Your selection contains 132 outcomes. Edit selection.
Filter publications

    2024

    1. LAGRAA, Sofiane, Martin HUSÁK, Hamida SEBA, Satyanarayana VUPPALA, Radu STATE and Moussa OUEDRAOGO. A review on graph-based approaches for network security monitoring and botnet detection. International Journal of Information Security. Springer, 2024, vol. 23, No 1, p. 119-140. ISSN 1615-5262. Available from: https://dx.doi.org/10.1007/s10207-023-00742-7.
    2. RUMAN, Ádám, Martin DRAŠAR, Lukáš SADLEK, Shanchieh Jay YANG and Pavel ČELEDA. Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Online. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. New York, United States: Association for Computing Machinery, 2024, p. 1-11. ISBN 979-8-4007-1718-5. Available from: https://dx.doi.org/10.1145/3664476.3664523.
    3. SADLEK, Lukáš and Pavel ČELEDA. Cyber Key Terrain Identification Using Adjusted PageRank Centrality. Online. In Meyer, N., Grocholewska-Czuryło, A. ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Cham: Springer, 2024, p. 293-306. ISBN 978-3-031-56325-6. Available from: https://dx.doi.org/10.1007/978-3-031-56326-3_21.
    4. DAUBNER, Lukáš, Barbora BÜHNOVÁ and Tomáš PITNER. Forensic experts' view of forensic-ready software systems: A qualitative study. Journal of Software: Evolution and Process. HOBOKEN: WILEY, 2024, vol. 36, No 5, p. 1-23. ISSN 2047-7473. Available from: https://dx.doi.org/10.1002/smr.2598.
    5. DAUBNER, Lukáš, Sofija MAKSOVIĆ, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš SEDLÁČEK. Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design. Online. In International Conference on Research Challenges in Information Science (RCIS 2024). Neuveden: Springer, 2024, p. 47–55. ISBN 978-3-031-59467-0. Available from: https://dx.doi.org/10.1007/978-3-031-59468-7_6.
    6. DAUBNER, Lukáš, Sofija MAKSOVIĆ and Tomáš SEDLÁČEK. FREAS: Forensic-Ready Analysis Suite. 2024.
    7. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Martin HORÁK, Martin HOFBAUER and Pavel ČELEDA. From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24). New York, NY, USA: ACM, 2024, p. 213-219. ISBN 979-8-4007-0600-4. Available from: https://dx.doi.org/10.1145/3649217.3653639.
    8. SADLEK, Lukáš, Martin HUSÁK and Pavel ČELEDA. Identification of Device Dependencies Using Link Prediction. Online. In NOMS 2024 - 2024 IEEE/IFIP Network Operations and Management Symposium. Seoul, South Korea: IEEE Xplore Digital Library, 2024, p. 1-10. ISBN 979-8-3503-2794-6. Available from: https://dx.doi.org/10.1109/NOMS59830.2024.10575713.
    9. VYKOPAL, Jan, Pavel ČELEDA, Valdemar ŠVÁBENSKÝ, Martin HOFBAUER and Martin HORÁK. Research and Practice of Delivering Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24). New York, NY, USA: ACM, 2024, p. 220-226. ISBN 979-8-4007-0600-4. Available from: https://dx.doi.org/10.1145/3649217.3653642.
    10. HUSÁK, Martin, Mohamed-Lamine MESSAI and Hamida SEBA. The 5th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2024). 2024.
    11. HUSÁK, Martin. Theory and Practice of Cybersecurity Knowledge Graphs and Further Steps. In ARES 2024: The 19th International Conference on Availability, Reliability and Security. 2024.
    12. HUSÁK, Martin, Shanchieh Jay YANG, Joseph KHOURY, Dorde KLISURA and Elias BOU-HARB. Unraveling Network-based Pivoting Maneuvers: Empirical Insights and Challenges. Online. In Sanjay Goel, Paulo Roberto Nunes de Souza. Digital Forensics and Cyber Crime. Cham: Springer, 2024, p. 132-151. ISBN 978-3-031-56582-3. Available from: https://dx.doi.org/10.1007/978-3-031-56583-0_9.

    2023

    1. DAUBNER, Lukáš, Raimundas MATULEVICIUS, Barbora BÜHNOVÁ, Matej ANTOL, Michal RŮŽIČKA and Tomáš PITNER. A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture. Online. In Advanced Information Systems Engineering. Cham: Springer Nature Switzerland, 2023, p. 522-538. ISBN 978-3-031-34559-3. Available from: https://dx.doi.org/10.1007/978-3-031-34560-9_31.
    2. DAUBNER, Lukáš, Matulevičius RAIMUNDAS and Barbora BÜHNOVÁ. A Model of Qualitative Factors in Forensic-Ready Software Systems. Online. In Research Challenges in Information Science: Information Science and the Connected World. Cham: Springer Nature Switzerland, 2023, p. 308-324. ISBN 978-3-031-33079-7. Available from: https://dx.doi.org/10.1007/978-3-031-33080-3_19.
    3. DAUBNER, Lukáš, Martin MACÁK, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ, Sofija MAKSOVIĆ and Tomáš PITNER. Addressing insider attacks via forensic-ready risk management. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. ENGLAND: ELSEVIER, 2023, vol. 73, March 2023, p. 103433-103449. ISSN 2214-2126. Available from: https://dx.doi.org/10.1016/j.jisa.2023.103433.
    4. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš PITNER. BPMN4FRSS: An BPMN Extension to Support Risk-Based Development of Forensic-Ready Software Systems. Online. In Evaluation of Novel Approaches to Software Engineering. Cham: Springer Nature Switzerland, 2023, p. 20-43. ISBN 978-3-031-36596-6. Available from: https://dx.doi.org/10.1007/978-3-031-36597-3_2.
    5. DAUBNER, Lukáš and Adam POVAŽANEC. Data Loss Prevention Solution for Linux Endpoint Devices. Online. In ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security. United States: Association for Computing Machinery, 2023, p. 1-10. ISBN 979-8-4007-0772-8. Available from: https://dx.doi.org/10.1145/3600160.3605036.
    6. DAUBNER, Lukáš, Barbora BÜHNOVÁ and Tomáš PITNER. Forensic experts' view of forensic-ready software systems: A qualitative study. Journal of Software: Evolution and Process. John Wiley & Sons Ltd., 2023, Neuveden, e2598, p. 1-23. ISSN 2047-7481. Available from: https://dx.doi.org/10.1002/smr.2598.
    7. ČERMÁK, Milan and Petr VELAN. How can network traffic lie? DFRWS EU 2023, 2023.
    8. HUSÁK, Martin, Pavol SOKOL, Martin ŽÁDNÍK, Václav BARTOŠ and Martin HORÁK. Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. Digital Threats: Research and Practice. Association for Computing Machinery, 2023, vol. 4, No 4, p. 1-11. ISSN 2576-5337. Available from: https://dx.doi.org/10.1145/3611391.
    9. HUSÁK, Martin and Michal JAVORNÍK. Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection. Online. In 2023 IEEE Conference on Communications and Network Security (CNS). New York, NY: IEEE, 2023, p. 1-6. ISBN 979-8-3503-3945-1. Available from: https://dx.doi.org/10.1109/CNS59707.2023.10288665.
    10. HUSÁK, Martin, Joseph KHOURY, Ðorđe KLISURA and Elias BOU-HARB. On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics. Online. In Pierre Collet, Latafat Gardashova, Samer El Zant, Ulviya Abdulkarimova. Complex Computational Ecosystems. Cham, Switzerland: Springer Nature, 2023, p. 167-179. ISBN 978-3-031-44354-1. Available from: https://dx.doi.org/10.1007/978-3-031-44355-8_12.
    11. LAŠTOVIČKA, Martin, Martin HUSÁK, Petr VELAN, Tomáš JIRSÍK and Pavel ČELEDA. Passive Operating System Fingerprinting Revisited: Evaluation and Current Challenges. Computer Networks. Netherlands: Elsevier, 2023, vol. 229, No 109782, p. 1-12. ISSN 1389-1286. Available from: https://dx.doi.org/10.1016/j.comnet.2023.109782.
    12. BOUČEK, Vladimír and Martin HUSÁK. Recommending Similar Devices in Close Proximity for Network Security Management. Online. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Montreal: IEEE, 2023, p. 481-484. ISBN 979-8-3503-3667-2. Available from: https://dx.doi.org/10.1109/WiMob58348.2023.10187729.
    13. HUSÁK, Martin, Mohamed-Lamine MESSAI and Hamida SEBA. The 4th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2023). 2023.
    14. ČERMÁK, Milan, Tatiana FRITZOVÁ, Vít RUSŇÁK and Denisa ŠRÁMKOVÁ. Using relational graphs for exploratory analysis of network traffic data. Forensic Science International: Digital Investigation. 2023, vol. 45, S, p. 1-10. ISSN 2666-2825. Available from: https://dx.doi.org/10.1016/j.fsidi.2023.301563.

    2022

    1. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš PITNER. Business Process Model and Notation for Forensic-Ready Software Systems. Online. In Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering. Setúbal, Portugal: SciTePress, 2022, p. 95-106. ISBN 978-989-758-568-5. Available from: https://dx.doi.org/10.5220/0011041000003176.
    2. HUSÁK, Martin. Complex Networks in Cybersecurity: Applications and Challenges. In ACONTA'22 : First European Conference on Augmented Complex Networks - Trustworthy Analysis. 2022.
    3. HUSÁK, Martin, Lukáš SADLEK, Stanislav ŠPAČEK, Martin LAŠTOVIČKA, Michal JAVORNÍK and Jana KOMÁRKOVÁ. CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling. Computers & Security. Elsevier, 2022, vol. 115, April, p. 1-19. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2022.102609.
    4. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna, Austria: ACM, 2022, p. 1-8. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3544458.
    5. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI and Barbora BÜHNOVÁ. Cybersecurity Analysis via Process Mining: A Systematic Literature Review. Online. In Advanced Data Mining and Applications. Cham, Switzerland: Springer, 2022, p. 393-407. ISBN 978-3-030-95404-8. Available from: https://dx.doi.org/10.1007/978-3-030-95405-5_28.
    6. ŽÁDNÍK, Martin, Jan WRONA, Karel HYNEK, Tomáš ČEJKA and Martin HUSÁK. Discovering coordinated groups of IP addresses through temporal correlation of alerts. IEEE Access. IEEE, 2022, vol. 10, No 1, p. 82799-82813. ISSN 2169-3536. Available from: https://dx.doi.org/10.1109/ACCESS.2022.3196362.
    7. MACÁK, Martin, Lukáš DAUBNER, Júlia JAMNICKÁ and Barbora BÜHNOVÁ. Game Achievement Analysis: Process Mining Approach. Online. In Advanced Data Mining and Applications. Cham: Springer International Publishing, 2022, p. 68-82. ISBN 978-3-030-95407-9. Available from: https://dx.doi.org/10.1007/978-3-030-95408-6_6.
    8. HUSÁK, Martin, Martin LAŠTOVIČKA and Tomáš PLESNÍK. Handling Internet Activism during the Russian Invasion of Ukraine: A Campus Network Perspective. Digital Threats: Research and Practice. New York, NY, USA: ACM, 2022, vol. 3, No 3, p. "17:1-17:5", 5 pp. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3534566.
    9. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Identification of Attack Paths Using Kill Chain and Attack Graphs. Online. In NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2022, p. 1-6. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789803.
    10. ČERMÁK, Milan. Incident Investigation: From Packets to Graph-Based Analysis. In International Workshop on Graph-based network Security (GraSec) in conjunction with IEEE/IFIP Network Operations and Management Symposium NOMS 2022. 2022.
    11. ŠUĽAN, Samuel and Martin HUSÁK. Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "22:1"-"22:6", 6 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3539007.
    12. JAVORNÍK, Michal and Martin HUSÁK. Mission-centric Decision Support in Cybersecurity via Bayesian Privilege Attack Graph. Engineering Reports. John Wiley & Sons, Inc, 2022, vol. 4, No 12, p. "e12538", 25 pp. ISSN 2577-8196. Available from: https://dx.doi.org/10.1002/eng2.12538.
    13. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI and Barbora BÜHNOVÁ. Process Mining Usage in Cybersecurity and Software Reliability Analysis: A Systematic Literature Review. Array. Elsevier Inc., 2022, vol. 13, No 1, p. 1-14. ISSN 2590-0056. Available from: https://dx.doi.org/10.1016/j.array.2021.100120.
    14. HUSÁK, Martin and Milan ČERMÁK. SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "25:1"-"25:10", 10 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3538981.
    15. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER and Ivo NUTÁR. SW pro ovládání nástrojů ofenzivní bezpečnosti (SW for orchestration of offensive security tools). 2022.
    16. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER, Michal DROBŇÁK and Ivo NUTÁR. SW pro statickou verifikaci bezpečnostních opatření (SW for static verification of security measures). 2022.
    17. HUSÁK, Martin and Hamida SEBA. The 3rd International Workshop on Graph-based network Security (GraSec 2022). 2022.
    18. ČERMÁK, Milan. Toward Graph-Based Network Traffic Analysis and Incident Investigation. In DFRWS EU 2022. 2022.

    2021

    1. MATTA, Lukáš and Martin HUSÁK. A Dashboard for Cyber Situational Awareness and Decision Support in Network Security Management. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, p. 716-717. ISBN 978-3-903176-32-4.
    2. DAUBNER, Lukáš, Tomáš PITNER and Jan MINISTR. Aspects of Forensic-Ready Software Systems in Public Service Domain. In Jan Ministr. Proceedings of the 24th International Conference on Information Technology for Practice. Ostrava, Czech Republic: VŠB - Technical University Ostrava, Centre for Information Technology, 2021, p. 139-145. ISBN 978-80-248-4562-3.
    3. ČERMÁK, Milan and Denisa ŠRÁMKOVÁ. GRANEF: Utilization of a Graph Database for Network Forensics. Online. In Sabrina De Capitani di Vimercati, Pierangela Samarati. Proceedings of the 18th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2021, p. 785-790. ISBN 978-989-758-524-1. Available from: https://dx.doi.org/10.5220/0010581807850790.
    4. TOVARŇÁK, Daniel, Lukáš SADLEK and Pavel ČELEDA. Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021). Washington DC, USA: IEEE, 2021, p. 986-991. ISBN 978-3-903176-32-4.
    5. ČERMÁK, Milan. Graph-based Network Traffic Analysis for Incident Investigation. In The 16th International Conference on Availability, Reliability and Security. 2021.
    6. ČEGAN, Jakub, Vladimír ROHEL, Milan ČERMÁK, Petr VELAN, Vojtěch HAMERSKÝ, Natálie VELECKÁ, Martin LEBEDA, Tomáš KACVINSKÝ and Zdeněk VYDRA. Kyberbezpečnost lékařských přístrojů (Cybersecurity of medical appliances). 2021.
    7. HUSÁK, Martin, Václav BARTOŠ, Pavol SOKOL and Andrej GAJDOŠ. Predictive Methods in Cyber Defense: Current Experience and Research Challenges. Future Generation Computer Systems. Elsevier, 2021, vol. 115, February, p. 517-530. ISSN 0167-739X. Available from: https://dx.doi.org/10.1016/j.future.2020.10.006.
    8. DAUBNER, Lukáš and Raimundas MATULEVIČIUS. Risk-Oriented Design Approach For Forensic-Ready Software Systems. Online. In The 16th International Conference on Availability, Reliability and Security (ARES 2021). New York, NY, USA: Association for Computing Machinery, 2021, p. 1-10. ISBN 978-1-4503-9051-4. Available from: https://dx.doi.org/10.1145/3465481.3470052.
    9. ČERMÁK, Milan and Pavel ČELEDA. Stream-Based IP Flow Analysis. Online. In Toufik Ahmed, Olivier Festor, Yacine Ghamri-Doudane, Joon-Myung Kang, Alberto E. Schaeffer-Filho, Radu State, Burkhard Stiller. IFIP/IEEE International Symposium on Integrated Network Management, IM 2021. Bordeaux, France: IFIP Open Digital Library, 2021, p. 736-741. ISBN 978-3-903176-32-4.
    10. HUSÁK, Martin, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. Online. In ARES 2021: The 16th International Conference on Availability, Reliability and Security. Virtual Event: Association for Computing Machinery, 2021, p. 1-8. ISBN 978-1-4503-9051-4. Available from: https://dx.doi.org/10.1145/3465481.3470037.
    11. LAGRAA, Sofiane, Radu STATE, Hamida SEBA and Martin HUSÁK. The 2nd International Workshop on Graph-based network Security (GraSec 2021). 2021.
    12. HUSÁK, Martin. Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. Online. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI). San Antonio: IEEE, 2021, p. 1-6. ISBN 978-1-6654-3838-4. Available from: https://dx.doi.org/10.1109/ISI53945.2021.9624774.
    13. HUSÁK, Martin, Giovanni APRUZZESE, Shanchieh YANG and Gordon WERNER. Towards an Efficient Detection of Pivoting Activity. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, p. 980-985. ISBN 978-3-903176-32-4.
    14. ČEGAN, Jakub, Tomáš KACVINSKÝ, Zdeněk VYDRA, Martin LEBEDA, Jakub Bartolomej KOŠUTH, Petr VELAN, Milan ČERMÁK, Andrej TOMČI, Ivo NUTÁR, Martin LAŠTOVIČKA, Natálie VELECKÁ, Pavla VIZVÁRY, Vojtěch HAMERSKÝ, Daniel KOUŘIL, Ondřej BUDAY, Martin KOTLÍK, Vladimír ROHEL, Jiří SÝKORA, Michal ZVÁNOVEC, Filip GRÉGR and Petr SLAVÍK. Virtualizované prostředí pro trénink CSIRT týmu (Virtual environment for training of the CSIRT teams). 2021.

    2020

    1. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Daniel TOVARŇÁK, Pavel ZEZULA, Martin MACÁK, Matúš GUOTH, Matej BABEJ, Dávid BRILLA and Martin KAŽIMÍR. ANALYZA – Datový sklad (ANALYZA – Dara Warehouse). 2020.
    2. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Jarešová MIROSLAVA, Barbora KOZLÍKOVÁ, Kristína ZÁKOPČANOVÁ, Pavel ZEZULA, Katarína FURMANOVÁ, Marko ŘEHÁČEK, Jozef BÁTRNA and Daniel PLAKINGER. ANALYZA – Vizualizační komponenta – Visilant (ANALYZA – Visualization Component – Visilant). 2020.
    3. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Barbora KOZLÍKOVÁ, Vladimír MÍČ, Filip NÁLEPA, David NOVÁK, Daniel TOVARŇÁK, Pavel ZEZULA, Jakub PESCHEL, Kasanič DENIS, Denisa ŠRÁMKOVÁ, Erik HRICIŠÁK, Vladimír LAZÁRIK and Kristián GUTIČ. ANALYZA – Výpočetní a orchestrační subsystém (ANALYZA – Computation and Orchestration Subsystem). 2020.
    4. HUSÁK, Martin, Martin ŽÁDNÍK, Václav BARTOŠ and Pavol SOKOL. Dataset of intrusion detection alerts from a sharing platform. Data in Brief. Elsevier, 2020, vol. 33, December, p. 1-12. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2020.106530.
    5. JAVORNÍK, Michal, Jana KOMÁRKOVÁ, Lukáš SADLEK and Martin HUSÁK. Decision Support for Mission-Centric Network Security Management. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110261.
    6. HUSÁK, Martin. Graph-based models in prediction and projection of cyber attacks. In The 1st International Workshop on Graph-based network Security. 2020.
    7. LAŠTOVIČKA, Martin, Martin HUSÁK and Lukáš SADLEK. Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110394.
    8. HUSÁK, Martin and Pavel ČELEDA. Predictions of Network Attacks in Collaborative Environment. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110472.
    9. HUSÁK, Martin, Tomáš BAJTOŠ, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. ACM Transactions on Management Information Systems. Association for Computing Machinery, 2020, vol. 11, No 4, p. 1-16. ISSN 2158-656X. Available from: https://dx.doi.org/10.1145/3386250.
    10. DAUBNER, Lukáš and Tomáš PITNER. Secure software modeling methods for forensic readiness. Online. In Jan Ministr. Proceedings of the 22nd International Conference on Information Technology for Practice. Ostrava, Czech Republic: VŠB - Technical University Ostrava, Centre for Information Technology, 2020, p. 153-160. ISBN 978-80-248-4321-6.
    11. MACÁK, Martin, Agáta KRUŽÍKOVÁ, Lukáš DAUBNER and Barbora BÜHNOVÁ. Simulation Games Platform for Unintentional Perpetrator Attack Vector Identification. Online. In ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops. New York, NY, USA: Association for Computing Machinery, 2020, p. 222-229. ISBN 978-1-4503-7963-2. Available from: https://dx.doi.org/10.1145/3387940.3391475.
    12. LAŠTOVIČKA, Martin, Jakub Bartolomej KOŠUTH, Daniel FILAKOVSKÝ, Antonín DUFKA and Martin HUSÁK. Software pro evidenci zranitelností v počítačové síti (Software for enumerating vulnerabilities in a computer network). 2020.
    13. SADLEK, Lukáš, Michal JAVORNÍK and Martin HUSÁK. Software pro podporu rozhodování při řešení bezpečnostního incidentu (Software for the decision support in the security incident handling). 2020.
    14. HUSÁK, Martin, Tomáš JIRSÍK and Shanchieh Jay YANG. SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security. Online. In Proceedings of the 15th International Conference on Availability, Reliability and Security. New York, NY, United States: Association for Computing Machinery, 2020, p. 1-10. ISBN 978-1-4503-8833-7. Available from: https://dx.doi.org/10.1145/3407023.3407062.
    15. DAUBNER, Lukáš, Martin MACÁK, Barbora BÜHNOVÁ and Tomáš PITNER. Towards verifiable evidence generation in forensic-ready systems. Online. In 2020 IEEE International Conference on Big Data (Big Data). Atlanta, United States: IEEE, 2020, p. 2264-2269. ISBN 978-1-7281-6251-5. Available from: https://dx.doi.org/10.1109/BigData50022.2020.9378035.
    16. LAŠTOVIČKA, Martin, Stanislav ŠPAČEK, Petr VELAN and Pavel ČELEDA. Using TLS Fingerprints for OS Identification in Encrypted Traffic. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110319.
    17. DAUBNER, Lukáš, Martin MACÁK, Barbora BÜHNOVÁ and Tomáš PITNER. Verification of Forensic Readiness in Software Development: A Roadmap. Online. In Proceedings of the 35th Annual ACM Symposium on Applied Computing. New York, NY, USA: Association for Computing Machinery, 2020, p. 1658-1661. ISBN 978-1-4503-6866-7. Available from: https://dx.doi.org/10.1145/3341105.3374094.
    18. MATTA, Lukáš and Martin HUSÁK. Webová aplikace pro vizualizaci bezpečnostní situace v počítačové síti (Web application for the visualization of security situation in computer network). 2020.

    2019

    1. HUSÁK, Martin and Jaroslav KAŠPAR. AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "81:1"-"81:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340513.
    2. BOU-HARB, Elias, Martin HUSÁK, Mourad DEBBABI and Chadi ASSI. Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Transactions on Big Data. IEEE, 2019, vol. 5, No 4, p. 439-453. ISSN 2332-7790. Available from: https://dx.doi.org/10.1109/TBDATA.2017.2723398.
    3. ŠPAČEK, Stanislav, Martin LAŠTOVIČKA, Martin HORÁK and Tomáš PLESNÍK. Current Issues of Malicious Domains Blocking. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, p. 551-556. ISBN 978-1-7281-0618-2.
    4. JAVORNÍK, Michal, Jana KOMÁRKOVÁ and Martin HUSÁK. Decision Support for Mission-Centric Cyber Defence. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "34:1"-"34:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340522.
    5. HORÁK, Martin, Václav STUPKA and Martin HUSÁK. GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "36:1"-"36:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340516.
    6. CHREN, Stanislav, Barbora BÜHNOVÁ, Martin MACÁK, Lukáš DAUBNER and Bruno ROSSI. Mistakes in UML Diagrams: Analysis of Student Projects in a Software Engineering Course. Online. In Sarah Beecham, Daniela Damian. Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training. Piscataway, NJ, USA: IEEE Press, 2019, p. 100-109. ISBN 978-1-7281-1000-4. Available from: https://dx.doi.org/10.1109/ICSE-SEET.2019.00019.
    7. ČERMÁK, Milan, Martin LAŠTOVIČKA and Tomáš JIRSÍK. Real-time Pattern Detection in IP Flow Data using Apache Spark. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 521-526. ISBN 978-1-7281-0618-2.
    8. HUSÁK, Martin, Jaroslav KAŠPAR and Milan ŽIARAN. Software pro inteligentní analýzu bezpečnostních událostí (iABU) (Software for the intelligent analysis of security events (iABU)). 2019.
    9. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Milan ČERMÁK, Jan DUDA, Vlastimil HOLER, Ľuboš HYŽÁK, Boris JADUŠ, Jakub KADAŠI, David LEŠKA, Martin MACHÁČ, Ivo NUTÁR, Radek OŠLEJŠEK, Dominik PILÁR, Tomáš PLESNÍK, Michal PROCHÁZKA, Tomáš REBOK, Vít RUSŇÁK, Miloslav STANĚK, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Jan VYKOPAL and Tatiana ZBONČÁKOVÁ. Software pro simulaci obecných i kritických informačních infrastruktur (Software for simulation of generic and critical information infrastructures). 2019.
    10. HUSÁK, Martin, Jana KOMÁRKOVÁ, Elias BOU-HARB and Pavel ČELEDA. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys & Tutorials. IEEE, 2019, vol. 21, No 1, p. 640-660. ISSN 1553-877X. Available from: https://dx.doi.org/10.1109/COMST.2018.2871866.
    11. BARTOŠ, Václav, Martin ŽÁDNÍK, Pavel KROBOT, Lukáš HUTÁK, Martin HUSÁK, Jaroslav KAŠPAR and Petr VELAN. Systém pro sdílení a analýzu bezpečnostních událostí (System for sharing and analysis of network security alerts). 2019.
    12. ČERMÁK, Milan. Trace-Share: Towards Provable Network Traffic Measurement and Analysis. 2019.

    2018

    1. HUSÁK, Martin, Nataliia NESHENKO, Morteza SAFAEI POUR, Elias BOU-HARB and Pavel ČELEDA. Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "29:1"-"29:6", 6 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3230837.
    2. KOMÁRKOVÁ, Jana, Lukáš SADLEK and Martin LAŠTOVIČKA. Community Based Platform for Vulnerability Categorization. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 2 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406125.
    3. KOMÁRKOVÁ, Jana, Martin HUSÁK, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. CRUSOE: Data Model for Cyber Situation Awareness. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "36:1"-"36:10", 10 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3232798.
    4. NESHENKO, Nataliia, Martin HUSÁK, Elias BOU-HARB, Pavel ČELEDA, Sameera AL-MULLA and Claude FACHKHA. Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations. Online. In 2018 IEEE Globecom Workshops. Abu Dhabi: IEEE, 2018, p. 1-7. ISBN 978-1-5386-4920-6. Available from: https://dx.doi.org/10.1109/GLOCOMW.2018.8644468.
    5. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Milan ČERMÁK and Martin LAŠTOVIČKA. Enhancing Cybersecurity Skills by Creating Serious Games. Online. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'18). Larnaca, Cyprus: ACM, 2018, p. 194-199. ISBN 978-1-4503-5707-4. Available from: https://dx.doi.org/10.1145/3197091.3197123.
    6. LAŠTOVIČKA, Martin, Antonín DUFKA and Jana KOMÁRKOVÁ. Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use?. Online. In IEEE. Proceedings of the 14th International Wireless Communications and Mobile Computing Conference. Limassol, Cyprus: IEEE Xplore Digital Library, 2018, p. 542-547. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450406.
    7. LAŠTOVIČKA, Martin, Tomáš JIRSÍK, Pavel ČELEDA, Stanislav ŠPAČEK and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Methods in the Jungle of Wireless Networks. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 9 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406262.
    8. LAŠTOVIČKA, Martin and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Prototype Demonstration. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 2 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406128.
    9. VELAN, Petr, Martin HUSÁK and Daniel TOVARŇÁK. Rapid Prototyping of Flow-Based Detection Methods Using Complex Event Processing. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. 1-3. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406121.
    10. HUSÁK, Martin and Jaroslav KAŠPAR. Towards Predicting Cyber Attacks Using Information Exchange and Data Mining. Online. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). Limassol: IEEE, 2018, p. 536-541. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450512.
    11. ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR and Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, p. 1-8. ISBN 978-3-903176-09-6. Available from: https://dx.doi.org/10.23919/TMA.2018.8506498.

    2017

    1. HUSÁK, Martin and Milan ČERMÁK. A Graph-based Representation of Relations in Network Security Alert Sharing Platforms. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 891-892. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987399.
    2. HUSÁK, Martin, Milan ČERMÁK, Martin LAŠTOVIČKA and Jan VYKOPAL. Exchanging Security Events: Which And How Many Alerts Can We Aggregate?. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 604-607. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987340.
    3. MEDKOVÁ, Jana, Martin HUSÁK, Martin VIZVÁRY and Pavel ČELEDA. Honeypot Testbed for Network Defence Strategy Evaluation. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 887-888. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987397.
    4. SOKOL, Pavol, Jakub MÍŠEK and Martin HUSÁK. Honeypots and honeynets: issues of privacy. EURASIP Journal on Information Security. London: Springer Open, 2017, vol. 10, No 4, p. 1-9. ISSN 1687-4161. Available from: https://dx.doi.org/10.1186/s13635-017-0057-4.
    5. MEDKOVÁ, Jana, Martin HUSÁK and Martin DRAŠAR. Network Defence Strategy Evaluation: Simulation vs. Live Network. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 81-88. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987267.
    6. HUSÁK, Martin, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "22:1"-"22:10", 10 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3098981.
    7. STUPKA, Václav, Martin HORÁK and Martin HUSÁK. Protection of personal data in security alert sharing platforms. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "65:1"-"65:8", 8 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3105822.
    8. LAŠTOVIČKA, Martin and Pavel ČELEDA. Situational Awareness: Detecting Critical Dependencies and Devices in a Network. In Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Zurich (Switzerland): Springer, 2017, p. 173-178. ISBN 978-3-319-60773-3. Available from: https://dx.doi.org/10.1007/978-3-319-60774-0_17.
    9. ŽÁDNÍK, Martin, Jan WRONA, Pavel KROBOT, Pavel MINAŘÍK, Jan BARIENČÍK, Tomáš JIRSÍK, Milan ČERMÁK and Daniel TOVARŇÁK. Systém pro sběr, uchování a analýzu síťových dat velkého rozsahu (System for collecting, storing and analysis of large IP flow data). 2017.
    10. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK and Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine. IEEE, 2017, vol. 55, No 7, p. 70-76. ISSN 0163-6804. Available from: https://dx.doi.org/10.1109/MCOM.2017.1600972.

    2016

    1. ČERMÁK, Milan, Daniel TOVARŇÁK, Martin LAŠTOVIČKA and Pavel ČELEDA. A Performance Benchmark of NetFlow Data Analysis on Distributed Stream Processing Systems. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 919-924. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502926.
    2. ČERMÁK, Milan and Pavel ČELEDA. Detecting Advanced Network Threats Using a Similarity Search. In Badonnel, Rémi and Koch, Robert and Pras, Aiko and Drašar, Martin and Stiller, Burkhard. Management and Security in the Age of Hyperconnectivity. 9701st ed. Munich, Germany: Springer International Publishing, 2016, p. 137-141. ISBN 978-3-319-39813-6. Available from: https://dx.doi.org/10.1007/978-3-319-39814-3_14.
    3. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting. EURASIP Journal on Information Security. 2016, vol. 2016, No 1, p. 1-14. ISSN 2510-523X. Available from: https://dx.doi.org/10.1186/s13635-016-0030-7.
    4. JIRSÍK, Tomáš, Milan ČERMÁK and Pavel ČELEDA. On Information Value of Top N Statistics. In 2016 6th International Conference on IT Convergence and Security (ICITCS). USA: Institute of Electrical and Electronic Engineers, 2016, p. 255-259. ISBN 978-1-5090-3764-3. Available from: https://dx.doi.org/10.1109/ICITCS.2016.7740357.
    5. ČERMÁK, Milan, Tomáš JIRSÍK and Martin LAŠTOVIČKA. Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 1019-1020. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502952.
    6. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK, Jakub Samuel PAULOVIČ and Michal ŠTEFÁNIK. Stream4Flow: Software for mining and analysis of the large volumes of network traffic. 2016.

    2015

    1. VELAN, Petr, Milan ČERMÁK, Pavel ČELEDA and Martin DRAŠAR. A Survey of Methods for Encrypted Traffic Classification and Analysis. International Journal of Network Management. John Wiley & Sons, Ltd., 2015, vol. 25, No 5, p. 355-374. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1901.
    2. SOKOL, Pavol, Martin HUSÁK and František LIPTÁK. Deploying Honeypots and Honeynets: Issue of Privacy. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 397-403. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.91.
    3. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Radek OŠLEJŠEK, Zdenek EICHLER, Dalibor TOTH, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Václav RAČANSKÝ, Ivo NUTÁR and Dušan LAGO. KYPO - Kybernetický polygon (KYPO - Cybernetic Proving Ground). 2015.
    4. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 389-396. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.35.
    5. HUSÁK, Martin, Petr VELAN and Jan VYKOPAL. Security Monitoring of HTTP Traffic Using Extended Flows. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 258-265. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.42.
    6. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Ivo NUTÁR and Dušan LAGO. Software pro konfiguraci a monitorování virtuálního prostředí KYPO (Software for configuration and monitoring of KYPO environment). 2015.
    7. PAVOL, Sokol, Kleinová LENKA and Martin HUSÁK. Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. Online. In EUROCON 2015 - International Conference on Computer as a Tool (EUROCON), IEEE. Salamanca, Spain: IEEE, 2015, p. 225-230. ISBN 978-1-4799-8569-2. Available from: https://dx.doi.org/10.1109/EUROCON.2015.7313713.

    2014

    1. GHAFIR, Ibrahim, Martin HUSÁK and Václav PŘENOSIL. A Survey on Intrusion Detection and Prevention Systems. In Proceedings of student conference Zvůle 2014, IEEE/UREL. Zvůle, Czech Republic: Faculty of Electrical Engineering and Communication, Brno University of Technology, 2014, p. 10-14. ISBN 978-80-214-5005-9.
    2. JIRSÍK, Tomáš, Martin HUSÁK, Pavel ČELEDA and Zdenek EICHLER. Cloud-based Security Research Testbed: A DDoS Use Case. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-2. ISBN 978-1-4799-0912-4. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838272.
    3. ČERMÁK, Milan, Pavel ČELEDA and Jan VYKOPAL. Detection of DNS Traffic Anomalies in Large Networks. In Yvon Kermarrec. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg: Springer International Publishing, 2014, p. 215-226. ISBN 978-3-319-13487-1. Available from: https://dx.doi.org/10.1007/978-3-319-13488-8_20.
    4. HUSÁK, Martin and Jakub ČEGAN. PhiGARo: Automatic Phishing Detection and Incident Response Framework. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on. Fribourg, Switzerland: IEEE, 2014, p. 295-302. ISBN 978-1-4799-4223-7. Available from: https://dx.doi.org/10.1109/ARES.2014.46.
    5. HUSÁK, Martin and Jan VYKOPAL. POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats. 2014.

    2013

    1. HUSÁK, Martin and Martin DRAŠAR. Flow-based Monitoring of Honeypots. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, p. 63-70. ISBN 978-80-7231-922-0.
    2. HUSÁK, Martin and Jan SOUKAL. libanim - JavaScript animation library. 2013.
    3. HUSÁK, Martin and Martin VIZVÁRY. POSTER: Reflected attacks abusing honeypots. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York, NY, USA: ACM, 2013, p. 1449-1452. ISBN 978-1-4503-2477-9. Available from: https://dx.doi.org/10.1145/2508859.2512523.
    4. DRAŠAR, Martin, Martin HUSÁK, Jakub ČEGAN, Martin VIZVÁRY, Milan ČERMÁK and Tomáš PLESNÍK. Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií (System for automatic handling of reports from anomaly detection tools). 2013.
Display details
Displayed: 8/10/2024 03:35