Tasks. Online. In Sojka, P., Horák, A., Kopeček, I., Pala, K. Text, Speech, and Dialogue: 21st International Conference. Cham: Springer Nature Switzerland AG, 2018, p. 239-250. ISBN 978-3-030-00793-5. Available from: https://dx.doi.org/10.1007/978-3-030-00794-2_26.
    2. HUSÁK, Martin, Nataliia NESHENKO, Morteza SAFAEI POUR, Elias BOU-HARB and Pavel ČELEDA. Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "29:1"-"29:6", 6 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3230837.
    3. KASL, František. Blockchain, společenská smlouva digitálního věku? (Blockchain, social contract of the digital age?). Revue pro právo a technologie. Masarykova univerzita, 2018, vol. 9, No 17, p. 3-18. ISSN 1804-5383. Available from: https://dx.doi.org/10.5817/RPT2018-1-1.
    4. PORTESI, Silvia, Václav STUPKA, Philip ANDERSON, François BEAUVOIS, Efthymios LALAS, Catalin PATRASCU, Andreas SFAKIANAKIS, Silvia SIGNORATO and Koen VAN IMPE. Cooperation between CSIRTs and Law Enforcement: interaction with the Judiciary. Greece: European Union Agency for Network and Information Security, 2018, 102 pp. ISBN 978-92-9204-259-2. Available from: https://dx.doi.org/10.2824/274312.
    5. KOMÁRKOVÁ, Jana, Martin HUSÁK, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. CRUSOE: Data Model for Cyber Situation Awareness. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "36:1"-"36:10", 10 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3232798.
    6. KASL, František. Cybersecurity of Small and Medium Enterprises in the Era of Internet of Things. The Lawyer Quarterly. Praha: Institute of State and Law of the Academy of Sciences of the Czech Republic, 2018, vol. 8, No 2, p. 165-188. ISSN 1805-8396.
    7. MINISTR, Jan, Tomáš PITNER and Nikola ŠIMKOVÁ. Cybersecurity Qualifications. Online. In Ministr Jan, Tvrdíková Milena. Proceedings of the 21st International Conference on Information Technology for Practice. Ostrava: VŠB-Technical University of Ostrava, 2018, p. 141-146. ISBN 978-80-248-4196-0.
    8. LOUTOCKÝ, Pavel, Jakub MÍŠEK and František KASL. Czech Republic. Online. In J.L. da Cruz Vilaça, R. L. Vasconcelos, M. Gorjão-Henriques, A. Saavedra. The internal market and the digital economy: XXVIII FIDE Congress Lisbon/Estoril (23-26 may 2018) Congress proceedings Vol. 1. Coimbra: Almedina, 2018, p. 285-315. Congress proceedings Vol. 1. ISBN 978-972-40-7478-8.
    9. NESHENKO, Nataliia, Martin HUSÁK, Elias BOU-HARB, Pavel ČELEDA, Sameera AL-MULLA and Claude FACHKHA. Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations. Online. In 2018 IEEE Globecom Workshops. Abu Dhabi: IEEE, 2018, p. 1-7. ISBN 978-1-5386-4920-6. Available from: https://dx.doi.org/10.1109/GLOCOMW.2018.8644468.
    10. KASL, František and Pavel LOUTOCKÝ. Distanční výkon práv u obchodních společností při využití elektronických prostředků (The distance performance of the rights in the case of companies with the help of electronic means). In COFOLA 2018. 2018.
    11. KASL, František. eJustice in the light of GDPR. In Cyberspace 2018. 2018.
    12. KOŠČÍK, Michal, Radim POLČÁK, Václav STUPKA, Matěj MYŠKA, Pavel LOUTOCKÝ and Jan ZIBNER. European ICT Law 2018: Texts, Cases, Materials. Brno: Masarykova univerzita, 2018, 404 pp.
    13. OŠLEJŠEK, Radek, Jan VYKOPAL, Karolína BURSKÁ and Vít RUSŇÁK. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. Online. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18). San Jose, California, USA: IEEE, 2018, p. 1-9. ISBN 978-1-5386-1173-9. Available from: https://dx.doi.org/10.1109/FIE.2018.8659299.
    14. ŠTERUSKÁ, Jana, Nikola ŠIMKOVÁ, Tomáš PITNER and Jan MINISTR. How to Make Academic-Industrial Collaboration More Effective? In Doucek Petr, Chroust Gerhard, Oškrdal Václav. 26th Interdisciplinary Information Management Talks (IDIMT) 2018 Strategic Modeling in Management, Economy and Society. Linz: Trauner Verlag, 2018, p. 81-86. ISBN 978-3-99062-339-8.
    15. KASL, František. INFORM: Ochrana osobních údajů z hlediska soudů a praktikujících právníků – Část 1. (INFORM: Personal data protection from the perspective of courts and legal practitioners - Part I.). 2018.
    16. KASL, František. INFORM: Ochrana osobních údajů z hlediska soudů a praktikujících právníků – Část 2. (INFORM: Personal data protection from the perspective of courts and legal practitioners - Part 2). 2018.
    17. KOTT, Alexander, Paul THERÓN, Luigi V MANCINI, Martin DRAŠAR, Edlira DUSHKU, Günther HEIKO, Markus KONT, Benoît LEBLANC, Agostino PANICO, Mauno PIHELGAS and Krzysztof RZADCA. Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense. 2018.
    18. PITNER, Tomáš, Jan MINISTR, Jan TOMÁŠEK, Martin LHOTÁK and Vyacheslav CHAPLYHA. Innovation of the Information System in the Field of Data Archiving. In Doucek Petr, Chroust Gerhard, Oškrdal Václav. 26th Interdisciplinary Information Management Talks (IDIMT) 2018 Strategic Modeling in Management, Economy and Society. Linz, Österreich/Austria: Johannes Kepler Universität Linz, 2018, p. 127-135. ISBN 978-3-99062-339-8.
    19. KASL, František. Legal Limitations of Algorithmic Analytical Tools Against Disinformation. In Law via Internet. 2018.
    20. KASL, František. Některé problematické aspekty současného vývoje eJustice (Selected problematic aspects of the current development of eJustice). Správní právo. Praha: Ministerstvo vnitra, 2018, vol. 51, 4-5, p. 268-278. ISSN 0139-6005.
    21. KASL, František. Obsah internetu má být regulován (The internet content should be regulated). In Masarykovy debaty. 2018.
    22. LAŠTOVIČKA, Martin, Tomáš JIRSÍK, Pavel ČELEDA, Stanislav ŠPAČEK and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Methods in the Jungle of Wireless Networks. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 9 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406262.
    23. KASL, František. Personal Data Breach in the Era of Internet of Things. In Internationales Rechtsinformatik Symposion IRIS 2018. 2018.
    24. KASL, František. Povaha sdělení o zamítnutí výmazu osobních údajů (The form of notice on denial of erasure of personal data). Brno: Masarykova Univerzita, 2018, p. 55-64. Available from: https://dx.doi.org/10.5817/RPT2018-2-3.
    25. KASL, František and Jiří MAREK. Právní rámec veřejně iniciovaného rozvoje chytrého města (Legal framework of publicly initiated development of smart city). In České právo a informační technologie. 2018.
    26. POLČÁK, Radim, Matěj MYŠKA, Petr HOSTAŠ, František KASL, Tereza KYSELOVSKÁ, Tomáš LECHNER, Pavel LOUTOCKÝ, Jakub MÍŠEK, Jan TOMÍŠEK, Václav STUPKA and Miroslav UŘIČAŘ. Právo informačních technologií (Information Technology Law). Praha: Wolters Kluwer, 2018, 656 pp. Právní monografie. ISBN 978-80-7598-045-8.
    27. GALAJDOVÁ, Dominika, František KASL, Pavel LOUTOCKÝ, Jakub MÍŠEK, Tereza NOVOTNÁ, Jan ZIBNER and Veronika ŽOLNERČÍKOVÁ. Přehled aktuální judikatury II/2018 (Overview of the Current Case Law II/2018). Brno: Masarykova univerzita, 2018, p. 65-91.
    28. GALAJDOVÁ, Dominika, František KASL, Pavel LOUTOCKÝ, Jakub MÍŠEK, Anna ŠTEFANIDESOVÁ and Jan ZIBNER. Přehled aktuální judikatury I/2018 (Overview of the Current Case Law I/2018). Brno: Masarykova univerzita, 2018, p. 59-89.
    29. VELAN, Petr, Martin HUSÁK and Daniel TOVARŇÁK. Rapid Prototyping of Flow-Based Detection Methods Using Complex Event Processing. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. 1-3. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406121.
    30. CHREN, Stanislav, Bruno ROSSI, Barbora BÜHNOVÁ and Tomáš PITNER. Reliability Data for Smart Grids: Where the Real Data can be Found. Online. In Ruzicka, J. 2018 Smart City Symposium Prague (SCSP). New York: IEEE, 2018, p. 1-6. ISBN 978-1-5386-5017-2. Available from: https://dx.doi.org/10.1109/SCSP.2018.8402648.
    31. HANZELKA, Jan and František KASL. Sekuritizace a právní nástroje pro boj s projevy nenávisti na internetu v Německu : O diskurzu od pojetí platforem sociálních médií jako „nástrojů zneužívaných k šíření extremismu“ k vnímání jejich „odpovědnosti za projevy nenávisti“. (Securitization and legal instruments for combat of hate speech on the internet in Germany: About the discourse from the perception of the social media as "tools abused for dissemination of extremism" to undertanding of their "liability for hate speech"). Acta Politologica. Praha: Fakulta sociálních věd Univerzity Karlovy, 2018, vol. 10, No 3, p. 20-46. ISSN 1804-1302. Available from: https://dx.doi.org/10.14712/1803-8220/15_2018.
    32. KUČERA, Adam and Tomáš PITNER. Semantic BMS: Allowing usage of building automation data in facility benchmarking. Advanced Engineering Informatics. 2018, vol. 35, January, p. 69-84. ISSN 1474-0346. Available from: https://dx.doi.org/10.1016/j.aei.2018.01.002.
    33. SCHVARCBACHER, Martin, Katarína HRABOVSKÁ, Bruno ROSSI and Tomáš PITNER. Smart Grid Testing Management Platform (SGTMP). Applied Sciences-Basel. BASEL, SWITZERLAND: MDPI AG, 2018, vol. 8, No 11, p. 1-23. ISSN 2076-3417. Available from: https://dx.doi.org/10.3390/app8112278.
    34. JIRSÍK, Tomáš. Stream4Flow: Real-time IP Flow Host Monitoring using Apache Spark. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE, 2018, p. 1-2. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406132.
    35. PITNER, Tomáš, Mirjana IVANOVIČ, Miloš SAVIĆ and Stelios XINOGALOS. Students’ perspective on the first programming language: C-like or Pascal-like languages? Journal Education and Information Technologies. New York, USA: Springer US, 2018, vol. 23, No 1, p. 287-302. ISSN 1360-2357. Available from: https://dx.doi.org/10.1007/s10639-017-9601-6.
    36. ŠPAČEK, Stanislav and Pavel ČELEDA. Threat Detection Through Correlation of Network Flows and Logs. Online. In Burkhard Stiller. Proceedings of the 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018). Neuveden: IFIP, 2018, p. 6-10. ISBN 978-3-903176-12-6.
    37. JIRSÍK, Tomáš, Štěpán TRČKA and Pavol ZAŤKO. Time Series Analyzer: Software for analysis of performance time series. 2018.
    38. JIRSÍK, Tomáš and Pavel ČELEDA. Toward Real-time Network-wide Cyber Situational Awareness. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE, 2018, p. 1-7. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406166.
    39. THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysytof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI and Agostino PANICO. Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. Online. In 2018 International Conference on Military Communications and Information Systems (ICMCIS). Warsaw, Poland: IEEE, 2018, p. 1-9. ISBN 978-1-5386-4559-8. Available from: https://dx.doi.org/10.1109/ICMCIS.2018.8398730.
    40. KADLEC, Miroslav, Jan ROSECKÝ, Filip PROCHÁZKA, Barbora BÜHNOVÁ and Tomáš PITNER. Towards Discovering the Limits of Smart Grid Communication Infrastructure. In Gandolfo Dominici. Governing Business Systems. Cham, Switzerland: Springer, 2018, p. 87-99. ISBN 978-3-319-66034-9. Available from: https://dx.doi.org/10.1007/978-3-319-66036-3_5.
    41. ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR and Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, p. 1-8. ISBN 978-3-903176-09-6. Available from: https://dx.doi.org/10.23919/TMA.2018.8506498.

    2017

    1. KASL, František. Bludiště na cestě k přiměřenému zabezpečení zpracování osobních údajů (Labyrinth towards the appropriate security of personal data processing). In České právo a informační technologie. 2017.
    2. KRÁL, Jaroslav, Tomáš PITNER and Michal ŽEMLIČKA. Document-Oriented Middleware: The Way to High-Quality Software. In International Conference on Computational Science and Its Applications. 1st ed. Cham: Springer, Cham, 2017, p. 607-619. ISBN 978-3-319-62403-7. Available from: https://dx.doi.org/10.1007/978-3-319-62404-4_45.
    3. HŘEBÍČEK, Jiří, Ralf DENZER, Gerald SCHIMAK and Tomáš PITNER. Environmental Software Systems. Computer Science for Environmental Protection12th IFIP WG 5.11 International Symposium. In IFIPAICT, volume 507. 1st ed. Cham: Springer, Cham, 2017, 486 pp. ISBN 978-3-319-89934-3. Available from: https://dx.doi.org/10.1007/978-3-319-89935-0.
    4. KASL, František. European Smart Regulation of the Distributed Ledger Technology in the Financial Sector. In Internationales Rechtsinformatik Symposion IRIS 2017. 2017.
    5. PITNER, Tomáš, Jan MINISTR and Andreja PUCIHAR. Innovation and diversity. In Doucek Petr, Chroust Gerhard, Oškrdal Václav. 25th Interdisciplinary Information Management Talks (IDIMT) 2017 Digitalization in Management, Society and Economy. Linz, Österreich/Austria: Johannes Kepler Universität Linz, 2017, p. 63-69. ISBN 978-3-99062-119-6.
    6. PITNER, Tomáš and Jan MINISTR. Innovation Of The Information Management In Compliance Management Area. In Doucek Petr, Chroust Gerhard, Oškrdal Václav. 25th Interdisciplinary Information Management Talks (IDIMT) 2017 Digitalization in Management, Society and Economy. Linz, Österreich/Austria: Johannes Kepler Universität Linz, 2017, p. 71-78. ISBN 978-3-99062-119-6.
    7. BANGUI, Hind, Mouzhi GE, Barbora BÜHNOVÁ, Said RAKRAK, Said RAGHAY and Tomáš PITNER. Multi-Criteria Decision Analysis Methods in the Mobile Cloud Offloading Paradigm. Journal of Sensor and Actuator Networks. MDPI, 2017, vol. 6, No 4, p. 1-19. ISSN 2224-2708. Available from: https://dx.doi.org/10.3390/jsan6040025.
    8. BARTOŠEK, Miroslav, Michal RŮŽIČKA and Václav STUPKA. Nařízení GDPR a jeho implementace na vysokých školách v ČR – jak na to (GDPR Regulation and its Implementation at Universities in the Czech Republic - how to do it). In EUNIS-CZ. Dopad zavedení novely VŠ zákona do IS vysokých škol. 1st ed. Plzeň: Západočeská univerzita v Plzni, 2017, p. 5-14. ISBN 978-80-261-0713-2.
    9. KASL, František. Obhajitelnost softwarových patentů (Justifiability of software patents). Revue pro právo a technologie. Masarykova univerzita, 2017, vol. 8, No 16, p. 25-41. ISSN 1804-5383. Available from: https://dx.doi.org/10.5817/RPT2017-2-2.
    10. KADLEC, Miroslav, Barbora BÜHNOVÁ and Tomáš PITNER. Planning and Scheduling for Optimizing Communication in Smart Grids. Online. In 12th International Symposium on Environmental Software Systems, ISESS 2017;. Zadar: Springer New York LLC, 2017, p. 446-456. ISBN 978-3-319-89934-3. Available from: https://dx.doi.org/10.1007/978-3-319-89935-0_37.
    11. MINISTR, Jan and Tomáš PITNER. Process Support of Information Security according to COBIT® 5. In NEMEC, R., CHYTILOVA, L. Proceedings of the 12 th International Conference on Strategic Management and its Support by Information Systems 2017. Ostrava, Czech Republic: VŠB – Technical University of Ostrava, Faculty of Economics, 2017, p. 418-424. ISBN 978-80-248-4046-8.
    12. STUPKA, Václav, Martin HORÁK and Martin HUSÁK. Protection of personal data in security alert sharing platforms. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "65:1"-"65:8", 8 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3105822.
    13. GALAJDOVÁ, Dominika, František KASL, Pavel LOUTOCKÝ, Jakub MÍŠEK, Helena PULLMANNOVÁ, Anna ŠTEFANIDESOVÁ and Jan ZIBNER. Přehled aktuální judikatury II/2017 (Overview of the Current Case Law II/2017). Brno: Masarykova univerzita, 2017, 15 pp. Revue pro právo a technologie, roč. 8, č. 16. ISSN 1804-5383.
    14. KUČERA, Adam and Tomáš PITNER. Semantic BMS: Ontology for Analysis of Building Operation Efficiency. In Hřebíček J., Denzer R., Schimak G., Pitner T. Environmental Software Systems. Computer Science for Environmental Protection. Cham: Springer, 2017, p. 349-359. ISBN 978-3-319-89934-3. Available from: https://dx.doi.org/10.1007/978-3-319-89935-0_29.
    15. IVANOVIČ, Mirjana, Stelios XINOGALOS, Tomáš PITNER and Miloš SAVIĆ. Technology enhanced learning in programming courses – international perspective. Education and Information Technologies. New York, NY, USA: Springer US, 2017, vol. 22, No 6, p. 2981-3003. ISSN 1360-2357. Available from: https://dx.doi.org/10.1007/s10639-016-9565-y.
    16. PITNER, Tomáš, Jan MINISTR, Daniel TOVARŇÁK, Filip KŠENZULIAK and Adam KUČERA. Towards a Common Logging and Monitoring Framework for Critical Infrastructures. In Radek Němec, Lucie Chytilová. Strategic Management and its Support by Information Systems (SMSIS). Ostrava: VŠB - Technical University of Ostrava, 2017, p. 488-495. ISBN 978-80-248-4046-8.
    17. OŠLEJŠEK, Radek, Dalibor TOTH, Zdenek EICHLER and Karolína BURSKÁ. Towards a Unified Data Storage and Generic Visualizations in Cyber Ranges. In Mark Scanlon, Nhien-An Le-Khac. Proceedings of the 16th European Conference on Cyber Warfare and Security ECCWS 2017. UK: Academic Conferences and Publishing International Limited, 2017, p. 298-306. ISBN 978-1-911218-43-2.
    18. KASL, František. Towards identification of cybersecurity principles for smart city cyber-physical environment. In Cyberspace Conference 2017. 2017.
    19. KADLEC, Miroslav, Barbora BÜHNOVÁ, Jan TOMŠÍK, Jan HERMAN and Kateřina DRUŽBÍKOVÁ. Weather forecast based scheduling for demand response optimization in smart grids. Online. In Smart City Symposium Prague (SCSP), 2017. Prague: IEEE, 2017, p. 1-6. ISBN 978-1-5386-3825-5. Available from: https://dx.doi.org/10.1109/SCSP.2017.7973867.

    2016

    1. POLČÁK, Radim, Jakub MÍŠEK, Pavel LOUTOCKÝ, Jakub HARAŠTA, Václav STUPKA and Tomáš ABELOVSKÝ. Access to Telecommunication Data in Criminal Justice in Czech Republic and Slovakia. In Sieber, U., von zur Mühlen, N (eds.) Access to Telecommunication Data in Criminal Justice. 1st ed. Berlin: Duncker & Humblot, 2016, p. 247-435. Strafrechtliche Forschungsberichte. ISBN 978-3-428-15143-1.
    2. STUPKA, Václav. AMM and Legal Implications for the Electricity Market. Online. In Björn Johansson, Filip Vencovský. BIR 2016 Workshops and Doctoral Consortium. 1684th ed. CEUR-WS.org, 2016. ISSN 1613-0073.
    3. STUPKA, Václav. Analýza datového provozu jako prevence kybernetických bezpečnostních incidentů (Analysis of data traffic as a cyber security incidents prevention). Data Security Management. Praha: TATE International s.r.o., 2016, vol. 2016, No 3, p. 44-48. ISSN 1211-8737.
    4. ROSSI, Bruno, Stanislav CHREN, Barbora BÜHNOVÁ and Tomáš PITNER. Anomaly Detection in Smart Grid Data: An Experience Report. Online. In The 2016 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2016). Budapest: IEEE, 2016, p. 2313-2318. ISBN 978-1-5090-1897-0. Available from: https://dx.doi.org/10.1109/SMC.2016.7844583.
    5. POLČÁK, Radim, Jakub MÍŠEK, Václav STUPKA, Pavel LOUTOCKÝ and Tomáš ABELOVSKÝ. Interception of electronic communications in the Czech Republic and Slovakia. 1st ed. Brno: Masaryk University, Faculty of Law, 2016, 241 pp. Publications of the Masaryk University, theoretical series, edition Scientia, File No. 573. ISBN 978-80-210-8423-0.
    6. POLČÁK, Radim, Jakub MÍŠEK, Václav STUPKA, Pavel LOUTOCKÝ and Tomáš ABELOVSKÝ. Interception of electronic communications in the Czech Republic and Slovakia. 1st ed. Brno: Masarykova univerzita, 2016, 241 pp. Spisy Právnické fakulty MU (řada teoretická), č. 573. ISBN 978-80-210-8423-0.
    7. STUPKA, Václav. Kybernetická bezpečnost a ochrana kritických energetických infrastruktur. In 13. Letní škola aplikované informatiky Bedřichov. 2016.
    8. STUPKA, Václav. Pojetí počítačového systému v trestním právu a jeho důsledky pro zajišťování elektronických důkazů (Definition of computer system and its relevance for collection of electronic evidence). In Vybrané aspekty kybernetické kriminality. 2016.
    9. POLČÁK, Radim, Jakub HARAŠTA and Václav STUPKA. Právní problémy kybernetické bezpečnosti (Legal issues of cyber security). 1st ed. Brno: Masarykova univerzita, Právnická fakulta, 2016, 215 pp. Spisy PF MU, řada teoretická, Editio Scientia; sv. č. 576. ISBN 978-80-210-8426-1.
    10. POLČÁK, Radim, Jakub HARAŠTA and Václav STUPKA. Právní problémy kybernetické bezpečnosti (Legal issues of cyber security). 1st ed. Brno: Masarykova univerzita, 2016. Spisy PF MU, řada teoretická, Editio Scientia; sv. č. 576. ISBN 978-80-210-8426-1.
    11. MOTSCHNIG, Renate and Tomáš PITNER. Putting learners’ experience at the center of technology enhanced learning, or how students can learn more while enjoying their classes. In Milan Turčáni, Zoltán Balogh, Michal Munk, Ľubomír Benko. DIVAI - 11th International Scientific Conference on Distance Learning in Applied Informatics. Prague, Czechia: Wolters Kluwer, 2016, p. 13-32. ISBN 978-80-7552-249-8.
    12. CHREN, Stanislav, Bruno ROSSI and Tomáš PITNER. Smart grids deployments within EU projects: The role of smart meters. Online. In Milan Koukol. 2016 Smart Cities Symposium Prague (SCSP). Neuveden: IEEE, 2016, p. nestránkováno, 5 pp. ISBN 978-1-5090-1116-2. Available from: https://dx.doi.org/10.1109/SCSP.2016.7501033.
    13. PITNER, Tomáš, Zbyněk KOCUR, Tomáš HÉGR, Václav STUPKA and Barbora BÜHNOVÁ. Studie pro bezpečné poskytování dat z elektroměru zákazníkovi v místě spotřeby (Study for the secure delivery of data from the meter to the customer at the point of consumption). 1st ed. Brno: Česká sdružení regulovaných energetických společností, 2016, 88 pp. (není).
    14. MINISTR, Jan and Tomáš PITNER. The Academic-Industrial Collaboration As An Innovation Instrument. In Doucek Petr, Chroust Gerhard, Oškrdal Václav. IDIMT-2016 Information Technology, Society and Economy Strategic Cross-Influence. Linz: Trauner Verlag, 2016, p. 53-61. ISBN 978-3-99033-869-8.
    15. STUPKA, Václav. Zajištění a uchování dat (Expedited preservation of data). In České právo a informační technologie 2016. 2016.
Display details
Displayed: 26/5/2024 18:25