Filter publications

    2024

    1. RUMAN, Ádám, Martin DRAŠAR, Lukáš SADLEK, Shanchieh Jay YANG and Pavel ČELEDA. Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification. Online. In ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security. New York, United States: Association for Computing Machinery, 2024, p. 1-11. ISBN 979-8-4007-1718-5. Available from: https://dx.doi.org/10.1145/3664476.3664523.
    2. DRAŠAR, Martin, Ádám RUMAN, Pavel ČELEDA and Yang SCHANCHIEH. The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments. Online. In Sokratis Katsikas et al. ESORICS 2023: Computer Security. ESORICS 2023 International Workshops. Neuveden: Springer Nature Switzerland AG, 2024, p. 738-749. ISBN 978-3-031-54128-5. Available from: https://dx.doi.org/10.1007/978-3-031-54129-2_43.

    2023

    1. DRAŠAR, Martin. Perception of the Environment. Online. In Kott, Alexander. Autonomous Intelligent Cyber Defense Agent (AICA): A Comprehensive Guide. 1st ed. Cham: Springer International Publishing, 2023, p. 47-61. Advances in Information Security, 87. ISBN 978-3-031-29269-9. Available from: https://dx.doi.org/10.1007/978-3-031-29269-9_3.
    2. RUSŇÁK, Vít and Martin DRAŠAR. Towards a Visual Analytics Workflow for Cybersecurity Simulations. Online. In Christophe Hurter, Helen Purchase, Kadi Bouatouch. Proceedings of VISIGRAPP2023 - Volume3: IVAPP. To appear. Lisbon, Portugal: SCITEPRESS – Science and Technology Publications, Lda., 2023, p. 179-186. ISBN 978-989-758-634-7. Available from: https://dx.doi.org/10.5220/0011695000003417.

    2022

    1. DRAŠAR, Martin, Ádám RUMAN and Vít RUSŇÁK. SW pro dynamickou verifikaci bezpečnostních opatření (SW for dynamic verification of security measures). 2022.

    2020

    1. KOTT, Alexander, Paul THERON, Luigi MANCINI, Edlira DUSHKU, Agostino PANICO, Martin DRAŠAR, Benoit LEBLANC, Paul LOSIEWICZ, Alessandro GUARINO, Mauno PIHELGAS and Krzysztof RZADCA. An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology. THOUSAND OAKS: SAGE PUBLICATIONS INC, 2020, vol. 17, No 1, p. 51-54. ISSN 1548-5129. Available from: https://dx.doi.org/10.1177/1548512919886163.
    2. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Daniel TOVARŇÁK, Pavel ZEZULA, Martin MACÁK, Matúš GUOTH, Matej BABEJ, Dávid BRILLA and Martin KAŽIMÍR. ANALYZA – Datový sklad (ANALYZA – Dara Warehouse). 2020.
    3. REBOK, Tomáš, Michal BATKO, Milan ČERMÁK, Martin DRAŠAR, Jarešová MIROSLAVA, Barbora KOZLÍKOVÁ, Kristína ZÁKOPČANOVÁ, Pavel ZEZULA, Katarína FURMANOVÁ, Marko ŘEHÁČEK, Jozef BÁTRNA and Daniel PLAKINGER. ANALYZA – Vizualizační komponenta – Visilant (ANALYZA – Visualization Component – Visilant). 2020.
    4. THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysztof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI and Fabio DE GASPARI. Reference Architecture of an Autonomous Agent for Cyber Defense of Complex Military Systems. Online. In Sushil Jajodia, George Cybenko, V.S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael Wellman. Adaptive Autonomous Secure Cyber Systems. Cham: Springer International Publishing, 2020, p. 1-21. ISBN 978-3-030-33432-1. Available from: https://dx.doi.org/10.1007/978-3-030-33432-1_1.
    5. DRAŠAR, Martin, Stephen MOSKAL, Shanchieh Jay YANG and Pavol ZAŤKO. Session-level Adversary Intent-Driven Cyberattack Simulator. Online. In Dusan Maga, Jiri Haek. DS-RT '20: Proceedings of the IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications. Praha: IEEE, 2020, p. 7-15. ISBN 978-1-7281-7343-6.

    2019

    1. DRAŠAR, Martin, Ádám RUMAN, Adam SKRÁŠEK and Matúš GALBA. CEP-Server: Software pro vyhodnocování a dotazování komplexních událostí v doméně ITOA (CEP-Server: Software for evaluation and querying of complex events in the ITOA domain). 2019.
    2. DRAŠAR, Martin and Tomáš JIRSÍK. IT Operations Analytics: Root Cause Analysis via Complex Event Processing. Online. In 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Washington DC, USA: IEEE, 2019, p. 741-742. ISBN 978-1-72810-618-2.
    3. ČELEDA, Pavel, Jakub ČEGAN, Martin DRAŠAR, Ivo NUTÁR, Jiří RÁJA, Tomáš REBOK, Andrej TOMČI and Daniel TOVARŇÁK. Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury (Tools for verification of SW/HW security and simulation of attacks on critical information infrastructure). 2019.

    2018

    1. KOTT, Alexander, Paul THERÓN, Luigi V MANCINI, Martin DRAŠAR, Edlira DUSHKU, Günther HEIKO, Markus KONT, Benoît LEBLANC, Agostino PANICO, Mauno PIHELGAS and Krzysztof RZADCA. Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense. 2018.
    2. THERON, Paul, Alexander KOTT, Martin DRAŠAR, Krzysytof RZADCA, Benoît LEBLANC, Mauno PIHELGAS, Luigi MANCINI and Agostino PANICO. Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture. Online. In 2018 International Conference on Military Communications and Information Systems (ICMCIS). Warsaw, Poland: IEEE, 2018, p. 1-9. ISBN 978-1-5386-4559-8. Available from: https://dx.doi.org/10.1109/ICMCIS.2018.8398730.
    3. ČERMÁK, Milan, Tomáš JIRSÍK, Petr VELAN, Jana KOMÁRKOVÁ, Stanislav ŠPAČEK, Martin DRAŠAR and Tomáš PLESNÍK. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. Online. In 2018 Network Traffic Measurement and Analysis Conference (TMA). Vienna, Austria: IEEE, 2018, p. 1-8. ISBN 978-3-903176-09-6. Available from: https://dx.doi.org/10.23919/TMA.2018.8506498.

    2017

    1. ŠPAČEK, Stanislav, Pavel ČELEDA, Martin DRAŠAR and Martin VIZVÁRY. Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. SPI 2017 - Security and Protection of Information 2017. Brno: Univerzita obrany, 2017, p. 143-158. ISBN 978-80-7231-414-0.
    2. DRAŠAR, Martin and Jana KOMÁRKOVÁ. Estimating Parameters of Target's Detection Methods. Online. In Michal Pechoucek, Alexander Kott. Proceedings of the NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience. Praha: CEUR Workshop Proceedings, 2017, p. 84-89. ISSN 1613-0073.
    3. MEDKOVÁ, Jana, Martin HUSÁK and Martin DRAŠAR. Network Defence Strategy Evaluation: Simulation vs. Live Network. Online. In Prosper Chemouil, Edmundo Monteiro, Marinos Charalambides, Edmundo Madeira, Paulo Simões, Stefano Secci, Luciano Paschoal Gaspary, Carlos Raniery P. dos Santos. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). Lisbon: IEEE, 2017, p. 81-88. ISBN 978-3-901882-89-0. Available from: https://dx.doi.org/10.23919/INM.2017.7987267.
    4. DRAŠAR, Martin and Pavel MINAŘÍK. Overview and Evaluation of Methods and Tools for Complex Event Processing. 2017, 11 pp.

    2015

    1. VELAN, Petr, Milan ČERMÁK, Pavel ČELEDA and Martin DRAŠAR. A Survey of Methods for Encrypted Traffic Classification and Analysis. International Journal of Network Management. John Wiley & Sons, Ltd., 2015, vol. 25, No 5, p. 355-374. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1901.

    2014

    1. KOUŘIL, Daniel, Tomáš REBOK, Tomáš JIRSÍK, Jakub ČEGAN, Martin DRAŠAR, Martin VIZVÁRY and Jan VYKOPAL. Cloud-based Testbed for Simulation of Cyber Attacks. In Hanan Lutfiyya and Piotr Cholda. Proceedings of the Network Operations and Management Symposium (NOMS 2014). Krakow, Poland: IEEE Xplore Digital Library, 2014, p. 1-6. ISBN 978-1-4799-0913-1. Available from: https://dx.doi.org/10.1109/NOMS.2014.6838298.
    2. DRAŠAR, Martin, Tomáš JIRSÍK and Martin VIZVÁRY. Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches. In Sperotto, Anna and Doyen, Guillaume and Latré, Steven and Charalambides, Marinos and Stiller, Burkhard. Monitoring and Securing Virtualized Networks and Services, Lecture Notes in Computer Science, Vol. 8508. Berlin: Springer Berlin Heidelberg, 2014, p. 160-172. ISBN 978-3-662-43861-9. Available from: https://dx.doi.org/10.1007/978-3-662-43862-6_19.
    3. DRAŠAR, Martin, Martin VIZVÁRY and Jan VYKOPAL. Similarity as a central approach to flow-based anomaly detection. International Journal of Network Management. John Wiley & Sons, Ltd., 2014, vol. 24, No 4, p. 318-336. ISSN 1055-7148. Available from: https://dx.doi.org/10.1002/nem.1867.
    4. ČELEDA, Pavel, Iva KREJČÍ and Jan VYKOPAL. 8th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014). 2014.

    2013

    1. VYKOPAL, Jan, Martin DRAŠAR and Philipp WINTER. Flow-based Brute-force Attack Detection. In Markus Zeilinger, Peter Schoo, Eckehard Hermann. Advances in IT Early Warning. Stuttgart: Fraunhofer Verlag, 2013, p. 41-51. ISBN 978-3-8396-0474-8.
    2. HUSÁK, Martin and Martin DRAŠAR. Flow-based Monitoring of Honeypots. In Jaroslav Dočkal, Milan Jirsa, Josef Kaderka. Security and Protection of Information 2013. Brno: Univerzita obrany, 2013, p. 63-70. ISBN 978-80-7231-922-0.
    3. ČEGAN, Jakub, Tomáš ŠÍMA, Jan SOUKAL and Martin DRAŠAR. PhiGARo HTTP(S) – tool for phishing incident processing. 2013.
    4. DRAŠAR, Martin. Protocol-independent Detection of Dictionary Attacks. In Thomas Bauschert. Advances in Communication Networking. Berlin: Springer Berlin Heidelberg, 2013, p. 304-309. ISBN 978-3-642-40551-8. Available from: https://dx.doi.org/10.1007/978-3-642-40552-5_30.
    5. DRAŠAR, Martin, Martin HUSÁK, Jakub ČEGAN, Martin VIZVÁRY, Milan ČERMÁK and Tomáš PLESNÍK. Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií (System for automatic handling of reports from anomaly detection tools). 2013.

    2012

    1. ČEGAN, Jakub, Jan SOUKAL, Martin DRAŠAR and Jan VYKOPAL. PhiGARo – tool for phishing incident processing. 2012.
Display details
Displayed: 26/12/2024 05:01