Filter publications

    2024

    1. LAGRAA, Sofiane, Martin HUSÁK, Hamida SEBA, Satyanarayana VUPPALA, Radu STATE and Moussa OUEDRAOGO. A review on graph-based approaches for network security monitoring and botnet detection. International Journal of Information Security. Springer, 2024, vol. 23, No 1, p. 119-140. ISSN 1615-5262. Available from: https://dx.doi.org/10.1007/s10207-023-00742-7.
    2. RUMAN, Ádám, Martin DRAŠAR, Lukáš SADLEK, Shanchieh Jay YANG and Pavel ČELEDA. Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Online. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. New York, United States: Association for Computing Machinery, 2024, p. 1-11. ISBN 979-8-4007-1718-5. Available from: https://dx.doi.org/10.1145/3664476.3664523.
    3. SADLEK, Lukáš and Pavel ČELEDA. Cyber Key Terrain Identification Using Adjusted PageRank Centrality. Online. In Meyer, N., Grocholewska-Czuryło, A. ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679. Cham: Springer, 2024, p. 293-306. ISBN 978-3-031-56325-6. Available from: https://dx.doi.org/10.1007/978-3-031-56326-3_21.
    4. DAUBNER, Lukáš, Barbora BÜHNOVÁ and Tomáš PITNER. Forensic experts' view of forensic-ready software systems: A qualitative study. Journal of Software: Evolution and Process. HOBOKEN: WILEY, 2024, vol. 36, No 5, p. 1-23. ISSN 2047-7473. Available from: https://dx.doi.org/10.1002/smr.2598.
    5. DAUBNER, Lukáš, Sofija MAKSOVIĆ, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš SEDLÁČEK. Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design. Online. In International Conference on Research Challenges in Information Science (RCIS 2024). Neuveden: Springer, 2024, p. 47–55. ISBN 978-3-031-59467-0. Available from: https://dx.doi.org/10.1007/978-3-031-59468-7_6.
    6. DAUBNER, Lukáš, Sofija MAKSOVIĆ and Tomáš SEDLÁČEK. FREAS: Forensic-Ready Analysis Suite. 2024.
    7. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Martin HORÁK, Martin HOFBAUER and Pavel ČELEDA. From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24). New York, NY, USA: ACM, 2024, p. 213-219. ISBN 979-8-4007-0600-4. Available from: https://dx.doi.org/10.1145/3649217.3653639.
    8. SADLEK, Lukáš, Martin HUSÁK and Pavel ČELEDA. Hierarchical Modeling of Cyber Assets in Kill Chain Attack Graphs. Online. In 20th International Conference on Network and Service Management, CNSM 2024. IFIP Open Digital Library, IEEE Xplore, 2024. ISBN 978-3-903176-66-9.
    9. SADLEK, Lukáš, Martin HUSÁK and Pavel ČELEDA. Identification of Device Dependencies Using Link Prediction. Online. In NOMS 2024 - 2024 IEEE/IFIP Network Operations and Management Symposium. Seoul, South Korea: IEEE Xplore Digital Library, 2024, p. 1-10. ISBN 979-8-3503-2794-6. Available from: https://dx.doi.org/10.1109/NOMS59830.2024.10575713.
    10. BOU-HARB, Elias, Edgar WEIPPL, Chadi ASSI, Martin HUSÁK, Jiangshan YU and Katherine FLANIGAN. IoT Security and Provisioning in Cyber-Enabled Niche Critical Infrastructure. In IEEE Internet of Things Magazine. Volume: 7, Issue: 6. IEEE, 2024, p. 10-12. ISSN 2576-3180. Available from: https://dx.doi.org/10.1109/MIOT.2024.10737172.
    11. HUSÁK, Martin, Darshan MANOJ and Priyanka KUMAR. Machine Learning in Intrusion Detection: An Operational Perspective. Online. 2024, 7 pp.
    12. VYKOPAL, Jan, Pavel ČELEDA, Valdemar ŠVÁBENSKÝ, Martin HOFBAUER and Martin HORÁK. Research and Practice of Delivering Tabletop Exercises. Online. In Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24). New York, NY, USA: ACM, 2024, p. 220-226. ISBN 979-8-4007-0600-4. Available from: https://dx.doi.org/10.1145/3649217.3653642.
    13. KRÁČMAROVÁ, Tereza, Markéta JASANSKÁ, Daniel BARTÁK, Pavel BREJCHA, Lucie ČEJKOVÁ, Johana JEŠÁTKOVÁ, Ondřej KAŠKA, Jan MARTÍNEK, Eva MEDZIHORSKÁ, Tina MIZEROVÁ, Maria PYTLOVÁ, Tomáš ŘEPA, Adéla SCHREIBEROVÁ, Kateřina SÝKOROVÁ, David ŠPŮREK, Julie VINKLOVÁ and Zuzana VRBECKÁ. Slovník mediální gramotnosti. První vydání. Brno: Nugis Finem Publishing, 2024, 120 pp. ISBN 978-80-7614-009-7.
    14. HUSÁK, Martin, Lukáš SADLEK, Martin HESKO, Vít ŠEBELA and Stanislav ŠPAČEK. The Evolution of the CRUSOE Toolset: Enhancing Decision Support in Network Security Management. Online. In 20th International Conference on Network and Service Management, CNSM 2024. 2024, 3 pp.
    15. HUSÁK, Martin, Mohamed-Lamine MESSAI and Hamida SEBA. The 5th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2024). 2024.
    16. HUSÁK, Martin. Theory and Practice of Cybersecurity Knowledge Graphs and Further Steps. In ARES 2024: The 19th International Conference on Availability, Reliability and Security. 2024.
    17. HUSÁK, Martin, Shanchieh Jay YANG, Joseph KHOURY, Dorde KLISURA and Elias BOU-HARB. Unraveling Network-based Pivoting Maneuvers: Empirical Insights and Challenges. Online. In Sanjay Goel, Paulo Roberto Nunes de Souza. Digital Forensics and Cyber Crime. Cham: Springer, 2024, p. 132-151. ISBN 978-3-031-56582-3. Available from: https://dx.doi.org/10.1007/978-3-031-56583-0_9.
    18. DUBOVECKÁ, Klára. Vulnerability of Students of Masaryk University to Two Different Types of Phishing. Applied Cybersecurity & Internet Governance. Warsaw: NASK – National Research Institute, 2024, vol. 4, No 2, p. 1-18. ISSN 2956-3119. Available from: https://dx.doi.org/10.60097/ACIG/190268.
    19. HUSÁK, Martin and Brian LEE. 1st Workshop on Network Security Operations (NeSecOr). 2024.

    2023

    1. DAUBNER, Lukáš, Raimundas MATULEVICIUS, Barbora BÜHNOVÁ, Matej ANTOL, Michal RŮŽIČKA and Tomáš PITNER. A Case Study on the Impact of Forensic-Ready Information Systems on the Security Posture. Online. In Advanced Information Systems Engineering. Cham: Springer Nature Switzerland, 2023, p. 522-538. ISBN 978-3-031-34559-3. Available from: https://dx.doi.org/10.1007/978-3-031-34560-9_31.
    2. DAUBNER, Lukáš, Matulevičius RAIMUNDAS and Barbora BÜHNOVÁ. A Model of Qualitative Factors in Forensic-Ready Software Systems. Online. In Research Challenges in Information Science: Information Science and the Connected World. Cham: Springer Nature Switzerland, 2023, p. 308-324. ISBN 978-3-031-33079-7. Available from: https://dx.doi.org/10.1007/978-3-031-33080-3_19.
    3. DAUBNER, Lukáš, Martin MACÁK, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ, Sofija MAKSOVIĆ and Tomáš PITNER. Addressing insider attacks via forensic-ready risk management. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS. ENGLAND: ELSEVIER, 2023, vol. 73, March 2023, p. 103433-103449. ISSN 2214-2126. Available from: https://dx.doi.org/10.1016/j.jisa.2023.103433.
    4. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš PITNER. BPMN4FRSS: An BPMN Extension to Support Risk-Based Development of Forensic-Ready Software Systems. Online. In Evaluation of Novel Approaches to Software Engineering. Cham: Springer Nature Switzerland, 2023, p. 20-43. ISBN 978-3-031-36596-6. Available from: https://dx.doi.org/10.1007/978-3-031-36597-3_2.
    5. BEURAN, Razvan, Jan VYKOPAL, Daniela BELAJOVÁ, Pavel ČELEDA, Yasuo TAN and Yoichi SHINODA. Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. Computers & Security. Elsevier, 2023, vol. 128, No 103120, p. 1-14. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2023.103120.
    6. DAUBNER, Lukáš and Adam POVAŽANEC. Data Loss Prevention Solution for Linux Endpoint Devices. Online. In ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security. United States: Association for Computing Machinery, 2023, p. 1-10. ISBN 979-8-4007-0772-8. Available from: https://dx.doi.org/10.1145/3600160.3605036.
    7. ŠPAČEK, Stanislav, Petr VELAN, Martin HOLKOVIČ and Tomáš PLESNÍK. Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic. Online. In 2023 IEEE/IFIP Network Operations and Management Symposium (NOMS 2023). Miami, Florida, USA: IEEE Xplore Digital Library, 2023, p. 1-6. ISBN 978-1-6654-7716-1. Available from: https://dx.doi.org/10.1109/NOMS56928.2023.10154211.
    8. DAUBNER, Lukáš, Barbora BÜHNOVÁ and Tomáš PITNER. Forensic experts' view of forensic-ready software systems: A qualitative study. Journal of Software: Evolution and Process. John Wiley & Sons Ltd., 2023, Neuveden, e2598, p. 1-23. ISSN 2047-7481. Available from: https://dx.doi.org/10.1002/smr.2598.
    9. POKORNÝ, Jan, Magdaléna KEJSTOVÁ, Vít RUSŇÁK and Simone KRIGLSTEIN. From Bin to Playin’: Give Vintage Objects a New Purpose as Game Controllers. Online. In Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA '23). Hamburg, Germany: Association for Computing Machinery, 2023, p. 1-6. ISBN 978-1-4503-9422-2. Available from: https://dx.doi.org/10.1145/3544549.3585665.
    10. ČERMÁK, Milan and Petr VELAN. How can network traffic lie? DFRWS EU 2023, 2023.
    11. HUSÁK, Martin, Pavol SOKOL, Martin ŽÁDNÍK, Václav BARTOŠ and Martin HORÁK. Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. Digital Threats: Research and Practice. Association for Computing Machinery, 2023, vol. 4, No 4, p. 1-11. ISSN 2576-5337. Available from: https://dx.doi.org/10.1145/3611391.
    12. HUSÁK, Martin and Michal JAVORNÍK. Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection. Online. In 2023 IEEE Conference on Communications and Network Security (CNS). New York, NY: IEEE, 2023, p. 1-6. ISBN 979-8-3503-3945-1. Available from: https://dx.doi.org/10.1109/CNS59707.2023.10288665.
    13. HUSÁK, Martin, Joseph KHOURY, Ðorđe KLISURA and Elias BOU-HARB. On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics. Online. In Pierre Collet, Latafat Gardashova, Samer El Zant, Ulviya Abdulkarimova. Complex Computational Ecosystems. Cham, Switzerland: Springer Nature, 2023, p. 167-179. ISBN 978-3-031-44354-1. Available from: https://dx.doi.org/10.1007/978-3-031-44355-8_12.
    14. LAŠTOVIČKA, Martin, Martin HUSÁK, Petr VELAN, Tomáš JIRSÍK and Pavel ČELEDA. Passive Operating System Fingerprinting Revisited: Evaluation and Current Challenges. Computer Networks. Netherlands: Elsevier, 2023, vol. 229, No 109782, p. 1-12. ISSN 1389-1286. Available from: https://dx.doi.org/10.1016/j.comnet.2023.109782.
    15. BOUČEK, Vladimír and Martin HUSÁK. Recommending Similar Devices in Close Proximity for Network Security Management. Online. In 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). Montreal: IEEE, 2023, p. 481-484. ISBN 979-8-3503-3667-2. Available from: https://dx.doi.org/10.1109/WiMob58348.2023.10187729.
    16. ANSAH, Alberta A, Adriana S VIVACQUA, Sailin ZHONG, Susanne BOLL, Marios CONSTANTINIDES, Himanshu VERMA, Abdallah El ALI, Alina LUSHNIKOVA, Hamed ALAVI, Sean RINTEL, Andrew L KUN, Orit SHAER, Anna L COX, Kathrin GERLING, Michael MULLER, Vít RUSŇÁK, Leticia Santos MACHADO, Thomas KOSCH, CHIWORK COLLECTIVE and SIGCHI EXECUTIVE COMMITTEE. Reflecting on Hybrid Events: Learning from a Year of Hybrid Experiences. Online. In Albrecht Schmidt, Kaisa Väänänen, Tesh Goyal, Per Ola Kristensson, Anicia Peters. Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA '23). New York, NY, USA: Association for Computing Machinery, 2023, p. 1–4, 5 pp. Available from: https://dx.doi.org/10.1145/3544549.3583181.
    17. HUSÁK, Martin, Mohamed-Lamine MESSAI and Hamida SEBA. The 4th International Workshop on Graph-based Approaches for CyberSecurity (GRASEC 2023). 2023.
    18. RUSŇÁK, Vít and Martin DRAŠAR. Towards a Visual Analytics Workflow for Cybersecurity Simulations. Online. In Christophe Hurter, Helen Purchase, Kadi Bouatouch. Proceedings of VISIGRAPP2023 - Volume3: IVAPP. To appear. Lisbon, Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2023, p. 179-186. ISBN 978-989-758-634-7. Available from: https://dx.doi.org/10.5220/0011695000003417.
    19. HYNEK, Jiří and Vít RUSŇÁK. Towards Interactive Geovisualization Authoring Toolkit for Industry Use Cases. Online. In A. Augusto de Sousa, Vlastimil Havran, Alexis Paljic, Tabitha Peck, Christophe Hurter, Helen Purchase, Giovanni Maria Farinella, Petia Radeva, Kadi Bouatouch. Computer Vision, Imaging and Computer Graphics Theory and Applications. 1st ed. Cham, Switzerland: Springer, 2023, p. 232-256. ISBN 978-3-031-25476-5. Available from: https://dx.doi.org/10.1007/978-3-031-25477-2_11.
    20. ČERMÁK, Milan, Tatiana FRITZOVÁ, Vít RUSŇÁK and Denisa ŠRÁMKOVÁ. Using relational graphs for exploratory analysis of network traffic data. Forensic Science International: Digital Investigation. 2023, vol. 45, S, p. 1-10. ISSN 2666-2825. Available from: https://dx.doi.org/10.1016/j.fsidi.2023.301563.
    21. HORÁK, Jiří, Katarína FURMANOVÁ, Barbora KOZLÍKOVÁ, Tomáš BRÁZDIL, Petr HOLUB, Martin KAČENGA, Matej GALLO, Rudolf NENUTIL, Jan BYŠKA and Vít RUSŇÁK. xOpat: eXplainable Open Pathology Analysis Tool. COMPUTER GRAPHICS FORUM. England: Wiley, 2023, vol. 42, No 3, p. 63-73. ISSN 0167-7055. Available from: https://dx.doi.org/10.1111/cgf.14812.

    2022

    1. ČEGAN, Jakub, Tomáš PLESNÍK, Daniel TOVARŇÁK, Zdeněk FORMAN and Roman VESELÝ. Analytická studie rozvoje a nasazení SOC (Analytical study of SOC development and deployment). 2022.
    2. PITNER, Tomáš, Otto DOSTÁL, Michal JAVORNÍK, Pavel ANDRES, Aleš ROČEK, Karel SLAVÍČEK, Tomáš KUBALA and Otto DOSTÁL. Analýza systému pro podporu efektivní spolupráce distribuovaných zdravotnických týmů (Analysis of a system to support effective collaboration of distributed healthcare teams). Brno: MU, 2022, 76 pp.
    3. DAUBNER, Lukáš, Raimundas MATULEVIČIUS, Barbora BÜHNOVÁ and Tomáš PITNER. Business Process Model and Notation for Forensic-Ready Software Systems. Online. In Proceedings of the 17th International Conference on Evaluation of Novel Approaches to Software Engineering. Setúbal, Portugal: SciTePress, 2022, p. 95-106. ISBN 978-989-758-568-5. Available from: https://dx.doi.org/10.5220/0011041000003176.
    4. HUSÁK, Martin. Complex Networks in Cybersecurity: Applications and Challenges. In ACONTA'22 : First European Conference on Augmented Complex Networks - Trustworthy Analysis. 2022.
    5. HUSÁK, Martin, Lukáš SADLEK, Stanislav ŠPAČEK, Martin LAŠTOVIČKA, Michal JAVORNÍK and Jana KOMÁRKOVÁ. CRUSOE: A Toolset for Cyber Situational Awareness and Decision Support in Incident Handling. Computers & Security. Elsevier, 2022, vol. 115, April, p. 1-19. ISSN 0167-4048. Available from: https://dx.doi.org/10.1016/j.cose.2022.102609.
    6. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna, Austria: ACM, 2022, p. 1-8. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3544458.
    7. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI and Barbora BÜHNOVÁ. Cybersecurity Analysis via Process Mining: A Systematic Literature Review. Online. In Advanced Data Mining and Applications. Cham, Switzerland: Springer, 2022, p. 393-407. ISBN 978-3-030-95404-8. Available from: https://dx.doi.org/10.1007/978-3-030-95405-5_28.
    8. DOČKALOVÁ BURSKÁ, Karolína, Vít RUSŇÁK and Radek OŠLEJŠEK. Data-driven insight into the puzzle-based cybersecurity training. Computers & Graphics. Elsevier Science, 2022, vol. 102, February 2022, p. 441-451. ISSN 0097-8493. Available from: https://dx.doi.org/10.1016/j.cag.2021.09.011.
    9. ŽÁDNÍK, Martin, Jan WRONA, Karel HYNEK, Tomáš ČEJKA and Martin HUSÁK. Discovering coordinated groups of IP addresses through temporal correlation of alerts. IEEE Access. IEEE, 2022, vol. 10, No 1, p. 82799-82813. ISSN 2169-3536. Available from: https://dx.doi.org/10.1109/ACCESS.2022.3196362.
    10. ŠPAČEK, Stanislav, Petr VELAN, Pavel ČELEDA and Daniel TOVARŇÁK. Encrypted Web Traffic Dataset: Event Logs and Packet Traces. Data in Brief. 2022, vol. 42, June, p. 1-10. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2022.108188.
    11. MACÁK, Martin, Lukáš DAUBNER, Júlia JAMNICKÁ and Barbora BÜHNOVÁ. Game Achievement Analysis: Process Mining Approach. Online. In Advanced Data Mining and Applications. Cham: Springer International Publishing, 2022, p. 68-82. ISBN 978-3-030-95407-9. Available from: https://dx.doi.org/10.1007/978-3-030-95408-6_6.
    12. HUSÁK, Martin, Martin LAŠTOVIČKA and Tomáš PLESNÍK. Handling Internet Activism during the Russian Invasion of Ukraine: A Campus Network Perspective. Digital Threats: Research and Practice. New York, NY, USA: ACM, 2022, vol. 3, No 3, p. "17:1-17:5", 5 pp. ISSN 2692-1626. Available from: https://dx.doi.org/10.1145/3534566.
    13. ŠPAČEK, Stanislav, Petr VELAN, Pavel ČELEDA and Daniel TOVARŇÁK. HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. Online. In 2022 IEEE/IFIP Network Operations and Management Symposium (NOMS 2022). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2022, p. 1-6. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789877.
    14. SADLEK, Lukáš, Pavel ČELEDA and Daniel TOVARŇÁK. Identification of Attack Paths Using Kill Chain and Attack Graphs. Online. In NOMS 2022 - 2022 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2022, p. 1-6. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789803.
    15. RUSŇÁK, Vít, Lenka JANEČKOVÁ, Filip DRGOŇ, Anna-Marie DOMBAJOVÁ and Veronika KUDĚLKOVÁ. Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance. Online. In Ebad Banissi, Anna Ursyn, Mark W. McK. Bannatyne, et al. 2022 26th International Conference Information Visualisation (IV). Vienna, Austria: IEEE, 2022, p. 300-306. ISBN 978-1-6654-9007-8. Available from: https://dx.doi.org/10.1109/IV56949.2022.00058.
    16. ČERMÁK, Milan. Incident Investigation: From Packets to Graph-Based Analysis. In International Workshop on Graph-based network Security (GraSec) in conjunction with IEEE/IFIP Network Operations and Management Symposium NOMS 2022. 2022.
    17. TOVARŇÁK, Daniel, Martin HAMERNÍK and Vít RUSŇÁK. Kolaborativní prostředí pro členy bezpečnostních týmů (Collaborative environment for security team members). 2022.
    18. ŠUĽAN, Samuel and Martin HUSÁK. Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "22:1"-"22:6", 6 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3539007.
    19. JAVORNÍK, Michal and Martin HUSÁK. Mission-centric Decision Support in Cybersecurity via Bayesian Privilege Attack Graph. Engineering Reports. John Wiley & Sons, Inc, 2022, vol. 4, No 12, p. "e12538", 25 pp. ISSN 2577-8196. Available from: https://dx.doi.org/10.1002/eng2.12538.
    20. TOVARŇÁK, Daniel, Michal ČECH, Dušan TICHÝ and Vojtěch DOHNAL. ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence. Online. In Varga, Pal, et al. Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022. USA: IEEE, 2022, p. 1-4. ISBN 978-1-6654-0601-7. Available from: https://dx.doi.org/10.1109/NOMS54207.2022.9789882.
    21. ČEGAN, Jakub, Daniel TOVARŇÁK, Tomáš PLESNÍK, Martin KEPRT and Milan PERNICA. Organizační, technický a právní model sdíleného SOC. 2022.
    22. MACÁK, Martin, Lukáš DAUBNER, Mohammadreza FANI SANI and Barbora BÜHNOVÁ. Process Mining Usage in Cybersecurity and Software Reliability Analysis: A Systematic Literature Review. Array. Elsevier Inc., 2022, vol. 13, No 1, p. 1-14. ISSN 2590-0056. Available from: https://dx.doi.org/10.1016/j.array.2021.100120.
    23. TOVARŇÁK, Daniel and Matúš RAČEK. Software pro integrovaný datový pohled na chráněnou infrastrukturu (Software for an integrated data view over the protected infrastructure). 2022.
    24. TOVARŇÁK, Daniel, Vojtěch DOHNAL, Dušan TICHÝ, Benjamin KRÁL and Martin MACHÁČ. Software pro podporu orchestrace bezpečnosti a řízení životního cyklu hrozeb (Software for security orchestration support and threat life-cycle management). 2022.
    25. HUSÁK, Martin and Milan ČERMÁK. SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. Online. In The 17th International Conference on Availability, Reliability and Security (ARES 2022). Vienna: ACM, 2022, p. "25:1"-"25:10", 10 pp. ISBN 978-1-4503-9670-7. Available from: https://dx.doi.org/10.1145/3538969.3538981.
    26. DRAŠAR, Martin, Ádám RUMAN and Vít RUSŇÁK. SW pro dynamickou verifikaci bezpečnostních opatření (SW for dynamic verification of security measures). 2022.
    27. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER and Ivo NUTÁR. SW pro ovládání nástrojů ofenzivní bezpečnosti (SW for orchestration of offensive security tools). 2022.
    28. RÁJA, Jiří, Milan BOHÁČEK, Lukáš DAUBNER, Michal DROBŇÁK and Ivo NUTÁR. SW pro statickou verifikaci bezpečnostních opatření (SW for static verification of security measures). 2022.
    29. HUSÁK, Martin and Hamida SEBA. The 3rd International Workshop on Graph-based network Security (GraSec 2022). 2022.
    30. ČERMÁK, Milan. Toward Graph-Based Network Traffic Analysis and Incident Investigation. In DFRWS EU 2022. 2022.

    2021

    1. MATTA, Lukáš and Martin HUSÁK. A Dashboard for Cyber Situational Awareness and Decision Support in Network Security Management. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, p. 716-717. ISBN 978-3-903176-32-4.
    2. DAUBNER, Lukáš, Tomáš PITNER and Jan MINISTR. Aspects of Forensic-Ready Software Systems in Public Service Domain. In Jan Ministr. Proceedings of the 24th International Conference on Information Technology for Practice. Ostrava, Czech Republic: VŠB - Technical University Ostrava, Centre for Information Technology, 2021, p. 139-145. ISBN 978-80-248-4562-3.
    3. TOVARŇÁK, Daniel, Matúš RAČEK and Petr VELAN. Cloud Native Data Platform for Network Telemetry and Analytics. Online. In Müge Sayıt, Stuart Clayman. 17th International Conference on Network and Service Management. Izmir, Turkey (Virtual): IFIP Open Digital Library, IEEE Xplore, 2021, p. 394-396. ISBN 978-3-903176-36-2. Available from: https://dx.doi.org/10.23919/CNSM52442.2021.9615568.
    4. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína DOČKALOVÁ BURSKÁ, Valdemar ŠVÁBENSKÝ, Jan VYKOPAL and Jakub ČEGAN. Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. IEEE Transactions on Visualization and Computer Graphics. 2021, vol. 27, No 8, p. 3425-3437. ISSN 1077-2626. Available from: https://dx.doi.org/10.1109/TVCG.2020.2977336.
    5. DOČKALOVÁ BURSKÁ, Karolína, Vít RUSŇÁK and Radek OŠLEJŠEK. Enhancing Situational Awareness for Tutors of Cybersecurity Capture the Flag Games. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: IEEE, 2021, p. 235-242. ISBN 978-1-6654-3827-8. Available from: https://dx.doi.org/10.1109/IV53921.2021.00045.
    6. ŠPAČEK, Stanislav, Daniel TOVARŇÁK and Pavel ČELEDA. Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption. In Audun Jøsang, Lynn Futcher, Janne Hagen. ICT Systems Security and Privacy Protection. 1st ed. Oslo: Springer, 2021, p. 302-316. ISBN 978-3-030-78119-4. Available from: https://dx.doi.org/10.1007/978-3-030-78120-0_20.
    7. HYNEK, Jiří, Jakub KACHLÍK and Vít RUSŇÁK. Geovisto: A Toolkit for Generic Geospatial Data Visualization. Online. In Christophe Hurter, Helen Purchase, Jose Braz, Kadi Bouatouch. Proceedings of the 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 3 IVAPP: IVAPP. Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2021, p. 101-111. ISBN 978-989-758-488-6. Available from: https://dx.doi.org/10.5220/0010260401010111.
    8. HYNEK, Jiří, Kryštof RYKALA, Jakub KACHLÍK and Vít RUSŇÁK. Geovisto: Toolkit for Generic Geospatial Data Visualization. 2021.
    9. ČERMÁK, Milan and Denisa ŠRÁMKOVÁ. GRANEF: Utilization of a Graph Database for Network Forensics. Online. In Sabrina De Capitani di Vimercati, Pierangela Samarati. Proceedings of the 18th International Conference on Security and Cryptography. Portugal: SCITEPRESS, 2021, p. 785-790. ISBN 978-989-758-524-1. Available from: https://dx.doi.org/10.5220/0010581807850790.
    10. TOVARŇÁK, Daniel, Lukáš SADLEK and Pavel ČELEDA. Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM 2021). Washington DC, USA: IEEE, 2021, p. 986-991. ISBN 978-3-903176-32-4.
    11. ČERMÁK, Milan. Graph-based Network Traffic Analysis for Incident Investigation. In The 16th International Conference on Availability, Reliability and Security. 2021.
    12. ČEGAN, Jakub, Vladimír ROHEL, Milan ČERMÁK, Petr VELAN, Vojtěch HAMERSKÝ, Natálie VELECKÁ, Martin LEBEDA, Tomáš KACVINSKÝ and Zdeněk VYDRA. Kyberbezpečnost lékařských přístrojů (Cybersecurity of medical appliances). 2021.
    13. UHLÁR, Juraj, Martin HOLKOVIČ and Vít RUSŇÁK. PCAPFunnel: A Tool for Rapid Exploration of Packet Capture Files. Online. In Ebad Banissi, Anna Ursyn, et al. 2021 25th International Conference Information Visualisation (IV). United States of America: The Institute of Electrical and Electronics Engineers, Inc., 2021, p. 69-76. ISBN 978-1-6654-3827-8. Available from: https://dx.doi.org/10.1109/IV53921.2021.00021.
    14. HUSÁK, Martin, Václav BARTOŠ, Pavol SOKOL and Andrej GAJDOŠ. Predictive Methods in Cyber Defense: Current Experience and Research Challenges. Future Generation Computer Systems. Elsevier, 2021, vol. 115, February, p. 517-530. ISSN 0167-739X. Available from: https://dx.doi.org/10.1016/j.future.2020.10.006.
    15. RUSŇÁK, Vít, Anna-Marie DOMBAJOVÁ, Veronika KUDĚLKOVÁ and Martin PYŠČUK. Prototypová implementace nástroje pro vizuální analýzu časově orientovaných dat (Prototype implementation of a tool for visual analysis of time-oriented data). 2021.
    16. DAUBNER, Lukáš and Raimundas MATULEVIČIUS. Risk-Oriented Design Approach For Forensic-Ready Software Systems. Online. In The 16th International Conference on Availability, Reliability and Security (ARES 2021). New York, NY, USA: Association for Computing Machinery, 2021, p. 1-10. ISBN 978-1-4503-9051-4. Available from: https://dx.doi.org/10.1145/3465481.3470052.
    17. VYKOPAL, Jan, Pavel ČELEDA, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ and Daniel TOVARŇÁK. Scalable Learning Environments for Teaching Cybersecurity Hands-on. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637180.
    18. ČERMÁK, Milan and Pavel ČELEDA. Stream-Based IP Flow Analysis. Online. In Toufik Ahmed, Olivier Festor, Yacine Ghamri-Doudane, Joon-Myung Kang, Alberto E. Schaeffer-Filho, Radu State, Burkhard Stiller. IFIP/IEEE International Symposium on Integrated Network Management, IM 2021. Bordeaux, France: IFIP Open Digital Library, 2021, p. 736-741. ISBN 978-3-903176-32-4.
    19. HUSÁK, Martin, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. Online. In ARES 2021: The 16th International Conference on Availability, Reliability and Security. Virtual Event: Association for Computing Machinery, 2021, p. 1-8. ISBN 978-1-4503-9051-4. Available from: https://dx.doi.org/10.1145/3465481.3470037.
    20. LAGRAA, Sofiane, Radu STATE, Hamida SEBA and Martin HUSÁK. The 2nd International Workshop on Graph-based network Security (GraSec 2021). 2021.
    21. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Daniel TOVARŇÁK and Pavel ČELEDA. Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. Online. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021, p. 1-9. ISBN 978-1-6654-3851-3. Available from: https://dx.doi.org/10.1109/FIE49875.2021.9637052.
    22. HUSÁK, Martin. Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. Online. In 2021 IEEE International Conference on Intelligence and Security Informatics (ISI). San Antonio: IEEE, 2021, p. 1-6. ISBN 978-1-6654-3838-4. Available from: https://dx.doi.org/10.1109/ISI53945.2021.9624774.
    23. HUSÁK, Martin, Giovanni APRUZZESE, Shanchieh YANG and Gordon WERNER. Towards an Efficient Detection of Pivoting Activity. Online. In 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM). Bordeaux: IEEE, 2021, p. 980-985. ISBN 978-3-903176-32-4.
    24. ČEGAN, Jakub, Tomáš KACVINSKÝ, Zdeněk VYDRA, Martin LEBEDA, Jakub Bartolomej KOŠUTH, Petr VELAN, Milan ČERMÁK, Andrej TOMČI, Ivo NUTÁR, Martin LAŠTOVIČKA, Natálie VELECKÁ, Pavla VIZVÁRY, Vojtěch HAMERSKÝ, Daniel KOUŘIL, Ondřej BUDAY, Martin KOTLÍK, Vladimír ROHEL, Jiří SÝKORA, Michal ZVÁNOVEC, Filip GRÉGR and Petr SLAVÍK. Virtualizované prostředí pro trénink CSIRT týmu (Virtual environment for training of the CSIRT teams). 2021.
    25. DOČKALOVÁ BURSKÁ, Karolína, Anna-Marie DOMBAJOVÁ, Jiří HYNEK, Jakub KACHLÍK, Jakub MATUŠKA, Michal PAVÚK, Kryštof RYKALA, Dávid ŽELNÍK and Vít RUSŇÁK. Vizuálně-analytická konzole pro ICS (Visual-analytics console for ICS). 2021.
    26. ROČEK, Aleš, Michal JAVORNÍK, Karel SLAVÍČEK and Otto DOSTÁL. Zero Watermarking: Critical Analysis of Its Role in Current Medical Imaging. Journal of Digital Imaging. 2021, vol. 34, No 1, p. 204-211. ISSN 0897-1889. Available from: https://dx.doi.org/10.1007/s10278-020-00396-0.

    2020

    1. ČECH, Michal, Roman CHRENŠŤ, Daniel TOVARŇÁK and Tomáš PLESNÍK. Adaptér pro systém pro správu zdrojů (Asset management adapter). 2020.
    2. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Daniel TOVARŇÁK, Pavel ZEZULA, Martin MACÁK, Matúš GUOTH, Matej BABEJ, Dávid BRILLA and Martin KAŽIMÍR. ANALYZA – Datový sklad (ANALYZA – Dara Warehouse). 2020.
    3. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Jarešová MIROSLAVA, Barbora KOZLÍKOVÁ, Kristína ZÁKOPČANOVÁ, Pavel ZEZULA, Katarína FURMANOVÁ, Marko ŘEHÁČEK, Jozef BÁTRNA and Daniel PLAKINGER. ANALYZA – Vizualizační komponenta – Visilant (ANALYZA – Visualization Component – Visilant). 2020.
    4. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Barbora KOZLÍKOVÁ, Vladimír MÍČ, Filip NÁLEPA, David NOVÁK, Daniel TOVARŇÁK, Pavel ZEZULA, Jakub PESCHEL, Kasanič DENIS, Denisa ŠRÁMKOVÁ, Erik HRICIŠÁK, Vladimír LAZÁRIK and Kristián GUTIČ. ANALYZA – Výpočetní a orchestrační subsystém (ANALYZA – Computation and Orchestration Subsystem). 2020.
    5. HUSÁK, Martin, Martin ŽÁDNÍK, Václav BARTOŠ and Pavol SOKOL. Dataset of intrusion detection alerts from a sharing platform. Data in Brief. Elsevier, 2020, vol. 33, December, p. 1-12. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2020.106530.
    6. JAVORNÍK, Michal, Jana KOMÁRKOVÁ, Lukáš SADLEK and Martin HUSÁK. Decision Support for Mission-Centric Network Security Management. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110261.
    7. HUSÁK, Martin. Graph-based models in prediction and projection of cyber attacks. In The 1st International Workshop on Graph-based network Security. 2020.
    8. PLESNÍK, Tomáš and Vít RUSŇÁK. Nettmap2 - Interaktivní nástroj pro zobrazení síťové topologie vizualizující data z Flowmon řešení (Nettmap2 - An interactive tool for displaying network topology using data visualization from Flowmon's solution). 2020.
    9. LAŠTOVIČKA, Martin, Martin HUSÁK and Lukáš SADLEK. Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110394.
    10. HUSÁK, Martin and Pavel ČELEDA. Predictions of Network Attacks in Collaborative Environment. Online. In NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium. Budapest, Hungary: IEEE, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110472.
    11. HUSÁK, Martin, Tomáš BAJTOŠ, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. ACM Transactions on Management Information Systems. Association for Computing Machinery, 2020, vol. 11, No 4, p. 1-16. ISSN 2158-656X. Available from: https://dx.doi.org/10.1145/3386250.
    12. DAUBNER, Lukáš and Tomáš PITNER. Secure software modeling methods for forensic readiness. Online. In Jan Ministr. Proceedings of the 22nd International Conference on Information Technology for Practice. Ostrava, Czech Republic: VŠB - Technical University Ostrava, Centre for Information Technology, 2020, p. 153-160. ISBN 978-80-248-4321-6.
    13. MACÁK, Martin, Agáta KRUŽÍKOVÁ, Lukáš DAUBNER and Barbora BÜHNOVÁ. Simulation Games Platform for Unintentional Perpetrator Attack Vector Identification. Online. In ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops. New York, NY, USA: Association for Computing Machinery, 2020, p. 222-229. ISBN 978-1-4503-7963-2. Available from: https://dx.doi.org/10.1145/3387940.3391475.
    14. ŠPAČEK, Stanislav and Milan ŽIARAN. Software pro aplikaci reaktivních opatření na prvcích aktivní obrany počítačové sítě (Software for the application of reactive measures on devices for active network defense). 2020.
    15. LAŠTOVIČKA, Martin, Jakub Bartolomej KOŠUTH, Daniel FILAKOVSKÝ, Antonín DUFKA and Martin HUSÁK. Software pro evidenci zranitelností v počítačové síti (Software for enumerating vulnerabilities in a computer network). 2020.
    16. SADLEK, Lukáš, Michal JAVORNÍK and Martin HUSÁK. Software pro podporu rozhodování při řešení bezpečnostního incidentu (Software for the decision support in the security incident handling). 2020.
    17. HUSÁK, Martin, Tomáš JIRSÍK and Shanchieh Jay YANG. SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security. Online. In Proceedings of the 15th International Conference on Availability, Reliability and Security. New York, NY, United States: Association for Computing Machinery, 2020, p. 1-10. ISBN 978-1-4503-8833-7. Available from: https://dx.doi.org/10.1145/3407023.3407062.
    18. DAUBNER, Lukáš, Martin MACÁK, Barbora BÜHNOVÁ and Tomáš PITNER. Towards verifiable evidence generation in forensic-ready systems. Online. In 2020 IEEE International Conference on Big Data (Big Data). Atlanta, United States: IEEE, 2020, p. 2264-2269. ISBN 978-1-7281-6251-5. Available from: https://dx.doi.org/10.1109/BigData50022.2020.9378035.
    19. TOVARŇÁK, Daniel, Stanislav ŠPAČEK and Jan VYKOPAL. Traffic and Log Data Captured During a Cyber Defense Exercise. Data in Brief. 2020, vol. 31, August, p. 1-11. ISSN 2352-3409. Available from: https://dx.doi.org/10.1016/j.dib.2020.105784.
    20. LAŠTOVIČKA, Martin, Stanislav ŠPAČEK, Petr VELAN and Pavel ČELEDA. Using TLS Fingerprints for OS Identification in Encrypted Traffic. Online. In 2020 IEEE/IFIP Network Operations and Management Symposium (NOMS 2020). Budapešť, Maďarsko: IEEE Xplore Digital Library, 2020, p. 1-6. ISBN 978-1-7281-4973-8. Available from: https://dx.doi.org/10.1109/NOMS47738.2020.9110319.
    21. DAUBNER, Lukáš, Martin MACÁK, Barbora BÜHNOVÁ and Tomáš PITNER. Verification of Forensic Readiness in Software Development: A Roadmap. Online. In Proceedings of the 35th Annual ACM Symposium on Applied Computing. New York, NY, USA: Association for Computing Machinery, 2020, p. 1658-1661. ISBN 978-1-4503-6866-7. Available from: https://dx.doi.org/10.1145/3341105.3374094.
    22. MATTA, Lukáš and Martin HUSÁK. Webová aplikace pro vizualizaci bezpečnostní situace v počítačové síti (Web application for the visualization of security situation in computer network). 2020.

    2019

    1. HUSÁK, Martin and Jaroslav KAŠPAR. AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "81:1"-"81:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340513.
    2. TOVARŇÁK, Daniel. An Algorithm for Message Type Discovery in Unstructured Log Data. Online. In Proceedings of the 14th International Conference on Software Technologies - Volume 1: ICSOFT. Prague: SciTePress, 2019, p. 665-676. ISBN 978-989-758-379-7. Available from: https://dx.doi.org/10.5220/0007919806650676.
    3. BOU-HARB, Elias, Martin HUSÁK, Mourad DEBBABI and Chadi ASSI. Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Transactions on Big Data. IEEE, 2019, vol. 5, No 4, p. 439-453. ISSN 2332-7790. Available from: https://dx.doi.org/10.1109/TBDATA.2017.2723398.
    4. ŠPAČEK, Stanislav, Martin LAŠTOVIČKA, Martin HORÁK and Tomáš PLESNÍK. Current Issues of Malicious Domains Blocking. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, p. 551-556. ISBN 978-1-7281-0618-2.
    5. JAVORNÍK, Michal, Jana KOMÁRKOVÁ and Martin HUSÁK. Decision Support for Mission-Centric Cyber Defence. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "34:1"-"34:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340522.
    6. ŠPAČEK, Stanislav, Vít RUSŇÁK and Anna-Marie DOMBAJOVÁ. DNS Firewall Data Visualization. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC: IEEE, 2019, p. 743-744. ISBN 978-1-7281-0618-2.
    7. HORÁK, Martin, Václav STUPKA and Martin HUSÁK. GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. Online. In Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019). New York: ACM, 2019, p. "36:1"-"36:8", 8 pp. ISBN 978-1-4503-7164-3. Available from: https://dx.doi.org/10.1145/3339252.3340516.
    8. CHREN, Stanislav, Barbora BÜHNOVÁ, Martin MACÁK, Lukáš DAUBNER and Bruno ROSSI. Mistakes in UML Diagrams: Analysis of Student Projects in a Software Engineering Course. Online. In Sarah Beecham, Daniela Damian. Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training. Piscataway, NJ, USA: IEEE Press, 2019, p. 100-109. ISBN 978-1-7281-1000-4. Available from: https://dx.doi.org/10.1109/ICSE-SEET.2019.00019.
    9. ČELEDA, Pavel, Jakub ČEGAN, Martin MACHÁČ, Jana MEDKOVÁ, Ivo NUTÁR, Tomáš PLESNÍK, Daniel TOVARŇÁK and Martin VIZVÁRY. Nástroj pro zmírňování a potlačování útoků na kritickou informační infrastrukturu (Tool for mitigation and suppression of attacks on critical information infrastructure). 2019.
    10. ČELEDA, Pavel, Jakub ČEGAN, Martin DRAŠAR, Ivo NUTÁR, Jiří RÁJA, Tomáš REBOK, Andrej TOMČI and Daniel TOVARŇÁK. Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury (Tools for verification of SW/HW security and simulation of attacks on critical information infrastructure). 2019.
    11. TOVARŇÁK, Daniel and Tomáš PITNER. Normalization of Unstructured Log Data into Streams of Structured Event Objects. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 671-676. ISBN 978-1-72810-618-2.
    12. ČERMÁK, Milan, Martin LAŠTOVIČKA and Tomáš JIRSÍK. Real-time Pattern Detection in IP Flow Data using Apache Spark. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 521-526. ISBN 978-1-7281-0618-2.
    13. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Michal BERAN, František HRDINA, Tomáš JIRSÍK, Daniel KOUŘIL, Michal MAZOUREK, Radek OŠLEJŠEK, Michal PROCHÁZKA, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Vadim JANOVSKIJ and Kristína ZÁKOPČANOVÁ. Software pro detekci a analýzu napadení KII (Software for detection and analysis of attacks on critical information infrastructures). 2019.
    14. HUSÁK, Martin, Jaroslav KAŠPAR and Milan ŽIARAN. Software pro inteligentní analýzu bezpečnostních událostí (iABU) (Software for the intelligent analysis of security events (iABU)). 2019.
    15. ČELEDA, Pavel, Jakub ČEGAN, Karolína DOČKALOVÁ BURSKÁ, Jan DUDA, Martin HAMERNÍK, Miroslava JAREŠOVÁ, Erik KOČAMBA, Radek OŠLEJŠEK, Vít RUSŇÁK, Daniel TOVARŇÁK, Hai Duong TRAN, Jan VYKOPAL and Kristína ZÁKOPČANOVÁ. Software pro provádění bezpečnostních cvičení a školení (Software for realization of cybersecurity exercises and trainings). 2019.
    16. ČELEDA, Pavel, Jakub ČEGAN, Kamil ANDONIADIS, Milan ČERMÁK, Jan DUDA, Vlastimil HOLER, Ľuboš HYŽÁK, Boris JADUŠ, Jakub KADAŠI, David LEŠKA, Martin MACHÁČ, Ivo NUTÁR, Radek OŠLEJŠEK, Dominik PILÁR, Tomáš PLESNÍK, Michal PROCHÁZKA, Tomáš REBOK, Vít RUSŇÁK, Miloslav STANĚK, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ, Daniel TOVARŇÁK, Petr VELAN, Martin VIZVÁRY, Jan VYKOPAL and Tatiana ZBONČÁKOVÁ. Software pro simulaci obecných i kritických informačních infrastruktur (Software for simulation of generic and critical information infrastructures). 2019.
    17. HUSÁK, Martin, Jana KOMÁRKOVÁ, Elias BOU-HARB and Pavel ČELEDA. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys & Tutorials. IEEE, 2019, vol. 21, No 1, p. 640-660. ISSN 1553-877X. Available from: https://dx.doi.org/10.1109/COMST.2018.2871866.
    18. BARTOŠ, Václav, Martin ŽÁDNÍK, Pavel KROBOT, Lukáš HUTÁK, Martin HUSÁK, Jaroslav KAŠPAR and Petr VELAN. Systém pro sdílení a analýzu bezpečnostních událostí (System for sharing and analysis of network security alerts). 2019.
    19. ČERMÁK, Milan. Trace-Share: Towards Provable Network Traffic Measurement and Analysis. 2019.
    20. OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína BURSKÁ, Valdemar ŠVÁBENSKÝ and Jan VYKOPAL. Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. Online. In Gove R., Arendt D., Kohlhammer J., Angelini M., Lyn Paul, C., Bryan C. McKenna S., Prigent N., Najafi P., Sopan A. 2019 IEEE Symposium on Visualization for Cyber Security (VizSec). Vancouver, BC, Canada: IEEE, 2019, p. 1-11. ISBN 978-1-7281-3876-3. Available from: https://dx.doi.org/10.1109/VizSec48167.2019.9161386.

    2018

    1. HUSÁK, Martin, Nataliia NESHENKO, Morteza SAFAEI POUR, Elias BOU-HARB and Pavel ČELEDA. Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "29:1"-"29:6", 6 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3230837.
    2. KOMÁRKOVÁ, Jana, Lukáš SADLEK and Martin LAŠTOVIČKA. Community Based Platform for Vulnerability Categorization. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 2 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406125.
    3. KOMÁRKOVÁ, Jana, Martin HUSÁK, Martin LAŠTOVIČKA and Daniel TOVARŇÁK. CRUSOE: Data Model for Cyber Situation Awareness. Online. In Proceedings of the 13th International Conference on Availability, Reliability and Security. Hamburg: ACM, 2018, p. "36:1"-"36:10", 10 pp. ISBN 978-1-4503-6448-5. Available from: https://dx.doi.org/10.1145/3230833.3232798.
    4. NESHENKO, Nataliia, Martin HUSÁK, Elias BOU-HARB, Pavel ČELEDA, Sameera AL-MULLA and Claude FACHKHA. Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations. Online. In 2018 IEEE Globecom Workshops. Abu Dhabi: IEEE, 2018, p. 1-7. ISBN 978-1-5386-4920-6. Available from: https://dx.doi.org/10.1109/GLOCOMW.2018.8644468.
    5. RUSŇÁK, Vít, Caroline APPERT, Olivier CHAPUIS and Emmanuel PIETRIGA. Designing Coherent Gesture Sets for Multi-scale Navigation on Tabletops. Online. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 2018, 12 pp. ISBN 978-1-4503-5620-6. Available from: https://dx.doi.org/10.1145/3173574.3173716.
    6. ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Milan ČERMÁK and Martin LAŠTOVIČKA. Enhancing Cybersecurity Skills by Creating Serious Games. Online. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'18). Larnaca, Cyprus: ACM, 2018, p. 194-199. ISBN 978-1-4503-5707-4. Available from: https://dx.doi.org/10.1145/3197091.3197123.
    7. OŠLEJŠEK, Radek, Jan VYKOPAL, Karolína BURSKÁ and Vít RUSŇÁK. Evaluation of Cyber Defense Exercises Using Visual Analytics Process. Online. In Proceedings of the 48th IEEE Frontiers in Education Conference (FIE'18). San Jose, California, USA: IEEE, 2018, p. 1-9. ISBN 978-1-5386-1173-9. Available from: https://dx.doi.org/10.1109/FIE.2018.8659299.
    8. LAŠTOVIČKA, Martin, Antonín DUFKA and Jana KOMÁRKOVÁ. Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use?. Online. In IEEE. Proceedings of the 14th International Wireless Communications and Mobile Computing Conference. Limassol, Cyprus: IEEE Xplore Digital Library, 2018, p. 542-547. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450406.
    9. LAŠTOVIČKA, Martin, Tomáš JIRSÍK, Pavel ČELEDA, Stanislav ŠPAČEK and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Methods in the Jungle of Wireless Networks. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 9 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406262.
    10. LAŠTOVIČKA, Martin and Daniel FILAKOVSKÝ. Passive OS Fingerprinting Prototype Demonstration. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. nestránkováno, 2 pp. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406128.
    11. VELAN, Petr, Martin HUSÁK and Daniel TOVARŇÁK. Rapid Prototyping of Flow-Based Detection Methods Using Complex Event Processing. Online. In NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium. Taipei, Taiwan: IEEE Xplore Digital Library, 2018, p. 1-3. ISBN 978-1-5386-3416-5. Available from: https://dx.doi.org/10.1109/NOMS.2018.8406121.
    12. ŠPAČEK, Stanislav and Pavel ČELEDA. Threat Detection Through Correlation of Network Flows and Logs. Online. In Burkhard Stiller. Proceedings of the 12th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2018). Neuveden: IFIP, 2018, p. 6-10. ISBN 978-3-903176-12-6.
    13. HUSÁK, Martin and Jaroslav KAŠPAR. Towards Predicting Cyber Attacks Using Information Exchange and Data Mining. Online. In 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC). Limassol: IEEE, 2018, p. 536-541. ISBN 978-1-5386-2070-0. Available from: https://dx.doi.org/10.1109/IWCMC.2018.8450512.
    14. ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR and Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, p. 1-8. ISBN 978-3-903176-09-6. Available from: https://dx.doi.org/10.23919/TMA.2018.8506498.

    2017

    1. HUSÁK, Martin and Milan ČERMÁK. A Graph-based Representation of Relations in Network Security Alert Sharing Platforms. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 891-892. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987399.
    2. ŠPAČEK, Stanislav, Pavel ČELEDA, Martin DRAŠAR and Martin VIZVÁRY. Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. SPI 2017 - Security and Protection of Information 2017. Brno: Univerzita obrany, 2017, p. 143-158. ISBN 978-80-7231-414-0.
    3. HUSÁK, Martin, Milan ČERMÁK, Martin LAŠTOVIČKA and Jan VYKOPAL. Exchanging Security Events: Which And How Many Alerts Can We Aggregate?. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 604-607. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987340.
    4. MEDKOVÁ, Jana, Martin HUSÁK, Martin VIZVÁRY and Pavel ČELEDA. Honeypot Testbed for Network Defence Strategy Evaluation. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 887-888. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987397.
    5. SOKOL, Pavol, Jakub MÍŠEK and Martin HUSÁK. Honeypots and honeynets: issues of privacy. EURASIP Journal on Information Security. London: Springer Open, 2017, vol. 10, No 4, p. 1-9. ISSN 1687-4161. Available from: https://dx.doi.org/10.1186/s13635-017-0057-4.
    6. VYKOPAL, Jan, Radek OŠLEJŠEK, Pavel ČELEDA, Martin VIZVÁRY and Daniel TOVARŇÁK. KYPO Cyber Range: Design and Use Cases. Online. In Cardoso J.,Cardoso J.,Maciaszek L.,Maciaszek L.,van Sinderen M.,Cabello E. Proceedings of the 12th International Conference on Software Technologies - Volume 1: ICSOFT. Madrid, Spain: SciTePress, 2017, p. 310-321. ISBN 978-989-758-262-2. Available from: https://dx.doi.org/10.5220/0006428203100321.
    7. VYKOPAL, Jan, Martin VIZVÁRY, Radek OŠLEJŠEK, Pavel ČELEDA and Daniel TOVARŇÁK. Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range. Online. In 2017 IEEE Frontiers in Education Conference. Indianapolis, IN, USA: IEEE, 2017, p. 1-8. ISBN 978-1-5090-5919-5. Available from: https://dx.doi.org/10.1109/FIE.2017.8190713.
    8. MEDKOVÁ, Jana, Martin HUSÁK and Martin DRAŠAR. Network Defence Strategy Evaluation: Simulation vs. Live Network. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 81-88. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987267.
    9. HUSÁK, Martin, Jaroslav KAŠPAR, Elias BOU-HARB and Pavel ČELEDA. On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "22:1"-"22:10", 10 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3098981.
    10. DOSTÁL, Otto, Otto DOSTÁL and Michal JAVORNÍK. Právní limity nakládání s údaji o zdravotním stavu. In XIII. mezinárodní kongres informačních technologií ve zdravotnictví. 2017.
    11. STUPKA, Václav, Martin HORÁK and Martin HUSÁK. Protection of personal data in security alert sharing platforms. Online. In Proceedings of the 12th International Conference on Availability, Reliability and Security. Reggio Calabria: ACM, 2017, p. "65:1"-"65:8", 8 pp. ISBN 978-1-4503-5257-4. Available from: https://dx.doi.org/10.1145/3098954.3105822.
    12. ROČEK, Aleš, Michal JAVORNÍK, Karel SLAVÍČEK and Otto DOSTÁL. Reversible Watermarking in Medical Imaging with Zero Distortion in ROI. Online. In Proceedings of 24th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2017). New York: IEEE, 2017, p. 356-359. ISBN 978-1-5386-1911-7. Available from: https://dx.doi.org/10.1109/ICECS.2017.8292071.
    13. LAŠTOVIČKA, Martin and Pavel ČELEDA. Situational Awareness: Detecting Critical Dependencies and Devices in a Network. In Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller. AIMS 2017 - 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Zurich (Switzerland): Springer, 2017, p. 173-178. ISBN 978-3-319-60773-3. Available from: https://dx.doi.org/10.1007/978-3-319-60774-0_17.
    14. ŽÁDNÍK, Martin, Jan WRONA, Pavel KROBOT, Pavel MINAŘÍK, Jan BARIENČÍK, Tomáš JIRSÍK, Milan ČERMÁK and Daniel TOVARŇÁK. Systém pro sběr, uchování a analýzu síťových dat velkého rozsahu (System for collecting, storing and analysis of large IP flow data). 2017.
    15. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK and Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine. IEEE, 2017, vol. 55, No 7, p. 70-76. ISSN 0163-6804. Available from: https://dx.doi.org/10.1109/MCOM.2017.1600972.
    16. PITNER, Tomáš, Jan MINISTR, Daniel TOVARŇÁK, Filip KŠENZULIAK and Adam KUČERA. Towards a Common Logging and Monitoring Framework for Critical Infrastructures. In Radek Němec, Lucie Chytilová. Strategic Management and its Support by Information Systems (SMSIS). Ostrava: VŠB - Technical University of Ostrava, 2017, p. 488-495. ISBN 978-80-248-4046-8.

    2016

    1. ROČEK, Aleš, Karel SLAVÍČEK, Otto DOSTÁL and Michal JAVORNÍK. A new approach to fully-reversible watermarking in medical imaging with breakthrough visibility parameters. Biomedical Signal Processing and Control. Elsevier, 2016, vol. 29, No 7, p. 44-52. ISSN 1746-8094. Available from: https://dx.doi.org/10.1016/j.bspc.2016.05.005.
    2. ČERMÁK, Milan, Daniel TOVARŇÁK, Martin LAŠTOVIČKA and Pavel ČELEDA. A Performance Benchmark of NetFlow Data Analysis on Distributed Stream Processing Systems. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 919-924. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502926.
    3. ČERMÁK, Milan and Pavel ČELEDA. Detecting Advanced Network Threats Using a Similarity Search. In Badonnel, Rémi and Koch, Robert and Pras, Aiko and Drašar, Martin and Stiller, Burkhard. Management and Security in the Age of Hyperconnectivity. 9701st ed. Munich, Germany: Springer International Publishing, 2016, p. 137-141. ISBN 978-3-319-39813-6. Available from: https://dx.doi.org/10.1007/978-3-319-39814-3_14.
    4. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting. EURASIP Journal on Information Security. 2016, vol. 2016, No 1, p. 1-14. ISSN 2510-523X. Available from: https://dx.doi.org/10.1186/s13635-016-0030-7.
    5. JIRSÍK, Tomáš, Milan ČERMÁK and Pavel ČELEDA. On Information Value of Top N Statistics. In 2016 6th International Conference on IT Convergence and Security (ICITCS). USA: Institute of Electrical and Electronic Engineers, 2016, p. 255-259. ISBN 978-1-5090-3764-3. Available from: https://dx.doi.org/10.1109/ICITCS.2016.7740357.
    6. TOVARŇÁK, Daniel. Practical Multi-pattern Matching Approach for Fast and Scalable Log Abstraction. In ICSOFT-EA 2016 - Proceedings of the 11th International Joint Conference on Software Technologies. Lisbon, Portugal: SCITEPRESS, 2016, p. 319-329. ISBN 978-989-758-194-6. Available from: https://dx.doi.org/10.5220/0006006603190329.
    7. ČERMÁK, Milan, Tomáš JIRSÍK and Martin LAŠTOVIČKA. Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark. In Sema Oktug, Mehmet Ulema, Cicek Cavdar, Lisandro Zambenedetti Granville, Carlos Raniery P. dos Santos. NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium. Istanbul, Turkey: IEEE Xplore Digital Library, 2016, p. 1019-1020. ISBN 978-1-5090-0223-8. Available from: https://dx.doi.org/10.1109/NOMS.2016.7502952.
    8. ROČEK, Aleš, Karel SLAVÍČEK and Michal JAVORNÍK. RONI Size and another Attributes of Representative Sample of Medical Images in Common Hospital Operation, Related to Securing by Watermarking Methods. In Prof. Osama Mohamed Mohamed Ahamed. International Conference on Image Processing, Production and Computer Science (ICIPCS'16). London: URENG, 2016, p. 44-51. ISBN 978-93-84422-62-2.
    9. JIRSÍK, Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK, Jakub Samuel PAULOVIČ and Michal ŠTEFÁNIK. Stream4Flow: Software for mining and analysis of the large volumes of network traffic. 2016.

    2015

    1. VELAN, Petr, Milan ČERMÁK, Pavel ČELEDA and Martin DRAŠAR. A Survey of Methods for Encrypted Traffic Classification and Analysis. International Journal of Network Management. John Wiley & Sons, Ltd., 2015, vol. 25, No 5, p. 355-374. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1901.
    2. SOKOL, Pavol, Martin HUSÁK and František LIPTÁK. Deploying Honeypots and Honeynets: Issue of Privacy. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 397-403. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.91.
    3. ČELEDA, Pavel, Jakub ČEGAN, Jan VYKOPAL and Daniel TOVARŇÁK. KYPO – A Platform for Cyber Defence Exercises. Online. In STO-MP-MSG-133: M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber Defence. Munich (Germany): NATO Science and Technology Organization, 2015, p. nestránkováno, 12 pp. ISBN 978-92-837-2020-1. Available from: https://dx.doi.org/10.14339/STO-MP-MSG-133-08-doc.
    4. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Radek OŠLEJŠEK, Zdenek EICHLER, Dalibor TOTH, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Václav RAČANSKÝ, Ivo NUTÁR and Dušan LAGO. KYPO - Kybernetický polygon (KYPO - Cybernetic Proving Ground). 2015.
    5. DOSTÁL, Otto, Otto DOSTÁL and Michal JAVORNÍK. Legislativní aspekty dalšího rozvoje v oblasti telemedicíny. In XI. mezinárodní kongres informačních technologií ve zdravotnictví. 2015.
    6. HUSÁK, Martin, Milan ČERMÁK, Tomáš JIRSÍK and Pavel ČELEDA. Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 389-396. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.35.
    7. HUSÁK, Martin, Petr VELAN and Jan VYKOPAL. Security Monitoring of HTTP Traffic Using Extended Flows. In 2015 10th International Conference on Availability, Reliability and Security. Toulouse: IEEE, 2015, p. 258-265. ISBN 978-1-4673-6590-1. Available from: https://dx.doi.org/10.1109/ARES.2015.42.
    8. ČEGAN, Jakub, Pavel ČELEDA, Tomáš JIRSÍK, Tomáš PLESNÍK, Michal PROCHÁZKA, Petr VELAN, Jan VYKOPAL, Martin VIZVÁRY, Milan ČERMÁK, Jan SOUKAL, Tomáš REBOK, Ivo NUTÁR and Dušan LAGO. Software pro konfiguraci a monitorování virtuálního prostředí KYPO (Software for configuration and monitoring of KYPO environment). 2015.
    9. PAVOL, Sokol, Kleinová LENKA and Martin HUSÁK. Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. Online. In EUROCON 2015 - International Conference on Computer as a Tool (EUROCON), IEEE. Salamanca, Spain: IEEE, 2015, p. 225-230. ISBN 978-1-4799-8569-2. Available from: https://dx.doi.org/10.1109/EUROCON.2015.7313713.
    10. JAVORNÍK, Michal, Otto DOSTÁL and Aleš ROČEK. Watermarking in Regional Medical Imaging. Online. In Valeri Mladenov, Elias Giacoumidis, Jinlong Wei. Proceedings of the 13th International Conference on Data Networks, Communications, Computers. Hungary: World Scientific and Engineering Academy and Society, 2015, p. 222-226. ISBN 978-1-61804-355-9.

    2014

    1. GHAFIR, Ibrahim, Martin HUSÁK and Václav PŘENOSIL. A Survey on Intrusion Detection and Prevention Systems. In Proceedings of student conference Zvůle 2014, IEEE/UREL. Zvůle, Czech Republic: Faculty of Electrical Engineering and Communication, Brno University of Technology, 2014, p. 10-14. ISBN 978-80-214-5005-9.
    2. JIRSÍK, Tomáš, Martin HUSÁK, Pavel ČELEDA and Zdenek EICHLER. Cloud-based Security Research Testbed: A DDoS Use Case. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-2. ISBN 978-1-4799-0912-4. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838272.
    3. ČERMÁK, Milan, Pavel ČELEDA and Jan VYKOPAL. Detection of DNS Traffic Anomalies in Large Networks. In Yvon Kermarrec. Advances in Communication Networking, Lecture Notes in Computer Science, Vol. 8846. Heidelberg: Springer International Publishing, 2014, p. 215-226. ISBN 978-3-319-13487-1. Available from: https://dx.doi.org/10.1007/978-3-319-13488-8_20.
    4. HUSÁK, Martin and Jakub ČEGAN. PhiGARo: Automatic Phishing Detection and Incident Response Framework. In Availability, Reliability and Security (ARES), 2014 Ninth International Conference on. Fribourg, Switzerland: IEEE, 2014, p. 295-302. ISBN 978-1-4799-4223-7. Available from: https://dx.doi.org/10.1109/ARES.2014.46.
    5. HUSÁK, Martin and Jan VYKOPAL. POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats. 2014.
    6. ROČEK, Aleš and Michal JAVORNÍK. Securing a Publicly Accessible Database of Medical Images Using Watermarking with Direct Diagnose Capability. Recent Advances in Computer Science. 2014, vol. 13, No 24, p. 79-86. ISSN 1790-5109.

    2013

    1. HUSÁK, Martin and Martin DRAŠAR. Flow-based Monitoring of Honeypots. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, p. 63-70. ISBN 978-80-7231-922-0.
    2. JAVORNÍK, Michal, Karel SLAVÍČEK and Otto DOSTÁL. Integration Concept in Regional Medical Imaging. In Joyce deng. Koncept integrace regionálního zpracování medicínských obrazových informací. Singapore: IACSIT Press, 2013, p. 26-31. ISBN 978-981-07-8391-4.
    3. HUSÁK, Martin and Jan SOUKAL. libanim - JavaScript animation library. 2013.
    4. SLAVÍČEK, Karel, Michal JAVORNÍK and Otto DOSTÁL. MEDIMED Shared Regional PACS Center. In Dongqing Wang. COMPUTED TOMOGRAPHY. 1st ed. Croatia: InTech, 2013, p. 43-62. ISBN 978-953-51-1102-3.
    5. HUSÁK, Martin and Martin VIZVÁRY. POSTER: Reflected attacks abusing honeypots. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York, NY, USA: ACM, 2013, p. 1449-1452. ISBN 978-1-4503-2477-9. Available from: https://dx.doi.org/10.1145/2508859.2512523.
    6. DRAŠAR, Martin, Martin HUSÁK, Jakub ČEGAN, Martin VIZVÁRY, Milan ČERMÁK and Tomáš PLESNÍK. Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií (System for automatic handling of reports from anomaly detection tools). 2013.

    2012

    1. SLAVÍČEK, Karel, Michal JAVORNÍK and Otto DOSTÁL. Extension of the Shared Regional PACS CenterMeDiMed to Smaller Healthcare Institutions. In Pascal Lorenz; Tibor Gyires; Iwona Pozniak-Koszalka. The Eleventh International Conference on Networks. Saint Gilles, Reunion Island: IARIA, 2012, p. 83-87. ISBN 978-1-61208-183-0.
    2. DOSTÁL, Otto, Karel SLAVÍČEK, Michal JAVORNÍK and Pavel BUDIŠ. ICT Systems Monitoring. Saarbrucken: LAMBERT Academic Publishing, 2012, 167 pp. ISBN 978-3-8473-7231-8.
    3. JAVORNÍK, Michal, Karel SLAVÍČEK and Otto DOSTÁL. Sharing of knowledge and resources in regional medical imaging. In 2nd International Conference on Biomedical Engineering & Assistive Technologies. Jalandhar: Dr. B. R. AMBEDKAR NATIONAL INSTITUTE OF TECHNOLOGY JALANDHAR – 144 011, India, 2012, p. 304-308. ISBN 978-81-925454-1-7.

    2011

    1. JAVORNÍK, Michal, Otto DOSTÁL and Karel SLAVÍČEK. Regional Medical Imaging System. World Academy of Science, Engineering and Technology. 2011, vol. 7, No 79, p. 389-393. ISSN 2010-376X.
    2. SLAVÍČEK, Karel, Otto DOSTÁL and Michal JAVORNÍK. Service Availability Quantification in Datacommunication Networks. In 34th International Conference on Telecommunication and Signal Processing. Budapest: IEEE, 2011, p. 57-61. ISBN 978-1-4577-1411-5.
    3. JAVORNÍK, Michal, Otto DOSTÁL and Karel SLAVÍČEK. System Supporting Effectiveness in Medical Imaging. In The 7th International Conference on Information Technology and Application. Sydney, Australia: 2011 ICITA, 2011, p. 162-166. ISBN 978-0-9803267-4-1.

    2010

    1. SLAVÍČEK, Karel, Otto DOSTÁL and Michal JAVORNÍK. Mathematical Processing of Event Logs. In New Information and Multimedia Technologies NIMT - 2010. Brno: VUT Brno, 2010, p. 58-61. ISBN 978-80-214-4126-2.
    2. SLAVÍČEK, Karel, Otto DOSTÁL and Michal JAVORNÍK. Mathematical processing of event logs from nerwork devices. In 2010 International Conference on Intelligent Network and Computing. Chengdu: IEEE, 2010, 5 pp. ISBN 978-1-4244-8271-9.
    3. SLAVÍČEK, Karel, Otto DOSTÁL, Michal JAVORNÍK and Miloš DRDLA. MEDIMED - Regional Centre for Medicine Image Data Processing. In Knowledge Discovery and Data Mining. 2010th ed. USA: IEEE Computer Society, 2010, p. 310 - 313. ISBN 978-0-7695-3923-2.
    4. DOSTÁL, Otto, Karel SLAVÍČEK and Michal JAVORNÍK. System for Effective Collaboration in the Area of Medical Imaging. In International Conference on Advanced Computer Science and Information Systems. Bali: Faculty of Computer Science, Universitas Indonesia, Depok, 16424, 2010, p. 207 - 212.
    5. JAVORNÍK, Michal and Otto DOSTÁL. Systém pro mezinárodní výměnu obrazových informací (System for the international exchange of image information). In Telemedicína Brno 2010. 2010.

    2009

    1. SLAVÍČEK, Karel, Otto DOSTÁL, Michal JAVORNÍK and Vladimír SCHINDLER. Current Development of MeDiMed the Regional Centre for Medicine Picture Data Processing. In International Conference NEW INFORMATION AND MULTIMEDIA TECHNOLOGIES. Brno: Brno University of Technology Faculty of Electrical Engineering and Communication, 2009, p. 58-61. ISBN 978-80-214-3708-1.
    2. HRTOŇOVÁ, Nina, Michal JAVORNÍK, Aleš ROČEK and Vladimír ZATLOUKAL. Environment for effective training in medical image diagnostics. In Research, Reflections and Innovations in Integrating ICT in Education. 1st ed. Badajoz, Spain: Formatex, 2009, p. 1221-1224. ISBN 978-84-692-1790-0.
    3. SLAVÍČEK, Karel, Michal JAVORNÍK and Otto DOSTÁL. Redundancy in Processing of Medical Image Data. In Fourth International Conference on Computer Sciences and Convergence Information Technology. Seoul, Korea: IEEE Computer Society Conference Publishing Services, 2009, p. 519-523. ISBN 978-1-4244-5244-6.
    4. HRTOŇOVÁ, Nina, Aleš ROČEK and Michal JAVORNÍK. Sharing the expert medical experience with medical students and specialists. In 10th INTERNATIONAL SCIENTIFIC CONFERENCE VIRTUAL UNIVERSITY VU'09. Bratislava: E-ACADEMIA SLOVACA N: O., 2009, 5 pp. ISBN 978-80-89316-11-3.
    5. DOSTÁL, Otto and Michal JAVORNÍK. Zkušenosti s provozem Radiologického komunikačního centra (Experience with the operation of radiological Communications Center). In Telemedicína Brno 2009. Brno: MSD, 2009, 5 pp. ISBN 978-80-7392-025-8.

    2008

    1. JAVORNÍK, Michal, Otto DOSTÁL, Karel SLAVÍČEK and Miloslav FILKA. Ict as Tool for Controlling of Market Relationship and Increasing of Economic Effectiveness in the Area of Processing of Medical Image Data. In New information and multimedia technologies NIMT- 2008. Brno: University of Technology, Brno, 2008, p. 83-85. ISBN 978-80-214-3708-1.
    2. JAVORNÍK, Michal, Otto DOSTÁL, Karel SLAVÍČEK and Pavel VENTRUBA. Knowledge Management and Cost - Effectiveness in the Area of Medical Image Data. In The 38th International Conference on Computers &Industrial Engineering. Beijing, China: University, Beijing,China, 2008, p. 883-887. ISBN 978-7-121-07437-0.
    3. SLAVÍČEK, Karel, Jaroslav LEDVINKA, Michal JAVORNÍK and Otto DOSTÁL. Mathematical Processing of Syslog Messages from Routers an Switches. In Information and Automation for Sustainability. Colombo: IEEE Catalog Number CFP0809B, 2008, p. 463-468. ISBN 978-1-4244-2900-4.
    4. SLAVÍČEK, Karel, Michal JAVORNÍK and Otto DOSTÁL. Technology backround of international collaboration on medicine multimedia knowledge base establishment. In Proceedings of the 2nd WSEAS International Conference on COMPUTER ENGINEERING and APPLICATIONS(CEA'08). Acapulco, Mexico, January 25-27, 2008: Published by WSEAS Press, 2008, p. 137-142, 5 pp. ISBN 978-960-6766-33-6.

    2007

    1. KŘÍSTEK, Jan, Petr KRUPA, Marek MECHL and Michal JAVORNÍK. DICOM-based teaching archive: the Czech MeDiMed project. In International Journal of Computer Assisted Radiology and Surgery. 2007/2. Berlin, Německo: Springer, 2007, 1 pp. ISSN 1861-6410.
    2. RAČANSKÁ, Eva, Otto DOSTÁL, Michal JAVORNÍK, Pavel VENTRUBA and Martin PETRENKO. Digital tutorial archive. In Proceedings of The 3rd IASTED International Conference on Telehealth 2007. Anaheim/Calgary/Zurich: ACTA Press, 2007, p. 77-81. ISBN 978-0-88986-668-3.
    3. RAČANSKÁ, Eva, Martin PETRENKO, Pavel VENTRUBA, Otto DOSTÁL and Michal JAVORNÍK. Digitální obrazový archiv (Digital tutorial archive). Praktická gynekologie. Brno: Medica Healthworld, 2007, vol. 2007, No 4, p. 179-183. ISSN 1211-6645.
    4. JAVORNÍK, Michal and Otto DOSTÁL. Improving Education and Cost - Effectiveness in Medical Imaging. IT@Networking Communications. Brussels: Christin Marolt, 2007, 1/2007, No 2, p. 14-15. ISSN 1784-0716.
    5. DOSTÁL, Otto, Michal JAVORNÍK, Karel SLAVÍČEK and Pavel VENTRUBA. Integration of Telemedicine Activities in the Czech Republic. In 4th International Conference on Innovations in Information Technology, Innovations '07. IEEE. Dubai, United Arab Emirates: UAE University, 2007, p. 532-536. ISBN 978-1-4244-1840-4.
    6. KRUPA, Petr, Michal JAVORNÍK and Otto DOSTÁL. Opportunities of Todays ICT Technologies for Support of Education and Training in Radiology. In The Sixth International Conference on Networking (ICN 2007). Sainte - Luce, Martinique, France: IEEE computer society, 2007, p. 57-62. ISBN 0-7695-2805-8.
    7. RAČANSKÁ, Eva, Martin PETRENKO, Pavel VENTRUBA, Otto DOSTÁL and Michal JAVORNÍK. PACS v gynekologii (PACS in gynecology). In Edukační sborník XXXI. Brněnské onkologické dny. Brno: Masarykův onkologický ústav, 2007, p. 60. ISBN 978-978-8679-30-1.
    8. DOSTÁL, Otto, Michal JAVORNÍK, Martin PETRENKO, Aleš ROČEK and Karel SLAVÍČEK. Projekt MEDIMED - regionální archiv medicínských obrazových dat (The MEDIMED project - regional archive of medicine multimedia data). In Širokopásmové sítě a jejich aplikace. Olomouc: CESNET,z.s.p.o.a UP Olomouc, 2007, p. 110-114. ISBN 978-80-244-1687-8.
    9. DOSTÁL, Otto and Michal JAVORNÍK. Regionání řešení pro podporu medicínských obrazových informací (Complex support of medical image information processing). In Telemedicína Brno 2007. Brno: MSD, 2007, p. 95-119. ISBN 978-80-86633-94-7.
    10. KŘÍSTEK, Jan, Marek MECHL, Michal JAVORNÍK, Ladislav DUŠEK and Petr KRUPA. Tříleté fungování výukové databáze MEDIMED: praktické aspekty. In Sborník přednášek Telemedicína Brno 2007. Brno, 2007, p. CD nosič. ISBN 978-80-86633-94-7.
    11. KRUPA, Petr, Pavel KRŠEK, Michal JAVORNÍK, Otto DOSTÁL, Robert SRNEC, Pavel USVALD, Pavel PROKS, Helga KECOVÁ, Evzen AMLER, Josef JANČÁŘ, Petr GÁL, Ladislav PLÁNKA and Alois NEČAS. Use of 3D geometry modelling of osteochondrosis-like iatrogenic lesions as a template for press and fit scaffold seeded with mesenchymal stem cells. Physiological Research. Praha: Institute of Physiology, Academy of Sci, 2007, vol. 56, Suppl 1, p. 107-114. ISSN 0862-8408.

    2006

    1. DOSTÁL, Otto, Michal JAVORNÍK and Pavel VENTRUBA. Collaborative environment supporting research and education in the area of medical image information. International Journal of Computer Assisted Radiology and Surgery. Deutschland: Springer, 2006, vol. 2006, No 1, p. 98-100. ISSN 1861-6410.
    2. DOSTÁL, Otto, Michal JAVORNÍK and Karel SLAVÍČEK. Opportunity of Current ICT in the Processing of Medical Image Information. In In Proceedings of the International Conference International Association of Science and Technology for Development. Mexico: EASTED. Mexico: The International Association of Science and Technology for Development, 2006, p. 193-195. ISBN 0-88986-545-0.
    3. DOSTÁL, Otto, Karel SLAVÍČEK and Michal JAVORNÍK. PKI Utilisation for PACS Users Authentication. In ICN 2006. Mauritius: IEEE Computer Society, 2006, p. 151-156. ISBN 0-7695-2552-0.
    4. KRUPA, Petr, Jan KŘÍSTEK, Pavel ANDRES, Otto DOSTÁL and Michal JAVORNÍK. Výukový PACS a jeho přínos ve výuce na LF MU (Teaching PACS archive and its role at the Medical Faculty of Masaryk University). In RITM report II. Brno: Masarykova Univerzita Brno, 2006, p. 77. ISBN 80-210-4213-3.
    5. JAVORNÍK, Michal, Otto DOSTÁL and Pavel ANDRES. Využití možností digitálního zpracování obrazových informací pro zvýšení kvality, efektivity a konkurenceschopnosti zdravotnických zarízení. In Sborník příspevků Strategické řízení nemocnic a řízení kvality péče. 2006th ed. Brno: Brno International Business School, 2006, 1 pp.

    2005

    1. DOSTÁL, Otto, Michal JAVORNÍK, Karel SLAVÍČEK and Miloslav FILKA. Communication Technology As a Tool to increase Efficiency in Medical Care. In Telecommunications and signal processing TSP 2005. Brno: VUT Brno, 2005, p. 179-184. ISBN 80-214-2972-0.
    2. DOSTÁL, Otto and Michal JAVORNÍK. MeDiMed: a new platform for multimedial cooperation in medicine. Convergence : globálně o telekomunikacích. Praha: CNG s. r. o., 2005, vol. 2005, No 11, p. 16-17. ISSN 1214-5785.
    3. DOSTÁL, Otto and Michal JAVORNÍK. Metropolitan Digital Imaging System in Medicine. Parliament Magazine. London: Dod's Parliamentary Communications, 2005, vol. 210, No 2005, p. 64.
    4. DOSTÁL, Otto and Michal JAVORNÍK. Projekt MeDiMed (MeDiMed project). Zpravodaj ÚVT MU : bulletin pro zájemce o výpočetní techniku na Masarykově univerzitě. Brno: MU v Brně, 2005, roč. XVI, No 2, p. 8-11. ISSN 1212-0901.
    5. DOSTÁL, Otto, Michal JAVORNÍK, Martin PETRENKO and Karel SLAVÍČEK. Projekt MEDIMED - metropolitní PACS archiv v Brně (Project MEDIMED - metropolitan PACS archive in Brno). In Širokopásmové sítě a jejich nové aplikace. Olomouc: UP Olomouc, 2005, p. 138-143. ISBN 80-244-1035-4.
    6. DOSTÁL, Otto and Michal JAVORNÍK. Regional educational and research centre for processing of medical image information. In Computer Assisted Radiology and Surgery. Berlin: Elsevier B.V., Amsterdam, 2005, p. 911-915. ISBN 0-444-51872-X.
    7. DOSTÁL, Otto and Michal JAVORNÍK. Regionální řešení zpracovávání medicínských obrazových informací (Regional solution for picture archiving and communication systems). In EurOpen. Plzeň: Česká společnost uživatelů otevřených systémů EurOpen, 2005, p. 125-130. ISBN 80-86583-09-0.
    8. JAVORNÍK, Michal and Otto DOSTÁL. Výuka v rámci projektu MeDiMed (Education in the frame of project MeDiMed). In Mezinárodní kongres Telemedicína Brno 2005. Brno: Radiologická společnost ČLS JEP, 2005, p. 27.
    9. JAVORNÍK, Michal, Otto DOSTÁL, Pavel ANDRES, Ladislav DUŠEK and Roman ŠMÍD. Výukový PACS na LF MU (Educational PACS operated by LF MU). In BOD XXIX. Brno: Masarykův onkologický ústav v Brně, 2005, p. 348-349. ISBN 80-86793-05-2.

    2004

    1. DOSTÁL, Otto, Michal JAVORNÍK, Karel SLAVÍČEK, Martin PETRENKO and Pavel ANDRES. Developement of Regional Centre for Medical Multimedia Data Processing. In Communications, Internet, and Information Technology. St. Thomas (USA): ACTA Press, 2004, p. 632-636. ISBN 0-88986-445-4.
    2. DOSTÁL, Otto, Michal JAVORNÍK and Karel SLAVÍČEK. Management of Interhospital Processing of Medical Multimedia Data. In Contemporary Trends in Top Management Education: How to Accomodate Demand and Suplply. Brno: B.I.B.S.,a.s., 2004, p. 70. ISBN 80-86575-74-8.
    3. SCHMIDT, Michal, Otto DOSTÁL and Michal JAVORNÍK. MEDIMED - Regional PACS Centre in Brno. In EuroPACS - MIR 2004. Trieste-Italy: University of Trieste, 2004, p. 463 -465. ISBN 88-8303-150-4.

    2003

    1. DOSTÁL, Otto, Michal JAVORNÍK, Karel SLAVÍČEK and Martin PETRENKO. MEDIMED-Regional Centre for Archiving and Interhospital Exchange of Medicine Multimedia Data. In Proceedings of the Second IASTED International Conference on Communications, Internet, and Information Technology. Scottsdale, Arizona, USA: International Association of Science and Technology for Development- IASTED, 2003, p. 609-614. ISBN 0-88986-398-9.

    2002

    1. DOSTÁL, Otto and Michal JAVORNÍK. Metropolitní archiv medicínských obrazových informací. Zpravodaj ÚVT MU : bulletin pro zájemce o výpočetní techniku na Masarykově univerzitě. Brno: MU v Brně, 2002, XII, No 5, p. 14-17. ISSN 1212-0901.
Display details
Displayed: 26/12/2024 15:42