Filter publications

    2017

    1. HUSÁK, Martin and Milan ČERMÁK. A Graph-based Representation of Relations in Network Security Alert Sharing Platforms. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 891-892. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987399.
    2. HUSÁK, Martin, Milan ČERMÁK, Martin LAŠTOVIČKA and Jan VYKOPAL. Exchanging Security Events: Which And How Many Alerts Can We Aggregate?. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 604-607. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987340.
    3. VYKOPAL, Jan, Radek OŠLEJŠEK, Pavel ČELEDA, Martin VIZVÁRY and Daniel TOVARŇÁK. KYPO Cyber Range: Design and Use Cases. Online. In Cardoso J.,Cardoso J.,Maciaszek L.,Maciaszek L.,van Sinderen M.,Cabello E. Proceedings of the 12th International Conference on Software Technologies - Volume 1: ICSOFT. Madrid, Spain: SciTePress, 2017, p. 310-321. ISBN 978-989-758-262-2. Available from: https://dx.doi.org/10.5220/0006428203100321.
    4. VYKOPAL, Jan, Martin VIZVÁRY, Radek OŠLEJŠEK, Pavel ČELEDA and Daniel TOVARŇÁK. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. Online. In 2017 IEEE Frontiers in Education Conference. Indianapolis, IN, USA: IEEE, 2017, p. 1-8. ISBN 978-1-5090-5919-5. Available from: https://dx.doi.org/10.1109/FIE.2017.8190713.
    5. ŽÁDNÍK, Martin, Jan WRONA, Pavel KROBOT, Pavel MINAŘÍK, Jan BARIENČÍK, Tomáš JIRSÍK, Milan ČERMÁK and Daniel TOVARŇÁK. Systém pro sběr, uchování a analýzu síťových dat velkého rozsahu (System for collecting, storing and analysis of large IP flow data). 2017.
    6. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK and Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine. IEEE, 2017, vol. 55, No 7, p. 70-76. ISSN 0163-6804. Available from: https://dx.doi.org/10.1109/MCOM.2017.1600972.
    7. PITNER, Tomáš, Jan MINISTR, Daniel TOVARŇÁK, Filip KŠENZULIAK and Adam KUČERA. Towards a Common Logging and Monitoring Framework for Critical Infrastructures. In Radek Němec, Lucie Chytilová. Strategic Management and its Support by Information Systems (SMSIS). Ostrava: VŠB - Technical University of Ostrava, 2017, p. 488-495. ISBN 978-80-248-4046-8.

    2016

    1. ČERMÁK, Milan, Daniel TOVARŇÁK, Martin LAŠTOVIČKA and Pavel ČELEDA. A Performance Benchmark of NetFlow Data Analysis on Distributed Stream Processing Systems. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 919-924. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502926.
    2. ČERMÁK, Milan and Pavel ČELEDA. Detecting Advanced Network Threats Using a Similarity Search. In Badonnel, Rémi and Koch, Robert and Pras, Aiko and Drašar, Martin and Stiller, Burkhard. Management and Security in the Age of Hyperconnectivity. 9701st ed. Munich, Germany: Springer International Publishing, 2016, p. 137-141. ISBN 978-3-319-39813-6. Available from: https://dx.doi.org/10.1007/978-3-319-39814-3_14.
    3. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting. EURASIP Journal on Information Security. 2016, vol. 2016, No 1, p. 1-14. ISSN 2510-523X. Available from: https://dx.doi.org/10.1186/s13635-016-0030-7.
    4. VELAN, Petr, Jana MEDKOVÁ, Tomáš JIRSÍK and Pavel ČELEDA. Network Traffic Characterisation Using Flow-Based Statistics. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. IEEE/IFIP Network Operations and Management Symposium 2016 (NOMS 2016). Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 907-912. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502924.
    5. JIRSÍK, Tomáš, Milan ČERMÁK and Pavel ČELEDA. On Information Value of Top N Statistics. In 2016 6th International Conference on IT Convergence and Security (ICITCS). USA: Institute of Electrical and Electronic Engineers, 2016, p. 255-259. ISBN 978-1-5090-3764-3. Available from: https://dx.doi.org/10.1109/ICITCS.2016.7740357.
    6. TOVARŇÁK, Daniel. Practical Multi-pattern Matching Approach for Fast and Scalable Log Abstraction. In ICSOFT-EA 2016 - Proceedings of the 11th International Joint Conference on Software Technologies. Lisbon, Portugal: SCITEPRESS, 2016, p. 319-329. ISBN 978-989-758-194-6. Available from: https://dx.doi.org/10.5220/0006006603190329.
    7. ČERMÁK, Milan, Tomáš JIRSÍK and Martin LAŠTOVIČKA. Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 1019-1020. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502952.
    8. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK, Jakub Samuel PAULOVIČ and Michal ŠTEFÁNIK. Stream4Flow: Software for mining and analysis of the large volumes of network traffic. 2016.

    2015

    1. VELAN, Petr, Milan ČERMÁK, Pavel ČELEDA and Martin DRAŠAR. A Survey of Methods for Encrypted Traffic Classification and Analysis. International Journal of Network Management. John Wiley & Sons, Ltd., 2015, vol. 25, No 5, p. 355-374. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1901.
    2. ČELEDA, Pavel, Jakub ČEGAN, Jan VYKOPAL and Daniel TOVARŇÁK. KYPO – A Platform for Cyber Defence Exercises. Online. In STO-MP-MSG-133: M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber Defence. Munich (Germany): NATO Science and Technology Organization, 2015, p. nestránkováno, 12 pp. ISBN 978-92-837-2020-1. Available from: https://dx.doi.org/10.14339/STO-MP-MSG-133-08-doc.
    3. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Radek OŠLEJŠEK, Zdenek EICHLER, Dalibor TOTH, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Václav RAČANSKÝ, Ivo NUTÁR and Dušan LAGO. KYPO - Kybernetický polygon (KYPO - Cybernetic Proving Ground). 2015.
    4. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 389-396. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.35.
    5. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Ivo NUTÁR and Dušan LAGO. Software pro konfiguraci a monitorování virtuálního prostředí KYPO (Software for configuration and monitoring of KYPO environment). 2015.
    6. OŠLEJŠEK, Radek, Zdenek EICHLER, Dalibor TOTH, Pavel ČELEDA, Jakub ČEGAN, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Martin VIZVÁRY and Jan VYKOPAL. Software pro vizualizaci virtuálního prostředí KYPO (Software for visualization of KYPO environment). 2015.
Display details
Displayed: 27/2/2025 11:49