Your selection contains 35 outcomes. Edit selection.
Filter publications
-
RUMAN, Ádám, Martin DRAŠAR, Lukáš SADLEK, Shanchieh Jay YANG and Pavel ČELEDA. Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Online. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. New York, United States: Association for Computing Machinery, 2024, p. 1-11. ISBN 979-8-4007-1718-5. Available from: https://dx.doi.org/10.1145/3664476.3664523.
RIV: Proceedings paper. English. United States of America.
Ruman, Ádám (703 Slovakia, guarantor, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution) -- Sadlek, Lukáš (703 Slovakia, belonging to the institution) -- Yang, Shanchieh Jay (840 United States of America) -- Čeleda, Pavel (203 Czech Republic, belonging to the institution)
Keywords in English: cybersecurity model; adversary framework; attack scenario generation; cyber terrain generation
International impact: yes
Reviewed: yes
Changed by: Mgr. Ádám Ruman, učo 469068. Changed: 17/10/2024 15:26. -
DRAŠAR, Martin, Ádám RUMAN, Pavel ČELEDA and Yang SCHANCHIEH. The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments. Online. In Sokratis Katsikas et al. ESORICS 2023: Computer Security. ESORICS 2023 International Workshops. Neuveden: Springer Nature Switzerland AG, 2024, p. 738-749. ISBN 978-3-031-54128-5. Available from: https://dx.doi.org/10.1007/978-3-031-54129-2_43.
RIV: Proceedings paper. English. Switzerland.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Ruman, Ádám (703 Slovakia, belonging to the institution) -- Čeleda, Pavel (203 Czech Republic, belonging to the institution) -- Schanchieh, Yang (840 United States of America)
Keywords in English: simulation environments; autonomous decision-making; cybersecurity
Type of proceedings: post-proceedings
International impact: yes
Reviewed: yes
Changed by: doc. Ing. Pavel Čeleda, Ph.D., učo 206086. Changed: 23/8/2024 10:39. -
DRAŠAR, Martin. Perception of the Environment. Online. In Kott, Alexander. Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide. 1st ed. Cham: Springer International Publishing, 2023, p. 47-61. Advances in Information Security, 87. ISBN 978-3-031-29269-9. Available from: https://dx.doi.org/10.1007/978-3-031-29269-9_3.URL
RIV/00216224:14610/23:00134608 Chapter(s) of a specialized book. English. Germany.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution)
Keywords in English: perception;autonomous agents;world representation;belief state;observation space
International impact: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 5/4/2024 11:18. -
RUSŇÁK, Vít and Martin DRAŠAR. Towards a Visual Analytics Workflow for Cybersecurity Simulations. Online. In Christophe Hurter, Helen Purchase, Kadi Bouatouch. Proceedings of VISIGRAPP2023 - Volume3: IVAPP. To appear. Lisbon, Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2023, p. 179-186. ISBN 978-989-758-634-7. Available from: https://dx.doi.org/10.5220/0011695000003417.URL
Name (in English): Towards a Visual Analytics Workflow for Cybersecurity Simulations
RIV/00216224:14610/23:00130096 Proceedings paper. English. Portugal.
Rusňák, Vít (203 Czech Republic, guarantor, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution)
Keywords in English: cybersecurity; attack simulator; visualizations; analytical workflow; task typology
Type of proceedings: post-proceedings
International impact: yes
Reviewed: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 5/4/2024 11:04. -
DRAŠAR, Martin, Ádám RUMAN and Vít RUSŇÁK. SW pro dynamickou verifikaci bezpečnostních opatření (SW for dynamic verification of security measures). 2022.URL
Name in Czech: SW pro dynamickou verifikaci bezpečnostních opatření
Name (in English): SW for dynamic verification of security measures
RIV/00216224:14610/22:00129790 Software. English. Czech Republic.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Ruman, Ádám (703 Slovakia, belonging to the institution) -- Rusňák, Vít (203 Czech Republic, belonging to the institution)
Keywords in English: autonomous systems;cybersecurity;simulation
International impact: yes
Changed by: RNDr. Martin Drašar, Ph.D., učo 98998. Changed: 27/1/2023 15:00. -
DRAŠAR, Martin. The Road to Autonomous Security. 2022.
Name in Czech: Cesta k autonomní bezpečnosti
English. Czech Republic.
Keywords in English: autonomous systems;cybersecurity;simulation;orchestration
International impact: yes
Changed by: RNDr. Martin Drašar, Ph.D., učo 98998. Changed: 24/1/2023 11:34. -
KOTT, Alexander, Paul THERON, Luigi MANCINI, Edlira DUSHKU, Agostino PANICO, Martin DRAŠAR, Benoit LEBLANC, Paul LOSIEWICZ, Alessandro GUARINO, Mauno PIHELGAS and Krzysztof RZADCA. An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. THOUSAND OAKS: SAGE PUBLICATIONS INC, 2020, vol. 17, No 1, p. 51-54. ISSN 1548-5129. Available from: https://dx.doi.org/10.1177/1548512919886163.URL
RIV/00216224:14610/20:00118543 Article in a journal. English. United States of America.
Kott, Alexander (840 United States of America) -- Theron, Paul (250 France) -- Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution)
Keywords in English: Intelligent agent; autonomy; cyber warfare; cyber defense; agent architecture
International impact: yes
Reviewed: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 27/4/2021 15:58. -
REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Daniel TOVARŇÁK, Pavel ZEZULA, Martin MACÁK, Matúš GUOTH, Matej BABEJ, Dávid BRILLA and Martin KAŽIMÍR. ANALYZA – Datový sklad (ANALYZA – Dara Warehouse). 2020.ANALYZA – Datový sklad
Name (in English): ANALYZA – Dara Warehouse
RIV/00216224:14610/20:00114823 Software. Czech. Czech Republic.
Rebok, Tomáš (203 Czech Republic, guarantor, belonging to the institution) -- Batko, Michal (203 Czech Republic, belonging to the institution) -- Čermák, Milan (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution) -- Tovarňák, Daniel (203 Czech Republic, belonging to the institution) -- Zezula, Pavel (203 Czech Republic, belonging to the institution) -- Macák, Martin (703 Slovakia, belonging to the institution) -- Guoth, Matúš (703 Slovakia) -- Babej, Matej (703 Slovakia, belonging to the institution) -- Brilla, Dávid (703 Slovakia, belonging to the institution) -- Kažimír, Martin (703 Slovakia, belonging to the institution)
Keywords in English: data warehouse; ANALYZA
International impact: yes
Changed by: Bc. Vít Eichler, učo 481109. Changed: 3/6/2021 07:18. -
ANALYZA – Vizualizační komponenta – Visilant (ANALYZA – Visualization Component – Visilant) (software)REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Jarešová MIROSLAVA, Barbora KOZLÍKOVÁ, Kristína ZÁKOPČANOVÁ, Pavel ZEZULA, Katarína FURMANOVÁ, Marko ŘEHÁČEK, Jozef BÁTRNA and Daniel PLAKINGER. ANALYZA – Vizualizační komponenta – Visilant (ANALYZA – Visualization Component – Visilant). 2020.ANALYZA – Vizualizační komponenta – Visilant
Name (in English): ANALYZA – Visualization Component – Visilant
RIV/00216224:14610/20:00114825 Software. Czech. Czech Republic.
Rebok, Tomáš (203 Czech Republic, guarantor, belonging to the institution) -- Batko, Michal (203 Czech Republic, belonging to the institution) -- Čermák, Milan (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution) -- Kozlíková, Barbora (203 Czech Republic, belonging to the institution) -- Zákopčanová, Kristína (203 Czech Republic, belonging to the institution) -- Zezula, Pavel (203 Czech Republic, belonging to the institution) -- Furmanová, Katarína (703 Slovakia, belonging to the institution) -- Řeháček, Marko (703 Slovakia, belonging to the institution) -- Bátrna, Jozef (703 Slovakia, belonging to the institution) -- Plakinger, Daniel (703 Slovakia, belonging to the institution)
Keywords in English: visualization; ANALYZA; Visilant
Changed by: RNDr. Tomáš Rebok, Ph.D., učo 39685. Changed: 29/4/2021 14:17. -
THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysztof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI and Fabio DE GASPARI. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems. Online. In Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman. Adaptive Autonomous Secure Cyber Systems. Cham: Springer International Publishing, 2020, p. 1-21. ISBN 978-3-030-33432-1. Available from: https://dx.doi.org/10.1007/978-3-030-33432-1_1.URL
RIV/00216224:14610/20:00115445 Chapter(s) of a specialized book. English. Germany.
Theron, Paul (guarantor) -- Drašar, Martin (203 Czech Republic, belonging to the institution)
Keywords in English: reference architecture;autonomous agents;cyber defense;millitary systems
International impact: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 27/4/2021 15:48. -
DRAŠAR, Martin, Stephen MOSKAL, Shanchieh Jay YANG and Pavol ZAŤKO. Session-level Adversary Intent-Driven Cyberattack Simulator. Online. In Dusan Maga, Jiri Haek. DS-RT '20: Proceedings of the IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications. Praha: IEEE, 2020, p. 7-15. ISBN 978-1-7281-7343-6.URL
Name in Czech: Simulátor kyberútoků řízený z pohledu útočníkova záměru
RIV/00216224:14610/20:00116424 Proceedings paper. English. United States of America.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Moskal, Stephen (840 United States of America) -- Yang, Shanchieh Jay (840 United States of America) -- Zaťko, Pavol (703 Slovakia)
Keywords in English: discrete event simulation;adversarial behavior;cyberattack
Type of proceedings: post-proceedings
International impact: yes
Reviewed: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 27/4/2021 16:09. -
DRAŠAR, Martin, Ádám RUMAN, Adam SKRÁŠEK and Matúš GALBA. CEP-Server: Software pro vyhodnocování a dotazování komplexních událostí v doméně ITOA (CEP-Server: Software for evaluation and querying of complex events in the ITOA domain). 2019.Zdrojové kódy CEP-Server
Name (in English): CEP-Server: Software for evaluation and querying of complex events in the ITOA domain
RIV/00216224:14610/19:00108413 Software. Czech. Czech Republic.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Ruman, Ádám (703 Slovakia, belonging to the institution) -- Skrášek, Adam (203 Czech Republic, belonging to the institution) -- Galba, Matúš (703 Slovakia, belonging to the institution)
Keywords in English: cep;complex event processing;t-rex;tesla;ITOA
Changed by: RNDr. Martin Drašar, Ph.D., učo 98998. Changed: 19/3/2020 18:37. -
DRAŠAR, Martin and Tomáš JIRSÍK. IT Operations Analytics: Root Cause Analysis via Complex Event Processing. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 741-742. ISBN 978-1-72810-618-2.URL URL
Name (in English): IT Operations Analytics: Root Cause Analysis via Complex Event Processing
RIV/00216224:14610/19:00108341 Proceedings paper. English. United States of America.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Jirsík, Tomáš (203 Czech Republic, belonging to the institution)
Keywords in English: IT operation analysis; complex event processing; root cause; IP flows; Tesla; T-Rex
International impact: yes
Reviewed: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 24/4/2020 15:44. -
ČELEDA, Pavel, Jakub ČEGAN, Martin DRAŠAR, Ivo NUTÁR, Jiří RÁJA, Tomáš REBOK, Andrej TOMČI and Daniel TOVARŇÁK. Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury (Tools for verification of SW/HW security and simulation of attacks on critical information infrastructure). 2019.Tools for verification of SW/HW security and simulation of attacks on critical information infrastructure
Name (in English): Tools for verification of SW/HW security and simulation of attacks on critical information infrastructure
RIV/00216224:14610/19:00108318 Software. English. Czech Republic.
Čeleda, Pavel (203 Czech Republic, guarantor, belonging to the institution) -- Čegan, Jakub (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution) -- Nutár, Ivo (703 Slovakia, belonging to the institution) -- Rája, Jiří (203 Czech Republic, belonging to the institution) -- Rebok, Tomáš (203 Czech Republic) -- Tomči, Andrej (703 Slovakia, belonging to the institution) -- Tovarňák, Daniel (203 Czech Republic, belonging to the institution)
Keywords in English: attack scenario; automation; red team; cryton; cyber defense exercise; breach and attack simulation
Changed by: Mgr. Ing. Jakub Čegan, učo 208114. Changed: 16/3/2020 15:23. -
KOTT, Alexander, Paul THERÓN, Luigi V MANCINI, Martin DRAŠAR, Edlira DUSHKU, Günther HEIKO, Markus KONT, Benoît LEBLANC, Agostino PANICO, Mauno PIHELGAS and Krzysztof RZADCA. Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense. 2018.arXiv
English. United States of America.
Keywords in English: reference architecture;autonomous agents;military systems;cyberdefence
International impact: yes
Changed by: RNDr. Martin Drašar, Ph.D., učo 98998. Changed: 8/5/2019 11:39. -
THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysytof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI and Agostino PANICO. Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. Online. In 2018 International Conference on Military Communications and Information Systems (ICMCIS). Warsaw, Poland: IEEE, 2018, p. 1-9. ISBN 978-1-5386-4559-8. Available from: https://dx.doi.org/10.1109/ICMCIS.2018.8398730.IEEE
RIV/00216224:14610/18:00109614 Proceedings paper. English. Poland.
Theron, Paul (guarantor) -- Drašar, Martin (203 Czech Republic, belonging to the institution)
Keywords in English: reference architecture;autonomous agents;military systems;cyberdefence
Type of proceedings: post-proceedings
International impact: yes
Reviewed: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 11/5/2020 13:56. -
ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR and Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, p. 1-8. ISBN 978-3-903176-09-6. Available from: https://dx.doi.org/10.23919/TMA.2018.8506498.Conference IEEE
RIV/00216224:14610/18:00106892 Proceedings paper. English. United States of America.
Čermák, Milan (203 Czech Republic, guarantor, belonging to the institution) -- Jirsík, Tomáš (203 Czech Republic, belonging to the institution) -- Velan, Petr (203 Czech Republic, belonging to the institution) -- Komárková, Jana (203 Czech Republic, belonging to the institution) -- Špaček, Stanislav (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution) -- Plesník, Tomáš (203 Czech Republic, belonging to the institution)
Keywords in English: datasets;network traffic;analysis
International impact: yes
Reviewed: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 18/4/2019 15:42. -
ŠPAČEK, Stanislav, Pavel ČELEDA, Martin DRAŠAR and Martin VIZVÁRY. Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. SPI 2017 - Security and Protection of Information 2017. Brno: Univerzita obrany, 2017, p. 143-158. ISBN 978-80-7231-414-0.URL
Name (in English): Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study
RIV/00216224:14610/17:00094472 Proceedings paper. Informatics. English. Czech Republic.
Špaček, Stanislav (203 Czech Republic, guarantor, belonging to the institution) -- Čeleda, Pavel (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution) -- Vizváry, Martin (703 Slovakia, belonging to the institution)
Keywords in English: Hacking Team; Remote Control System; KYPO Cyber Range; Advanced Persistent Threat; Malware Builder Kit
Type of proceedings: post-proceedings
International impact: yes
Reviewed: yes
Changed by: doc. Ing. Pavel Čeleda, Ph.D., učo 206086. Changed: 16/4/2018 20:16. -
DRAŠAR, Martin and Jana KOMÁRKOVÁ. Estimating Parameters of Target's Detection Methods. Online. In Michal Pechoucek, Alexander Kott. Proceedings of the NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience. Praha: CEUR Workshop Proceedings, 2017, p. 84-89. ISSN 1613-0073.URL
Name in Czech: Zjišťování parametrů cílových detekčních metod
RIV/00216224:14610/17:00099647 Proceedings paper. Informatics. English. United States of America.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Komárková, Jana (203 Czech Republic, belonging to the institution)
Keywords in English: dictionary attacks; attack parameters estimation
Type of proceedings: post-proceedings
International impact: yes
Reviewed: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 10/4/2018 16:30. -
MEDKOVÁ, Jana, Martin HUSÁK and Martin DRAŠAR. Network Defence Strategy Evaluation: Simulation vs. Live Network. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 81-88. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987267.URL
RIV/00216224:14610/17:00094471 Proceedings paper. Informatics. English. United States of America.
Medková, Jana (203 Czech Republic, guarantor, belonging to the institution) -- Husák, Martin (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution)
Keywords in English: game theory;cyber security;simulation;honeypot
International impact: yes
Reviewed: yes
Changed by: RNDr. Martin Husák, Ph.D., učo 256631. Changed: 5/4/2018 18:32. -
DRAŠAR, Martin and Pavel MINAŘÍK. Overview and Evaluation of Methods and Tools for Complex Event Processing. 2017, 11 pp.URL
Name in Czech: Přehled a hodnocení nástrojů a metod pro zpracování komplexních událostí
RIV/00216224:14610/17:00094457 Special-purpose publication. English. Czech Republic. obsah podléhá obchodnímu tajemství.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Minařík, Pavel (203 Czech Republic)
Keywords in English: complex events; CEP
Changed by: RNDr. Martin Drašar, Ph.D., učo 98998. Changed: 18/4/2018 12:36. -
VELAN, Petr, Milan ČERMÁK, Pavel ČELEDA and Martin DRAŠAR. A Survey of Methods for Encrypted Traffic Classification and Analysis. International Journal of Network Management. John Wiley & Sons, Ltd., 2015, vol. 25, No 5, p. 355-374. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1901.URL URL
Name in Czech: Přehled metod pro klasifikaci a analýzu šifrovaného síťového provozu
RIV/00216224:14610/15:00080523 Article in a journal. Informatics. English. United States of America.
Velan, Petr (203 Czech Republic, guarantor, belonging to the institution) -- Čermák, Milan (203 Czech Republic, belonging to the institution) -- Čeleda, Pavel (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution)
Keywords in English: encrypted traffic; monitoring; network; traffic classification; traffic analysis; machine learning; encryption protocols
International impact: yes
Reviewed: yes
Changed by: Mgr. Alena Mokrá, učo 362754. Changed: 27/4/2018 13:17. -
KOUŘIL, Daniel, Tomáš REBOK, Tomáš JIRSÍK, Jakub ČEGAN, Martin DRAŠAR, Martin VIZVÁRY and Jan VYKOPAL. Cloud-based Testbed for Simulation of Cyber Attacks. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-6. ISBN 978-1-4799-0913-1. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838298.URL
Name in Czech: Cloudové prostředí pro simulaci kybernetických útoků
Name (in English): Cloud-based Testbed for Simulation of Cyber Attacks
RIV/00216224:14610/14:00073216 Proceedings paper. Informatics. English. United States of America.
Kouřil, Daniel (203 Czech Republic, guarantor, belonging to the institution) -- Rebok, Tomáš (203 Czech Republic, belonging to the institution) -- Jirsík, Tomáš (203 Czech Republic, belonging to the institution) -- Čegan, Jakub (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution) -- Vizváry, Martin (703 Slovakia, belonging to the institution) -- Vykopal, Jan (203 Czech Republic, belonging to the institution)
Keywords in English: cyber attack; simulation; cloud; measurement; testbed; security; training
Type of proceedings: pre-proceedings
International impact: yes
Reviewed: yes
Changed by: RNDr. Daniel Kouřil, Ph.D., učo 1388. Changed: 13/1/2017 00:33. -
DRAŠAR, Martin, Tomáš JIRSÍK and Martin VIZVÁRY. Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches. In Sperotto, Anna and Doyen, Guillaume and Latré, Steven and Charalambides, Marinos and Stiller, Burkhard. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin: Springer Berlin Heidelberg, 2014, p. 160-172. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_19.URL
RIV/00216224:14610/14:00073230 Proceedings paper. Informatics. English. Germany.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Jirsík, Tomáš (203 Czech Republic, belonging to the institution) -- Vizváry, Martin (703 Slovakia, belonging to the institution)
Keywords in English: intrusion detection; NetFlow; sketch; modular hashes; correlation
Type of proceedings: post-proceedings
International impact: yes
Reviewed: yes
Changed by: Mgr. Marta Novotná Buršíková, učo 15689. Changed: 1/4/2015 09:02. -
DRAŠAR, Martin, Martin VIZVÁRY and Jan VYKOPAL. Similarity as a central approach to flow-based anomaly detection. International Journal of Network Management. John Wiley & Sons, Ltd., 2014, vol. 24, No 4, p. 318-336. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1867.URL
Name in Czech: Podobnost jako hlavní přístup k detekci anomálií na základě síťových toků
RIV/00216224:14610/14:00076011 Article in a journal. Informatics. English. United States of America.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Vizváry, Martin (703 Slovakia, belonging to the institution) -- Vykopal, Jan (203 Czech Republic, belonging to the institution)
Keywords in English: similarity; anomaly detection; network flows
International impact: yes
Reviewed: yes
Changed by: Mgr. Marta Novotná Buršíková, učo 15689. Changed: 24/4/2015 14:36. -
ČELEDA, Pavel, Iva KREJČÍ and Jan VYKOPAL. 8th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014). 2014.Webová stránka konference.
Name in Czech: Osmá Mezinárodní konference o autonomních infrastrukturách, jejich správě a bezpečnosti (AIMS 2014)
RIV/00216224:14610/14:00075999 Organization of a conference. Informatics. English. Czech Republic.
Čeleda, Pavel (203 Czech Republic, guarantor, belonging to the institution) -- Krejčí, Iva (203 Czech Republic, belonging to the institution) -- Vykopal, Jan (203 Czech Republic, belonging to the institution)
Keywords in English: monitoring; security; virtualized networks virtualized services
International impact: yes
Reviewed: yes
Changed by: doc. RNDr. Jan Vykopal, Ph.D., učo 98724. Changed: 17/7/2014 17:14. -
VYKOPAL, Jan, Martin DRAŠAR and Philipp WINTER. Flow-based Brute-force Attack Detection. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. Stuttgart: Fraunhofer Verlag, 2013, p. 41-51. ISBN 978-3-8396-0474-8.
Name in Czech: Detekce útoků hrubou silou pomocí síťových toků
RIV/00216224:14610/13:00065695 Chapter(s) of a specialized book. Informatics. English. Germany.
Vykopal, Jan (203 Czech Republic, guarantor, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution) -- Winter, Philipp (40 Austria)
Keywords in English: network; flow; brute force attack; password; detection; similarity; entropy; evasion
International impact: yes
Changed by: Mgr. Marta Novotná Buršíková, učo 15689. Changed: 3/4/2014 15:24. -
HUSÁK, Martin and Martin DRAŠAR. Flow-based Monitoring of Honeypots. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, p. 63-70. ISBN 978-80-7231-922-0.
Name in Czech: Monitorování honeypotů pomocí toků
RIV/00216224:14610/13:00065721 Proceedings paper. Informatics. English. Czech Republic.
Husák, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution)
Keywords in English: honeypot;monitoring;NetFlow;NfSen;dictionary attack
Type of proceedings: post-proceedings
International impact: yes
Reviewed: yes
Changed by: RNDr. Martin Husák, Ph.D., učo 256631. Changed: 27/4/2018 05:05. -
ČEGAN, Jakub, Tomáš ŠÍMA, Jan SOUKAL and Martin DRAŠAR. PhiGARo HTTP(S) – tool for phishing incident processing. 2013.PhiGARo - tool for phishing incident processing, homepage & download
Name in Czech: PhiGARo HTTP(S) - nástroj ke zpracování phishingových incidentů.
RIV/00216224:14610/13:00072265 Software. Informatics. English. Czech Republic.
Čegan, Jakub (203 Czech Republic, guarantor, belonging to the institution) -- Šíma, Tomáš (203 Czech Republic, belonging to the institution) -- Soukal, Jan (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution)
Keywords in English: phishing; incident; detection; response; blocking; NetFlow; Sendmail; HTTP; HTTPS; logs; ticketing system; Request Tracker; API; screenshot
Changed by: Mgr. Marta Novotná Buršíková, učo 15689. Changed: 31/3/2014 14:09. -
DRAŠAR, Martin. Protocol-independent Detection of Dictionary Attacks. In Thomas Bauschert. Advances in Communication Networking. Berlin: Springer Berlin Heidelberg, 2013, p. 304-309. ISBN 978-3-642-40551-8. Available from: https://dx.doi.org/10.1007/978-3-642-40552-5_30.
Name in Czech: Detekce slovníkových útoků nezávisla na aplikačním protokolu
RIV/00216224:14610/13:00065726 Proceedings paper. Informatics. English. Germany.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution)
Keywords in English: traffic classes; anomaly detection; network behavior analysis
International impact: yes
Reviewed: yes
Changed by: Mgr. Marta Novotná Buršíková, učo 15689. Changed: 16/3/2016 15:29. -
DRAŠAR, Martin, Martin HUSÁK, Jakub ČEGAN, Martin VIZVÁRY, Milan ČERMÁK and Tomáš PLESNÍK. Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií (System for automatic handling of reports from anomaly detection tools). 2013.URL
Name (in English): System for automatic handling of reports from anomaly detection tools
RIV/00216224:14610/13:00072273 Software. Informatics. Czech. Czech Republic.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Husák, Martin (203 Czech Republic, belonging to the institution) -- Čegan, Jakub (203 Czech Republic, belonging to the institution) -- Vizváry, Martin (703 Slovakia, belonging to the institution) -- Čermák, Milan (203 Czech Republic, belonging to the institution) -- Plesník, Tomáš (203 Czech Republic, belonging to the institution)
Keywords in English: automation;incident handling;incident reports
Changed by: RNDr. Martin Drašar, Ph.D., učo 98998. Changed: 9/4/2014 16:55. -
DRAŠAR, Martin and Jan VYKOPAL. Bruteforcing in the Shadows - Evading Automated Detection. 2012.Webová stránka konference Slidy prezentace
Name in Czech: Skrytý bruteforcing - obcházení automatické deteckce útoků
RIV/00216224:14610/12:00058679 Audiovisual works. Informatics. English. Czech Republic.
Drašar, Martin (203 Czech Republic, guarantor, belonging to the institution) -- Vykopal, Jan (203 Czech Republic, belonging to the institution)
Keywords in English: NetFlow;bruteforce attacks;flow stretching;evading detection;automatic detection;
International impact: yes
Reviewed: yes
Changed by: Mgr. Marta Novotná Buršíková, učo 15689. Changed: 7/3/2013 10:15. -
ČEGAN, Jakub, Jan SOUKAL, Martin DRAŠAR and Jan VYKOPAL. PhiGARo – tool for phishing incident processing. 2012.PhiGARo - tool for phishing incident processing, homepage & download
Name in Czech: PhiGARo - nástroj ke zpracování phishingových incidentů.
RIV/00216224:14610/12:00062602 Software. Informatics. English. Czech Republic.
Čegan, Jakub (203 Czech Republic, guarantor, belonging to the institution) -- Soukal, Jan (203 Czech Republic, belonging to the institution) -- Drašar, Martin (203 Czech Republic, belonging to the institution) -- Vykopal, Jan (203 Czech Republic, belonging to the institution)
Keywords in English: phishing; incident; detection; response; blocking; NetFlow; Sendmail; logs; ticketing system; Request Tracker
Changed by: Mgr. Marta Novotná Buršíková, učo 15689. Changed: 13/4/2017 10:14. -
KREJČÍ, Radek, Ladislav LHOTKA, Pavel ČELEDA and Petr ŠPRINGL. Secure Remote Configuration of Network Devices - a Case Study. In CESNET Conference 2008. Prague: CESNET, z. s. p. o., 2008, p. 77-84. ISBN 978-80-904173-0-4.URL
Name in Czech: Zabezpečená vzdálená konfigurace síťových zařízení - případová studie
RIV/00216224:14610/08:00026520 Proceedings paper. Informatics. English. Czech Republic.
Krejčí, Radek (203 Czech Republic, guarantor, belonging to the institution) -- Lhotka, Ladislav (203 Czech Republic) -- Čeleda, Pavel (203 Czech Republic, belonging to the institution) -- Špringl, Petr (203 Czech Republic, belonging to the institution)
Keywords in English: FlowMon; Liberouter; network configuration; NETCONF; NETMOD; YANG
International impact: yes
Reviewed: yes
Changed by: Mgr. Marta Novotná Buršíková, učo 15689. Changed: 29/3/2012 14:57. -
BARTOŠEK, Miroslav and Petr KOVÁŘ. Digitální knihovna fotografií MU (Digital Library of Photographs at the Masaryk University). In RUFIS 2002: Role of Universities in the Future Information Society. Brno: VUT Brno, 2002, p. 2-11. ISBN 80-86510-40-9.
Name (in English): Digital Library of Photographs at the Masaryk University
RIV/00216224:14330/02:00006317 Proceedings paper. Computer hardware and software. Czech. Czech Republic.
Bartošek, Miroslav (203 Czech Republic, guarantor) -- Kovář, Petr (203 Czech Republic)
Keywords in English: digital libraries; digital imaging; metadata; Dublin Core
Changed by: RNDr. Miroslav Bartošek, CSc., učo 930. Changed: 4/9/2002 08:21.
Identification numbers: 4240722866
2024
2023
2022
2020
2019
2018
2017
2015
2014
2013
2012
2008
2002
Displayed: 26/11/2024 08:32