-
RUMAN, Ádám, Martin DRAŠAR, Lukáš SADLEK, Shanchieh Jay YANG a Pavel ČELEDA. Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Online. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. New York, United States: Association for Computing Machinery, 2024, s. 1-11. ISBN 979-8-4007-1718-5. Dostupné z: https://dx.doi.org/10.1145/3664476.3664523.Podrobněji: https://is.muni.cz/publication/2407277/cs
-
DRAŠAR, Martin, Ádám RUMAN, Pavel ČELEDA a Yang SCHANCHIEH. The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments. Online. In Sokratis Katsikas et al. ESORICS 2023: Computer Security. ESORICS 2023 International Workshops. Neuveden: Springer Nature Switzerland AG, 2024, s. 738-749. ISBN 978-3-031-54128-5. Dostupné z: https://dx.doi.org/10.1007/978-3-031-54129-2_43.Podrobněji: https://is.muni.cz/publication/2303042/cs
-
DRAŠAR, Martin. Perception of the Environment. Online. In Kott, Alexander. Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide. 1. vyd. Cham: Springer International Publishing, 2023, s. 47-61. Advances in Information Security, 87. ISBN 978-3-031-29269-9. Dostupné z: https://dx.doi.org/10.1007/978-3-031-29269-9_3.Podrobněji: https://is.muni.cz/publication/2289479/cs
-
RUSŇÁK, Vít a Martin DRAŠAR. Towards a Visual Analytics Workflow for Cybersecurity Simulations. Online. In Christophe Hurter, Helen Purchase, Kadi Bouatouch. Proceedings of VISIGRAPP2023 - Volume3: IVAPP. To appear. Lisbon, Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2023, s. 179-186. ISBN 978-989-758-634-7. Dostupné z: https://dx.doi.org/10.5220/0011695000003417.Podrobněji: https://is.muni.cz/publication/2237959/cs
-
DRAŠAR, Martin, Ádám RUMAN a Vít RUSŇÁK. SW pro dynamickou verifikaci bezpečnostních opatření. 2022.Podrobněji: https://is.muni.cz/publication/2250101/cs
-
DRAŠAR, Martin. The Road to Autonomous Security. 2022.Podrobněji: https://is.muni.cz/publication/2249378/cs
-
KOTT, Alexander, Paul THERON, Luigi MANCINI, Edlira DUSHKU, Agostino PANICO, Martin DRAŠAR, Benoit LEBLANC, Paul LOSIEWICZ, Alessandro GUARINO, Mauno PIHELGAS a Krzysztof RZADCA. An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. THOUSAND OAKS: SAGE PUBLICATIONS INC, 2020, roč. 17, č. 1, s. 51-54. ISSN 1548-5129. Dostupné z: https://dx.doi.org/10.1177/1548512919886163.Podrobněji: https://is.muni.cz/publication/1763778/cs
-
ANALYZA – Datový sklad (software)REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Daniel TOVARŇÁK, Pavel ZEZULA, Martin MACÁK, Matúš GUOTH, Matej BABEJ, Dávid BRILLA a Martin KAŽIMÍR. ANALYZA – Datový sklad. 2020.Podrobněji: https://is.muni.cz/publication/1736344/cs
-
ANALYZA – Vizualizační komponenta – Visilant (software)REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Jarešová MIROSLAVA, Barbora KOZLÍKOVÁ, Kristína ZÁKOPČANOVÁ, Pavel ZEZULA, Katarína FURMANOVÁ, Marko ŘEHÁČEK, Jozef BÁTRNA a Daniel PLAKINGER. ANALYZA – Vizualizační komponenta – Visilant. 2020.Podrobněji: https://is.muni.cz/publication/1736358/cs
-
THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysztof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI a Fabio DE GASPARI. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems. Online. In Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman. Adaptive Autonomous Secure Cyber Systems. Cham: Springer International Publishing, 2020, s. 1-21. ISBN 978-3-030-33432-1. Dostupné z: https://dx.doi.org/10.1007/978-3-030-33432-1_1.Podrobněji: https://is.muni.cz/publication/1638199/cs
-
DRAŠAR, Martin, Stephen MOSKAL, Shanchieh Jay YANG a Pavol ZAŤKO. Session-level Adversary Intent-Driven Cyberattack Simulator. Online. In Dusan Maga, Jiri Haek. DS-RT '20: Proceedings of the IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications. Praha: IEEE, 2020, s. 7-15. ISBN 978-1-7281-7343-6.Podrobněji: https://is.muni.cz/publication/1679082/cs
-
DRAŠAR, Martin, Ádám RUMAN, Adam SKRÁŠEK a Matúš GALBA. CEP-Server: Software pro vyhodnocování a dotazování komplexních událostí v doméně ITOA. 2019.Podrobněji: https://is.muni.cz/publication/1613637/cs
-
DRAŠAR, Martin a Tomáš JIRSÍK. IT Operations Analytics: Root Cause Analysis via Complex Event Processing. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, s. 741-742. ISBN 978-1-72810-618-2.Podrobněji: https://is.muni.cz/publication/1524436/cs
-
ČELEDA, Pavel, Jakub ČEGAN, Martin DRAŠAR, Ivo NUTÁR, Jiří RÁJA, Tomáš REBOK, Andrej TOMČI a Daniel TOVARŇÁK. Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury. 2019.Podrobněji: https://is.muni.cz/publication/1611336/cs
-
KOTT, Alexander, Paul THERÓN, Luigi V MANCINI, Martin DRAŠAR, Edlira DUSHKU, Günther HEIKO, Markus KONT, Benoît LEBLANC, Agostino PANICO, Mauno PIHELGAS a Krzysztof RZADCA. Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense. 2018.Podrobněji: https://is.muni.cz/publication/1529242/cs
-
THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysytof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI a Agostino PANICO. Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. Online. In 2018 International Conference on Military Communications and Information Systems (ICMCIS). Warsaw, Poland: IEEE, 2018, s. 1-9. ISBN 978-1-5386-4559-8. Dostupné z: https://dx.doi.org/10.1109/ICMCIS.2018.8398730.Podrobněji: https://is.muni.cz/publication/1529241/cs
-
ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR a Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, s. 1-8. ISBN 978-3-903176-09-6. Dostupné z: https://dx.doi.org/10.23919/TMA.2018.8506498.Podrobněji: https://is.muni.cz/publication/1420697/cs
-
ŠPAČEK, Stanislav, Pavel ČELEDA, Martin DRAŠAR a Martin VIZVÁRY. Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. SPI 2017 - Security and Protection of Information 2017. Brno: Univerzita obrany, 2017, s. 143-158. ISBN 978-80-7231-414-0.Podrobněji: https://is.muni.cz/publication/1382042/cs
-
DRAŠAR, Martin a Jana KOMÁRKOVÁ. Estimating Parameters of Target's Detection Methods. Online. In Michal Pechoucek, Alexander Kott. Proceedings of the NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience. Praha: CEUR Workshop Proceedings, 2017, s. 84-89. ISSN 1613-0073.Podrobněji: https://is.muni.cz/publication/1405330/cs
-
MEDKOVÁ, Jana, Martin HUSÁK a Martin DRAŠAR. Network Defence Strategy Evaluation: Simulation vs. Live Network. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, s. 81-88. ISBN 978-3-901882-89-0. Dostupné z: https://dx.doi.org/10.23919/INM.2017.7987267.Podrobněji: https://is.muni.cz/publication/1379728/cs
-
DRAŠAR, Martin a Pavel MINAŘÍK. Overview and Evaluation of Methods and Tools for Complex Event Processing. 2017, 11 s.Podrobněji: https://is.muni.cz/publication/1414429/cs
-
VELAN, Petr, Milan ČERMÁK, Pavel ČELEDA a Martin DRAŠAR. A Survey of Methods for Encrypted Traffic Classification and Analysis. International Journal of Network Management. John Wiley & Sons, Ltd., 2015, roč. 25, č. 5, s. 355-374. ISSN 1055-7148. Dostupné z: https://dx.doi.org/10.1002/nem.1901.Podrobněji: https://is.muni.cz/publication/1305020/cs
-
KOUŘIL, Daniel, Tomáš REBOK, Tomáš JIRSÍK, Jakub ČEGAN, Martin DRAŠAR, Martin VIZVÁRY a Jan VYKOPAL. Cloud-based Testbed for Simulation of Cyber Attacks. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, s. 1-6. ISBN 978-1-4799-0913-1. Dostupné z: https://dx.doi.org/10.1109/NOMS.2014.6838298.Podrobněji: https://is.muni.cz/publication/1179611/cs
-
DRAŠAR, Martin, Tomáš JIRSÍK a Martin VIZVÁRY. Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches. In Sperotto, Anna and Doyen, Guillaume and Latré, Steven and Charalambides, Marinos and Stiller, Burkhard. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin: Springer Berlin Heidelberg, 2014, s. 160-172. ISBN 978-3-662-43861-9. Dostupné z: https://dx.doi.org/10.1007/978-3-662-43862-6_19.Podrobněji: https://is.muni.cz/publication/1192611/cs
-
DRAŠAR, Martin, Martin VIZVÁRY a Jan VYKOPAL. Similarity as a central approach to flow-based anomaly detection. International Journal of Network Management. John Wiley & Sons, Ltd., 2014, roč. 24, č. 4, s. 318-336. ISSN 1055-7148. Dostupné z: https://dx.doi.org/10.1002/nem.1867.Podrobněji: https://is.muni.cz/publication/1192777/cs
-
ČELEDA, Pavel, Iva KREJČÍ a Jan VYKOPAL. 8th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014). 2014.Podrobněji: https://is.muni.cz/publication/1192683/cs
-
VYKOPAL, Jan, Martin DRAŠAR a Philipp WINTER. Flow-based Brute-force Attack Detection. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. Stuttgart: Fraunhofer Verlag, 2013, s. 41-51. ISBN 978-3-8396-0474-8.Podrobněji: https://is.muni.cz/publication/1076305/cs
-
HUSÁK, Martin a Martin DRAŠAR. Flow-based Monitoring of Honeypots. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, s. 63-70. ISBN 978-80-7231-922-0.Podrobněji: https://is.muni.cz/publication/1112293/cs
-
ČEGAN, Jakub, Tomáš ŠÍMA, Jan SOUKAL a Martin DRAŠAR. PhiGARo HTTP(S) – tool for phishing incident processing. 2013.Podrobněji: https://is.muni.cz/publication/1166324/cs
-
DRAŠAR, Martin. Protocol-independent Detection of Dictionary Attacks. In Thomas Bauschert. Advances in Communication Networking. Berlin: Springer Berlin Heidelberg, 2013, s. 304-309. ISBN 978-3-642-40551-8. Dostupné z: https://dx.doi.org/10.1007/978-3-642-40552-5_30.Podrobněji: https://is.muni.cz/publication/1121073/cs
-
DRAŠAR, Martin, Martin HUSÁK, Jakub ČEGAN, Martin VIZVÁRY, Milan ČERMÁK a Tomáš PLESNÍK. Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií. 2013.Podrobněji: https://is.muni.cz/publication/1166363/cs
-
DRAŠAR, Martin a Jan VYKOPAL. Bruteforcing in the Shadows - Evading Automated Detection. 2012.Podrobněji: https://is.muni.cz/publication/970621/cs
-
ČEGAN, Jakub, Jan SOUKAL, Martin DRAŠAR a Jan VYKOPAL. PhiGARo – tool for phishing incident processing. 2012.Podrobněji: https://is.muni.cz/publication/1080515/cs
2024
2023
2022
2020
2019
2018
2017
2015
2014
2013
2012
Zobrazeno: 16. 12. 2024 22:47