Your selection contains 93 outcomes. Edit selection.
Filter publications

    2023

    1. BEURAN, Razvan, Jan VYKOPAL, Daniela BELAJOVÁ, Pavel ČELEDA, Yasuo TAN and Yoichi SHINODA. Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. Computers & Security. Elsevier, 2023, vol. 128, No 103120, p. 1-14. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2023.103120.
    2. HUSÁK, Martin, Pavol SOKOL, Martin ŽÁDNÍK, Václav BARTOŠ and Martin HORÁK. Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. Digital Threats: Research and Practice. Association for Computing Machinery, 2023, vol. 4, No 4, p. 1-11. ISSN 2576-5337. Available from: https://dx.doi.org/10.1145/3611391.
    3. KRAUS, Lydia, Valdemar ŠVÁBENSKÝ, Martin HORÁK, Václav MATYÁŠ, Jan VYKOPAL and Pavel ČELEDA. Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. Online. In Proceedings of the 28th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'23). New York, NY, USA: ACM, 2023, p. 236-242. ISBN 979-8-4007-0138-2. Available from: https://dx.doi.org/10.1145/3587102.3588862.

    2022

    1. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA and Lydia KRAUS. Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training. Education and Information Technologies. Springer, 2022, vol. 27, No 9, p. 12179 - 12212. ISSN 1360-2357. Available from: https://dx.doi.org/10.1007/s10639-022-11093-6.
    2. POLČÁK, Radim, Jakub MÍŠEK, Matěj MYŠKA, Jakub HARAŠTA, Pavel LOUTOCKÝ, Veronika ŽOLNERČÍKOVÁ, Václav STUPKA, Michal KOŠČÍK, Aleš ZAVRŠNIK, Ludwig GRAMLICH, Herbert HRACHOVEC, Andreas KIRCHNER, Kristian DANEBACK, Jakub MACEK, Dan Jerker Börje SVANTESSON, Erich SCHWEIGHOFER, David ŠMAHEL, Miroslav MAREŠ, Andreas WIEBE, Monika METYKOVÁ, Alena MACKOVÁ, Hana MACHÁČKOVÁ, Václav MATYÁŠ, Bettina BACHER, Eva MARTINICOVÁ, Zbyněk LOEBL, Alex IVANČO and Jan KLESLA. Cyberspace 2022. 2022.
    3. RUMAN, Ádám and Daniel KOUŘIL. Detection of Malicious Code in SSH programs. In Sborník příspěvků z 54. konference EurOpen.CZ. 2022, p. 115-124.
    4. ŠVÁBENSKÝ, Valdemar, Richard WEISS, Jack COOK, Jan VYKOPAL, Pavel ČELEDA, Jens MACHE, Radoslav CHUDOVSKÝ and Ankur CHATTOPADHYAY. Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. Online. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22). New York, NY, USA: ACM, 2022, p. 787-793. ISBN 978-1-4503-9070-5. Available from: https://dx.doi.org/10.1145/3478431.3499414.
    5. MATYÁŠ, Václav, Kamil MALINKA, Lydia KRAUS, Lenka KNAPOVÁ and Agáta KRUŽÍKOVÁ. Even if users do not read security directives, their behavior is not so catastrophic. Communications of the ACM. New York, NY, USA: ACM, 2022, vol. 65, No 1, p. 37-40. ISSN 0001-0782. Available from: https://dx.doi.org/10.1145/3471928.
    6. RUSŇÁK, Vít, Lenka JANEČKOVÁ, Filip DRGOŇ, Anna-Marie DOMBAJOVÁ and Veronika KUDĚLKOVÁ. Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance. Online. In Ebad Banissi, Anna Ursyn, Mark W. McK. Bannatyne, et al. 2022 26th International Conference Information Visualisation (IV). Vienna, Austria: IEEE, 2022, p. 300-306. ISBN 978-1-6654-9007-8. Available from: https://dx.doi.org/10.1109/IV56949.2022.00058.
    7. ŠMAHEL, David, Lenka DĚDKOVÁ, Lydia KRAUS, Václav MATYÁŠ and Vlasta BUKAČOVÁ. Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences. Human Behavior and Emerging Technologies. 2022, vol. 2022, No 1230344, p. 1-12. ISSN 2578-1863. Available from: https://dx.doi.org/10.1155/2022/1230344.
    8. PUCHOVSKÁ, Anna, Šárka MATOUŠKOVÁ, Irina MATUSEVIČ and Barbora FUKÁRKOVÁ. Jak na vizuální úpravu e-learningového kurzu? (How to visually adjust an e-learning course?). 2022.
    9. TOVARŇÁK, Daniel, Michal ČECH, Dušan TICHÝ and Vojtěch DOHNAL. ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence. Online. In Varga, Pal, et al. Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022. USA: IEEE, 2022, p. 1-4. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789882.
    10. HARAŠTA, Jakub, Michael BÁTRLA, Anna BLECHOVÁ, Tereza NOVOTNÁ, Jakub MÍŠEK and Ladislav VYHNÁNEK. Omezení pohybu v souvislosti s řešením krizí způsobených biologickými agens a toxiny (doporučení) (Restrictions on Movement in Crises caused by Biological Agents and Toxins (Recommendations)). Brno: Masarykova univerzita pro Ministerstvo vnitra České republiky, 2022, 17 pp. 1. vydání.
    11. VYKOPAL, Jan, Valdemar ŠVÁBENSKÝ, Pavel ŠEDA and Pavel ČELEDA. Preventing Cheating in Hands-on Lab Assignments. Online. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22). New York, NY, USA: ACM, 2022, p. 78-84. ISBN 978-1-4503-9070-5. Available from: https://dx.doi.org/10.1145/3478431.3499420.
    12. BLECHOVÁ, Anna, Kristýna BÓNOVÁ, Martin ERLEBACH, Vojtěch JUŘIČKA, Anežka KARPJÁKOVÁ, Andrej KRIŠTOFÍK, Pavel LOUTOCKÝ, Jakub MÍŠEK, Sofie PETROVÁ, Jan SVOBODA, Jakub VOSTOUPAL, Ondřej WOZNICA and Veronika PŘÍBAŇ ŽOLNERČÍKOVÁ. Přehled aktuální judikatury II/2022 (Overview of the Current Case Law II/2022). In Revue pro právo a technologie. Brno: Masarykova univerzita, 2022, p. 161–194, 33 pp. ISSN 1805-2797. Available from: https://dx.doi.org/10.5817/RPT2022-2-5.
    13. BÁTRLA, Michael and Jakub HARAŠTA. 'Releasing the Hounds?' Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations. In T. Jančárková, G. Visky, I. Winther. 2022 14th International Conference on Cyber Conflict: Keep Moving. Tallinn: NATO CCDCOE Publications, 2022, p. 93-115. ISBN 978-9916-9789-0-0. Available from: https://dx.doi.org/10.23919/CyCon55549.2022.9811074.
    14. TOVARŇÁK, Daniel, Vojtěch DOHNAL, Dušan TICHÝ, Benjamin KRÁL and Martin MACHÁČ. Software pro podporu orchestrace bezpečnosti a řízení životního cyklu hrozeb (Software for security orchestration support and threat life-cycle management). 2022.
    15. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA, Kristián TKÁČIK and Daniel POPOVIČ. Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering. Education and Information Technologies. Springer, 2022, vol. 27, No 7, p. 9231-9262. ISSN 1360-2357. Available from: https://dx.doi.org/10.1007/s10639-022-10954-4.
    16. DRAŠAR, Martin, Ádám RUMAN and Vít RUSŇÁK. SW pro dynamickou verifikaci bezpečnostních opatření (SW for dynamic verification of security measures). 2022.
    17. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER and Ivo NUTÁR. SW pro ovládání nástrojů ofenzivní bezpečnosti (SW for orchestration of offensive security tools). 2022.
    18. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER, Michal DROBŇÁK and Ivo NUTÁR. SW pro statickou verifikaci bezpečnostních opatření (SW for static verification of security measures). 2022.
    19. KRAUS, Lydia, Matěj GRABOVSKÝ, Martin UKROP, Katarína GALANSKÁ and Václav MATYÁŠ. Usability Insights from Establishing TLS Connections. In IFIP International Conference on ICT Systems Security and Privacy Protection. Cham, Germany: Springer Verlag, 2022, p. 289-305. ISBN 978-3-031-06974-1. Available from: https://dx.doi.org/10.1007/978-3-031-06975-8_17.
    20. MÍŠEK, Jakub, Anna BLECHOVÁ, Michael BÁTRLA, Tereza NOVOTNÁ, Ladislav VYHNÁNEK and Jakub HARAŠTA. Vliv technologických nástrojů na ústavnost krizových opatření omezujících svobodu pohybu (Impact Of Technological Tools On Constitutionality of Emergency Measures Restricting Freedom of Movement). Brno: Masarykova univerzita pro Ministerstvo vnitra České republiky, 2022, 78 pp. 1. vydání.

    2021

    1. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína DOČKALOVÁ BURSKÁ, Valdemar ŠVÁBENSKÝ, Jan VYKOPAL and Jakub ČEGAN. Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. IEEE Transactions on Visualization and Computer Graphics. 2021, vol. 27, No 8, p. 3425-3437. ISSN 1077-2626. Available from: https://dx.doi.org/10.1109/TVCG.2020.2977336.
    2. ŠVÁBENSKÝ, Valdemar, Pavel ČELEDA, Jan VYKOPAL and Silvia BRIŠÁKOVÁ. Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges. Computers & Security. Elsevier, 2021, vol. 102, No 102154, p. 1-14. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2020.102154.
    3. POLČÁK, Radim, Jakub MÍŠEK, Matěj MYŠKA, Jakub HARAŠTA, Pavel LOUTOCKÝ, Veronika ŽOLNERČÍKOVÁ, Václav STUPKA, František KASL, Aleš ZAVRŠNIK, Ludwig GRAMLICH, Herbert HRACHOVEC, Andreas KIRCHNER, Kristian DANEBACK, Jakub MACEK, Dan Jerker Börje SVANTESSON, Erich SCHWEIGHOFER, David ŠMAHEL, Miroslav MAREŠ, Andreas WIEBE, Monika METYKOVÁ, Alena MACKOVÁ, Hana MACHÁČKOVÁ, Lydia KRAUS, Václav MATYÁŠ and Walter HÖTZENDORFER. Cyberspace 2021. 2021.
    4. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ŠEDA and Pavel ČELEDA. Dataset of Shell Commands Used by Participants of Hands-on Cybersecurity Training. Data in Brief. Elsevier, 2021, vol. 38, September, p. 1-9. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2021.107398.
    5. ČERMÁK, Milan and Denisa ŠRÁMKOVÁ. GRANEF: Utilization of a Graph Database for Network Forensics. Online. In Sabrina De Capitani di Vimercati, Pierangela Samarati. Proceedings of the 18th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2021, p. 785-790. ISBN 978-989-758-524-1. Available from: https://dx.doi.org/10.5220/0010581807850790.
    6. JIRSÍK, Tomáš and Petr VELAN. Host Behavior in Computer Network: One-Year Study. IEEE Transactions on Network and Service Management. 2021, vol. 18, No 1, p. 822-838. ISSN 1932-4537. Available from: https://dx.doi.org/10.1109/TNSM.2020.3036528.
    7. KRAUS, Lydia, Mária ŠVIDROŇOVÁ and Elizabeth STOBERT. How Do Users Chain Email Accounts Together? In Jøsang A., Futcher L., Hagen J. IFIP International Conference on ICT Systems Security and Privacy Protection. Switzerland: Springer International Publishing, 2021, p. 416-429. ISBN 978-3-030-78119-4. Available from: https://dx.doi.org/10.1007/978-3-030-78120-0_27.
    8. ŠAVELKA, Jaromír, Hannes WESTERMANN, Karim BENYEKHLEF, Charlotte S. ALEXANDER, Jayla C. GRANT, Restrepo David AMARILES, Rajaa El HAMDANI, Sébastien MEEÙS, Aurore TROUSSEL, Michal ARASZKIEWICZ, Kevin D. ASHLEY, Alexandra ASHLEY, Karl BRANTING, Mattia FALDUTI, Matthias GRABMAIR, Jakub HARAŠTA, Tereza NOVOTNÁ, Elizabeth TIPPETT and Shiwanni JOHNSON. Lex Rosetta: Transfer of Predictive Models Across Languages, Jurisdictions, and Legal Domains. Online. In Eighteenth International Conference on Artificial Intelligence and Law: Proceedings of the Conference. 1st ed. New York: ACM, 2021, p. 129-138. ISBN 978-1-4503-8526-8. Available from: https://dx.doi.org/10.1145/3462757.3466149.
    9. HARAŠTA, Jakub. Michal Kolmaš: National Identity and Japanese Revisionism. Mezinárodní vztahy. Ústav mezinárodních vztahů, 2021, vol. 56, No 2, p. 110-114. ISBN 978-0-367-58569-3. Available from: https://dx.doi.org/10.32422/mv-cjir.1777.
    10. ŠKYŘÍK, Petr and Šárka MATOUŠKOVÁ. Otevřená dílna v knihovně: podpora kreativity, digitálních kompetencí a komunity (Makerspace in the library: support for creativity, digital competences and community). In KISK 4 FUTURE - online. 2021. KISK 4 FUTURE.
    11. VYHNÁNEK, Ladislav, Anna BLECHOVÁ, Michael BÁTRLA, Jakub MÍŠEK, Tereza NOVOTNÁ and Jakub HARAŠTA. Proporcionalita krizových opatření omezujících svobodu pohybu (Proportionality of Crisis Measures Restricting Freedom of Movement). Brno: Masarykova univerzita pro Ministerstvo vnitra České republiky, 2021, 173 pp. 1. vydání.
    12. RUSŇÁK, Vít, Anna-Marie DOMBAJOVÁ, Veronika KUDĚLKOVÁ and Martin PYŠČUK. Prototypová implementace nástroje pro vizuální analýzu časově orientovaných dat (Prototype implementation of a tool for visual analysis of time-oriented data). 2021.
    13. ŠEDA, Pavel, Jan VYKOPAL, Valdemar ŠVÁBENSKÝ and Pavel ČELEDA. Reinforcing Cybersecurity Hands-on Training With Adaptive Learning. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637252.
    14. VYKOPAL, Jan, Pavel ČELEDA, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ and Daniel TOVARŇÁK. Scalable Learning Environments for Teaching Cybersecurity Hands-on. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637180.
    15. ŠVÁBENSKÝ, Valdemar and Martin UKROP. The Stack: Unplugged Activities for Teaching Computer Science. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE '21). 2021. ISBN 978-1-4503-8062-1. Available from: https://dx.doi.org/10.1145/3408877.3439569.
    16. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Daniel TOVARŇÁK and Pavel ČELEDA. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637052.
    17. NOVOTNÁ, Tereza and Jakub HARAŠTA. Topic Modelling of Czech Supreme Court Decisions: Evaluation of Legal Experts. In Internationales Rechtsinformatik Symposion IRIS 2021. 2021.
    18. GÁLIKOVÁ, Miriam, Valdemar ŠVÁBENSKÝ and Jan VYKOPAL. Toward Guidelines for Designing Cybersecurity Serious Games. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (SIGCSE '21). 2021. ISBN 978-1-4503-8062-1. Available from: https://dx.doi.org/10.1145/3408877.3439568.
    19. ČEGAN, Jakub, Tomáš KACVINSKÝ, Zdeněk VYDRA, Martin LEBEDA, Jakub Bartolomej KOŠUTH, Petr VELAN, Milan ČERMÁK, Andrej TOMČI, Ivo NUTÁR, Martin LAŠTOVIČKA, Natálie VELECKÁ, Pavla VIZVÁRY, Vojtěch HAMERSKÝ, Daniel KOUŘIL, Ondřej BUDAY, Martin KOTLÍK, Vladimír ROHEL, Jiří SÝKORA, Michal ZVÁNOVEC, Filip GRÉGR and Petr SLAVÍK. Virtualizované prostředí pro trénink CSIRT týmu (Virtual environment for training of the CSIRT teams). 2021.
    20. DOČKALOVÁ BURSKÁ, Karolína, Anna-Marie DOMBAJOVÁ, Jiří HYNEK, Jakub KACHLÍK, Jakub MATUŠKA, Michal PAVÚK, Kryštof RYKALA, Dávid ŽELNÍK and Vít RUSŇÁK. Vizuálně-analytická konzole pro ICS (Visual-analytics console for ICS). 2021.
    21. NOVOTNÁ, Tereza and Jakub HARAŠTA. Vyhledávání české judikatury v praxi: potřeby uživatele vs. aktuální výzkumné metody. In České právo a informační technologie 2021. 2021.

    2020

    1. VYKOPAL, Jan, Valdemar ŠVÁBENSKÝ and Ee-Chien CHANG. Benefits and Pitfalls of Using Capture The Flag Games in University Courses. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 752-758. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366893.
    2. JIRSÍK, Tomáš and Pavel ČELEDA. Cyber Situation Awareness via IP Flow Monitoring. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Hungary: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8.
    3. POLČÁK, Radim, Jakub MÍŠEK, Matěj MYŠKA, Jakub HARAŠTA, Pavel LOUTOCKÝ, Veronika ŽOLNERČÍKOVÁ, Václav STUPKA, František KASL, Aleš ZAVRŠNIK, Ludwig GRAMLICH, Herbert HRACHOVEC, Andreas KIRCHNER, Kristian DANEBACK, Jakub MACEK, Dan Jerker Börje SVANTESSON, Erich SCHWEIGHOFER, David ŠMAHEL, Miroslav MAREŠ, Andreas WIEBE, Monika METYKOVÁ, Alena MACKOVÁ, Hana MACHÁČKOVÁ, Lydia KRAUS, Václav MATYÁŠ and Walter HÖTZENDORFER. Cyberspace 2020. 2020.
    4. KRAUS, Lydia, Martin UKROP, Václav MATYÁŠ and Tobias FIEBIG. Evolution of SSL/TLS Indicators and Warnings in Web Browsers. In Anderson, J., Stajano, F., Christianson, B., Matyáš, V. 27th International Workshop on Security Protocols (SPW 2019). Switzerland: Springer International Publishing, 2020, p. 267-280. ISBN 978-3-030-57042-2. Available from: https://dx.doi.org/10.1007/978-3-030-57043-9_25.
    5. MOTSCHNIG, Renate, Michael SILBER and Valdemar ŠVÁBENSKÝ. How Does a Student-Centered Course on Communication and Professional Skills Impact Students in the Long Run?. Online. In 2020 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2020, p. 1-9. ISBN 978-1-7281-8961-1. Available from: https://dx.doi.org/10.1109/FIE44824.2020.9273962.
    6. ČELEDA, Pavel, Jan VYKOPAL, Valdemar ŠVÁBENSKÝ and Karel SLAVÍČEK. KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 1026-1032. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366908.
    7. VELAN, Petr and Tomáš JIRSÍK. On the Impact of Flow Monitoring Configuration. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Budapešť: IEEE Xplore Digital Library, 2020, p. 1-7. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110361.
    8. HUSÁK, Martin, Tomáš JIRSÍK and Shanchieh Jay YANG. SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security. Online. In Proceedings of the 15th International Conference on Availability, Reliability and Security. New York, NY, United States: Association for Computing Machinery, 2020, p. 1-10. ISBN 978-1-4503-8833-7. Available from: https://dx.doi.org/10.1145/3407023.3407062.
    9. UKROP, Martin, Valdemar ŠVÁBENSKÝ and Imrich NAGY. Teaching Lab: Training Novice Computer Science Teachers. In Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE ’20). 2020. ISBN 978-1-4503-6874-2. Available from: https://dx.doi.org/10.1145/3341525.3393967.
    10. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL and Pavel ČELEDA. What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. Online. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education (SIGCSE '20). New York, NY, USA: ACM, 2020, p. 2-8. ISBN 978-1-4503-6793-6. Available from: https://dx.doi.org/10.1145/3328778.3366816.
    11. UKROP, Martin, Lydia KRAUS and Václav MATYÁŠ. Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version). Digital Threats: Research and Practice. New York, NY, USA: Association for Computing Machinery, 2020, vol. 1, No 4, p. 1-29. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3419472.

    2019

    1. ŠVÁBENSKÝ, Valdemar. Analyzing User Interactions with Cybersecurity Games. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). 2019. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3293717.
    2. SMERIGA, Juraj and Tomáš JIRSÍK. Behavior-Aware Network Segmentation using IP Flows. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2019, p. 1-9. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3339265.
    3. ŠPAČEK, Stanislav, Martin LAŠTOVIČKA, Martin HORÁK and Tomáš PLESNÍK. Current Issues of Malicious Domains Blocking. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, p. 551-556. ISBN 978-1-7281-0618-2.
    4. HORÁK, Martin, Václav STUPKA and Martin HUSÁK. GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "36:1"-"36:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340516.
    5. DRAŠAR, Martin and Tomáš JIRSÍK. IT Operations Analytics: Root Cause Analysis via Complex Event Processing. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 741-742. ISBN 978-1-72810-618-2.
    6. JIRSÍK, Tomáš, Štěpán TRČKA and Pavel ČELEDA. Quality of Service Forecasting with LSTM Neural Network. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 251-260. ISBN 978-1-72810-618-2.
    7. ČERMÁK, Milan, Martin LAŠTOVIČKA and Tomáš JIRSÍK. Real-time Pattern Detection in IP Flow Data using Apache Spark. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 521-526. ISBN 978-1-7281-0618-2.
    8. UKROP, Martin, Valdemar ŠVÁBENSKÝ and Jan NEHYBA. Reflective Diary for Professional Development of Novice Teachers. Online. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). Minneapolis, Minnesota, USA: ACM, 2019, p. 1088-1094. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3287448.
    9. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Michal BERAN, František HRDINA, Tomáš JIRSÍK, Daniel KOUŘIL, Michal MAZOUREK, Radek OŠLEJŠEK, Michal PROCHÁZKA, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Vadim JANOVSKIJ and Kristína ZÁKOPČANOVÁ. Software pro detekci a analýzu napadení KII (Software for detection and analysis of attacks on critical information infrastructures). 2019.
    10. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Milan ČERMÁK, Jan DUDA, Vlastimil HOLER, Ľuboš HYŽÁK, Boris JADUŠ, Jakub KADAŠI, David LEŠKA, Martin MACHÁČ, Ivo NUTÁR, Radek OŠLEJŠEK, Dominik PILÁR, Tomáš PLESNÍK, Michal PROCHÁZKA, Tomáš REBOK, Vít RUSŇÁK, Miloslav STANĚK, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Jan VYKOPAL and Tatiana ZBONČÁKOVÁ. Software pro simulaci obecných i kritických informačních infrastruktur (Software for simulation of generic and critical information infrastructures). 2019.
    11. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL and Pavel ČELEDA. Towards Learning Analytics in Cybersecurity Capture the Flag Games. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). 2019. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3293816.
    12. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína BURSKÁ, Valdemar ŠVÁBENSKÝ and Jan VYKOPAL. Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. Online. In Gove R., Arendt D., Kohlhammer J., Angelini M., Lyn Paul, C., Bryan C. McKenna S., Prigent N., Najafi P., Sopan A. 2019 IEEE Symposium on Visualization for Cyber Security (VizSec). Vancouver, BC, Canada: IEEE, 2019, p. 1-11. ISBN 978-1-7281-3876-3. Available from: https://dx.doi.org/10.1109/VizSec48167.2019.9161386.

    2018

    1. LAŠTOVIČKA, Martin, Tomáš JIRSÍK, Pavel ČELEDA, Stanislav ŠPAČEK and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Methods in the Jungle of Wireless Networks. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 9 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406262.
    2. JIRSÍK, Tomáš. Stream4Flow: Real-time IP Flow Host Monitoring using Apache Spark. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE, 2018, p. 1-2. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406132.
    3. JIRSÍK, Tomáš, Štěpán TRČKA and Pavol ZAŤKO. Time Series Analyzer: Software for analysis of performance time series. 2018.
    4. JIRSÍK, Tomáš and Pavel ČELEDA. Toward Real-time Network-wide Cyber Situational Awareness. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE, 2018, p. 1-7. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406166.
    5. ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR and Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, p. 1-8. ISBN 978-3-903176-09-6. Available from: https://dx.doi.org/10.23919/TMA.2018.8506498.

    2017

    1. STUPKA, Václav, Martin HORÁK and Martin HUSÁK. Protection of personal data in security alert sharing platforms. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "65:1"-"65:8", 8 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3105822.
    2. ŽÁDNÍK, Martin, Jan WRONA, Pavel KROBOT, Pavel MINAŘÍK, Jan BARIENČÍK, Tomáš JIRSÍK, Milan ČERMÁK and Daniel TOVARŇÁK. Systém pro sběr, uchování a analýzu síťových dat velkého rozsahu (System for collecting, storing and analysis of large IP flow data). 2017.
    3. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK and Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine. IEEE, 2017, vol. 55, No 7, p. 70-76. ISSN 0163-6804. Available from: https://dx.doi.org/10.1109/MCOM.2017.1600972.

    2016

    1. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting. EURASIP Journal on Information Security. 2016, vol. 2016, No 1, p. 1-14. ISSN 2510-523X. Available from: https://dx.doi.org/10.1186/s13635-016-0030-7.
    2. VELAN, Petr, Jana MEDKOVÁ, Tomáš JIRSÍK and Pavel ČELEDA. Network Traffic Characterisation Using Flow-Based Statistics. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. IEEE/IFIP Network Operations and Management Symposium 2016 (NOMS 2016). Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 907-912. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502924.
    3. JIRSÍK, Tomáš, Milan ČERMÁK and Pavel ČELEDA. On Information Value of Top N Statistics. In 2016 6th International Conference on IT Convergence and Security (ICITCS). USA: Institute of Electrical and Electronic Engineers, 2016, p. 255-259. ISBN 978-1-5090-3764-3. Available from: https://dx.doi.org/10.1109/ICITCS.2016.7740357.
    4. ČERMÁK, Milan, Tomáš JIRSÍK and Martin LAŠTOVIČKA. Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 1019-1020. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502952.
    5. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK, Jakub Samuel PAULOVIČ and Michal ŠTEFÁNIK. Stream4Flow: Software for mining and analysis of the large volumes of network traffic. 2016.

    2015

    1. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Radek OŠLEJŠEK, Zdenek EICHLER, Dalibor TOTH, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Václav RAČANSKÝ, Ivo NUTÁR and Dušan LAGO. KYPO - Kybernetický polygon (KYPO - Cybernetic Proving Ground). 2015.
    2. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 389-396. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.35.
    3. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Ivo NUTÁR and Dušan LAGO. Software pro konfiguraci a monitorování virtuálního prostředí KYPO (Software for configuration and monitoring of KYPO environment). 2015.
    4. OŠLEJŠEK, Radek, Zdenek EICHLER, Dalibor TOTH, Pavel ČELEDA, Jakub ČEGAN, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Martin VIZVÁRY and Jan VYKOPAL. Software pro vizualizaci virtuálního prostředí KYPO (Software for visualization of KYPO environment). 2015.

    2014

    1. JIRSÍK, Tomáš, Martin HUSÁK, Pavel ČELEDA and Zdenek EICHLER. Cloud-based Security Research Testbed: A DDoS Use Case. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-2. ISBN 978-1-4799-0912-4. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838272.
    2. KOUŘIL, Daniel, Tomáš REBOK, Tomáš JIRSÍK, Jakub ČEGAN, Martin DRAŠAR, Martin VIZVÁRY and Jan VYKOPAL. Cloud-based Testbed for Simulation of Cyber Attacks. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-6. ISBN 978-1-4799-0913-1. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838298.
    3. DRAŠAR, Martin, Tomáš JIRSÍK and Martin VIZVÁRY. Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches. In Sperotto, Anna and Doyen, Guillaume and Latré, Steven and Charalambides, Marinos and Stiller, Burkhard. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin: Springer Berlin Heidelberg, 2014, p. 160-172. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_19.
    4. JIRSÍK, Tomáš and Pavel ČELEDA. Enhancing Network Security: Host Trustworthiness Estimation. In Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Heidelberg: Springer Berlin / Heidelberg, 2014, p. 63-68. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_8.
    5. JIRSÍK, Tomáš and Pavel ČELEDA. Identifying Operating System Using Flow-based Traffic Fingerprinting. In Yvon Kermarrec. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg: Springer International Publishing, 2014, p. 70-73. ISBN 978-3-319-13487-1. Available from: https://dx.doi.org/10.1007/978-3-319-13488-8_7.

    2013

    1. ELICH, Martin, Petr VELAN, Tomáš JIRSÍK and Pavel ČELEDA. An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis. Online. In Damla Turgut, Nils Aschenbruck, Jens Tölle. 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). WNM 2013: The 7th IEEE Workshop on Network Measurements. Sydney, Australia: IEEE Xplore Digital Library, 2013, p. 1046-1052. ISBN 978-1-4799-0540-9. Available from: https://dx.doi.org/10.1109/LCNW.2013.6758546.
    2. VELAN, Petr, Tomáš JIRSÍK and Pavel ČELEDA. Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement. In Thomas Bauschert. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8115. Heidelberg: Springer Berlin / Heidelberg, 2013, p. 136-147. ISBN 978-3-642-40551-8. Available from: https://dx.doi.org/10.1007/978-3-642-40552-5_13.
    3. REJCHRT, Jan, Tomáš JIRSÍK and Jan VYKOPAL. Time Series Solver. 2013.
Display details
Displayed: 25/7/2024 22:13