Your selection contains 95 outcomes. Edit selection.
Filter publications

    2024

    1. LAGRAA, Sofiane, Martin HUSÁK, Hamida SEBA, Satyanarayana VUPPALA, Radu STATE and Moussa OUEDRAOGO. A review on graph-based approaches for network security monitoring and botnet detection. International Journal of Information Security. Springer, 2024, vol. 23, No 1, p. 119-140. ISSN 1615-5262. Available from: https://dx.doi.org/10.1007/s10207-023-00742-7.
    2. RUMAN, Ádám, Martin DRAŠAR, Lukáš SADLEK, Shanchieh Jay YANG and Pavel ČELEDA. Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Online. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. New York, United States: Association for Computing Machinery, 2024, p. 1-11. ISBN 979-8-4007-1718-5. Available from: https://dx.doi.org/10.1145/3664476.3664523.
    3. SADLEK, Lukáš and Pavel ČELEDA. Cyber Key Terrain Identification Using Adjusted PageRank Centrality. Online. In Meyer, N., Grocholewska-Czuryło, A. ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Cham: Springer, 2024, p. 293-306. ISBN 978-3-031-56325-6. Available from: https://dx.doi.org/10.1007/978-3-031-56326-3_21.
    4. DAUBNER, Lukáš, Sofija MAKSOVIĆ, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš SEDLÁČEK. Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design. Online. In International Conference on Research Challenges in Information Science (RCIS 2024). Neuveden: Springer, 2024, p. 47–55. ISBN 978-3-031-59467-0. Available from: https://dx.doi.org/10.1007/978-3-031-59468-7_6.
    5. DAUBNER, Lukáš, Sofija MAKSOVIĆ and Tomáš SEDLÁČEK. FREAS: Forensic-Ready Analysis Suite. 2024.
    6. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Martin HORÁK, Martin HOFBAUER and Pavel ČELEDA. From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24). New York, NY, USA: ACM, 2024, p. 213-219. ISBN 979-8-4007-0600-4. Available from: https://dx.doi.org/10.1145/3649217.3653639.
    7. SADLEK, Lukáš, Martin HUSÁK and Pavel ČELEDA. Identification of Device Dependencies Using Link Prediction. Online. In NOMS 2024 - 2024 IEEE/IFIP Network Operations and Management Symposium. Seoul, South Korea: IEEE Xplore Digital Library, 2024, p. 1-10. ISBN 979-8-3503-2794-6. Available from: https://dx.doi.org/10.1109/NOMS59830.2024.10575713.
    8. VYKOPAL, Jan, Pavel ČELEDA, Valdemar ŠVÁBENSKÝ, Martin HOFBAUER and Martin HORÁK. Research and Practice of Delivering Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24). New York, NY, USA: ACM, 2024, p. 220-226. ISBN 979-8-4007-0600-4. Available from: https://dx.doi.org/10.1145/3649217.3653642.
    9. HUSÁK, Martin, Mohamed-Lamine MESSAI and Hamida SEBA. The 5th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2024). 2024.
    10. HUSÁK, Martin. Theory and Practice of Cybersecurity Knowledge Graphs and Further Steps. In ARES 2024: The 19th International Conference on Availability, Reliability and Security. 2024.
    11. HUSÁK, Martin, Shanchieh Jay YANG, Joseph KHOURY, Dorde KLISURA and Elias BOU-HARB. Unraveling Network-based Pivoting Maneuvers: Empirical Insights and Challenges. Online. In Sanjay Goel, Paulo Roberto Nunes de Souza. Digital Forensics and Cyber Crime. Cham: Springer, 2024, p. 132-151. ISBN 978-3-031-56582-3. Available from: https://dx.doi.org/10.1007/978-3-031-56583-0_9.

    2023

    1. DAUBNER, Lukáš, Raimundas MATULEVICIUS, Barbora BÜHNOVÁ, Matej ANTOL, Michal RŮŽIČKA and Tomáš PITNER. A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture. Online. In Advanced Information Systems Engineering. Cham: Springer Nature Switzerland, 2023, p. 522-538. ISBN 978-3-031-34559-3. Available from: https://dx.doi.org/10.1007/978-3-031-34560-9_31.
    2. DAUBNER, Lukáš, Matulevičius RAIMUNDAS and Barbora BÜHNOVÁ. A Model of Qualitative Factors in Forensic-Ready Software Systems. Online. In Research Challenges in Information Science: Information Science and the Connected World. Cham: Springer Nature Switzerland, 2023, p. 308-324. ISBN 978-3-031-33079-7. Available from: https://dx.doi.org/10.1007/978-3-031-33080-3_19.
    3. DAUBNER, Lukáš, Martin MACÁK, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ, Sofija MAKSOVIĆ and Tomáš PITNER. Addressing insider attacks via forensic-ready risk management. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. ENGLAND: ELSEVIER, 2023, vol. 73, March 2023, p. 103433-103449. ISSN 2214-2126. Available from: https://dx.doi.org/10.1016/j.jisa.2023.103433.
    4. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš PITNER. BPMN4FRSS: An BPMN Extension to Support Risk-Based Development of Forensic-Ready Software Systems. Online. In Evaluation of Novel Approaches to Software Engineering. Cham: Springer Nature Switzerland, 2023, p. 20-43. ISBN 978-3-031-36596-6. Available from: https://dx.doi.org/10.1007/978-3-031-36597-3_2.
    5. DAUBNER, Lukáš and Adam POVAŽANEC. Data Loss Prevention Solution for Linux Endpoint Devices. Online. In ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security. United States: Association for Computing Machinery, 2023, p. 1-10. ISBN 979-8-4007-0772-8. Available from: https://dx.doi.org/10.1145/3600160.3605036.
    6. DAUBNER, Lukáš, Barbora BÜHNOVÁ and Tomáš PITNER. Forensic experts' view of forensic-ready software systems: A qualitative study. Journal of Software: Evolution and Process. John Wiley & Sons Ltd., 2023, Neuveden, e2598, p. 1-23. ISSN 2047-7481. Available from: https://dx.doi.org/10.1002/smr.2598.
    7. HUSÁK, Martin, Pavol SOKOL, Martin ŽÁDNÍK, Václav BARTOŠ and Martin HORÁK. Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. Digital Threats: Research and Practice. Association for Computing Machinery, 2023, vol. 4, No 4, p. 1-11. ISSN 2576-5337. Available from: https://dx.doi.org/10.1145/3611391.
    8. HUSÁK, Martin and Michal JAVORNÍK. Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection. Online. In 2023 IEEE Conference on Communications and Network Security (CNS). New York, NY: IEEE, 2023, p. 1-6. ISBN 979-8-3503-3945-1. Available from: https://dx.doi.org/10.1109/CNS59707.2023.10288665.
    9. HUSÁK, Martin, Joseph KHOURY, Ðorđe KLISURA and Elias BOU-HARB. On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics. Online. In Pierre Collet, Latafat Gardashova, Samer El Zant, Ulviya Abdulkarimova. Complex Computational Ecosystems. Cham, Switzerland: Springer Nature, 2023, p. 167-179. ISBN 978-3-031-44354-1. Available from: https://dx.doi.org/10.1007/978-3-031-44355-8_12.
    10. LAŠTOVIČKA, Martin, Martin HUSÁK, Petr VELAN, Tomáš JIRSÍK and Pavel ČELEDA. Passive Operating System Fingerprinting Revisited: Evaluation and Current Challenges. Computer Networks. Netherlands: Elsevier, 2023, vol. 229, No 109782, p. 1-12. ISSN 1389-1286. Available from: https://dx.doi.org/10.1016/j.comnet.2023.109782.
    11. BOUČEK, Vladimír and Martin HUSÁK. Recommending Similar Devices in Close Proximity for Network Security Management. Online. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Montreal: IEEE, 2023, p. 481-484. ISBN 979-8-3503-3667-2. Available from: https://dx.doi.org/10.1109/WiMob58348.2023.10187729.
    12. HUSÁK, Martin, Mohamed-Lamine MESSAI and Hamida SEBA. The 4th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2023). 2023.

    2022

    1. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš PITNER. Business Process Model and Notation for Forensic-Ready Software Systems. Online. In Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering. Setúbal, Portugal: SciTePress, 2022, p. 95-106. ISBN 978-989-758-568-5. Available from: https://dx.doi.org/10.5220/0011041000003176.
    2. HUSÁK, Martin. Complex Networks in Cybersecurity: Applications and Challenges. In ACONTA'22 : First European Conference on Augmented Complex Networks - Trustworthy Analysis. 2022.
    3. HUSÁK, Martin, Lukáš SADLEK, Stanislav ŠPAČEK, Martin LAŠTOVIČKA, Michal JAVORNÍK and Jana KOMÁRKOVÁ. CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling. Computers & Security. Elsevier, 2022, vol. 115, April, p. 1-19. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2022.102609.
    4. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna, Austria: ACM, 2022, p. 1-8. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3544458.
    5. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI and Barbora BÜHNOVÁ. Cybersecurity Analysis via Process Mining: A Systematic Literature Review. Online. In Advanced Data Mining and Applications. Cham, Switzerland: Springer, 2022, p. 393-407. ISBN 978-3-030-95404-8. Available from: https://dx.doi.org/10.1007/978-3-030-95405-5_28.
    6. ŽÁDNÍK, Martin, Jan WRONA, Karel HYNEK, Tomáš ČEJKA and Martin HUSÁK. Discovering coordinated groups of IP addresses through temporal correlation of alerts. IEEE Access. IEEE, 2022, vol. 10, No 1, p. 82799-82813. ISSN 2169-3536. Available from: https://dx.doi.org/10.1109/ACCESS.2022.3196362.
    7. MACÁK, Martin, Lukáš DAUBNER, Júlia JAMNICKÁ and Barbora BÜHNOVÁ. Game Achievement Analysis: Process Mining Approach. Online. In Advanced Data Mining and Applications. Cham: Springer International Publishing, 2022, p. 68-82. ISBN 978-3-030-95407-9. Available from: https://dx.doi.org/10.1007/978-3-030-95408-6_6.
    8. HUSÁK, Martin, Martin LAŠTOVIČKA and Tomáš PLESNÍK. Handling Internet Activism during the Russian Invasion of Ukraine: A Campus Network Perspective. Digital Threats: Research and Practice. New York, NY, USA: ACM, 2022, vol. 3, No 3, p. "17:1-17:5", 5 pp. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3534566.
    9. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Identification of Attack Paths Using Kill Chain and Attack Graphs. Online. In NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2022, p. 1-6. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789803.
    10. ŠUĽAN, Samuel and Martin HUSÁK. Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "22:1"-"22:6", 6 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3539007.
    11. JAVORNÍK, Michal and Martin HUSÁK. Mission-centric Decision Support in Cybersecurity via Bayesian Privilege Attack Graph. Engineering Reports. John Wiley & Sons, Inc, 2022, vol. 4, No 12, p. "e12538", 25 pp. ISSN 2577-8196. Available from: https://dx.doi.org/10.1002/eng2.12538.
    12. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI and Barbora BÜHNOVÁ. Process Mining Usage in Cybersecurity and Software Reliability Analysis: A Systematic Literature Review. Array. Elsevier Inc., 2022, vol. 13, No 1, p. 1-14. ISSN 2590-0056. Available from: https://dx.doi.org/10.1016/j.array.2021.100120.
    13. HUSÁK, Martin and Milan ČERMÁK. SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "25:1"-"25:10", 10 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3538981.
    14. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER and Ivo NUTÁR. SW pro ovládání nástrojů ofenzivní bezpečnosti (SW for orchestration of offensive security tools). 2022.
    15. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER, Michal DROBŇÁK and Ivo NUTÁR. SW pro statickou verifikaci bezpečnostních opatření (SW for static verification of security measures). 2022.
    16. HUSÁK, Martin and Hamida SEBA. The 3rd International Workshop on Graph-based network Security (GraSec 2022). 2022.

    2021

    1. MATTA, Lukáš and Martin HUSÁK. A Dashboard for Cyber Situational Awareness and Decision Support in Network Security Management. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, p. 716-717. ISBN 978-3-903176-32-4.
    2. DAUBNER, Lukáš, Tomáš PITNER and Jan MINISTR. Aspects of Forensic-Ready Software Systems in Public Service Domain. In Jan Ministr. Proceedings of the 24th International Conference on Information Technology for Practice. Ostrava, Czech Republic: VŠB - Technical University Ostrava, Centre for Information Technology, 2021, p. 139-145. ISBN 978-80-248-4562-3.
    3. TOVARŇÁK, Daniel, Lukáš SADLEK and Pavel ČELEDA. Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021). Washington DC, USA: IEEE, 2021, p. 986-991. ISBN 978-3-903176-32-4.
    4. HUSÁK, Martin, Václav BARTOŠ, Pavol SOKOL and Andrej GAJDOŠ. Predictive Methods in Cyber Defense: Current Experience and Research Challenges. Future Generation Computer Systems. Elsevier, 2021, vol. 115, February, p. 517-530. ISSN 0167-739X. Available from: https://dx.doi.org/10.1016/j.future.2020.10.006.
    5. DAUBNER, Lukáš and Raimundas MATULEVIČIUS. Risk-Oriented Design Approach For Forensic-Ready Software Systems. Online. In The 16th International Conference on Availability, Reliability and Security (ARES 2021). New York, NY, USA: Association for Computing Machinery, 2021, p. 1-10. ISBN 978-1-4503-9051-4. Available from: https://dx.doi.org/10.1145/3465481.3470052.
    6. HUSÁK, Martin, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. Online. In ARES 2021: The 16th International Conference on Availability, Reliability and Security. Virtual Event: Association for Computing Machinery, 2021, p. 1-8. ISBN 978-1-4503-9051-4. Available from: https://dx.doi.org/10.1145/3465481.3470037.
    7. LAGRAA, Sofiane, Radu STATE, Hamida SEBA and Martin HUSÁK. The 2nd International Workshop on Graph-based network Security (GraSec 2021). 2021.
    8. HUSÁK, Martin. Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. Online. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI). San Antonio: IEEE, 2021, p. 1-6. ISBN 978-1-6654-3838-4. Available from: https://dx.doi.org/10.1109/ISI53945.2021.9624774.
    9. HUSÁK, Martin, Giovanni APRUZZESE, Shanchieh YANG and Gordon WERNER. Towards an Efficient Detection of Pivoting Activity. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, p. 980-985. ISBN 978-3-903176-32-4.

    2020

    1. HUSÁK, Martin, Martin ŽÁDNÍK, Václav BARTOŠ and Pavol SOKOL. Dataset of intrusion detection alerts from a sharing platform. Data in Brief. Elsevier, 2020, vol. 33, December, p. 1-12. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2020.106530.
    2. JAVORNÍK, Michal, Jana KOMÁRKOVÁ, Lukáš SADLEK and Martin HUSÁK. Decision Support for Mission-Centric Network Security Management. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110261.
    3. HUSÁK, Martin. Graph-based models in prediction and projection of cyber attacks. In The 1st International Workshop on Graph-based network Security. 2020.
    4. LAŠTOVIČKA, Martin, Martin HUSÁK and Lukáš SADLEK. Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110394.
    5. HUSÁK, Martin and Pavel ČELEDA. Predictions of Network Attacks in Collaborative Environment. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110472.
    6. HUSÁK, Martin, Tomáš BAJTOŠ, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. ACM Transactions on Management Information Systems. Association for Computing Machinery, 2020, vol. 11, No 4, p. 1-16. ISSN 2158-656X. Available from: https://dx.doi.org/10.1145/3386250.
    7. DAUBNER, Lukáš and Tomáš PITNER. Secure software modeling methods for forensic readiness. Online. In Jan Ministr. Proceedings of the 22nd International Conference on Information Technology for Practice. Ostrava, Czech Republic: VŠB - Technical University Ostrava, Centre for Information Technology, 2020, p. 153-160. ISBN 978-80-248-4321-6.
    8. MACÁK, Martin, Agáta KRUŽÍKOVÁ, Lukáš DAUBNER and Barbora BÜHNOVÁ. Simulation Games Platform for Unintentional Perpetrator Attack Vector Identification. Online. In ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops. New York, NY, USA: Association for Computing Machinery, 2020, p. 222-229. ISBN 978-1-4503-7963-2. Available from: https://dx.doi.org/10.1145/3387940.3391475.
    9. LAŠTOVIČKA, Martin, Jakub Bartolomej KOŠUTH, Daniel FILAKOVSKÝ, Antonín DUFKA and Martin HUSÁK. Software pro evidenci zranitelností v počítačové síti (Software for enumerating vulnerabilities in a computer network). 2020.
    10. SADLEK, Lukáš, Michal JAVORNÍK and Martin HUSÁK. Software pro podporu rozhodování při řešení bezpečnostního incidentu (Software for the decision support in the security incident handling). 2020.
    11. HUSÁK, Martin, Tomáš JIRSÍK and Shanchieh Jay YANG. SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security. Online. In Proceedings of the 15th International Conference on Availability, Reliability and Security. New York, NY, United States: Association for Computing Machinery, 2020, p. 1-10. ISBN 978-1-4503-8833-7. Available from: https://dx.doi.org/10.1145/3407023.3407062.
    12. DAUBNER, Lukáš, Martin MACÁK, Barbora BÜHNOVÁ and Tomáš PITNER. Towards verifiable evidence generation in forensic-ready systems. Online. In 2020 IEEE International Conference on Big Data (Big Data). Atlanta, United States: IEEE, 2020, p. 2264-2269. ISBN 978-1-7281-6251-5. Available from: https://dx.doi.org/10.1109/BigData50022.2020.9378035.
    13. DAUBNER, Lukáš, Martin MACÁK, Barbora BÜHNOVÁ and Tomáš PITNER. Verification of Forensic Readiness in Software Development: A Roadmap. Online. In Proceedings of the 35th Annual ACM Symposium on Applied Computing. New York, NY, USA: Association for Computing Machinery, 2020, p. 1658-1661. ISBN 978-1-4503-6866-7. Available from: https://dx.doi.org/10.1145/3341105.3374094.
    14. MATTA, Lukáš and Martin HUSÁK. Webová aplikace pro vizualizaci bezpečnostní situace v počítačové síti (Web application for the visualization of security situation in computer network). 2020.

    2019

    1. HUSÁK, Martin and Jaroslav KAŠPAR. AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "81:1"-"81:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340513.
    2. BOU-HARB, Elias, Martin HUSÁK, Mourad DEBBABI and Chadi ASSI. Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Transactions on Big Data. IEEE, 2019, vol. 5, No 4, p. 439-453. ISSN 2332-7790. Available from: https://dx.doi.org/10.1109/TBDATA.2017.2723398.
    3. JAVORNÍK, Michal, Jana KOMÁRKOVÁ and Martin HUSÁK. Decision Support for Mission-Centric Cyber Defence. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "34:1"-"34:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340522.
    4. HORÁK, Martin, Václav STUPKA and Martin HUSÁK. GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "36:1"-"36:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340516.
    5. CHREN, Stanislav, Barbora BÜHNOVÁ, Martin MACÁK, Lukáš DAUBNER and Bruno ROSSI. Mistakes in UML Diagrams: Analysis of Student Projects in a Software Engineering Course. Online. In Sarah Beecham, Daniela Damian. Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training. Piscataway, NJ, USA: IEEE Press, 2019, p. 100-109. ISBN 978-1-7281-1000-4. Available from: https://dx.doi.org/10.1109/ICSE-SEET.2019.00019.
    6. HUSÁK, Martin, Jaroslav KAŠPAR and Milan ŽIARAN. Software pro inteligentní analýzu bezpečnostních událostí (iABU) (Software for the intelligent analysis of security events (iABU)). 2019.
    7. HUSÁK, Martin, Jana KOMÁRKOVÁ, Elias BOU-HARB and Pavel ČELEDA. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys & Tutorials. IEEE, 2019, vol. 21, No 1, p. 640-660. ISSN 1553-877X. Available from: https://dx.doi.org/10.1109/COMST.2018.2871866.
    8. BARTOŠ, Václav, Martin ŽÁDNÍK, Pavel KROBOT, Lukáš HUTÁK, Martin HUSÁK, Jaroslav KAŠPAR and Petr VELAN. Systém pro sdílení a analýzu bezpečnostních událostí (System for sharing and analysis of network security alerts). 2019.

    2018

    1. HUSÁK, Martin, Nataliia NESHENKO, Morteza SAFAEI POUR, Elias BOU-HARB and Pavel ČELEDA. Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "29:1"-"29:6", 6 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3230837.
    2. KOMÁRKOVÁ, Jana, Martin HUSÁK, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. CRUSOE: Data Model for Cyber Situation Awareness. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "36:1"-"36:10", 10 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3232798.
    3. NESHENKO, Nataliia, Martin HUSÁK, Elias BOU-HARB, Pavel ČELEDA, Sameera AL-MULLA and Claude FACHKHA. Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations. Online. In 2018 IEEE Globecom Workshops. Abu Dhabi: IEEE, 2018, p. 1-7. ISBN 978-1-5386-4920-6. Available from: https://dx.doi.org/10.1109/GLOCOMW.2018.8644468.
    4. VELAN, Petr, Martin HUSÁK and Daniel TOVARŇÁK. Rapid Prototyping of Flow-Based Detection Methods Using Complex Event Processing. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. 1-3. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406121.
    5. HUSÁK, Martin and Jaroslav KAŠPAR. Towards Predicting Cyber Attacks Using Information Exchange and Data Mining. Online. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). Limassol: IEEE, 2018, p. 536-541. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450512.

    2017

    1. HUSÁK, Martin and Milan ČERMÁK. A Graph-based Representation of Relations in Network Security Alert Sharing Platforms. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 891-892. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987399.
    2. HUSÁK, Martin, Milan ČERMÁK, Martin LAŠTOVIČKA and Jan VYKOPAL. Exchanging Security Events: Which And How Many Alerts Can We Aggregate?. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 604-607. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987340.
    3. MEDKOVÁ, Jana, Martin HUSÁK, Martin VIZVÁRY and Pavel ČELEDA. Honeypot Testbed for Network Defence Strategy Evaluation. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 887-888. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987397.
    4. SOKOL, Pavol, Jakub MÍŠEK and Martin HUSÁK. Honeypots and honeynets: issues of privacy. EURASIP Journal on Information Security. London: Springer Open, 2017, vol. 10, No 4, p. 1-9. ISSN 1687-4161. Available from: https://dx.doi.org/10.1186/s13635-017-0057-4.
    5. MEDKOVÁ, Jana, Martin HUSÁK and Martin DRAŠAR. Network Defence Strategy Evaluation: Simulation vs. Live Network. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 81-88. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987267.
    6. HUSÁK, Martin, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "22:1"-"22:10", 10 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3098981.
    7. STUPKA, Václav, Martin HORÁK and Martin HUSÁK. Protection of personal data in security alert sharing platforms. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "65:1"-"65:8", 8 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3105822.

    2016

    1. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting. EURASIP Journal on Information Security. 2016, vol. 2016, No 1, p. 1-14. ISSN 2510-523X. Available from: https://dx.doi.org/10.1186/s13635-016-0030-7.

    2015

    1. SOKOL, Pavol, Martin HUSÁK and František LIPTÁK. Deploying Honeypots and Honeynets: Issue of Privacy. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 397-403. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.91.
    2. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 389-396. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.35.
    3. HUSÁK, Martin, Petr VELAN and Jan VYKOPAL. Security Monitoring of HTTP Traffic Using Extended Flows. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 258-265. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.42.
    4. PAVOL, Sokol, Kleinová LENKA and Martin HUSÁK. Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. Online. In EUROCON 2015 - International Conference on Computer as a Tool (EUROCON), IEEE. Salamanca, Spain: IEEE, 2015, p. 225-230. ISBN 978-1-4799-8569-2. Available from: https://dx.doi.org/10.1109/EUROCON.2015.7313713.

    2014

    1. GHAFIR, Ibrahim, Martin HUSÁK and Václav PŘENOSIL. A Survey on Intrusion Detection and Prevention Systems. In Proceedings of student conference Zvůle 2014, IEEE/UREL. Zvůle, Czech Republic: Faculty of Electrical Engineering and Communication, Brno University of Technology, 2014, p. 10-14. ISBN 978-80-214-5005-9.
    2. JIRSÍK, Tomáš, Martin HUSÁK, Pavel ČELEDA and Zdenek EICHLER. Cloud-based Security Research Testbed: A DDoS Use Case. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-2. ISBN 978-1-4799-0912-4. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838272.
    3. HUSÁK, Martin and Jakub ČEGAN. PhiGARo: Automatic Phishing Detection and Incident Response Framework. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on. Fribourg, Switzerland: IEEE, 2014, p. 295-302. ISBN 978-1-4799-4223-7. Available from: https://dx.doi.org/10.1109/ARES.2014.46.
    4. HUSÁK, Martin and Jan VYKOPAL. POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats. 2014.

    2013

    1. HUSÁK, Martin and Martin DRAŠAR. Flow-based Monitoring of Honeypots. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, p. 63-70. ISBN 978-80-7231-922-0.
    2. HUSÁK, Martin and Jan SOUKAL. libanim - JavaScript animation library. 2013.
    3. HUSÁK, Martin and Martin VIZVÁRY. POSTER: Reflected attacks abusing honeypots. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York, NY, USA: ACM, 2013, p. 1449-1452. ISBN 978-1-4503-2477-9. Available from: https://dx.doi.org/10.1145/2508859.2512523.
    4. DRAŠAR, Martin, Martin HUSÁK, Jakub ČEGAN, Martin VIZVÁRY, Milan ČERMÁK and Tomáš PLESNÍK. Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií (System for automatic handling of reports from anomaly detection tools). 2013.
Display details
Displayed: 8/9/2024 08:22