Vámi zvolený výběr obsahuje 189 výsledků. Upravit výběr.
Filtrování publikací

    2024

    1. LAGRAA, Sofiane, Martin HUSÁK, Hamida SEBA, Satyanarayana VUPPALA, Radu STATE a Moussa OUEDRAOGO. A review on graph-based approaches for network security monitoring and botnet detection. International Journal of Information Security. Springer, 2024, roč. 23, č. 1, s. 119-140. ISSN 1615-5262. Dostupné z: https://dx.doi.org/10.1007/s10207-023-00742-7.
    2. RUMAN, Ádám, Martin DRAŠAR, Lukáš SADLEK, Shanchieh Jay YANG a Pavel ČELEDA. Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Online. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. New York, United States: Association for Computing Machinery, 2024, s. 1-11. ISBN 979-8-4007-1718-5. Dostupné z: https://dx.doi.org/10.1145/3664476.3664523.
    3. SADLEK, Lukáš a Pavel ČELEDA. Cyber Key Terrain Identification Using Adjusted PageRank Centrality. Online. In Meyer, N., Grocholewska-Czuryło, A. ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Cham: Springer, 2024, s. 293-306. ISBN 978-3-031-56325-6. Dostupné z: https://dx.doi.org/10.1007/978-3-031-56326-3_21.
    4. DAUBNER, Lukáš, Barbora BÜHNOVÁ a Tomáš PITNER. Forensic experts' view of forensic-ready software systems: A qualitative study. Journal of Software: Evolution and Process. HOBOKEN: WILEY, 2024, roč. 36, č. 5, s. 1-23. ISSN 2047-7473. Dostupné z: https://dx.doi.org/10.1002/smr.2598.
    5. DAUBNER, Lukáš, Sofija MAKSOVIĆ, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ a Tomáš SEDLÁČEK. Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design. Online. In International Conference on Research Challenges in Information Science (RCIS 2024). Neuveden: Springer, 2024, s. 47–55. ISBN 978-3-031-59467-0. Dostupné z: https://dx.doi.org/10.1007/978-3-031-59468-7_6.
    6. DAUBNER, Lukáš, Sofija MAKSOVIĆ a Tomáš SEDLÁČEK. FREAS: Forensic-Ready Analysis Suite. 2024.
    7. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Martin HORÁK, Martin HOFBAUER a Pavel ČELEDA. From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24). New York, NY, USA: ACM, 2024, s. 213-219. ISBN 979-8-4007-0600-4. Dostupné z: https://dx.doi.org/10.1145/3649217.3653639.
    8. SADLEK, Lukáš, Martin HUSÁK a Pavel ČELEDA. Hierarchical Modeling of Cyber Assets in Kill Chain Attack Graphs. Online. In 20th International Conference on Network and Service Management, CNSM 2024. IFIP Open Digital Library, IEEE Xplore, 2024. ISBN 978-3-903176-66-9.
    9. SADLEK, Lukáš, Martin HUSÁK a Pavel ČELEDA. Identification of Device Dependencies Using Link Prediction. Online. In NOMS 2024 - 2024 IEEE/IFIP Network Operations and Management Symposium. Seoul, South Korea: IEEE Xplore Digital Library, 2024, s. 1-10. ISBN 979-8-3503-2794-6. Dostupné z: https://dx.doi.org/10.1109/NOMS59830.2024.10575713.
    10. BOU-HARB, Elias, Edgar WEIPPL, Chadi ASSI, Martin HUSÁK, Jiangshan YU a Katherine FLANIGAN. IoT Security and Provisioning in Cyber-Enabled Niche Critical Infrastructure. In IEEE Internet of Things Magazine. Volume: 7, Issue: 6. IEEE, 2024, s. 10-12. ISSN 2576-3180. Dostupné z: https://dx.doi.org/10.1109/MIOT.2024.10737172.
    11. HUSÁK, Martin, Darshan MANOJ a Priyanka KUMAR. Machine Learning in Intrusion Detection: An Operational Perspective. Online. 2024, 7 s.
    12. VYKOPAL, Jan, Pavel ČELEDA, Valdemar ŠVÁBENSKÝ, Martin HOFBAUER a Martin HORÁK. Research and Practice of Delivering Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24). New York, NY, USA: ACM, 2024, s. 220-226. ISBN 979-8-4007-0600-4. Dostupné z: https://dx.doi.org/10.1145/3649217.3653642.
    13. KRÁČMAROVÁ, Tereza, Markéta JASANSKÁ, Daniel BARTÁK, Pavel BREJCHA, Lucie ČEJKOVÁ, Johana JEŠÁTKOVÁ, Ondřej KAŠKA, Jan MARTÍNEK, Eva MEDZIHORSKÁ, Tina MIZEROVÁ, Maria PYTLOVÁ, Tomáš ŘEPA, Adéla SCHREIBEROVÁ, Kateřina SÝKOROVÁ, David ŠPŮREK, Julie VINKLOVÁ a Zuzana VRBECKÁ. Slovník mediální gramotnosti. První vydání. Brno: Nugis Finem Publishing, 2024, 120 s. ISBN 978-80-7614-009-7.
    14. HUSÁK, Martin, Lukáš SADLEK, Martin HESKO, Vít ŠEBELA a Stanislav ŠPAČEK. The Evolution of the CRUSOE Toolset: Enhancing Decision Support in Network Security Management. Online. In 20th International Conference on Network and Service Management, CNSM 2024. 2024, 3 s.
    15. HUSÁK, Martin, Mohamed-Lamine MESSAI a Hamida SEBA. The 5th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2024). 2024.
    16. HUSÁK, Martin. Theory and Practice of Cybersecurity Knowledge Graphs and Further Steps. In ARES 2024: The 19th International Conference on Availability, Reliability and Security. 2024.
    17. HUSÁK, Martin, Shanchieh Jay YANG, Joseph KHOURY, Dorde KLISURA a Elias BOU-HARB. Unraveling Network-based Pivoting Maneuvers: Empirical Insights and Challenges. Online. In Sanjay Goel, Paulo Roberto Nunes de Souza. Digital Forensics and Cyber Crime. Cham: Springer, 2024, s. 132-151. ISBN 978-3-031-56582-3. Dostupné z: https://dx.doi.org/10.1007/978-3-031-56583-0_9.
    18. HUSÁK, Martin a Brian LEE. 1st Workshop on Network Security Operations (NeSecOr). 2024.

    2023

    1. DAUBNER, Lukáš, Raimundas MATULEVICIUS, Barbora BÜHNOVÁ, Matej ANTOL, Michal RŮŽIČKA a Tomáš PITNER. A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture. Online. In Advanced Information Systems Engineering. Cham: Springer Nature Switzerland, 2023, s. 522-538. ISBN 978-3-031-34559-3. Dostupné z: https://dx.doi.org/10.1007/978-3-031-34560-9_31.
    2. DAUBNER, Lukáš, Matulevičius RAIMUNDAS a Barbora BÜHNOVÁ. A Model of Qualitative Factors in Forensic-Ready Software Systems. Online. In Research Challenges in Information Science: Information Science and the Connected World. Cham: Springer Nature Switzerland, 2023, s. 308-324. ISBN 978-3-031-33079-7. Dostupné z: https://dx.doi.org/10.1007/978-3-031-33080-3_19.
    3. DAUBNER, Lukáš, Martin MACÁK, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ, Sofija MAKSOVIĆ a Tomáš PITNER. Addressing insider attacks via forensic-ready risk management. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. ENGLAND: ELSEVIER, 2023, roč. 73, March 2023, s. 103433-103449. ISSN 2214-2126. Dostupné z: https://dx.doi.org/10.1016/j.jisa.2023.103433.
    4. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ a Tomáš PITNER. BPMN4FRSS: An BPMN Extension to Support Risk-Based Development of Forensic-Ready Software Systems. Online. In Evaluation of Novel Approaches to Software Engineering. Cham: Springer Nature Switzerland, 2023, s. 20-43. ISBN 978-3-031-36596-6. Dostupné z: https://dx.doi.org/10.1007/978-3-031-36597-3_2.
    5. BEURAN, Razvan, Jan VYKOPAL, Daniela BELAJOVÁ, Pavel ČELEDA, Yasuo TAN a Yoichi SHINODA. Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. Computers & Security. Elsevier, 2023, roč. 128, č. 103120, s. 1-14. ISSN 0167-4048. Dostupné z: https://dx.doi.org/10.1016/j.cose.2023.103120.
    6. DAUBNER, Lukáš a Adam POVAŽANEC. Data Loss Prevention Solution for Linux Endpoint Devices. Online. In ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security. United States: Association for Computing Machinery, 2023, s. 1-10. ISBN 979-8-4007-0772-8. Dostupné z: https://dx.doi.org/10.1145/3600160.3605036.
    7. ŠPAČEK, Stanislav, Petr VELAN, Martin HOLKOVIČ a Tomáš PLESNÍK. Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic. Online. In 2023 IEEE/IFIP Network Operations and Management Symposium (NOMS 2023). Miami, Florida, USA: IEEE Xplore Digital Library, 2023, s. 1-6. ISBN 978-1-6654-7716-1. Dostupné z: https://dx.doi.org/10.1109/NOMS56928.2023.10154211.
    8. DAUBNER, Lukáš, Barbora BÜHNOVÁ a Tomáš PITNER. Forensic experts' view of forensic-ready software systems: A qualitative study. Journal of Software: Evolution and Process. John Wiley & Sons Ltd., 2023, Neuveden, e2598, s. 1-23. ISSN 2047-7481. Dostupné z: https://dx.doi.org/10.1002/smr.2598.
    9. POKORNÝ, Jan, Magdaléna KEJSTOVÁ, Vít RUSŇÁK a Simone KRIGLSTEIN. From Bin to Playin’: Give Vintage Objects a New Purpose as Game Controllers. Online. In Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA '23). Hamburg, Germany: Association for Computing Machinery, 2023, s. 1-6. ISBN 978-1-4503-9422-2. Dostupné z: https://dx.doi.org/10.1145/3544549.3585665.
    10. ČERMÁK, Milan a Petr VELAN. How can network traffic lie? DFRWS EU 2023, 2023.
    11. HUSÁK, Martin, Pavol SOKOL, Martin ŽÁDNÍK, Václav BARTOŠ a Martin HORÁK. Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. Digital Threats: Research and Practice. Association for Computing Machinery, 2023, roč. 4, č. 4, s. 1-11. ISSN 2576-5337. Dostupné z: https://dx.doi.org/10.1145/3611391.
    12. HUSÁK, Martin a Michal JAVORNÍK. Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection. Online. In 2023 IEEE Conference on Communications and Network Security (CNS). New York, NY: IEEE, 2023, s. 1-6. ISBN 979-8-3503-3945-1. Dostupné z: https://dx.doi.org/10.1109/CNS59707.2023.10288665.
    13. HUSÁK, Martin, Joseph KHOURY, Ðorđe KLISURA a Elias BOU-HARB. On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics. Online. In Pierre Collet, Latafat Gardashova, Samer El Zant, Ulviya Abdulkarimova. Complex Computational Ecosystems. Cham, Switzerland: Springer Nature, 2023, s. 167-179. ISBN 978-3-031-44354-1. Dostupné z: https://dx.doi.org/10.1007/978-3-031-44355-8_12.
    14. LAŠTOVIČKA, Martin, Martin HUSÁK, Petr VELAN, Tomáš JIRSÍK a Pavel ČELEDA. Passive Operating System Fingerprinting Revisited: Evaluation and Current Challenges. Computer Networks. Netherlands: Elsevier, 2023, roč. 229, č. 109782, s. 1-12. ISSN 1389-1286. Dostupné z: https://dx.doi.org/10.1016/j.comnet.2023.109782.
    15. BOUČEK, Vladimír a Martin HUSÁK. Recommending Similar Devices in Close Proximity for Network Security Management. Online. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Montreal: IEEE, 2023, s. 481-484. ISBN 979-8-3503-3667-2. Dostupné z: https://dx.doi.org/10.1109/WiMob58348.2023.10187729.
    16. ANSAH, Alberta A, Adriana S VIVACQUA, Sailin ZHONG, Susanne BOLL, Marios CONSTANTINIDES, Himanshu VERMA, Abdallah El ALI, Alina LUSHNIKOVA, Hamed ALAVI, Sean RINTEL, Andrew L KUN, Orit SHAER, Anna L COX, Kathrin GERLING, Michael MULLER, Vít RUSŇÁK, Leticia Santos MACHADO, Thomas KOSCH, CHIWORK COLLECTIVE a SIGCHI EXECUTIVE COMMITTEE. Reflecting on Hybrid Events: Learning from a Year of Hybrid Experiences. Online. In Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA '23). New York, NY, USA: Association for Computing Machinery, 2023, s. 1–4, 5 s. Dostupné z: https://dx.doi.org/10.1145/3544549.3583181.
    17. HUSÁK, Martin, Mohamed-Lamine MESSAI a Hamida SEBA. The 4th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2023). 2023.
    18. RUSŇÁK, Vít a Martin DRAŠAR. Towards a Visual Analytics Workflow for Cybersecurity Simulations. Online. In Christophe Hurter, Helen Purchase, Kadi Bouatouch. Proceedings of VISIGRAPP2023 - Volume3: IVAPP. To appear. Lisbon, Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2023, s. 179-186. ISBN 978-989-758-634-7. Dostupné z: https://dx.doi.org/10.5220/0011695000003417.
    19. HYNEK, Jiří a Vít RUSŇÁK. Towards Interactive Geovisualization Authoring Toolkit for Industry Use Cases. Online. In A. Augusto de Sousa, Vlastimil Havran, Alexis Paljic, Tabitha Peck, Christophe Hurter, Helen Purchase, Giovanni Maria Farinella, Petia Radeva, Kadi Bouatouch. Computer Vision, Imaging and Computer Graphics Theory and Applications. 1. vyd. Cham, Switzerland: Springer, 2023, s. 232-256. ISBN 978-3-031-25476-5. Dostupné z: https://dx.doi.org/10.1007/978-3-031-25477-2_11.
    20. ČERMÁK, Milan, Tatiana FRITZOVÁ, Vít RUSŇÁK a Denisa ŠRÁMKOVÁ. Using relational graphs for exploratory analysis of network traffic data. Forensic Science International: Digital Investigation. 2023, roč. 45, S, s. 1-10. ISSN 2666-2825. Dostupné z: https://dx.doi.org/10.1016/j.fsidi.2023.301563.
    21. HORÁK, Jiří, Katarína FURMANOVÁ, Barbora KOZLÍKOVÁ, Tomáš BRÁZDIL, Petr HOLUB, Martin KAČENGA, Matej GALLO, Rudolf NENUTIL, Jan BYŠKA a Vít RUSŇÁK. xOpat: eXplainable Open Pathology Analysis Tool. COMPUTER GRAPHICS FORUM. England: Wiley, 2023, roč. 42, č. 3, s. 63-73. ISSN 0167-7055. Dostupné z: https://dx.doi.org/10.1111/cgf.14812.

    2022

    1. ČEGAN, Jakub, Tomáš PLESNÍK, Daniel TOVARŇÁK, Zdeněk FORMAN a Roman VESELÝ. Analytická studie rozvoje a nasazení SOC. 2022.
    2. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ a Tomáš PITNER. Business Process Model and Notation for Forensic-Ready Software Systems. Online. In Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering. Setúbal, Portugal: SciTePress, 2022, s. 95-106. ISBN 978-989-758-568-5. Dostupné z: https://dx.doi.org/10.5220/0011041000003176.
    3. HUSÁK, Martin. Complex Networks in Cybersecurity: Applications and Challenges. In ACONTA'22 : First European Conference on Augmented Complex Networks - Trustworthy Analysis. 2022.
    4. HUSÁK, Martin, Lukáš SADLEK, Stanislav ŠPAČEK, Martin LAŠTOVIČKA, Michal JAVORNÍK a Jana KOMÁRKOVÁ. CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling. Computers & Security. Elsevier, 2022, roč. 115, April, s. 1-19. ISSN 0167-4048. Dostupné z: https://dx.doi.org/10.1016/j.cose.2022.102609.
    5. SADLEK, Lukáš, Pavel ČELEDA a Daniel TOVARŇÁK. Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna, Austria: ACM, 2022, s. 1-8. ISBN 978-1-4503-9670-7. Dostupné z: https://dx.doi.org/10.1145/3538969.3544458.
    6. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI a Barbora BÜHNOVÁ. Cybersecurity Analysis via Process Mining: A Systematic Literature Review. Online. In Advanced Data Mining and Applications. Cham, Switzerland: Springer, 2022, s. 393-407. ISBN 978-3-030-95404-8. Dostupné z: https://dx.doi.org/10.1007/978-3-030-95405-5_28.
    7. DOČKALOVÁ BURSKÁ, Karolína, Vít RUSŇÁK a Radek OŠLEJŠEK. Data-driven insight into the puzzle-based cybersecurity training. Computers & Graphics. Elsevier Science, 2022, roč. 102, February 2022, s. 441-451. ISSN 0097-8493. Dostupné z: https://dx.doi.org/10.1016/j.cag.2021.09.011.
    8. ŽÁDNÍK, Martin, Jan WRONA, Karel HYNEK, Tomáš ČEJKA a Martin HUSÁK. Discovering coordinated groups of IP addresses through temporal correlation of alerts. IEEE Access. IEEE, 2022, roč. 10, č. 1, s. 82799-82813. ISSN 2169-3536. Dostupné z: https://dx.doi.org/10.1109/ACCESS.2022.3196362.
    9. ČELEDA, Pavel, Attila FARKAS, Pavel ŠEDA, Andrej TOMČI, Daniel IĽKOVIČ, Martin ŠVÉDA a Tomáš HRADSKÝ. Dohledové centrum pro monitorování výrobních informačních systémů. 2022.
    10. ŠPAČEK, Stanislav, Petr VELAN, Pavel ČELEDA a Daniel TOVARŇÁK. Encrypted Web Traffic Dataset: Event Logs and Packet Traces. Data in Brief. 2022, roč. 42, June, s. 1-10. ISSN 2352-3409. Dostupné z: https://dx.doi.org/10.1016/j.dib.2022.108188.
    11. MACÁK, Martin, Lukáš DAUBNER, Júlia JAMNICKÁ a Barbora BÜHNOVÁ. Game Achievement Analysis: Process Mining Approach. Online. In Advanced Data Mining and Applications. Cham: Springer International Publishing, 2022, s. 68-82. ISBN 978-3-030-95407-9. Dostupné z: https://dx.doi.org/10.1007/978-3-030-95408-6_6.
    12. HUSÁK, Martin, Martin LAŠTOVIČKA a Tomáš PLESNÍK. Handling Internet Activism during the Russian Invasion of Ukraine: A Campus Network Perspective. Digital Threats: Research and Practice. New York, NY, USA: ACM, 2022, roč. 3, č. 3, s. "17:1-17:5", 5 s. ISSN 2692-1626. Dostupné z: https://dx.doi.org/10.1145/3534566.
    13. ŠPAČEK, Stanislav, Petr VELAN, Pavel ČELEDA a Daniel TOVARŇÁK. HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. Online. In 2022 IEEE/IFIP Network Operations and Management Symposium (NOMS 2022). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2022, s. 1-6. ISBN 978-1-6654-0601-7. Dostupné z: https://dx.doi.org/10.1109/NOMS54207.2022.9789877.
    14. SADLEK, Lukáš, Pavel ČELEDA a Daniel TOVARŇÁK. Identification of Attack Paths Using Kill Chain and Attack Graphs. Online. In NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2022, s. 1-6. ISBN 978-1-6654-0601-7. Dostupné z: https://dx.doi.org/10.1109/NOMS54207.2022.9789803.
    15. RUSŇÁK, Vít, Lenka JANEČKOVÁ, Filip DRGOŇ, Anna-Marie DOMBAJOVÁ a Veronika KUDĚLKOVÁ. Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance. Online. In Ebad Banissi, Anna Ursyn, Mark W. McK. Bannatyne, et al. 2022 26th International Conference Information Visualisation (IV). Vienna, Austria: IEEE, 2022, s. 300-306. ISBN 978-1-6654-9007-8. Dostupné z: https://dx.doi.org/10.1109/IV56949.2022.00058.
    16. ČERMÁK, Milan. Incident Investigation: From Packets to Graph-Based Analysis. In International Workshop on Graph-based network Security (GraSec) in conjunction with IEEE/IFIP Network Operations and Management Symposium NOMS 2022. 2022.
    17. TOVARŇÁK, Daniel, Martin HAMERNÍK a Vít RUSŇÁK. Kolaborativní prostředí pro členy bezpečnostních týmů. 2022.
    18. ŠUĽAN, Samuel a Martin HUSÁK. Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, s. "22:1"-"22:6", 6 s. ISBN 978-1-4503-9670-7. Dostupné z: https://dx.doi.org/10.1145/3538969.3539007.
    19. JAVORNÍK, Michal a Martin HUSÁK. Mission-centric Decision Support in Cybersecurity via Bayesian Privilege Attack Graph. Engineering Reports. John Wiley & Sons, Inc, 2022, roč. 4, č. 12, s. "e12538", 25 s. ISSN 2577-8196. Dostupné z: https://dx.doi.org/10.1002/eng2.12538.
    20. TOVARŇÁK, Daniel, Michal ČECH, Dušan TICHÝ a Vojtěch DOHNAL. ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence. Online. In Varga, Pal, et al. Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022. USA: IEEE, 2022, s. 1-4. ISBN 978-1-6654-0601-7. Dostupné z: https://dx.doi.org/10.1109/NOMS54207.2022.9789882.
    21. ČEGAN, Jakub, Daniel TOVARŇÁK, Tomáš PLESNÍK, Martin KEPRT a Milan PERNICA. Organizační, technický a právní model sdíleného SOC. 2022.
    22. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI a Barbora BÜHNOVÁ. Process Mining Usage in Cybersecurity and Software Reliability Analysis: A Systematic Literature Review. Array. Elsevier Inc., 2022, roč. 13, č. 1, s. 1-14. ISSN 2590-0056. Dostupné z: https://dx.doi.org/10.1016/j.array.2021.100120.
    23. TOVARŇÁK, Daniel a Matúš RAČEK. Software pro integrovaný datový pohled na chráněnou infrastrukturu. 2022.
    24. TOVARŇÁK, Daniel, Vojtěch DOHNAL, Dušan TICHÝ, Benjamin KRÁL a Martin MACHÁČ. Software pro podporu orchestrace bezpečnosti a řízení životního cyklu hrozeb. 2022.
    25. HUSÁK, Martin a Milan ČERMÁK. SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, s. "25:1"-"25:10", 10 s. ISBN 978-1-4503-9670-7. Dostupné z: https://dx.doi.org/10.1145/3538969.3538981.
    26. DRAŠAR, Martin, Ádám RUMAN a Vít RUSŇÁK. SW pro dynamickou verifikaci bezpečnostních opatření. 2022.
    27. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER a Ivo NUTÁR. SW pro ovládání nástrojů ofenzivní bezpečnosti. 2022.
    28. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER, Michal DROBŇÁK a Ivo NUTÁR. SW pro statickou verifikaci bezpečnostních opatření. 2022.
    29. HUSÁK, Martin a Hamida SEBA. The 3rd International Workshop on Graph-based network Security (GraSec 2022). 2022.
    30. ČERMÁK, Milan. Toward Graph-Based Network Traffic Analysis and Incident Investigation. In DFRWS EU 2022. 2022.

    2021

    1. MATTA, Lukáš a Martin HUSÁK. A Dashboard for Cyber Situational Awareness and Decision Support in Network Security Management. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, s. 716-717. ISBN 978-3-903176-32-4.
    2. DAUBNER, Lukáš, Tomáš PITNER a Jan MINISTR. Aspects of Forensic-Ready Software Systems in Public Service Domain. In Jan Ministr. Proceedings of the 24th International Conference on Information Technology for Practice. Ostrava, Czech Republic: VŠB - Technical University Ostrava, Centre for Information Technology, 2021, s. 139-145. ISBN 978-80-248-4562-3.
    3. TOVARŇÁK, Daniel, Matúš RAČEK a Petr VELAN. Cloud Native Data Platform for Network Telemetry and Analytics. Online. In Müge Sayıt, Stuart Clayman. 17th International Conference on Network and Service Management. Izmir, Turkey (Virtual): IFIP Open Digital Library, IEEE Xplore, 2021, s. 394-396. ISBN 978-3-903176-36-2. Dostupné z: https://dx.doi.org/10.23919/CNSM52442.2021.9615568.
    4. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína DOČKALOVÁ BURSKÁ, Valdemar ŠVÁBENSKÝ, Jan VYKOPAL a Jakub ČEGAN. Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. IEEE Transactions on Visualization and Computer Graphics. 2021, roč. 27, č. 8, s. 3425-3437. ISSN 1077-2626. Dostupné z: https://dx.doi.org/10.1109/TVCG.2020.2977336.
    5. DOČKALOVÁ BURSKÁ, Karolína, Vít RUSŇÁK a Radek OŠLEJŠEK. Enhancing Situational Awareness for Tutors of Cybersecurity Capture the Flag Games. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: IEEE, 2021, s. 235-242. ISBN 978-1-6654-3827-8. Dostupné z: https://dx.doi.org/10.1109/IV53921.2021.00045.
    6. ŠPAČEK, Stanislav, Daniel TOVARŇÁK a Pavel ČELEDA. Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption. In Audun Jøsang, Lynn Futcher, Janne Hagen. ICT Systems Security and Privacy Protection. 1. vyd. Oslo: Springer, 2021, s. 302-316. ISBN 978-3-030-78119-4. Dostupné z: https://dx.doi.org/10.1007/978-3-030-78120-0_20.
    7. HYNEK, Jiří, Jakub KACHLÍK a Vít RUSŇÁK. Geovisto: A Toolkit for Generic Geospatial Data Visualization. Online. In Christophe Hurter, Helen Purchase, Jose Braz, Kadi Bouatouch. Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 3 IVAPP: IVAPP. Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2021, s. 101-111. ISBN 978-989-758-488-6. Dostupné z: https://dx.doi.org/10.5220/0010260401010111.
    8. HYNEK, Jiří, Kryštof RYKALA, Jakub KACHLÍK a Vít RUSŇÁK. Geovisto: Toolkit for Generic Geospatial Data Visualization. 2021.
    9. ČERMÁK, Milan a Denisa ŠRÁMKOVÁ. GRANEF: Utilization of a Graph Database for Network Forensics. Online. In Sabrina De Capitani di Vimercati, Pierangela Samarati. Proceedings of the 18th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2021, s. 785-790. ISBN 978-989-758-524-1. Dostupné z: https://dx.doi.org/10.5220/0010581807850790.
    10. TOVARŇÁK, Daniel, Lukáš SADLEK a Pavel ČELEDA. Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021). Washington DC, USA: IEEE, 2021, s. 986-991. ISBN 978-3-903176-32-4.
    11. ČERMÁK, Milan. Graph-based Network Traffic Analysis for Incident Investigation. In The 16th International Conference on Availability, Reliability and Security. 2021.
    12. ČEGAN, Jakub, Vladimír ROHEL, Milan ČERMÁK, Petr VELAN, Vojtěch HAMERSKÝ, Natálie VELECKÁ, Martin LEBEDA, Tomáš KACVINSKÝ a Zdeněk VYDRA. Kyberbezpečnost lékařských přístrojů. 2021.
    13. UHLÁR, Juraj, Martin HOLKOVIČ a Vít RUSŇÁK. PCAPFunnel: A Tool for Rapid Exploration of Packet Capture Files. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: The Institute of Electrical and Electronics Engineers, Inc., 2021, s. 69-76. ISBN 978-1-6654-3827-8. Dostupné z: https://dx.doi.org/10.1109/IV53921.2021.00021.
    14. HUSÁK, Martin, Václav BARTOŠ, Pavol SOKOL a Andrej GAJDOŠ. Predictive Methods in Cyber Defense: Current Experience and Research Challenges. Future Generation Computer Systems. Elsevier, 2021, roč. 115, February, s. 517-530. ISSN 0167-739X. Dostupné z: https://dx.doi.org/10.1016/j.future.2020.10.006.
    15. RUSŇÁK, Vít, Anna-Marie DOMBAJOVÁ, Veronika KUDĚLKOVÁ a Martin PYŠČUK. Prototypová implementace nástroje pro vizuální analýzu časově orientovaných dat. 2021.
    16. DAUBNER, Lukáš a Raimundas MATULEVIČIUS. Risk-Oriented Design Approach For Forensic-Ready Software Systems. Online. In The 16th International Conference on Availability, Reliability and Security (ARES 2021). New York, NY, USA: Association for Computing Machinery, 2021, s. 1-10. ISBN 978-1-4503-9051-4. Dostupné z: https://dx.doi.org/10.1145/3465481.3470052.
    17. VYKOPAL, Jan, Pavel ČELEDA, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ a Daniel TOVARŇÁK. Scalable Learning Environments for Teaching Cybersecurity Hands-on. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, s. 1-9. ISBN 978-1-6654-3851-3. Dostupné z: https://dx.doi.org/10.1109/FIE49875.2021.9637180.
    18. ČERMÁK, Milan a Pavel ČELEDA. Stream-Based IP Flow Analysis. Online. In Toufik Ahmed, Olivier Festor, Yacine Ghamri-Doudane, Joon-Myung Kang, Alberto E. Schaeffer-Filho, Radu State, Burkhard Stiller. IFIP/IEEE International Symposium on Integrated Network Management, IM 2021. Bordeaux, France: IFIP Open Digital Library, 2021, s. 736-741. ISBN 978-3-903176-32-4.
    19. HUSÁK, Martin, Martin LAŠTOVIČKA a Daniel TOVARŇÁK. System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. Online. In ARES 2021: The 16th International Conference on Availability, Reliability and Security. Virtual Event: Association for Computing Machinery, 2021, s. 1-8. ISBN 978-1-4503-9051-4. Dostupné z: https://dx.doi.org/10.1145/3465481.3470037.
    20. LAGRAA, Sofiane, Radu STATE, Hamida SEBA a Martin HUSÁK. The 2nd International Workshop on Graph-based network Security (GraSec 2021). 2021.
    21. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Daniel TOVARŇÁK a Pavel ČELEDA. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, s. 1-9. ISBN 978-1-6654-3851-3. Dostupné z: https://dx.doi.org/10.1109/FIE49875.2021.9637052.
    22. HUSÁK, Martin. Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. Online. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI). San Antonio: IEEE, 2021, s. 1-6. ISBN 978-1-6654-3838-4. Dostupné z: https://dx.doi.org/10.1109/ISI53945.2021.9624774.
    23. HUSÁK, Martin, Giovanni APRUZZESE, Shanchieh YANG a Gordon WERNER. Towards an Efficient Detection of Pivoting Activity. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, s. 980-985. ISBN 978-3-903176-32-4.
    24. ČEGAN, Jakub, Tomáš KACVINSKÝ, Zdeněk VYDRA, Martin LEBEDA, Jakub Bartolomej KOŠUTH, Petr VELAN, Milan ČERMÁK, Andrej TOMČI, Ivo NUTÁR, Martin LAŠTOVIČKA, Natálie VELECKÁ, Pavla VIZVÁRY, Vojtěch HAMERSKÝ, Daniel KOUŘIL, Ondřej BUDAY, Martin KOTLÍK, Vladimír ROHEL, Jiří SÝKORA, Michal ZVÁNOVEC, Filip GRÉGR a Petr SLAVÍK. Virtualizované prostředí pro trénink CSIRT týmu. 2021.
    25. DOČKALOVÁ BURSKÁ, Karolína, Anna-Marie DOMBAJOVÁ, Jiří HYNEK, Jakub KACHLÍK, Jakub MATUŠKA, Michal PAVÚK, Kryštof RYKALA, Dávid ŽELNÍK a Vít RUSŇÁK. Vizuálně-analytická konzole pro ICS. 2021.

    2020

    1. ČECH, Michal, Roman CHRENŠŤ, Daniel TOVARŇÁK a Tomáš PLESNÍK. Adaptér pro systém pro správu zdrojů. 2020.
    2. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Daniel TOVARŇÁK, Pavel ZEZULA, Martin MACÁK, Matúš GUOTH, Matej BABEJ, Dávid BRILLA a Martin KAŽIMÍR. ANALYZA – Datový sklad. 2020.
    3. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Jarešová MIROSLAVA, Barbora KOZLÍKOVÁ, Kristína ZÁKOPČANOVÁ, Pavel ZEZULA, Katarína FURMANOVÁ, Marko ŘEHÁČEK, Jozef BÁTRNA a Daniel PLAKINGER. ANALYZA – Vizualizační komponenta – Visilant. 2020.
    4. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Barbora KOZLÍKOVÁ, Vladimír MÍČ, Filip NÁLEPA, David NOVÁK, Daniel TOVARŇÁK, Pavel ZEZULA, Jakub PESCHEL, Kasanič DENIS, Denisa ŠRÁMKOVÁ, Erik HRICIŠÁK, Vladimír LAZÁRIK a Kristián GUTIČ. ANALYZA – Výpočetní a orchestrační subsystém. 2020.
    5. HUSÁK, Martin, Martin ŽÁDNÍK, Václav BARTOŠ a Pavol SOKOL. Dataset of intrusion detection alerts from a sharing platform. Data in Brief. Elsevier, 2020, roč. 33, December, s. 1-12. ISSN 2352-3409. Dostupné z: https://dx.doi.org/10.1016/j.dib.2020.106530.
    6. JAVORNÍK, Michal, Jana KOMÁRKOVÁ, Lukáš SADLEK a Martin HUSÁK. Decision Support for Mission-Centric Network Security Management. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, s. 1-6. ISBN 978-1-7281-4973-8. Dostupné z: https://dx.doi.org/10.1109/NOMS47738.2020.9110261.
    7. HUSÁK, Martin. Graph-based models in prediction and projection of cyber attacks. In The 1st International Workshop on Graph-based network Security. 2020.
    8. PLESNÍK, Tomáš a Vít RUSŇÁK. Nettmap2 - Interaktivní nástroj pro zobrazení síťové topologie vizualizující data z Flowmon řešení. 2020.
    9. LAŠTOVIČKA, Martin, Martin HUSÁK a Lukáš SADLEK. Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2020, s. 1-6. ISBN 978-1-7281-4973-8. Dostupné z: https://dx.doi.org/10.1109/NOMS47738.2020.9110394.
    10. HUSÁK, Martin a Pavel ČELEDA. Predictions of Network Attacks in Collaborative Environment. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, s. 1-6. ISBN 978-1-7281-4973-8. Dostupné z: https://dx.doi.org/10.1109/NOMS47738.2020.9110472.
    11. HUSÁK, Martin, Tomáš BAJTOŠ, Jaroslav KAŠPAR, Elias BOU-HARB a Pavel ČELEDA. Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. ACM Transactions on Management Information Systems. Association for Computing Machinery, 2020, roč. 11, č. 4, s. 1-16. ISSN 2158-656X. Dostupné z: https://dx.doi.org/10.1145/3386250.
    12. DAUBNER, Lukáš a Tomáš PITNER. Secure software modeling methods for forensic readiness. Online. In Jan Ministr. Proceedings of the 22nd International Conference on Information Technology for Practice. Ostrava, Czech Republic: VŠB - Technical University Ostrava, Centre for Information Technology, 2020, s. 153-160. ISBN 978-80-248-4321-6.
    13. MACÁK, Martin, Agáta KRUŽÍKOVÁ, Lukáš DAUBNER a Barbora BÜHNOVÁ. Simulation Games Platform for Unintentional Perpetrator Attack Vector Identification. Online. In ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops. New York, NY, USA: Association for Computing Machinery, 2020, s. 222-229. ISBN 978-1-4503-7963-2. Dostupné z: https://dx.doi.org/10.1145/3387940.3391475.
    14. ŠPAČEK, Stanislav a Milan ŽIARAN. Software pro aplikaci reaktivních opatření na prvcích aktivní obrany počítačové sítě. 2020.
    15. LAŠTOVIČKA, Martin, Jakub Bartolomej KOŠUTH, Daniel FILAKOVSKÝ, Antonín DUFKA a Martin HUSÁK. Software pro evidenci zranitelností v počítačové síti. 2020.
    16. SADLEK, Lukáš, Michal JAVORNÍK a Martin HUSÁK. Software pro podporu rozhodování při řešení bezpečnostního incidentu. 2020.
    17. HUSÁK, Martin, Tomáš JIRSÍK a Shanchieh Jay YANG. SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security. Online. In Proceedings of the 15th International Conference on Availability, Reliability and Security. New York, NY, United States: Association for Computing Machinery, 2020, s. 1-10. ISBN 978-1-4503-8833-7. Dostupné z: https://dx.doi.org/10.1145/3407023.3407062.
    18. DAUBNER, Lukáš, Martin MACÁK, Barbora BÜHNOVÁ a Tomáš PITNER. Towards verifiable evidence generation in forensic-ready systems. Online. In 2020 IEEE International Conference on Big Data (Big Data). Atlanta, United States: IEEE, 2020, s. 2264-2269. ISBN 978-1-7281-6251-5. Dostupné z: https://dx.doi.org/10.1109/BigData50022.2020.9378035.
    19. TOVARŇÁK, Daniel, Stanislav ŠPAČEK a Jan VYKOPAL. Traffic and Log Data Captured During a Cyber Defense Exercise. Data in Brief. 2020, roč. 31, August, s. 1-11. ISSN 2352-3409. Dostupné z: https://dx.doi.org/10.1016/j.dib.2020.105784.
    20. LAŠTOVIČKA, Martin, Stanislav ŠPAČEK, Petr VELAN a Pavel ČELEDA. Using TLS Fingerprints for OS Identification in Encrypted Traffic. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2020, s. 1-6. ISBN 978-1-7281-4973-8. Dostupné z: https://dx.doi.org/10.1109/NOMS47738.2020.9110319.
    21. DAUBNER, Lukáš, Martin MACÁK, Barbora BÜHNOVÁ a Tomáš PITNER. Verification of Forensic Readiness in Software Development: A Roadmap. Online. In Proceedings of the 35th Annual ACM Symposium on Applied Computing. New York, NY, USA: Association for Computing Machinery, 2020, s. 1658-1661. ISBN 978-1-4503-6866-7. Dostupné z: https://dx.doi.org/10.1145/3341105.3374094.
    22. MATTA, Lukáš a Martin HUSÁK. Webová aplikace pro vizualizaci bezpečnostní situace v počítačové síti. 2020.

    2019

    1. HUSÁK, Martin a Jaroslav KAŠPAR. AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, s. "81:1"-"81:8", 8 s. ISBN 978-1-4503-7164-3. Dostupné z: https://dx.doi.org/10.1145/3339252.3340513.
    2. TOVARŇÁK, Daniel. An Algorithm for Message Type Discovery in Unstructured Log Data. Online. In Proceedings of the 14th International Conference on Software Technologies - Volume 1: ICSOFT. Prague: SciTePress, 2019, s. 665-676. ISBN 978-989-758-379-7. Dostupné z: https://dx.doi.org/10.5220/0007919806650676.
    3. BOU-HARB, Elias, Martin HUSÁK, Mourad DEBBABI a Chadi ASSI. Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Transactions on Big Data. IEEE, 2019, roč. 5, č. 4, s. 439-453. ISSN 2332-7790. Dostupné z: https://dx.doi.org/10.1109/TBDATA.2017.2723398.
    4. ŠPAČEK, Stanislav, Martin LAŠTOVIČKA, Martin HORÁK a Tomáš PLESNÍK. Current Issues of Malicious Domains Blocking. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, s. 551-556. ISBN 978-1-7281-0618-2.
    5. JAVORNÍK, Michal, Jana KOMÁRKOVÁ a Martin HUSÁK. Decision Support for Mission-Centric Cyber Defence. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, s. "34:1"-"34:8", 8 s. ISBN 978-1-4503-7164-3. Dostupné z: https://dx.doi.org/10.1145/3339252.3340522.
    6. ŠPAČEK, Stanislav, Vít RUSŇÁK a Anna-Marie DOMBAJOVÁ. DNS Firewall Data Visualization. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, s. 743-744. ISBN 978-1-7281-0618-2.
    7. HORÁK, Martin, Václav STUPKA a Martin HUSÁK. GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, s. "36:1"-"36:8", 8 s. ISBN 978-1-4503-7164-3. Dostupné z: https://dx.doi.org/10.1145/3339252.3340516.
    8. CHREN, Stanislav, Barbora BÜHNOVÁ, Martin MACÁK, Lukáš DAUBNER a Bruno ROSSI. Mistakes in UML Diagrams: Analysis of Student Projects in a Software Engineering Course. Online. In Sarah Beecham, Daniela Damian. Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training. Piscataway, NJ, USA: IEEE Press, 2019, s. 100-109. ISBN 978-1-7281-1000-4. Dostupné z: https://dx.doi.org/10.1109/ICSE-SEET.2019.00019.
    9. ČELEDA, Pavel, Jakub ČEGAN, Martin MACHÁČ, Jana MEDKOVÁ, Ivo NUTÁR, Tomáš PLESNÍK, Daniel TOVARŇÁK a Martin VIZVÁRY. Nástroj pro zmírňování a potlačování útoků na kritickou informační infrastrukturu. 2019.
    10. ČELEDA, Pavel, Jakub ČEGAN, Martin DRAŠAR, Ivo NUTÁR, Jiří RÁJA, Tomáš REBOK, Andrej TOMČI a Daniel TOVARŇÁK. Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury. 2019.
    11. TOVARŇÁK, Daniel a Tomáš PITNER. Normalization of Unstructured Log Data into Streams of Structured Event Objects. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, s. 671-676. ISBN 978-1-72810-618-2.
    12. ČERMÁK, Milan, Martin LAŠTOVIČKA a Tomáš JIRSÍK. Real-time Pattern Detection in IP Flow Data using Apache Spark. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, s. 521-526. ISBN 978-1-7281-0618-2.
    13. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Michal BERAN, František HRDINA, Tomáš JIRSÍK, Daniel KOUŘIL, Michal MAZOUREK, Radek OŠLEJŠEK, Michal PROCHÁZKA, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Vadim JANOVSKIJ a Kristína ZÁKOPČANOVÁ. Software pro detekci a analýzu napadení KII. 2019.
    14. HUSÁK, Martin, Jaroslav KAŠPAR a Milan ŽIARAN. Software pro inteligentní analýzu bezpečnostních událostí (iABU). 2019.
    15. ČELEDA, Pavel, Jakub ČEGAN, Karolína DOČKALOVÁ BURSKÁ, Jan DUDA, Martin HAMERNÍK, Miroslava JAREŠOVÁ, Erik KOČAMBA, Radek OŠLEJŠEK, Vít RUSŇÁK, Daniel TOVARŇÁK, Hai Duong TRAN, Jan VYKOPAL a Kristína ZÁKOPČANOVÁ. Software pro provádění bezpečnostních cvičení a školení. 2019.
    16. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Milan ČERMÁK, Jan DUDA, Vlastimil HOLER, Ľuboš HYŽÁK, Boris JADUŠ, Jakub KADAŠI, David LEŠKA, Martin MACHÁČ, Ivo NUTÁR, Radek OŠLEJŠEK, Dominik PILÁR, Tomáš PLESNÍK, Michal PROCHÁZKA, Tomáš REBOK, Vít RUSŇÁK, Miloslav STANĚK, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Jan VYKOPAL a Tatiana ZBONČÁKOVÁ. Software pro simulaci obecných i kritických informačních infrastruktur. 2019.
    17. HUSÁK, Martin, Jana KOMÁRKOVÁ, Elias BOU-HARB a Pavel ČELEDA. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys & Tutorials. IEEE, 2019, roč. 21, č. 1, s. 640-660. ISSN 1553-877X. Dostupné z: https://dx.doi.org/10.1109/COMST.2018.2871866.
    18. BARTOŠ, Václav, Martin ŽÁDNÍK, Pavel KROBOT, Lukáš HUTÁK, Martin HUSÁK, Jaroslav KAŠPAR a Petr VELAN. Systém pro sdílení a analýzu bezpečnostních událostí. 2019.
    19. ČERMÁK, Milan. Trace-Share: Towards Provable Network Traffic Measurement and Analysis. 2019.
    20. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína BURSKÁ, Valdemar ŠVÁBENSKÝ a Jan VYKOPAL. Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. Online. In Gove R., Arendt D., Kohlhammer J., Angelini M., Lyn Paul, C., Bryan C. McKenna S., Prigent N., Najafi P., Sopan A. 2019 IEEE Symposium on Visualization for Cyber Security (VizSec). Vancouver, BC, Canada: IEEE, 2019, s. 1-11. ISBN 978-1-7281-3876-3. Dostupné z: https://dx.doi.org/10.1109/VizSec48167.2019.9161386.

    2018

    1. HUSÁK, Martin, Nataliia NESHENKO, Morteza SAFAEI POUR, Elias BOU-HARB a Pavel ČELEDA. Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, s. "29:1"-"29:6", 6 s. ISBN 978-1-4503-6448-5. Dostupné z: https://dx.doi.org/10.1145/3230833.3230837.
    2. KOMÁRKOVÁ, Jana, Lukáš SADLEK a Martin LAŠTOVIČKA. Community Based Platform for Vulnerability Categorization. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, s. nestránkováno, 2 s. ISBN 978-1-5386-3416-5. Dostupné z: https://dx.doi.org/10.1109/NOMS.2018.8406125.
    3. KOMÁRKOVÁ, Jana, Martin HUSÁK, Martin LAŠTOVIČKA a Daniel TOVARŇÁK. CRUSOE: Data Model for Cyber Situation Awareness. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, s. "36:1"-"36:10", 10 s. ISBN 978-1-4503-6448-5. Dostupné z: https://dx.doi.org/10.1145/3230833.3232798.
    4. NESHENKO, Nataliia, Martin HUSÁK, Elias BOU-HARB, Pavel ČELEDA, Sameera AL-MULLA a Claude FACHKHA. Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations. Online. In 2018 IEEE Globecom Workshops. Abu Dhabi: IEEE, 2018, s. 1-7. ISBN 978-1-5386-4920-6. Dostupné z: https://dx.doi.org/10.1109/GLOCOMW.2018.8644468.
    5. RUSŇÁK, Vít, Caroline APPERT, Olivier CHAPUIS a Emmanuel PIETRIGA. Designing Coherent Gesture Sets for Multi-scale Navigation on Tabletops. Online. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 2018, 12 s. ISBN 978-1-4503-5620-6. Dostupné z: https://dx.doi.org/10.1145/3173574.3173716.
    6. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Milan ČERMÁK a Martin LAŠTOVIČKA. Enhancing Cybersecurity Skills by Creating Serious Games. Online. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'18). Larnaca, Cyprus: ACM, 2018, s. 194-199. ISBN 978-1-4503-5707-4. Dostupné z: https://dx.doi.org/10.1145/3197091.3197123.
    7. OŠLEJŠEK, Radek, Jan VYKOPAL, Karolína BURSKÁ a Vít RUSŇÁK. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. Online. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18). San Jose, California, USA: IEEE, 2018, s. 1-9. ISBN 978-1-5386-1173-9. Dostupné z: https://dx.doi.org/10.1109/FIE.2018.8659299.
    8. LAŠTOVIČKA, Martin, Antonín DUFKA a Jana KOMÁRKOVÁ. Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use?. Online. In IEEE. Proceedings of the 14th International Wireless Communications and Mobile Computing Conference. Limassol, Cyprus: IEEE Xplore Digital Library, 2018, s. 542-547. ISBN 978-1-5386-2070-0. Dostupné z: https://dx.doi.org/10.1109/IWCMC.2018.8450406.
    9. LAŠTOVIČKA, Martin, Tomáš JIRSÍK, Pavel ČELEDA, Stanislav ŠPAČEK a Daniel FILAKOVSKÝ. Passive OS Fingerprinting Methods in the Jungle of Wireless Networks. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, s. nestránkováno, 9 s. ISBN 978-1-5386-3416-5. Dostupné z: https://dx.doi.org/10.1109/NOMS.2018.8406262.
    10. LAŠTOVIČKA, Martin a Daniel FILAKOVSKÝ. Passive OS Fingerprinting Prototype Demonstration. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, s. nestránkováno, 2 s. ISBN 978-1-5386-3416-5. Dostupné z: https://dx.doi.org/10.1109/NOMS.2018.8406128.
    11. VELAN, Petr, Martin HUSÁK a Daniel TOVARŇÁK. Rapid Prototyping of Flow-Based Detection Methods Using Complex Event Processing. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, s. 1-3. ISBN 978-1-5386-3416-5. Dostupné z: https://dx.doi.org/10.1109/NOMS.2018.8406121.
    12. ŠPAČEK, Stanislav a Pavel ČELEDA. Threat Detection Through Correlation of Network Flows and Logs. Online. In Burkhard Stiller. Proceedings of the 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018). Neuveden: IFIP, 2018, s. 6-10. ISBN 978-3-903176-12-6.
    13. HUSÁK, Martin a Jaroslav KAŠPAR. Towards Predicting Cyber Attacks Using Information Exchange and Data Mining. Online. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). Limassol: IEEE, 2018, s. 536-541. ISBN 978-1-5386-2070-0. Dostupné z: https://dx.doi.org/10.1109/IWCMC.2018.8450512.
    14. ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR a Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, s. 1-8. ISBN 978-3-903176-09-6. Dostupné z: https://dx.doi.org/10.23919/TMA.2018.8506498.

    2017

    1. HUSÁK, Martin a Milan ČERMÁK. A Graph-based Representation of Relations in Network Security Alert Sharing Platforms. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, s. 891-892. ISBN 978-3-901882-89-0. Dostupné z: https://dx.doi.org/10.23919/INM.2017.7987399.
    2. ŠPAČEK, Stanislav, Pavel ČELEDA, Martin DRAŠAR a Martin VIZVÁRY. Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. SPI 2017 - Security and Protection of Information 2017. Brno: Univerzita obrany, 2017, s. 143-158. ISBN 978-80-7231-414-0.
    3. HUSÁK, Martin, Milan ČERMÁK, Martin LAŠTOVIČKA a Jan VYKOPAL. Exchanging Security Events: Which And How Many Alerts Can We Aggregate?. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, s. 604-607. ISBN 978-3-901882-89-0. Dostupné z: https://dx.doi.org/10.23919/INM.2017.7987340.
    4. MEDKOVÁ, Jana, Martin HUSÁK, Martin VIZVÁRY a Pavel ČELEDA. Honeypot Testbed for Network Defence Strategy Evaluation. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, s. 887-888. ISBN 978-3-901882-89-0. Dostupné z: https://dx.doi.org/10.23919/INM.2017.7987397.
    5. SOKOL, Pavol, Jakub MÍŠEK a Martin HUSÁK. Honeypots and honeynets: issues of privacy. EURASIP Journal on Information Security. London: Springer Open, 2017, roč. 10, č. 4, s. 1-9. ISSN 1687-4161. Dostupné z: https://dx.doi.org/10.1186/s13635-017-0057-4.
    6. VYKOPAL, Jan, Radek OŠLEJŠEK, Pavel ČELEDA, Martin VIZVÁRY a Daniel TOVARŇÁK. KYPO Cyber Range: Design and Use Cases. Online. In Cardoso J.,Cardoso J.,Maciaszek L.,Maciaszek L.,van Sinderen M.,Cabello E. Proceedings of the 12th International Conference on Software Technologies - Volume 1: ICSOFT. Madrid, Spain: SciTePress, 2017, s. 310-321. ISBN 978-989-758-262-2. Dostupné z: https://dx.doi.org/10.5220/0006428203100321.
    7. VYKOPAL, Jan, Martin VIZVÁRY, Radek OŠLEJŠEK, Pavel ČELEDA a Daniel TOVARŇÁK. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. Online. In 2017 IEEE Frontiers in Education Conference. Indianapolis, IN, USA: IEEE, 2017, s. 1-8. ISBN 978-1-5090-5919-5. Dostupné z: https://dx.doi.org/10.1109/FIE.2017.8190713.
    8. MEDKOVÁ, Jana, Martin HUSÁK a Martin DRAŠAR. Network Defence Strategy Evaluation: Simulation vs. Live Network. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, s. 81-88. ISBN 978-3-901882-89-0. Dostupné z: https://dx.doi.org/10.23919/INM.2017.7987267.
    9. HUSÁK, Martin, Jaroslav KAŠPAR, Elias BOU-HARB a Pavel ČELEDA. On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, s. "22:1"-"22:10", 10 s. ISBN 978-1-4503-5257-4. Dostupné z: https://dx.doi.org/10.1145/3098954.3098981.
    10. STUPKA, Václav, Martin HORÁK a Martin HUSÁK. Protection of personal data in security alert sharing platforms. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, s. "65:1"-"65:8", 8 s. ISBN 978-1-4503-5257-4. Dostupné z: https://dx.doi.org/10.1145/3098954.3105822.
    11. LAŠTOVIČKA, Martin a Pavel ČELEDA. Situational Awareness: Detecting Critical Dependencies and Devices in a Network. In Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Zurich (Switzerland): Springer, 2017, s. 173-178. ISBN 978-3-319-60773-3. Dostupné z: https://dx.doi.org/10.1007/978-3-319-60774-0_17.
    12. ŽÁDNÍK, Martin, Jan WRONA, Pavel KROBOT, Pavel MINAŘÍK, Jan BARIENČÍK, Tomáš JIRSÍK, Milan ČERMÁK a Daniel TOVARŇÁK. Systém pro sběr, uchování a analýzu síťových dat velkého rozsahu. 2017.
    13. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK a Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine. IEEE, 2017, roč. 55, č. 7, s. 70-76. ISSN 0163-6804. Dostupné z: https://dx.doi.org/10.1109/MCOM.2017.1600972.
    14. PITNER, Tomáš, Jan MINISTR, Daniel TOVARŇÁK, Filip KŠENZULIAK a Adam KUČERA. Towards a Common Logging and Monitoring Framework for Critical Infrastructures. In Radek Němec, Lucie Chytilová. Strategic Management and its Support by Information Systems (SMSIS). Ostrava: VŠB - Technical University of Ostrava, 2017, s. 488-495. ISBN 978-80-248-4046-8.

    2016

    1. ČERMÁK, Milan, Daniel TOVARŇÁK, Martin LAŠTOVIČKA a Pavel ČELEDA. A Performance Benchmark of NetFlow Data Analysis on Distributed Stream Processing Systems. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, s. 919-924. ISBN 978-1-5090-0223-8. Dostupné z: https://dx.doi.org/10.1109/NOMS.2016.7502926.
    2. ČERMÁK, Milan a Pavel ČELEDA. Detecting Advanced Network Threats Using a Similarity Search. In Badonnel, Rémi and Koch, Robert and Pras, Aiko and Drašar, Martin and Stiller, Burkhard. Management and Security in the Age of Hyperconnectivity. 9701. vyd. Munich, Germany: Springer International Publishing, 2016, s. 137-141. ISBN 978-3-319-39813-6. Dostupné z: https://dx.doi.org/10.1007/978-3-319-39814-3_14.
    3. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK a Pavel ČELEDA. HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting. EURASIP Journal on Information Security. 2016, roč. 2016, č. 1, s. 1-14. ISSN 2510-523X. Dostupné z: https://dx.doi.org/10.1186/s13635-016-0030-7.
    4. JIRSÍK, Tomáš, Milan ČERMÁK a Pavel ČELEDA. On Information Value of Top N Statistics. In 2016 6th International Conference on IT Convergence and Security (ICITCS). USA: Institute of Electrical and Electronic Engineers, 2016, s. 255-259. ISBN 978-1-5090-3764-3. Dostupné z: https://dx.doi.org/10.1109/ICITCS.2016.7740357.
    5. TOVARŇÁK, Daniel. Practical Multi-pattern Matching Approach for Fast and Scalable Log Abstraction. In ICSOFT-EA 2016 - Proceedings of the 11th International Joint Conference on Software Technologies. Lisbon, Portugal: SCITEPRESS, 2016, s. 319-329. ISBN 978-989-758-194-6. Dostupné z: https://dx.doi.org/10.5220/0006006603190329.
    6. ČERMÁK, Milan, Tomáš JIRSÍK a Martin LAŠTOVIČKA. Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, s. 1019-1020. ISBN 978-1-5090-0223-8. Dostupné z: https://dx.doi.org/10.1109/NOMS.2016.7502952.
    7. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK, Jakub Samuel PAULOVIČ a Michal ŠTEFÁNIK. Stream4Flow: Software for mining and analysis of the large volumes of network traffic. 2016.

    2015

    1. VELAN, Petr, Milan ČERMÁK, Pavel ČELEDA a Martin DRAŠAR. A Survey of Methods for Encrypted Traffic Classification and Analysis. International Journal of Network Management. John Wiley & Sons, Ltd., 2015, roč. 25, č. 5, s. 355-374. ISSN 1055-7148. Dostupné z: https://dx.doi.org/10.1002/nem.1901.
    2. SOKOL, Pavol, Martin HUSÁK a František LIPTÁK. Deploying Honeypots and Honeynets: Issue of Privacy. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, s. 397-403. ISBN 978-1-4673-6590-1. Dostupné z: https://dx.doi.org/10.1109/ARES.2015.91.
    3. ČELEDA, Pavel, Jakub ČEGAN, Jan VYKOPAL a Daniel TOVARŇÁK. KYPO – A Platform for Cyber Defence Exercises. Online. In STO-MP-MSG-133: M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber Defence. Munich (Germany): NATO Science and Technology Organization, 2015, s. nestránkováno, 12 s. ISBN 978-92-837-2020-1. Dostupné z: https://dx.doi.org/10.14339/STO-MP-MSG-133-08-doc.
    4. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Radek OŠLEJŠEK, Zdenek EICHLER, Dalibor TOTH, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Václav RAČANSKÝ, Ivo NUTÁR a Dušan LAGO. KYPO - Kybernetický polygon. 2015.
    5. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK a Pavel ČELEDA. Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, s. 389-396. ISBN 978-1-4673-6590-1. Dostupné z: https://dx.doi.org/10.1109/ARES.2015.35.
    6. HUSÁK, Martin, Petr VELAN a Jan VYKOPAL. Security Monitoring of HTTP Traffic Using Extended Flows. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, s. 258-265. ISBN 978-1-4673-6590-1. Dostupné z: https://dx.doi.org/10.1109/ARES.2015.42.
    7. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Ivo NUTÁR a Dušan LAGO. Software pro konfiguraci a monitorování virtuálního prostředí KYPO. 2015.
    8. PAVOL, Sokol, Kleinová LENKA a Martin HUSÁK. Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. Online. In EUROCON 2015 - International Conference on Computer as a Tool (EUROCON), IEEE. Salamanca, Spain: IEEE, 2015, s. 225-230. ISBN 978-1-4799-8569-2. Dostupné z: https://dx.doi.org/10.1109/EUROCON.2015.7313713.

    2014

    1. GHAFIR, Ibrahim, Martin HUSÁK a Václav PŘENOSIL. A Survey on Intrusion Detection and Prevention Systems. In Proceedings of student conference Zvůle 2014, IEEE/UREL. Zvůle, Czech Republic: Faculty of Electrical Engineering and Communication, Brno University of Technology, 2014, s. 10-14. ISBN 978-80-214-5005-9.
    2. JIRSÍK, Tomáš, Martin HUSÁK, Pavel ČELEDA a Zdenek EICHLER. Cloud-based Security Research Testbed: A DDoS Use Case. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, s. 1-2. ISBN 978-1-4799-0912-4. Dostupné z: https://dx.doi.org/10.1109/NOMS.2014.6838272.
    3. ČERMÁK, Milan, Pavel ČELEDA a Jan VYKOPAL. Detection of DNS Traffic Anomalies in Large Networks. In Yvon Kermarrec. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg: Springer International Publishing, 2014, s. 215-226. ISBN 978-3-319-13487-1. Dostupné z: https://dx.doi.org/10.1007/978-3-319-13488-8_20.
    4. DNSAnomDet (software)
      ČERMÁK, Milan. DNSAnomDet. 2014.
    5. HUSÁK, Martin a Jakub ČEGAN. PhiGARo: Automatic Phishing Detection and Incident Response Framework. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on. Fribourg, Switzerland: IEEE, 2014, s. 295-302. ISBN 978-1-4799-4223-7. Dostupné z: https://dx.doi.org/10.1109/ARES.2014.46.
    6. HUSÁK, Martin a Jan VYKOPAL. POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats. 2014.

    2013

    1. HUSÁK, Martin a Martin DRAŠAR. Flow-based Monitoring of Honeypots. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, s. 63-70. ISBN 978-80-7231-922-0.
    2. HUSÁK, Martin a Jan SOUKAL. libanim - JavaScript animation library. 2013.
    3. HUSÁK, Martin a Martin VIZVÁRY. POSTER: Reflected attacks abusing honeypots. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York, NY, USA: ACM, 2013, s. 1449-1452. ISBN 978-1-4503-2477-9. Dostupné z: https://dx.doi.org/10.1145/2508859.2512523.
    4. DRAŠAR, Martin, Martin HUSÁK, Jakub ČEGAN, Martin VIZVÁRY, Milan ČERMÁK a Tomáš PLESNÍK. Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií. 2013.
Zobrazit podrobně
Zobrazeno: 17. 11. 2024 12:26