Přeskočit na horní lištu
Přeskočit na hlavičku
Přeskočit na obsah
Přeskočit na patičku
EN
>
Publikace
>
Vyhledávání publikací
Vyhledávání publikací
Pokročilé vyhledávání
Repozitář
Vybrané publikace/výsledky
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement (2013)
An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis (2013)
Time Series Solver (2013)
Cloud-based Testbed for Simulation of Cyber Attacks (2014)
Cloud-based Security Research Testbed: A DDoS Use Case (2014)
Enhancing Network Security: Host Trustworthiness Estimation (2014)
Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches (2014)
Identifying Operating System Using Flow-based Traffic Fingerprinting (2014)
Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting (2015)
KYPO - Kybernetický polygon (2015)
Software pro konfiguraci a monitorování virtuálního prostředí KYPO (2015)
Software pro vizualizaci virtuálního prostředí KYPO (2015)
HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting (2016)
Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark (2016)
Network Traffic Characterisation Using Flow-Based Statistics (2016)
On Information Value of Top N Statistics (2016)
Stream4Flow: Software for mining and analysis of the large volumes of network traffic (2016)
Protection of personal data in security alert sharing platforms (2017)
Toward Stream-Based IP Flow Analysis (2017)
Passive OS Fingerprinting Methods in the Jungle of Wireless Networks (2018)
Systém pro sběr, uchování a analýzu síťových dat velkého rozsahu (2017)
Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets (2018)
Toward Real-time Network-wide Cyber Situational Awareness (2018)
Stream4Flow: Real-time IP Flow Host Monitoring using Apache Spark (2018)
Reflective Diary for Professional Development of Novice Teachers (2019)
Towards Learning Analytics in Cybersecurity Capture the Flag Games (2019)
Analyzing User Interactions with Cybersecurity Games (2019)
Real-time Pattern Detection in IP Flow Data using Apache Spark (2019)
Quality of Service Forecasting with LSTM Neural Network (2019)
Time Series Analyzer: Software for analysis of performance time series (2018)
Current Issues of Malicious Domains Blocking (2019)
IT Operations Analytics: Root Cause Analysis via Complex Event Processing (2019)
GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform (2019)
Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study (2019)
Behavior-Aware Network Segmentation using IP Flows (2019)
KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems (2020)
What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences (2020)
Benefits and Pitfalls of Using Capture The Flag Games in University Courses (2020)
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (2020)
Software pro simulaci obecných i kritických informačních infrastruktur (2019)
Software pro detekci a analýzu napadení KII (2019)
Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training (2021)
On the Impact of Flow Monitoring Configuration (2020)
Teaching Lab: Training Novice Computer Science Teachers (2020)
Cyber Situation Awareness via IP Flow Monitoring (2020)
SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security (2020)
How Does a Student-Centered Course on Communication and Professional Skills Impact Students in the Long Run? (2020)
Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version) (2020)
The Stack: Unplugged Activities for Teaching Computer Science (2021)
Toward Guidelines for Designing Cybersecurity Serious Games (2021)
Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges (2021)
Cyberspace 2020 (2020)
Host Behavior in Computer Network: One-Year Study (2021)
Michal Kolmaš: National Identity and Japanese Revisionism (2021)
Lex Rosetta: Transfer of Predictive Models Across Languages, Jurisdictions, and Legal Domains (2021)
GRANEF: Utilization of a Graph Database for Network Forensics (2021)
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training (2021)
Reinforcing Cybersecurity Hands-on Training With Adaptive Learning (2021)
Scalable Learning Environments for Teaching Cybersecurity Hands-on (2021)
Even if users do not read security directives, their behavior is not so catastrophic (2022)
Dataset of Shell Commands Used by Participants of Hands-on Cybersecurity Training (2021)
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises (2022)
Topic Modelling of Czech Supreme Court Decisions: Evaluation of Legal Experts (2021)
Vyhledávání české judikatury v praxi: potřeby uživatele vs. aktuální výzkumné metody (2021)
Proporcionalita krizových opatření omezujících svobodu pohybu (2021)
How Do Users Chain Email Accounts Together? (2021)
Preventing Cheating in Hands-on Lab Assignments (2022)
Cyberspace 2021 (2021)
Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering (2022)
Otevřená dílna v knihovně: podpora kreativity, digitálních kompetencí a komunity (2021)
Vizuálně-analytická konzole pro ICS (2021)
Prototypová implementace nástroje pro vizuální analýzu časově orientovaných dat (2021)
Virtualizované prostředí pro trénink CSIRT týmu (2021)
Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training (2022)
'Releasing the Hounds?' Disruption of the Ransomware Ecosystem Through Offensive Cyber Operations (2022)
Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance (2022)
ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence (2022)
Usability Insights from Establishing TLS Connections (2022)
Vliv technologických nástrojů na ústavnost krizových opatření omezujících svobodu pohybu (2022)
Cyberspace 2022 (2022)
Detection of Malicious Code in SSH programs. (2022)
Přehled aktuální judikatury II/2022 (2022)
Omezení pohybu v souvislosti s řešením krizí způsobených biologickými agens a toxiny (doporučení) (2022)
České právo a informační technologie 2022 (2022)
Software pro podporu orchestrace bezpečnosti a řízení životního cyklu hrozeb (2022)
SW pro ovládání nástrojů ofenzivní bezpečnosti (2022)
SW pro statickou verifikaci bezpečnostních opatření (2022)
SW pro dynamickou verifikaci bezpečnostních opatření (2022)
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms (2023)
Jak na vizuální úpravu e-learningového kurzu? (2022)
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. (2023)
Investigating Installers of Security Software in 20 Countries: Individual-and Country-Level Differences (2022)
Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform (2023)
Odebrat vše z výběru
Operace s vybranými výsledky
Export a tisk
Seznam vybraných záznamů
Další aplikace
Publikace
Informační systém