Přeskočit na horní lištu
Přeskočit na hlavičku
Přeskočit na obsah
Přeskočit na patičku
EN
>
Publikace
>
Vyhledávání publikací
Vyhledávání publikací
Pokročilé vyhledávání
Repozitář
Vybrané publikace/výsledky
Počítačová studovna MU zahájila provoz (2000)
Computation of Recursive Programs (1978)
Computation Rules Using Memory I (1986)
Monitorování provozu ve vysokorychlostních sítích na bázi IP toků (2007)
High-Performance Agent System for Intrusion Detection in Backbone Networks (2007)
Collaborative Attack Detection in High-Speed Networks (2007)
Network Intrusion Detection by Means of Community of Trusting Agents (2007)
Agent-Based Network Intrusion Detection System (2007)
High-Speed Network Traffic Acquisition for Agent Systems (2007)
FlowMon Probe (2007)
Hardware Accelerated FlowMon Probe (2007)
CAMNEP: An intrusion detection system for high-speed networks (2008)
Software Diagnostics for Embedded Systems (2007)
CAMNEP: Agent-Based Network Intrusion Detection System (2008)
Hardware Accelerated FlowMon Probe (2007)
Hardware-Accelerated Framework for Flow Monitoring of 10Gbit Networks (2008)
Multi-Agent Approach to Network Intrusion Detection (Demo Paper) (2008)
Collaborative Approach to Network Behavior Analysis (2008)
Secure Remote Configuration of Network Devices - a Case Study (2008)
NETCONF - Secure FlowMon Probe Remote Configuration (2008)
Hardware-Accelerated Framework for Security in High-Speed Networks (2008)
Flow Based Network Intrusion Detection System using Hardware-Accelerated NetFlow Probes (2008)
Improving Anomaly Detection Error Rate by Collective Trust Modeling (2008)
Packet Capture Benchmark on 1 GE (2008)
Projekt CAMNEP - systém detekce průniku ve vysokorychlostních počítačových sítích (2009)
CAMNEP: Multistage Collective Network Behavior Analysis System with Hardware Accelerated NetFlow Probes (2009)
Hardware-Accelerated Flexible Flow Measurement (2009)
Network-based Dictionary Attack Detection (2009)
Validation of the Network-based Dictionary Attack Detection (2009)
Flow Based Security Awareness Framework for High-Speed Networks (2009)
Analýza bezpečnostních rizik počítačové sítě pomocí NetFlow (2009)
IPFIX Based Virtual Network Monitoring (2009)
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes (2009)
NetFlow-based monitoring in the FEDERICA project (2009)
Open-source programové vybavení pro průmyslové systémy (2006)
Diagnostika programového vybavení pomocí inteligentních diagnostických časovačů (2006)
Digital Multiparameter System for Characterizing the Neutron-Gamma Field in the LR-O Experimental Reactor (2007)
Projekt Liberouter - hardwarová akcelerace pro sledování a analyzování provozu ve vysokorychlostních sítích (2008)
Hardware Acceleration of NetFlow Monitoring (2008)
Adaptive Multiagent System for Network Traffic Monitoring (2009)
Improving Host Profiling With Bidirectional Flows (2009)
NetFlow, monitorování IP toků a bezpečnost sítě (2009)
Netflow Based System for NAT Detection (2009)
NetFlow-based NAT detection module (2009)
Projekt obranného výzkumu "CYBER" - bezpečnost informačních a komunikačních systému AČR (2010)
From Signature-Based Towards Behaviour-Based Anomaly Detection (2010)
Hardware Acceleration for Cyber Security (2010)
Chuck Norris aneb Odkud přijde útok? (2010)
NfSen Plugin Supporting the Virtual Network Monitoring (2010)
FEDERICA User Tutorial: Monitoring slices (2010)
Na stopě Chucka Norrise (2010)
Malware Detection From The Network Perspective Using NetFlow Data (2010)
Chuck Norris Botnet (2010)
Aspect-based Attack Detection in Large-scale Networks (2010)
(Ne)bezpečné HTTPS - část I (2010)
Embedded Malware - An Analysis of the Chuck Norris Botnet (2010)
Virtual Network Monitoring in FEDERICA Project (2010)
(Ne)bezpečné HTTPS - část II (2010)
Hardware Acceleration: An Essential Part of Cyber Security in High-Speed Networks (2010)
Chuck Norris botnet detection plugin (2010)
Hardware-Accelerated and Security Research at Masaryk University (2010)
HAMOC - Hardware-Accelerated Monitoring Center (2010)
Bezpečnostní nástrahy protokolu IPv6 (2011)
Inteligentní logovací server (2010)
An Analysis of the Chuck Norris Botnet 2 (2011)
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX (2011)
Revealing Botnets Using Network Traffic Statistics (2011)
Virtual Network Monitoring in FEDERICA Project (2011)
HAMOC - Hardware-Accelerated Monitoring Center (2011)
A Flow-Level Taxonomy and Prevalence of Brute Force Attacks (2011)
Intelligent logging server (2010)
Bezpečnost řídicích systémů inteligentních budov (2011)
Plugin for detecting of time variation in network connections (2011)
BACnet Monitoring Plugins (2011)
Bruteforcing in the Shadows - Evading Automated Detection (2012)
Automatic Network Protection Scenarios Using NetFlow (2012)
Modelling of part medium access methods in the HomePlug (2012)
Extension of the Shared Regional PACS CenterMeDiMed to Smaller Healthcare Institutions (2012)
Network Security Monitoring and Behavior Analysis (2012)
Dependable Networks and Services, 6th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2012 (2012)
Traffic Measurement and Analysis of Building Automation and Control Networks (2012)
Výzkum v oblasti kybernetické bezpečnosti na Masarykově univerzitě od roku 2008 (2012)
Flow-Based Security Issue Detection in Building Automation and Control Networks (2012)
Revealing and Analysing Modem Malware (2012)
Honeynet monitoring plugin (2012)
Geolokace a bezpečnost počítačových sítí (2012)
Army & Academia Cyber Security Research in Czech Republic (2012)
Flow-based Brute-force Attack Detection (2013)
SSH brute-force attack detection plugin (2012)
Local Search Heuristics for Media Streams Planning Problem (2013)
Secure medical multimedia DICOM data transfers over Internet (2012)
PhiGARo – tool for phishing incident processing (2012)
Sharing of knowledge and resources in regional medical imaging (2012)
ICT Systems Monitoring (2012)
Towards User-Aware Multi-Touch Interaction Layer for Group Collaborative Systems (2013)
FlowMon - Plugins for HTTP Monitoring (2012)
NetFlow and IPFIX Geolocation Tools (2012)
COMBOI-ADC (2012)
Medical image data security based on principles of digital watermarking methods (2012)
Metody zabezpečení medicínských obrazových informací využívající principů digitálního vodoznačení (2012)
RdpMonitor - RDP authentication attack detection plugin (2012)
Flow Data Collection in Large Scale Networks (2013)
SimFlow - a similarity-based detection of brute-force attacks (2013)
Large-Scale Geolocation for NetFlow (2013)
Flow-based detection of RDP brute-force attacks (2013)
Flow-based Monitoring of Honeypots (2013)
Media Streams Planning with Transcoding (2013)
Emerging Management Mechanisms for the Future Internet, 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013 (2013)
WARDEN: realtime sharing of detected threats between CSIRT teams (2013)
CSIRT-MU (2009)
Phishing at your own risk (2011)
Network security monitoring working group (2013)
Flow-based Network Protection as an Integral Part of an Early Warning System (2011)
Incident response automation in the Masaryk University network (2013)
GPU-accelerated DXT and JPEG compression schemes for low-latency network transmissions of HD, 2K, and 4K video (2013)
Monitoring, Detection and Reporting of Security Incidents in CESNET NREN (2013)
Practical experience with IPFIX flow collectors (2013)
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement (2013)
Real-time JPEG2000 for Digital Cinema and Large-Scale Image Archiving (2013)
Protocol-independent Detection of Dictionary Attacks (2013)
E-government v České republice: právní a technologické aspekty (2013)
POSTER: Reflected attacks abusing honeypots (2013)
Důvody vzniku Zákona o kybernetické bezpečnoti (2013)
An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis (2013)
DNSAnomDet (2014)
3.5 Million Smartmeters in the Cloud (2013)
Time Series Solver (2013)
Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet (2013)
Fully-automated Occlusion-insensitive Norway Spruce Tree Reconstructions from 3D Point Cloud Data [poster] (2013)
Automatic Tree Reconstruction from its Laser Scan [poster] (2013)
Automatic reconstruction of Norway spruce tree models from LiDAR data (2013)
Three-dimensional Tree Reconstructions from Terrestrial LiDAR Scans (2013)
European ICT Law 2013 Texts, Cases, Materials (2013)
Kalman filter improvement for gyroscopic mouse movement smoothing (2013)
Influence of the TCP packet setting and encryption for data transfer in medical applications (2013)
The possibilities of using single-board computers for medical data transmission security (2013)
Perun - user and resources management system (2013)
MEDIMED Shared Regional PACS Center (2013)
RemSig - Bezpečné úložiště digitálních certifikátů (2013)
BBMRI_CZ Index Service (2013)
THALAMOSS Data Management Platform (2013)
VLANManager (2013)
CoUniverse 1.0 (2013)
MUSE framework 1.1.1 (2013)
Cybernetic Proving Ground (2013)
FlowMon - TCP Input Filter Plugin (2013)
ExternalDNS (2013)
PhiGARo HTTP(S) – tool for phishing incident processing (2013)
libanim - JavaScript animation library (2013)
Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií (2013)
trendMonitoring (2013)
Analýza vývoje telekomunikací pro ČEZ Distribuční služby, s.r.o. (2013)
Integration Concept in Regional Medical Imaging (2013)
Cloud-based Testbed for Simulation of Cyber Attacks (2014)
Cloud-based Security Research Testbed: A DDoS Use Case (2014)
Enhancing Network Security: Host Trustworthiness Estimation (2014)
Systém pro ovládání videokonferenčních zařízení (2013)
Aplikace pro mobilní telefon pro ovládání externích videokonferenčních zařízení (2013)
Jednotka pro vyhodnocování optického spektra (2013)
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX (2014)
Next Generation Application-Aware Flow Monitoring (2014)
Vulnerability analysis methods for road networks (2014)
POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats (2014)
Future of DDoS Attacks Mitigation in Software Defined Networks (2014)
e-Sbírka a e-Legislativa (2014)
Jazyková analýza a autorské právo (2014)
Předávání informací mezi CERT a policií (2014)
Aktuální otázky kyberkriminality II. (2014)
Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches (2014)
8th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014) (2014)
Comparative Study of Negative Aspects Elimination of Medical Image Watermarking Methods (2014)
Similarity as a central approach to flow-based anomaly detection (2014)
Perun – Modern Approach for User and Service Management (2014)
Media Streams Planning with Uncertain Link Capacities (2014)
Continuous Queries over Distributed Streams of Heterogeneous Monitoring Data in Cloud Datacenters (2014)
Identifying Operating System Using Flow-based Traffic Fingerprinting (2014)
Detection of DNS Traffic Anomalies in Large Networks (2014)
PhiGARo: Automatic Phishing Detection and Incident Response Framework (2014)
Intellectual property on the internet - filesharing and legal protection of the software (2014)
Autorský zákon (2014)
A Survey on Intrusion Detection and Prevention Systems (2014)
Local Search Heuristics for Media Streams Planning with Transcoding (2014)
Cyber security in the Czech republic (2014)
European ICT Law 2014 Texts, Cases, Materials (2014)
Uspořádání vícecestného dvouparametrického spektrometrického systému (2015)
Užívání znaků Masarykovy univerzity (2014)
Cooperation between CERT and LEA in the Czech republic (2014)
Computer applications systems and networks for medical education : MEFANET: Czech and Slovak Medical Faculties Network (2014)
Securing a Publicly Accessible Database of Medical Images Using Watermarking with Direct Diagnose Capability (2014)
Uchovávání provozních údajů pro účely vyúčtování poskytnutých služeb elektronických komunikací (2013)
MUSE framework 1.5 (2014)
DWY Time Series Decomposition Model (2014)
InstantPACS (2014)
Zálohovací a dohledový systém pro InstantPACS (2014)
Cybernetic Proving Ground - Cloud-based Testbed for Simulation of Cyber Attacks (2014)
Data advokátů v cloudu (2015)
Rozvoj detekčních schopností a platformy sonda/kolektor (2014)
Deploying Honeypots and Honeynets: Issue of Privacy (2015)
Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting (2015)
Lessons Learned from KYPO – Cyber Exercise & Research Platform Project (2015)
Security Monitoring of HTTP Traffic Using Extended Flows (2015)
High-Density Network Flow Monitoring (2015)
Hardware Accelerated Flow Measurement of 100G Ethernet (2015)
A Survey of Methods for Encrypted Traffic Classification and Analysis (2015)
European ICT Law 2015 Texts, Cases, Materials (2015)
Tor-based Malware and Tor Connection Detection (2014)
KYPO - Kybernetický polygon (2015)
Software pro konfiguraci a monitorování virtuálního prostředí KYPO (2015)
Software pro vizualizaci virtuálního prostředí KYPO (2015)
Ruby Benchmark Suite using Docker (2015)
KYPO – A Platform for Cyber Defence Exercises (2015)
Celkové závěry a doporučení k projektu přípravných rešerší k AMM (2015)
HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting (2016)
A Performance Benchmark of NetFlow Data Analysis on Distributed Stream Processing Systems (2016)
Legalita penetračního testování (2015)
Analýza SSL provozu (2015)
Electronic legislation in the Czech Republic (2015)
Trestněprávní souvislosti bezpečnostních incidentů (2015)
Kybernetická bezpečnost v ČR (2015)
Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark (2016)
Elektronické důkazní prostředky (2015)
Data jako důkaz v trestním řízení (2015)
Dokazování odposlechem (2015)
Trestní odpovědnost při zajišťování kybernetické bezpečnosti (2015)
Detekce zranitelností a útoků pomocí NetFlow dat, validace zranitelností na systému FlowMon (2015)
Detecting Advanced Network Threats Using a Similarity Search (2016)
Break your network. Responsibly. (2015)
První návrh cílové infrastruktury pro provoz systému IRIS (2015)
Iterative Optimization of a Multi-compartmental Air Quality Modelling System (2015)
Network Traffic Characterisation Using Flow-Based Statistics (2016)
Elektronické důkazy v trestním řízení (2015)
Elektronické důkazy v trestním řízení (2015)
Network Defence Using Attacker-Defender Interaction Modelling (2016)
Numerical and experimental investigation of three-dimensional cavitating flow around the straight NACA2412 hydrofoil (2016)
On the Design of Security Games: From Frustrating to Engaging Learning (2016)
On Information Value of Top N Statistics (2016)
Představení dokumentů vytvořených v rámci projektu InovaCOM (2013)
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization (2015)
Exchanging Security Events: Which And How Many Alerts Can We Aggregate? (2017)
Finding Exercise Equilibrium: How to Support the Game Balance at the Very Beginning? (2017)
Stream4Flow: Software for mining and analysis of the large volumes of network traffic (2016)
Using Markdown Inside TeX Documents (2017)
Honeypot Testbed for Network Defence Strategy Evaluation (2017)
Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study (2017)
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts (2017)
Protection of personal data in security alert sharing platforms (2017)
Towards a Unified Data Storage and Generic Visualizations in Cyber Ranges (2017)
Situational Awareness: Detecting Critical Dependencies and Devices in a Network (2017)
Visual Analytics for Network Security and Critical Infrastructures (2017)
Toward Stream-Based IP Flow Analysis (2017)
Semantic Vector Encoding and Similarity Search Using Fulltext Search Engines (2017)
KYPO Cyber Range: Design and Use Cases (2017)
Mathematics Index and Search in DSpace (2017)
Nařízení GDPR a jeho implementace na vysokých školách v ČR – jak na to (2017)
Dynamic Reconfiguration in Multigroup Multicast Routing under Uncertainty (2018)
Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range (2017)
Timely Feedback in Unstructured Cybersecurity Exercises (2018)
Challenges Arising from Prerequisite Testing in Cybersecurity Games (2018)
Flexible Similarity Search of Semantic Vectors Using Fulltext Search Engines (2017)
European ICT Law 2017: Texts, Cases, Materials (2017)
Dokumenty ke studiu práva informačních a komunikačních technologií (2017)
Reversible Watermarking in Medical Imaging with Zero Distortion in ROI (2017)
Vector Space Representations in Information Retrieval (2017)
BiobankUniverse: automatic matchmaking between datasets for biobank data discovery and integration (2017)
A Decentralized IT Architecture for Locating and Negotiating Access to Biobank Samples (2017)
Conception and Implementation of an Austrian Biobank Directory Integration Framework (2017)
Four simple recommendations to encourage best practices in research software (2017)
Math Information Retrieval for Digital Libraries (2017)
Passive OS Fingerprinting Methods in the Jungle of Wireless Networks (2018)
Systém pro sběr, uchování a analýzu síťových dat velkého rozsahu (2017)
Passive OS Fingerprinting Prototype Demonstration (2018)
Community Based Platform for Vulnerability Categorization (2018)
TeX na školách? Samozřejmě ano! Příklad užití TeXu na Fakultě informatiky Masarykovy univerzity (2017)
Enhancing Cybersecurity Skills by Creating Serious Games (2018)
Towards Predicting Cyber Attacks Using Information Exchange and Data Mining (2018)
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors (2018)
Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use? (2018)
CRUSOE: Data Model for Cyber Situation Awareness (2018)
Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets (2018)
Toward Real-time Network-wide Cyber Situational Awareness (2018)
Stream4Flow: Real-time IP Flow Host Monitoring using Apache Spark (2018)
Data protection impact assessment before open data publication (2018)
Evaluation of Cyber Defense Exercises Using Visual Analytics Process (2018)
Gathering Insights from Teenagers' Hacking Experience with Authentic Cybersecurity Tools (2018)
MIaS: Math-Aware Retrieval in Digital Mathematical Libraries (2018)
Implementation Notes for the Soft Cosine Measure (2018)
Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations (2018)
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security (2019)
Annotated Corpus of Czech Case Law for Reference Recognition Tasks (2018)
European ICT Law 2018: Texts, Cases, Materials (2018)
Právo informačních technologií (2018)
Common ELIXIR Service for Researcher Authentication and Authorisation (2018)
Weighting of Passages in Question Answering (2018)
Reflective Diary for Professional Development of Novice Teachers (2019)
Towards Learning Analytics in Cybersecurity Capture the Flag Games (2019)
Analyzing User Interactions with Cybersecurity Games (2019)
Indexování a vyhledávání matematických formulí (2018)
Real-time Pattern Detection in IP Flow Data using Apache Spark (2019)
Quality of Service Forecasting with LSTM Neural Network (2019)
Time Series Analyzer: Software for analysis of performance time series (2018)
Threat Detection Through Correlation of Network Flows and Logs (2018)
Current Issues of Malicious Domains Blocking (2019)
DNS Firewall Data Visualization (2019)
Právní limity nakládání s údaji o zdravotním stavu (2017)
Metodika bitové ochrany digitálních dat (2019)
Příprava Zpravodaje CSTUG (2018)
Enabling SSH Protocol Visibility in Flow Monitoring (2019)
Application-Aware Flow Monitoring (2019)
IT Operations Analytics: Root Cause Analysis via Complex Event Processing (2019)
Semantically Coherent Vector Space Representations (2019)
Soft Cosine Measure: Capturing Term Similarity in the Bag of Words VSM (2019)
Video699: Interconnecting Lecture Recordings with Study Materials (2019)
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture (2018)
Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense (2018)
Markdown 2.7.0: Towards lightweight markup in TeX (2019)
Enhancing Reuse of Data and Biological Material in Medical Research: From FAIR to FAIR-Health (2018)
PhenoMeNal: processing and analysis of metabolomics data in the cloud (2019)
Informační bezpečnost žáků základních škol. Lekce v knihovnách (2019)
Informační bezpečnost žáků základních škol. Lekce v knihovnách (2019)
GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform (2019)
Decision Support for Mission-Centric Cyber Defence (2019)
Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study (2019)
Behavior-Aware Network Segmentation using IP Flows (2019)
Leveraging European infrastructures to access 1 million human genomes by 2022 (2019)
Metodika aplikace GDPR na výzkumná data v prostředí vysokých škol v ČR (2018)
Pan-European Data Harmonization for Biobanks in ADOPT BBMRI-ERIC (2019)
KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems (2020)
What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences (2020)
Benefits and Pitfalls of Using Capture The Flag Games in University Courses (2020)
Quo Vadis, Math Information Retrieval (2019)
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (2020)
Using TLS Fingerprints for OS Identification in Encrypted Traffic (2020)
Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks (2020)
Informační bezpečnost žáků základních škol : lekce v knihovnách (2019)
Připravujeme copyright asistenty? (2019)
Copyright Literacy of LIS Students in the Czech Republic (2019)
Information Literacy of Masaryk University Students and Evaluation of Campus-Wide Course (2019)
Software pro simulaci obecných i kritických informačních infrastruktur (2019)
Software pro detekci a analýzu napadení KII (2019)
Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury (2019)
Nástroj pro zmírňování a potlačování útoků na kritickou informační infrastrukturu (2019)
Software pro provádění bezpečnostních cvičení a školení (2019)
CEP-Server: Software pro vyhodnocování a dotazování komplexních událostí v doméně ITOA (2019)
Czech Republic (2018)
Predictions of Network Attacks in Collaborative Environment (2020)
Decision Support for Mission-Centric Network Security Management (2020)
Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training (2021)
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach (2020)
Cooperation between CSIRTs and Law Enforcement: interaction with the Judiciary (2018)
Kurz rozvoje digitálních kompetencí: zkušenost se vzájemným hodnocením v univerzitním online kurzu (2020)
On the Impact of Flow Monitoring Configuration (2020)
Teaching Lab: Training Novice Computer Science Teachers (2020)
Cyber Situation Awareness via IP Flow Monitoring (2020)
Traffic and Log Data Captured During a Cyber Defense Exercise (2020)
BBMRI-ERIC’s contributions to research and knowledge exchange on COVID-19 (2020)
Library advocacy ve vysokoškolské knihovně (2020)
SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security (2020)
How Does a Student-Centered Course on Communication and Professional Skills Impact Students in the Long Run? (2020)
Markdown 2.8.1: Směle k trůnu odlehčeného značkování v TeXu (2020)
Non-repudiable provenance for clinical decision support systems (2021)
Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version) (2020)
Three is Better than One: Ensembling Math Information Retrieval Systems (2020)
Making Markdown into a microwave meal (2020)
Geovisto: A Toolkit for Generic Geospatial Data Visualization (2021)
When Tesseract Does It Alone: Optical Character Recognition of Medieval Texts (2020)
Towards Useful Word Embeddings: Evaluation on Information Retrieval, Text Classification, and Language Modeling (2020)
The Art of Reproducible Machine Learning: A Survey of Methodology in Word Vector Experiments (2020)
Cthulhu Hails from Wales: N-gram Frequency Analysis of R'lyehian (2020)
The Stack: Unplugged Activities for Teaching Computer Science (2021)
Toward Guidelines for Designing Cybersecurity Serious Games (2021)
Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges (2021)
Cyberspace 2020 (2020)
Software pro evidenci zranitelností v počítačové síti (2020)
Software pro podporu rozhodování při řešení bezpečnostního incidentu (2020)
Host Behavior in Computer Network: One-Year Study (2021)
Zero Watermarking: Critical Analysis of Its Role in Current Medical Imaging (2021)
Geovisto: Toolkit for Generic Geospatial Data Visualization (2021)
Právní aspekty sdílení dat v rámci informačních technologií konceptu Smart City v dopravě a jejich dopady do práva veřejných zakázek (2020)
Budoucnost knihoven (2019)
Nettmap2 - Interaktivní nástroj pro zobrazení síťové topologie vizualizující data z Flowmon řešení (2020)
Interpretable Document Representations for Fast and Accurate Retrieval of Mathematical Information (2021)
Adaptér pro systém pro správu zdrojů (2020)
Simulační prostředí pro testování průmyslových aplikací (2020)
Nástroj pro simulaci chování průmyslových komponent (2020)
Stream-Based IP Flow Analysis (2021)
PCAPFunnel: A Tool for Rapid Exploration of Packet Capture Files (2021)
Enhancing Situational Awareness for Tutors of Cybersecurity Capture the Flag Games (2021)
ARCLib (2020)
Projekt ARCLib – vývoj open-source řešení pro dlouhodobou archivaci digitálních dokumentů pro knihovny a další paměťové instituce – aktuální stav (2019)
WebMIaS on Docker: Deploying Math-Aware Search in a Single Line of Code (2021)
Michal Kolmaš: National Identity and Japanese Revisionism (2021)
Lex Rosetta: Transfer of Predictive Models Across Languages, Jurisdictions, and Legal Domains (2021)
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption (2021)
GRANEF: Utilization of a Graph Database for Network Forensics (2021)
BBMRI-ERIC Negotiator: Implementing Efficient Access to Biobanks (2021)
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training (2021)
Reinforcing Cybersecurity Hands-on Training With Adaptive Learning (2021)
Scalable Learning Environments for Teaching Cybersecurity Hands-on (2021)
Enabling Trustworthy and Traceable Research by Non-Repudiable Opaque Provenance in a Distributed Environment (2021)
ISO 23494: Biotechnology – Provenance Information Model for Biological Specimen And Data (2021)
Even if users do not read security directives, their behavior is not so catastrophic (2022)
Cyber Range: Preparing for Crisis or Something Just for Technical People? (2021)
One Size Does Not Fit All: Finding the Optimal Subword Sizes for FastText Models across Languages (2021)
System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling (2021)
Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations (2021)
Regressive Ensemble for Machine Translation Quality Evaluation (2021)
Dataset of Shell Commands Used by Participants of Hands-on Cybersecurity Training (2021)
Ensembling Ten Math Information Retrieval Systems: MIRMU and MSM at ARQMath 2021 (2021)
Data-driven insight into the puzzle-based cybersecurity training (2022)
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises (2022)
Automated annotations of epithelial cells and stroma in hematoxylin–eosin-stained whole-slide images using cytokeratin re-staining (2022)
GA4GH: International policies and standards for data sharing across genomic research and healthcare (2021)
Cloud Native Data Platform for Network Telemetry and Analytics (2021)
Topic Modelling of Czech Supreme Court Decisions: Evaluation of Legal Experts (2021)
BBMRI-CZ as a Partner for Personalized Medicine and Translational Medical Research (2020)
Expanding the BBMRI-ERIC Directory into a Global Catalogue of COVID-19–Ready Collections: A Joint Initiative of BBMRI-ERIC and ISBER (2020)
The Data Use Ontology to streamline responsible access to human biomedical datasets (2021)
Application of Super-Resolution Models in Optical Character Recognition of Czech Medieval Texts (2021)
When Tesseract Brings Friends: Layout Analysis, Language Identification, and Super-Resolution in the Optical Character Recognition of Medieval Texts (2021)
Vyhledávání české judikatury v praxi: potřeby uživatele vs. aktuální výzkumné metody (2021)
Proporcionalita krizových opatření omezujících svobodu pohybu (2021)
How Do Users Chain Email Accounts Together? (2021)
Preventing Cheating in Hands-on Lab Assignments (2022)
Cyberspace 2021 (2021)
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic (2022)
CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling (2022)
Software pro měření a vyhodnocení výkonnostních parametrů (2021)
Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering (2022)
Otevřená dílna v knihovně: podpora kreativity, digitálních kompetencí a komunity (2021)
Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications (2022)
Identification of Attack Paths Using Kill Chain and Attack Graphs (2022)
Vizuálně-analytická konzole pro ICS (2021)
Prototypová implementace nástroje pro vizuální analýzu časově orientovaných dat (2021)
Virtualizované prostředí pro trénink CSIRT týmu (2021)
Encrypted Web Traffic Dataset: Event Logs and Packet Traces (2022)
Handling Internet Activism during the Russian Invasion of Ukraine: A Campus Network Perspective (2022)
Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training (2022)
Mission-centric Decision Support in Cybersecurity via Bayesian Privilege Attack Graph (2022)
Integration of Biobanks in National eHealth Ecosystems Facilitating Long-Term Longitudinal Clinical-Omics Studies and Citizens' Engagement in Research Through eHealthBioR. (2021)
'Releasing the Hounds?' Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations (2022)
Position paper on management of personal data in environment and health research in Europe (2022)
Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance (2022)
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations (2022)
ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence (2022)
A Revealed Imperfection in Concept Drift Correction in Metabolomics Modeling (2022)
Jak citovat: citační styly (2022)
Jak citovat: citační styly (2022)
Markdown 2.10.0: LaTeX themes & snippets, two flavors of comments, and LuaMetaTeX (2021)
Markdown 2.10.0: LaTeXová témata a snippety (2021)
The Common Provenance Model: Capturing Distributed Provenance in Life Sciences Processes (2022)
Lightweight Distributed Provenance Model for Complex Real–world Environments (2022)
Usability Insights from Establishing TLS Connections (2022)
Designing Adaptive Cybersecurity Hands-on Training (2022)
From DSpace to Islandora : why and how (2022)
Podporujeme nadané prvňáčky (2022)
Vliv technologických nástrojů na ústavnost krizových opatření omezujících svobodu pohybu (2022)
Cyberspace 2022 (2022)
Overleaf: Kolaborativní webový editor LaTeXu (2021)
Detection of Malicious Code in SSH programs. (2022)
Towards a Visual Analytics Workflow for Cybersecurity Simulations (2023)
Digitalia MUNI ARTS – více než digitální knihovna : výzkumná infrastruktura Filozofické fakulty Masarykovy univerzity a systém Islandora (2022)
Přehled aktuální judikatury II/2022 (2022)
Towards Interactive Geovisualization Authoring Toolkit for Industry Use Cases (2023)
Smart Environment for Adaptive Learning of Cybersecurity Skills (2023)
Omezení pohybu v souvislosti s řešením krizí způsobených biologickými agens a toxiny (doporučení) (2022)
Dohledové centrum pro monitorování výrobních informačních systémů (2022)
The Road to Autonomous Security (2022)
České právo a informační technologie 2022 (2022)
Software pro integrovaný datový pohled na chráněnou infrastrukturu (2022)
Hierarchical Modeling of Cyber Assets in Kill Chain Attack Graphs (2024)
Kolaborativní prostředí pro členy bezpečnostních týmů (2022)
SW pro ovládání nástrojů ofenzivní bezpečnosti (2022)
SW pro statickou verifikaci bezpečnostních opatření (2022)
SW pro dynamickou verifikaci bezpečnostních opatření (2022)
Software pro přípravu a realizaci bezpečnostních her (2022)
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms (2023)
Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic (2023)
Security Operations Center (SOC) aneb nepřeceňujte jeden článek systému (část I.) (2022)
Security Operations Center (SOC) aneb nepřeceňujte jeden článek systému (část II.) (2022)
Security Operations Center (SOC) aneb nepřeceňujte jeden článek systému (část III.) (2022)
Jak na vizuální úpravu e-learningového kurzu? (2022)
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. (2023)
How can network traffic lie? (2023)
Analýza systému pro podporu efektivní spolupráce distribuovaných zdravotnických týmů (2022)
Organizační, technický a právní model sdíleného SOC (2022)
Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences (2022)
Software pro sběr a vyhodnocení dat z bezpečnostních her (2022)
Software inteligentního asistenta pro hraní bezpečnostních her (2022)
Analytická studie rozvoje a nasazení SOC (2022)
Platforma pro realizaci kyberbezpečnostních kurzů (2022)
Using relational graphs for exploratory analysis of network traffic data (2023)
From Bin to Playin’: Give Vintage Objects a New Purpose as Game Controllers (2023)
Passive Operating System Fingerprinting Revisited: Evaluation and Current Challenges (2023)
Reflecting on Hybrid Events: Learning from a Year of Hybrid Experiences (2023)
On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics (2023)
GA4GH: International policies and standards for data sharing across genomic research and healthcare (2021)
Dostupnost mediálního obsahu: blokování dezinformačních webů (2023)
Privacy and Technology Law Czech Republic: Information Technology Law (2023)
Recommending Similar Devices in Close Proximity for Network Security Management (2023)
xOpat: eXplainable Open Pathology Analysis Tool (2023)
A Model of Qualitative Factors in Forensic-Ready Software Systems (2023)
A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture (2023)
Recenze závěrečných prací I/2023 (2023)
Kvantitativní přístup v kvalitativní doméně práva: odpověď autorů (2023)
Forensic experts' view of forensic-ready software systems: A qualitative study (2023)
BPMN4FRSS: An BPMN Extension to Support Risk-Based Development of Forensic-Ready Software Systems (2023)
Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform (2023)
Q2 (Quantum Square): Quantum Questions for Social Sciences & Humanities (2023)
CICM'21 Systems Entries (2021)
The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments (2024)
Cyber Key Terrain Identification Using Adjusted PageRank Centrality (2024)
Data Loss Prevention Solution for Linux Endpoint Devices (2023)
A review on graph-based approaches for network security monitoring and botnet detection (2024)
The 4th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2023) (2023)
Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection (2023)
Unraveling Network-based Pivoting Maneuvers: Empirical Insights and Challenges (2024)
Cyberspace 2023 (2023)
Recenze závěrečných prací I/2023 (2023)
First Global Report on the State of Artificial Intelligence in Legal Practice (2023)
Regulation of Cryptography and Dual-Use Goods (2023)
Online Public Services (2023)
Sector-Specific Obligations (2023)
Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design (2024)
FREAS: Forensic-Ready Analysis Suite (2024)
Slovník mediální gramotnosti (2024)
NETWORK PHYSICAL LAYER ATTACK IN THE VERY HIGH CAPACITY NETWORKS (2023)
Long Distance Military Fiber-Optic Polarization Sensor Improved by an Optical Amplifier (2023)
Optimization of a polarized light detector for a polarizing optical fiber sensor (2023)
Forensic experts' view of forensic-ready software systems: A qualitative study (2024)
Software pro podporu orchestrace bezpečnosti a řízení životního cyklu hrozeb (2022)
Odebrat vše z výběru
Operace s vybranými výsledky
Export a tisk
Seznam vybraných záznamů
Další aplikace
Publikace
Informační systém