Your selection contains 168 outcomes. Edit selection.
Filter publications

    2020

    1. ČECH, Michal, Roman CHRENŠŤ, Daniel TOVARŇÁK and Tomáš PLESNÍK. Adaptér pro systém pro správu zdrojů (Asset management adapter). 2020.
    2. KRAUS, Lydia, Martin UKROP, Václav MATYÁŠ and Tobias FIEBIG. Evolution of SSL/TLS Indicators and Warnings in Web Browsers. In Anderson, J., Stajano, F., Christianson, B., Matyáš, V. 27th International Workshop on Security Protocols (SPW 2019). Switzerland: Springer International Publishing, 2020, p. 267-280. ISBN 978-3-030-57042-2. Available from: https://dx.doi.org/10.1007/978-3-030-57043-9_25.
    3. ČERNÝ, Michal, Natálie VELECKÁ and Barbora FUKÁRKOVÁ. Kurz rozvoje digitálních kompetencí: zkušenost se vzájemným hodnocením v univerzitním online kurzu (Digital competence development course: peer assesment in a university online course). ITLib. Bratislava: Centrum vedecko - technických informácií SR, 2020, No 1, p. 38-44. ISSN 1335-793X.
    4. LAŠTOVIČKA, Martin, Jakub Bartolomej KOŠUTH, Daniel FILAKOVSKÝ, Antonín DUFKA and Martin HUSÁK. Software pro evidenci zranitelností v počítačové síti (Software for enumerating vulnerabilities in a computer network). 2020.
    5. UKROP, Martin, Lydia KRAUS and Václav MATYÁŠ. Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version). Digital Threats: Research and Practice. New York, NY, USA: Association for Computing Machinery, 2020, vol. 1, No 4, p. 1-29. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3419472.

    2019

    1. VELAN, Petr and Pavel ČELEDA. Application-Aware Flow Monitoring. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 701-706. ISBN 978-1-72810-618-2.
    2. KOVÁŘOVÁ, Pavla and Martin KRČÁL. Budoucnost knihoven. In Duha: Informace o knihách a knihovnách z Moravy. Brno: Moravská zemská knihovna, 2019. 33. ISSN 1804-4255.
    3. DRAŠAR, Martin, Ádám RUMAN, Adam SKRÁŠEK and Matúš GALBA. CEP-Server: Software pro vyhodnocování a dotazování komplexních událostí v doméně ITOA (CEP-Server: Software for evaluation and querying of complex events in the ITOA domain). 2019.
    4. KOVÁŘOVÁ, Pavla. Copyright Literacy of LIS Students in the Czech Republic. Online. In Kurbanoğlu, Serap; Špiranec, Sonja; Ünal, Yurdagül; Boustany, Joumana; Huotari, Maija Leena; Grassian, Esther; Mizrachi, Diane; Roy, Loriene. Information Literacy in Everyday Life. Cham: Springer International Publishing, 2019, p. 585-593. ISBN 978-3-030-13471-6. Available from: https://dx.doi.org/10.1007/978-3-030-13472-3_55.
    5. ŠPAČEK, Stanislav, Martin LAŠTOVIČKA, Martin HORÁK and Tomáš PLESNÍK. Current Issues of Malicious Domains Blocking. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, p. 551-556. ISBN 978-1-7281-0618-2.
    6. ŠPAČEK, Stanislav, Vít RUSŇÁK and Anna-Marie DOMBAJOVÁ. DNS Firewall Data Visualization. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, p. 743-744. ISBN 978-1-7281-0618-2.
    7. ČELEDA, Pavel, Petr VELAN, Benjamin KRÁL and Ondřej KOZÁK. Enabling SSH Protocol Visibility in Flow Monitoring. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 569-574. ISBN 978-1-72810-618-2.
    8. KOVÁŘOVÁ, Pavla. Informační bezpečnost žáků základních škol : lekce v knihovnách (Information Safety of Primary School Pupils : lessons in Libraries). 1st ed. Brno: Masarykova univerzita, 2019, 261 pp. Spisy Filozofické fakulty Masarykovy univerzity, č. 489. ISBN 978-80-210-9270-9. Available from: https://dx.doi.org/10.5817/CZ.MUNI.M210-9271-2019.
    9. KOVÁŘOVÁ, Pavla. Informační bezpečnost žáků základních škol. Lekce v knihovnách (Information Safety of Primary School Pupils. Lessons in Libraries). 1st ed. Brno: Masarykova univerzita, 2019, 261 pp. Spisy Filozofické fakulty Masarykovy univerzity, č. 489. ISBN 978-80-210-9270-9.
    10. KOVÁŘOVÁ, Pavla. Informační bezpečnost žáků základních škol. Lekce v knihovnách (Information Safety of Primary School Pupils. Lessons in Libraries). Online. 1., elektronické vyd. Brno: Masarykova univerzita, 2019, 261 pp. Spisy Filozofické fakulty Masarykovy univerzity, sv. 489. ISBN 978-80-210-9271-6. Available from: https://dx.doi.org/10.5817/CZ.MUNI.M210-9271-2019.
    11. KOVÁŘOVÁ, Pavla. Information Literacy of Masaryk University Students and Evaluation of Campus-Wide Course. Online. In Kurbanoğlu, Serap; Špiranec, Sonja; Ünal, Yurdagül; Boustany, Joumana; Huotari, Maija Leena; Grassian, Esther; Mizrachi, Diane; Roy, Loriene. Information Literacy in Everyday Life. Cham: Springer International Publishing, 2019, p. 399-408. ISBN 978-3-030-13471-6. Available from: https://dx.doi.org/10.1007/978-3-030-13472-3_38.
    12. DRAŠAR, Martin and Tomáš JIRSÍK. IT Operations Analytics: Root Cause Analysis via Complex Event Processing. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 741-742. ISBN 978-1-72810-618-2.
    13. ČELEDA, Pavel, Jakub ČEGAN, Martin MACHÁČ, Jana MEDKOVÁ, Ivo NUTÁR, Tomáš PLESNÍK, Daniel TOVARŇÁK and Martin VIZVÁRY. Nástroj pro zmírňování a potlačování útoků na kritickou informační infrastrukturu (Tool for mitigation and suppression of attacks on critical information infrastructure). 2019.
    14. ČELEDA, Pavel, Jakub ČEGAN, Martin DRAŠAR, Ivo NUTÁR, Jiří RÁJA, Tomáš REBOK, Andrej TOMČI and Daniel TOVARŇÁK. Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury (Tools for verification of SW/HW security and simulation of attacks on critical information infrastructure). 2019.
    15. KOVÁŘOVÁ, Pavla. Připravujeme copyright asistenty? In Seminář IVIG: SPRÁVNĚ PRÁVNĚ o copyrightu a plagiátorství. 2019.
    16. JIRSÍK, Tomáš, Štěpán TRČKA and Pavel ČELEDA. Quality of Service Forecasting with LSTM Neural Network. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 251-260. ISBN 978-1-72810-618-2.
    17. ČERMÁK, Milan, Martin LAŠTOVIČKA and Tomáš JIRSÍK. Real-time Pattern Detection in IP Flow Data using Apache Spark. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 521-526. ISBN 978-1-7281-0618-2.
    18. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Michal BERAN, František HRDINA, Tomáš JIRSÍK, Daniel KOUŘIL, Michal MAZOUREK, Radek OŠLEJŠEK, Michal PROCHÁZKA, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Vadim JANOVSKIJ and Kristína ZÁKOPČANOVÁ. Software pro detekci a analýzu napadení KII (Software for detection and analysis of attacks on critical information infrastructures). 2019.
    19. ČELEDA, Pavel, Jakub ČEGAN, Karolína DOČKALOVÁ BURSKÁ, Jan DUDA, Martin HAMERNÍK, Miroslava JAREŠOVÁ, Erik KOČAMBA, Radek OŠLEJŠEK, Vít RUSŇÁK, Daniel TOVARŇÁK, Hai Duong TRAN, Jan VYKOPAL and Kristína ZÁKOPČANOVÁ. Software pro provádění bezpečnostních cvičení a školení (Software for realization of cybersecurity exercises and trainings). 2019.
    20. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Milan ČERMÁK, Jan DUDA, Vlastimil HOLER, Ľuboš HYŽÁK, Boris JADUŠ, Jakub KADAŠI, David LEŠKA, Martin MACHÁČ, Ivo NUTÁR, Radek OŠLEJŠEK, Dominik PILÁR, Tomáš PLESNÍK, Michal PROCHÁZKA, Tomáš REBOK, Vít RUSŇÁK, Miloslav STANĚK, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Jan VYKOPAL and Tatiana ZBONČÁKOVÁ. Software pro simulaci obecných i kritických informačních infrastruktur (Software for simulation of generic and critical information infrastructures). 2019.
    21. HUSÁK, Martin, Jana KOMÁRKOVÁ, Elias BOU-HARB and Pavel ČELEDA. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys & Tutorials. IEEE, 2019, vol. 21, No 1, p. 640-660. ISSN 1553-877X. Available from: https://dx.doi.org/10.1109/COMST.2018.2871866.
    22. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL and Pavel ČELEDA. Towards Learning Analytics in Cybersecurity Capture the Flag Games. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE’19). 2019. ISBN 978-1-4503-5890-3. Available from: https://dx.doi.org/10.1145/3287324.3293816.
    23. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína BURSKÁ, Valdemar ŠVÁBENSKÝ and Jan VYKOPAL. Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. Online. In Gove R., Arendt D., Kohlhammer J., Angelini M., Lyn Paul, C., Bryan C. McKenna S., Prigent N., Najafi P., Sopan A. 2019 IEEE Symposium on Visualization for Cyber Security (VizSec). Vancouver, BC, Canada: IEEE, 2019, p. 1-11. ISBN 978-1-7281-3876-3. Available from: https://dx.doi.org/10.1109/VizSec48167.2019.9161386.

    2018

    1. HUSÁK, Martin, Nataliia NESHENKO, Morteza SAFAEI POUR, Elias BOU-HARB and Pavel ČELEDA. Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "29:1"-"29:6", 6 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3230837.
    2. LINDEN, Mikael, Michal PROCHÁZKA, Ilkka LAPPALAINEN, Dominik František BUČÍK, Pavel VYSKOČIL, Martin KUBA, Sami SILÉN, Peter BELMANN, Alexander SCZYRBA, Steven NEWHOUSE, Luděk MATYSKA and Tommi NYRÖNEN. Common ELIXIR Service for Researcher Authentication and Authorisation. F1000Research. F1000 Research Ltd., 2018, vol. 7, No 2018, p. 1-16. ISSN 2046-1402. Available from: https://dx.doi.org/10.12688/f1000research.15161.1.
    3. KOMÁRKOVÁ, Jana, Lukáš SADLEK and Martin LAŠTOVIČKA. Community Based Platform for Vulnerability Categorization. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 2 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406125.
    4. KOMÁRKOVÁ, Jana, Martin HUSÁK, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. CRUSOE: Data Model for Cyber Situation Awareness. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "36:1"-"36:10", 10 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3232798.
    5. NESHENKO, Nataliia, Martin HUSÁK, Elias BOU-HARB, Pavel ČELEDA, Sameera AL-MULLA and Claude FACHKHA. Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations. Online. In 2018 IEEE Globecom Workshops. Abu Dhabi: IEEE, 2018, p. 1-7. ISBN 978-1-5386-4920-6. Available from: https://dx.doi.org/10.1109/GLOCOMW.2018.8644468.
    6. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Milan ČERMÁK and Martin LAŠTOVIČKA. Enhancing Cybersecurity Skills by Creating Serious Games. Online. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'18). Larnaca, Cyprus: ACM, 2018, p. 194-199. ISBN 978-1-4503-5707-4. Available from: https://dx.doi.org/10.1145/3197091.3197123.
    7. OŠLEJŠEK, Radek, Jan VYKOPAL, Karolína BURSKÁ and Vít RUSŇÁK. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. Online. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18). San Jose, California, USA: IEEE, 2018, p. 1-9. ISBN 978-1-5386-1173-9. Available from: https://dx.doi.org/10.1109/FIE.2018.8659299.
    8. ŠVÁBENSKÝ, Valdemar and Jan VYKOPAL. Gathering Insights from Teenagers' Hacking Experience with Authentic Cybersecurity Tools. Online. In 2018 IEEE Frontiers in Education Conference (FIE). San Jose, California, USA: IEEE, 2018, p. 1414-1417. ISBN 978-1-5386-1175-3. Available from: https://dx.doi.org/10.1109/FIE.2018.8658840.
    9. ŠVÁBENSKÝ, Valdemar and Jan VYKOPAL. Challenges Arising from Prerequisite Testing in Cybersecurity Games. Online. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE’18). Baltimore, Maryland, USA: ACM, 2018, p. 56-61. ISBN 978-1-4503-5103-4. Available from: https://dx.doi.org/10.1145/3159450.3159454.
    10. KOTT, Alexander, Paul THERÓN, Luigi V MANCINI, Martin DRAŠAR, Edlira DUSHKU, Günther HEIKO, Markus KONT, Benoît LEBLANC, Agostino PANICO, Mauno PIHELGAS and Krzysztof RZADCA. Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense. 2018.
    11. LAŠTOVIČKA, Martin, Antonín DUFKA and Jana KOMÁRKOVÁ. Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use?. Online. In IEEE. Proceedings of the 14th International Wireless Communications and Mobile Computing Conference. Limassol, Cyprus: IEEE Xplore Digital Library, 2018, p. 542-547. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450406.
    12. LAŠTOVIČKA, Martin, Tomáš JIRSÍK, Pavel ČELEDA, Stanislav ŠPAČEK and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Methods in the Jungle of Wireless Networks. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 9 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406262.
    13. LAŠTOVIČKA, Martin and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Prototype Demonstration. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 2 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406128.
    14. ŠPAČEK, Stanislav and Pavel ČELEDA. Threat Detection Through Correlation of Network Flows and Logs. Online. In Burkhard Stiller. Proceedings of the 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018). Neuveden: IFIP, 2018, p. 6-10. ISBN 978-3-903176-12-6.
    15. VYKOPAL, Jan, Radek OŠLEJŠEK, Karolína BURSKÁ and Kristína ZÁKOPČANOVÁ. Timely Feedback in Unstructured Cybersecurity Exercises. Online. In Proceedings of Special Interest Group on Computer Science Education, Baltimore, Maryland, USA, February 21–24, 2018(SIGCSE’18). New York, NY, USA: ACM, 2018, p. 173-178. ISBN 978-1-4503-5103-4. Available from: https://dx.doi.org/10.1145/3159450.3159561.
    16. JIRSÍK, Tomáš and Pavel ČELEDA. Toward Real-time Network-wide Cyber Situational Awareness. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE, 2018, p. 1-7. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406166.
    17. THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysytof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI and Agostino PANICO. Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. Online. In 2018 International Conference on Military Communications and Information Systems (ICMCIS). Warsaw, Poland: IEEE, 2018, p. 1-9. ISBN 978-1-5386-4559-8. Available from: https://dx.doi.org/10.1109/ICMCIS.2018.8398730.
    18. HUSÁK, Martin and Jaroslav KAŠPAR. Towards Predicting Cyber Attacks Using Information Exchange and Data Mining. Online. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). Limassol: IEEE, 2018, p. 536-541. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450512.
    19. ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR and Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, p. 1-8. ISBN 978-3-903176-09-6. Available from: https://dx.doi.org/10.23919/TMA.2018.8506498.

    2017

    1. ŠPAČEK, Stanislav, Pavel ČELEDA, Martin DRAŠAR and Martin VIZVÁRY. Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. SPI 2017 - Security and Protection of Information 2017. Brno: Univerzita obrany, 2017, p. 143-158. ISBN 978-80-7231-414-0.
    2. HUSÁK, Martin, Milan ČERMÁK, Martin LAŠTOVIČKA and Jan VYKOPAL. Exchanging Security Events: Which And How Many Alerts Can We Aggregate?. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 604-607. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987340.
    3. VYKOPAL, Jan and Jakub ČEGAN. Finding Exercise Equilibrium: How to Support the Game Balance at the Very Beginning? 2017. ISBN 978-1-4503-4698-6. Available from: https://dx.doi.org/10.1145/3017680.3022409.
    4. MEDKOVÁ, Jana, Martin HUSÁK, Martin VIZVÁRY and Pavel ČELEDA. Honeypot Testbed for Network Defence Strategy Evaluation. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 887-888. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987397.
    5. VYKOPAL, Jan, Radek OŠLEJŠEK, Pavel ČELEDA, Martin VIZVÁRY and Daniel TOVARŇÁK. KYPO Cyber Range: Design and Use Cases. Online. In Cardoso J.,Cardoso J.,Maciaszek L.,Maciaszek L.,van Sinderen M.,Cabello E. Proceedings of the 12th International Conference on Software Technologies - Volume 1: ICSOFT. Madrid, Spain: SciTePress, 2017, p. 310-321. ISBN 978-989-758-262-2. Available from: https://dx.doi.org/10.5220/0006428203100321.
    6. VYKOPAL, Jan, Martin VIZVÁRY, Radek OŠLEJŠEK, Pavel ČELEDA and Daniel TOVARŇÁK. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. Online. In 2017 IEEE Frontiers in Education Conference. Indianapolis, IN, USA: IEEE, 2017, p. 1-8. ISBN 978-1-5090-5919-5. Available from: https://dx.doi.org/10.1109/FIE.2017.8190713.
    7. HUSÁK, Martin, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "22:1"-"22:10", 10 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3098981.
    8. LAŠTOVIČKA, Martin and Pavel ČELEDA. Situational Awareness: Detecting Critical Dependencies and Devices in a Network. In Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Zurich (Switzerland): Springer, 2017, p. 173-178. ISBN 978-3-319-60773-3. Available from: https://dx.doi.org/10.1007/978-3-319-60774-0_17.
    9. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK and Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine. IEEE, 2017, vol. 55, No 7, p. 70-76. ISSN 0163-6804. Available from: https://dx.doi.org/10.1109/MCOM.2017.1600972.
    10. OŠLEJŠEK, Radek, Dalibor TOTH, Zdenek EICHLER and Karolína BURSKÁ. Towards a Unified Data Storage and Generic Visualizations in Cyber Ranges. In Mark Scanlon, Nhien-An Le-Khac. Proceedings of the 16th European Conference on Cyber Warfare and Security ECCWS 2017. UK: Academic Conferences and Publishing International Limited, 2017, p. 298-306. ISBN 978-1-911218-43-2.
    11. BURSKÁ, Karolína and Radek OŠLEJŠEK. Visual Analytics for Network Security and Critical Infrastructures. In Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Zürich (Switzerland): Springer, 2017, p. 149-152. ISBN 978-3-319-60773-3. Available from: https://dx.doi.org/10.1007/978-3-319-60774-0_13.

    2016

    1. ČERMÁK, Milan, Daniel TOVARŇÁK, Martin LAŠTOVIČKA and Pavel ČELEDA. A Performance Benchmark of NetFlow Data Analysis on Distributed Stream Processing Systems. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 919-924. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502926.
    2. ČERMÁK, Milan and Pavel ČELEDA. Detecting Advanced Network Threats Using a Similarity Search. In Badonnel, Rémi and Koch, Robert and Pras, Aiko and Drašar, Martin and Stiller, Burkhard. Management and Security in the Age of Hyperconnectivity. 9701st ed. Munich, Germany: Springer International Publishing, 2016, p. 137-141. ISBN 978-3-319-39813-6. Available from: https://dx.doi.org/10.1007/978-3-319-39814-3_14.
    3. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting. EURASIP Journal on Information Security. 2016, vol. 2016, No 1, p. 1-14. ISSN 2510-523X. Available from: https://dx.doi.org/10.1186/s13635-016-0030-7.
    4. MEDKOVÁ, Jana and Pavel ČELEDA. Network Defence Using Attacker-Defender Interaction Modelling. In Badonnel, R., Koch, R., Pras, A., Drašar, M., Stiller, B. IFIP International Conference on Autonomous Infrastructure, Management and Security. Munich, Germany: Springer International Publishing, 2016, p. 127-131. ISBN 978-3-319-39813-6. Available from: https://dx.doi.org/10.1007/978-3-319-39814-3_12.
    5. VELAN, Petr, Jana MEDKOVÁ, Tomáš JIRSÍK and Pavel ČELEDA. Network Traffic Characterisation Using Flow-Based Statistics. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. IEEE/IFIP Network Operations and Management Symposium 2016 (NOMS 2016). Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 907-912. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502924.
    6. JIRSÍK, Tomáš, Milan ČERMÁK and Pavel ČELEDA. On Information Value of Top N Statistics. In 2016 6th International Conference on IT Convergence and Security (ICITCS). USA: Institute of Electrical and Electronic Engineers, 2016, p. 255-259. ISBN 978-1-5090-3764-3. Available from: https://dx.doi.org/10.1109/ICITCS.2016.7740357.
    7. VYKOPAL, Jan and Miloš BARTÁK. On the Design of Security Games: From Frustrating to Engaging Learning. 2016.
    8. ČERMÁK, Milan, Tomáš JIRSÍK and Martin LAŠTOVIČKA. Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 1019-1020. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502952.

    2015

    1. VELAN, Petr, Milan ČERMÁK, Pavel ČELEDA and Martin DRAŠAR. A Survey of Methods for Encrypted Traffic Classification and Analysis. International Journal of Network Management. John Wiley & Sons, Ltd., 2015, vol. 25, No 5, p. 355-374. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1901.
    2. STUPKA, Václav. Analýza SSL provozu (SSL traffic analysis). In České právo a informační technologie 2015. 2015.
    3. PITNER, Tomáš, Filip PROCHÁZKA, Bruno ROSSI, Barbora BÜHNOVÁ, Stanislav CHREN, Andrea VAŠEKOVÁ, Jan ROSECKÝ and Václav STUPKA. Celkové závěry a doporučení k projektu přípravných rešerší k AMM (Final Report from Preliminary Research for Automated Metering Management). Brno: ČEZ Distribuce, a.s., 2015, 8 pp.
    4. STUPKA, Václav. Data advokátů v cloudu (Attorneys data in the cloud). Data Security Management. TATE International s.r.o., 2015, vol. 19, No 1, p. 34-37. ISSN 1211-8737.
    5. STUPKA, Václav. Data jako důkaz v trestním řízení (Data as evidence in criminal proceedings). In Radim Polčák, František Púry, Jakub Harašta a kolektiv. Elektronické důkazy v trestním řízení. Brno: Masarykova univerzita, 2015, p. 83-114. Spisy Právnické fakulty MU č. 542 (řada teoretická, Edice Scientia). ISBN 978-80-210-8073-7.
    6. SOKOL, Pavol, Martin HUSÁK and František LIPTÁK. Deploying Honeypots and Honeynets: Issue of Privacy. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 397-403. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.91.
    7. BARTÁK, Miloš and Jan VYKOPAL. Detekce zranitelností a útoků pomocí NetFlow dat, validace zranitelností na systému FlowMon (Vulnerability and attack detection using NetFlow, vulnerability testing of FlowMon system). Brno: INVEA-TECH a.s., 2015, 25 pp. 20151113.
    8. STUPKA, Václav. Dokazování odposlechem (Interception of electronic communication as evidence). In Radim Polčák, František Púry, Jakub Harašta a kolektiv. Elektronické důkazy v trestním řízení. Brno: Masarykova univerzita, 2015, p. 181-194. Spisy Právnické fakulty MU č. 542 (řada teoretická, Edice Scientia). ISBN 978-80-210-8073-7.
    9. STUPKA, Václav. Electronic legislation in the Czech Republic. In Central and Eastern European e|Dem and e|Gov Days 2015. Vienna, Austria: Austrian Computer Society, 2015, p. 491 - 500, 9 pp.
    10. STUPKA, Václav. Elektronické důkazní prostředky (Electronic evidence). In Kalvodová, Věra a Milana Hrušáková. Dokazování v trestním řízení - právní, kriminologické a kriminalistické aspekty. 1st ed. Brno: Masarykova univerzita, 2015, p. 311-320. Spisy Právnické fakulty Masarykovy univerzity v Brně, svazek č. 539. ISBN 978-80-210-8072-0.
    11. POLČÁK, Radim, František PÚRY, Jakub HARAŠTA, Tomáš ABELOVSKÝ, Petr KLEMENT, Matěj MYŠKA, Václav STUPKA, Alena PEJČOCHOVÁ and Tomáš ELBERT. Elektronické důkazy v trestním řízení (Electronic evidence in criminal procedure). 1st ed. Brno: Masarykova univerzita, 2015, 254 pp. ISBN 978-80-210-8073-7.
    12. POLČÁK, Radim, František PÚRY, Jakub HARAŠTA, Tomáš ABELOVSKÝ, Petr KLEMENT, Matěj MYŠKA, Václav STUPKA, Alena PEJČOCHOVÁ and Tomáš ELBERT. Elektronické důkazy v trestním řízení (Electronic evidence in criminal procedure). 1st ed. Brno: Masarykova univerzita, 2015, 254 pp. Acta Universitatis Brunensis Iuridica. ISBN 978-80-210-8073-7.
    13. PUŠ, Viktor, Petr VELAN, Lukáš KEKELY, Jan KOŘENEK and Pavel MINAŘÍK. Hardware Accelerated Flow Measurement of 100G Ethernet. Online. In Remi Badonnel, Jin Xiao, Shingo Ata, Filip De Turck, Voicu Groza, Carlos Raniery P. dos Santos. IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Ottawa, Canada: IEEE Xplore Digital Library, 2015, p. 1147-1148. ISBN 978-3-901882-76-0.
    14. VELAN, Petr and Viktor PUŠ. High-Density Network Flow Monitoring. Online. In Remi Badonnel, Jin Xiao, Shingo Ata, Filip De Turck, Voicu Groza, Carlos Raniery P. dos Santos. IFIP/IEEE International Symposium on Integrated Network Management (IM 2015). Ottawa, Canada: IEEE Xplore Digital Library, 2015, p. 996-1001. ISBN 978-3-901882-76-0.
    15. STUPKA, Václav. Kybernetická bezpečnost v ČR (Cyber security in the Czech Republic). In Kyberbezpečnost v praxi. 2015.
    16. ČELEDA, Pavel, Jakub ČEGAN, Jan VYKOPAL and Daniel TOVARŇÁK. KYPO – A Platform for Cyber Defence Exercises. Online. In STO-MP-MSG-133: M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber Defence. Munich (Germany): NATO Science and Technology Organization, 2015, p. nestránkováno, 12 pp. ISBN 978-92-837-2020-1. Available from: https://dx.doi.org/10.14339/STO-MP-MSG-133-08-doc.
    17. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Radek OŠLEJŠEK, Zdenek EICHLER, Dalibor TOTH, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Václav RAČANSKÝ, Ivo NUTÁR and Dušan LAGO. KYPO - Kybernetický polygon (KYPO - Cybernetic Proving Ground). 2015.
    18. STUPKA, Václav. Legalita penetračního testování (Legality of penetration testing). In Dny práva 2015. 2015.
    19. ČEGAN, Jakub and Martin VIZVÁRY. Lessons Learned from KYPO – Cyber Exercise & Research Platform Project. Online. In Milan Jirsa, Josef Kaderka, Ladislav Hagara, Jaroslav Dočkal. Security and Protection of Information. Brno: University of Defence, 2015, p. 15-26. ISSN 2336-5587.
    20. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 389-396. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.35.
    21. HUSÁK, Martin, Petr VELAN and Jan VYKOPAL. Security Monitoring of HTTP Traffic Using Extended Flows. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 258-265. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.42.
    22. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Ivo NUTÁR and Dušan LAGO. Software pro konfiguraci a monitorování virtuálního prostředí KYPO (Software for configuration and monitoring of KYPO environment). 2015.
    23. OŠLEJŠEK, Radek, Zdenek EICHLER, Dalibor TOTH, Pavel ČELEDA, Jakub ČEGAN, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Martin VIZVÁRY and Jan VYKOPAL. Software pro vizualizaci virtuálního prostředí KYPO (Software for visualization of KYPO environment). 2015.
    24. PAVOL, Sokol, Kleinová LENKA and Martin HUSÁK. Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. Online. In EUROCON 2015 - International Conference on Computer as a Tool (EUROCON), IEEE. Salamanca, Spain: IEEE, 2015, p. 225-230. ISBN 978-1-4799-8569-2. Available from: https://dx.doi.org/10.1109/EUROCON.2015.7313713.
    25. STUPKA, Václav. Trestněprávní souvislosti bezpečnostních incidentů (Criminal consequences of cyber security incidents). In Konference Security & Networking Bratisava 2015. 2015.
    26. STUPKA, Václav. Trestní odpovědnost při zajišťování kybernetické bezpečnosti (Criminal liability in ensuring cyber security). In Konference Security & Networking Brno 2015. 2015.
    27. PŘENOSIL, Václav, František CVACHOVEC, Pavel ČELEDA and Martin VEŠKRNA. Uspořádání vícecestného dvouparametrického spektrometrického systému (Arrangement of two-parameter multipath spectrometric system). 2015.

    2014

    1. GHAFIR, Ibrahim, Martin HUSÁK and Václav PŘENOSIL. A Survey on Intrusion Detection and Prevention Systems. In Proceedings of student conference Zvůle 2014, IEEE/UREL. Zvůle, Czech Republic: Faculty of Electrical Engineering and Communication, Brno University of Technology, 2014, p. 10-14. ISBN 978-80-214-5005-9.
    2. STUPKA, Václav. Aktuální otázky kyberkriminality II. (Current practice in cybercrime II.). 2014.
    3. STUPKA, Václav. Autorský zákon (Copyright law). In Academic skills 2014. 2014.
    4. JIRSÍK, Tomáš, Martin HUSÁK, Pavel ČELEDA and Zdenek EICHLER. Cloud-based Security Research Testbed: A DDoS Use Case. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-2. ISBN 978-1-4799-0912-4. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838272.
    5. KOUŘIL, Daniel, Tomáš REBOK, Tomáš JIRSÍK, Jakub ČEGAN, Martin DRAŠAR, Martin VIZVÁRY and Jan VYKOPAL. Cloud-based Testbed for Simulation of Cyber Attacks. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-6. ISBN 978-1-4799-0913-1. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838298.
    6. SCHWARZ, Daniel, Ladislav DUŠEK, Martin BAREŠ, Julie BIENERTOVÁ VAŠKŮ, Jitka FEBEROVÁ, Jiří KOFRÁNEK, Martin KOMENDA, Barbora LUDÍKOVÁ, Jiří MAYER, Jaroslav MAJERNÍK, Radim POLČÁK, Jarmila POTOMKOVÁ, Michal PROCHÁZKA, Adrian RAUDASCHL, Petr ŠTOURAČ, Jaroslav ŠTĚRBA, Stanislav ŠTÍPEK, Čestmír ŠTUKA, Ilja TACHECÍ and Martin VEJRAŽKA. Computer applications systems and networks for medical education : MEFANET: Czech and Slovak Medical Faculties Network. 1st ed. Brno: Masaryk University, Institute of Biostatistics and Analyses : Facta Medica, 2014, 230 pp. ISBN 978-80-904731-9-5. Available from: https://dx.doi.org/10.13140/2.1.1383.0723.
    7. TOVARŇÁK, Daniel and Tomáš PITNER. Continuous Queries over Distributed Streams of Heterogeneous Monitoring Data in Cloud Datacenters. In Andreas Holzinger, Therese Libourel, Leszek Maciaszek and Stephen Mellor. ICSOFT-EA 2014 - Proceedings of the 9th International Conference on Software Engineering and Applications. Portugalsko: SCITEPRESS, 2014, p. 470-481. ISBN 978-989-758-036-9. Available from: https://dx.doi.org/10.5220/0005095504700481.
    8. STUPKA, Václav. Cooperation between CERT and LEA in the Czech republic. In 9th CERT ENISA/EC3 Workshop. 2014.
    9. STUPKA, Václav. Cyber security in the Czech republic. In C4e workshop on cyber security. 2014.
    10. VYKOPAL, Jan. Cybernetic Proving Ground - Cloud-based Testbed for Simulation of Cyber Attacks. 2014.
    11. ČERMÁK, Milan, Pavel ČELEDA and Jan VYKOPAL. Detection of DNS Traffic Anomalies in Large Networks. In Yvon Kermarrec. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg: Springer International Publishing, 2014, p. 215-226. ISBN 978-3-319-13487-1. Available from: https://dx.doi.org/10.1007/978-3-319-13488-8_20.
    12. DRAŠAR, Martin, Tomáš JIRSÍK and Martin VIZVÁRY. Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches. In Sperotto, Anna and Doyen, Guillaume and Latré, Steven and Charalambides, Marinos and Stiller, Burkhard. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin: Springer Berlin Heidelberg, 2014, p. 160-172. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_19.
    13. JIRSÍK, Tomáš and Pavel ČELEDA. Enhancing Network Security: Host Trustworthiness Estimation. In Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Heidelberg: Springer Berlin / Heidelberg, 2014, p. 63-68. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_8.
    14. STUPKA, Václav. e-Sbírka a e-Legislativa (eCollection and eLegislation). Revue pro právo a technologie. Brno: Masarykova univerzita, 2014, vol. 5, No 9, p. 185-198, 267 pp. ISSN 1804-5383.
    15. HOFSTEDE, Rick, Pavel ČELEDA, Brian TRAMMELL, Idilio DRAGO, Ramin SADRE, Anna SPEROTTO and Aiko PRAS. Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. PISCATAWAY: IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2014, vol. 16, No 4, p. 2037-2064. ISSN 1553-877X. Available from: https://dx.doi.org/10.1109/COMST.2014.2321898.
    16. VIZVÁRY, Martin and Jan VYKOPAL. Future of DDoS Attacks Mitigation in Software Defined Networks. In Sperotto, Anna and Doyen, Guillaume and Latré, Steven and Charalambides, Marinos and Stiller, Burkhard. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin: Springer Berlin Heidelberg, 2014, p. 123-127. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_15.
    17. JIRSÍK, Tomáš and Pavel ČELEDA. Identifying Operating System Using Flow-based Traffic Fingerprinting. In Yvon Kermarrec. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg: Springer International Publishing, 2014, p. 70-73. ISBN 978-3-319-13487-1. Available from: https://dx.doi.org/10.1007/978-3-319-13488-8_7.
    18. STUPKA, Václav. Intellectual property on the internet - filesharing and legal protection of the software. In Second summer school in Brno - "IT Law". 2014.
    19. STUPKA, Václav. Jazyková analýza a autorské právo (Language analysis and Copyright). In Autorské právo v prostředí jazykových dat a nástrojů. 2014.
    20. VELAN, Petr and Pavel ČELEDA. Next Generation Application-Aware Flow Monitoring. In Anna Sperotto, Guillaume Doyen, Steven Latré, Marinos Charalambides, Burkhard Stiller. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Heidelberg: Springer Berlin / Heidelberg, 2014, p. 173-178. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_20.
    21. PROCHÁZKA, Michal, Slávek LICEHAMMER and Luděk MATYSKA. Perun – Modern Approach for User and Service Management. Mauritius: IIMC International Information Management Corporation Ltd, 2014, 11 pp. ISBN 978-1-905824-44-1.
    22. HUSÁK, Martin and Jakub ČEGAN. PhiGARo: Automatic Phishing Detection and Incident Response Framework. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on. Fribourg, Switzerland: IEEE, 2014, p. 295-302. ISBN 978-1-4799-4223-7. Available from: https://dx.doi.org/10.1109/ARES.2014.46.
    23. HUSÁK, Martin and Jan VYKOPAL. POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats. 2014.
    24. STUPKA, Václav. Předávání informací mezi CERT a policií (Information exchange between CERT and LEA). In COFOLA 2014. 2014.
    25. VIZVÁRY, Martin, Tomáš PLESNÍK and Jan VYKOPAL. Rozvoj detekčních schopností a platformy sonda/kolektor (Development of detection capabilities and the probe/collector platform). Brno: INVEA-TECH a.s., 2014, 15 pp. 20141231.
    26. DRAŠAR, Martin, Martin VIZVÁRY and Jan VYKOPAL. Similarity as a central approach to flow-based anomaly detection. International Journal of Network Management. John Wiley & Sons, Ltd., 2014, vol. 24, No 4, p. 318-336. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1867.
    27. GHAFIR, Ibrahim, Jakub SVOBODA and Václav PŘENOSIL. Tor-based Malware and Tor Connection Detection. In Proceedings of International Conference on Frontiers of Communications, Networks and Applications. Kuala Lumpur, Malaysia: IET, 2014, p. 1-6. ISBN 978-1-78561-072-1. Available from: https://dx.doi.org/10.1049/cp.2014.1411.
    28. STUPKA, Václav. Užívání znaků Masarykovy univerzity (Using Masaryk University symbols). In Interface. Brno: Masarykova univerzita, 2014, p. 1-3, 12 pp. ISSN 1803-5248.
    29. BÍL, Michal, Rostislav VODÁK, Jan KUBEČEK, Tomáš REBOK, Tomáš SVOBODA and Petr HLINĚNÝ. Vulnerability analysis methods for road networks. In European Geosciences Union General Assembly 2014 (EGU 2014). 2014.
    30. ČELEDA, Pavel, Iva KREJČÍ and Jan VYKOPAL. 8th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014). 2014.

    2013

    1. ELICH, Martin, Petr VELAN, Tomáš JIRSÍK and Pavel ČELEDA. An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis. Online. In Damla Turgut, Nils Aschenbruck, Jens Tölle. 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). WNM 2013: The 7th IEEE Workshop on Network Measurements. Sydney, Australia: IEEE Xplore Digital Library, 2013, p. 1046-1052. ISBN 978-1-4799-0540-9. Available from: https://dx.doi.org/10.1109/LCNW.2013.6758546.
    2. SLOUP, Petr and Tomáš REBOK. Automatic reconstruction of Norway spruce tree models from LiDAR data. In ISPRS2013-SSG. 2013.
    3. SLOUP, Petr, Tomáš REBOK and Jan HANUŠ. Automatic Tree Reconstruction from its Laser Scan [poster]. In Global Change and Resilience. 2013.
    4. VELAN, Petr, Tomáš JIRSÍK and Pavel ČELEDA. Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement. In Thomas Bauschert. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8115. Heidelberg: Springer Berlin / Heidelberg, 2013, p. 136-147. ISBN 978-3-642-40551-8. Available from: https://dx.doi.org/10.1007/978-3-642-40552-5_13.
    5. STUPKA, Václav. Důvody vzniku Zákona o kybernetické bezpečnoti (Reasons for creating Act on cyber security). In Kybernetická bezpečnost státu 2013. 2013.
    6. STUPKA, Václav. E-government v České republice: právní a technologické aspekty. Revue pro právo a technologie. Brno: Masarykova univerzita, 2013, vol. 4, No 7. ISSN 1804-5383.
    7. DOYEN, Guillaume, Martin WALDBURGER, Pavel ČELEDA, Anna SPEROTTO and Burkhard STILLER. Emerging Management Mechanisms for the Future Internet, 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013. In Lecture Notes in Computer Science 7943. Heidelberg: Springer Berlin / Heidelberg, 2013, 161 pp. ISBN 978-3-642-38997-9. Available from: https://dx.doi.org/10.1007/978-3-642-38998-6.
    8. KOŠČÍK, Michal, Libor KYNCL, Matěj MYŠKA, Radim POLČÁK, Václav STUPKA and Jaromír ŠAVELKA. European ICT Law 2013 Texts, Cases, Materials. Brno: Tribun EU, 2013, 365 pp. ISBN 978-80-263-0396-1.
    9. ČELEDA, Pavel and Vojtěch KRMÍČEK. Flow Data Collection in Large Scale Networks. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. 1st ed. Stuttgart: Fraunhofer Verlag, 2013, p. 30-40. ISBN 978-3-8396-0474-8.
    10. VYKOPAL, Jan, Martin DRAŠAR and Philipp WINTER. Flow-based Brute-force Attack Detection. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. Stuttgart: Fraunhofer Verlag, 2013, p. 41-51. ISBN 978-3-8396-0474-8.
    11. VIZVÁRY, Martin and Jan VYKOPAL. Flow-based detection of RDP brute-force attacks. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, p. 131-138. ISBN 978-80-7231-922-0.
    12. HUSÁK, Martin and Martin DRAŠAR. Flow-based Monitoring of Honeypots. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, p. 63-70. ISBN 978-80-7231-922-0.
    13. VELAN, Petr. FlowMon - TCP Input Filter Plugin. 2013.
    14. SLOUP, Petr, Tomáš REBOK and Jan HANUŠ. Fully-automated Occlusion-insensitive Norway Spruce Tree Reconstructions from 3D Point Cloud Data [poster]. In ISPRS2013-SSG. 2013.
    15. ČEGAN, Jakub and Jan SOUKAL. Incident response automation in the Masaryk University network. 2013.
    16. ČELEDA, Pavel, Petr VELAN, Martin RÁBEK, Rick HOFSTEDE and Aiko PRAS. Large-Scale Geolocation for NetFlow. Online. In Filip De Turck, Yixin Diao, Choong Se on Hong, Deep Medhi, Ramin Sadre. IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Ghent, Belgium: IEEE Xplore Digital Library, 2013, p. 1015-1020. ISBN 978-1-4673-5229-1.
    17. HUSÁK, Martin and Jan SOUKAL. libanim - JavaScript animation library. 2013.
    18. BARTOŠ, Václav, Pavel ČELEDA, Tomáš KREUZWIESER, Viktor PUŠ, Petr VELAN and Martin ŽÁDNÍK. Monitoring, Detection and Reporting of Security Incidents in CESNET NREN. 2013.
    19. SEBESTIÁNOVÁ, Zora, Michal PROCHÁZKA, Slávek LICEHAMMER, Michal ŠŤAVA and Pavel ZLÁMAL. Perun - user and resources management system. 2013.
    20. ČEGAN, Jakub, Tomáš ŠÍMA, Jan SOUKAL and Martin DRAŠAR. PhiGARo HTTP(S) – tool for phishing incident processing. 2013.
    21. HUSÁK, Martin and Martin VIZVÁRY. POSTER: Reflected attacks abusing honeypots. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York, NY, USA: ACM, 2013, p. 1449-1452. ISBN 978-1-4503-2477-9. Available from: https://dx.doi.org/10.1145/2508859.2512523.
    22. VELAN, Petr. Practical experience with IPFIX flow collectors. Online. In Filip De Turck, Yixin Diao, Choong Se on Hong, Deep Medhi, Ramin Sadre. IFIP/IEEE International Symposium on Integrated Network Management (IM 2013). Ghent, Belgium: IEEE Xplore Digital Library, 2013, p. 1021-1026. ISBN 978-1-4673-5229-1.
    23. DRAŠAR, Martin. Protocol-independent Detection of Dictionary Attacks. In Thomas Bauschert. Advances in Communication Networking. Berlin: Springer Berlin Heidelberg, 2013, p. 304-309. ISBN 978-3-642-40551-8. Available from: https://dx.doi.org/10.1007/978-3-642-40552-5_30.
    24. PROCHÁZKA, Michal and Daniel KOUŘIL. RemSig - Bezpečné úložiště digitálních certifikátů (RemSig - Secure digital certificate storage). 2013.
    25. DOYEN, Guillaume, Martin WALDBURGER, Anna SPEROTTO, Pavel ČELEDA, Juan-Luis GORRICHO, Thomas SCHAAF and Joan SERRAT. Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet. Journal of Network and Systems Management. Springer US, 2013, vol. 22, No 2, p. 289-296. ISSN 1573-7705. Available from: https://dx.doi.org/10.1007/s10922-013-9298-9.
    26. VYKOPAL, Jan. SimFlow - a similarity-based detection of brute-force attacks. 2013.
    27. DRAŠAR, Martin, Martin HUSÁK, Jakub ČEGAN, Martin VIZVÁRY, Milan ČERMÁK and Tomáš PLESNÍK. Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií (System for automatic handling of reports from anomaly detection tools). 2013.
    28. REBOK, Tomáš, Petr SLOUP, Jan HANUŠ and Věroslav KAPLAN. Three-dimensional Tree Reconstructions from Terrestrial LiDAR Scans. In National Grid Infrastructure Yearbook 2011-12. 2013, p. 91-95. ISBN 978-80-904689-7-9.
    29. REJCHRT, Jan, Tomáš JIRSÍK and Jan VYKOPAL. Time Series Solver. 2013.
    30. trendMonitoring (software)
      VIZVÁRY, Martin. trendMonitoring. 2013.
    31. STUPKA, Václav. Uchovávání provozních údajů pro účely vyúčtování poskytnutých služeb elektronických komunikací (Data retention for billing purposes). Revue pro právo a technologie. Brno: Masarykova univerzita, 2013, vol. 4, No 8. ISSN 1804-5383.
    32. KÁCHA, Pavel, Andrea KROPÁČOVÁ and Jan VYKOPAL. WARDEN: realtime sharing of detected threats between CSIRT teams. 2013.

    2012

    1. ČEGAN, Jakub, Jan SOUKAL, Martin DRAŠAR and Jan VYKOPAL. PhiGARo – tool for phishing incident processing. 2012.

    2011

    1. VYKOPAL, Jan and Jan SOUKAL. Phishing at your own risk. 2011.

    2000

    1. BARTOŠEK, Miroslav, Petr PIŠTĚK and Václav RAČANSKÝ. Počítačová studovna MU zahájila provoz. Univerzitní noviny, List Masarykovy univerzity a Nadace Universitas Masarykiana. Brno: Nadace MU, 2000, roč. 7, No 11, p. 36-38. ISSN 1211-6866.

    1986

    1. RAČANSKÝ, Václav. Computation Rules Using Memory I. Scripta Facultatis Scientiarum Naturalium Universitatis Purkynianae Brunensis - Mathematica. Brno: Přírodovědecká fakulta Univerzity J.E. Purkyně, 1986, p. 483-493.

    1978

    1. RAČANSKÝ, Václav. Computation of Recursive Programs. Scripta Facultatis Scientiarum Naturalium Universitatis Purkynianae Brunensis - Mathematica. Brno: Přírodovědecká fakulta Univerzity J.E. Purkyně, 1978, p. 59-62.
Display details
Displayed: 30/11/2024 07:37