Skip to top bar
Skip to header
Skip to content
Skip to footer
CS
>
Publications
>
Publication Records - Search
Publication Records - Search
Advanced search
Repository
Selected publication/outcome records
Počítačová studovna MU zahájila provoz (2000)
Computation of Recursive Programs (1978)
Computation Rules Using Memory I (1986)
Flow-based Brute-force Attack Detection (2013)
PhiGARo – tool for phishing incident processing (2012)
Flow Data Collection in Large Scale Networks (2013)
SimFlow - a similarity-based detection of brute-force attacks (2013)
Large-Scale Geolocation for NetFlow (2013)
Flow-based detection of RDP brute-force attacks (2013)
Flow-based Monitoring of Honeypots (2013)
Emerging Management Mechanisms for the Future Internet, 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2013 (2013)
WARDEN: realtime sharing of detected threats between CSIRT teams (2013)
Phishing at your own risk (2011)
Network security monitoring working group (2013)
Incident response automation in the Masaryk University network (2013)
Monitoring, Detection and Reporting of Security Incidents in CESNET NREN (2013)
Practical experience with IPFIX flow collectors (2013)
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement (2013)
Protocol-independent Detection of Dictionary Attacks (2013)
E-government v České republice: právní a technologické aspekty (2013)
POSTER: Reflected attacks abusing honeypots (2013)
Důvody vzniku Zákona o kybernetické bezpečnoti (2013)
An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis (2013)
DNSAnomDet (2014)
Time Series Solver (2013)
Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet (2013)
Fully-automated Occlusion-insensitive Norway Spruce Tree Reconstructions from 3D Point Cloud Data [poster] (2013)
Automatic Tree Reconstruction from its Laser Scan [poster] (2013)
Automatic reconstruction of Norway spruce tree models from LiDAR data (2013)
Three-dimensional Tree Reconstructions from Terrestrial LiDAR Scans (2013)
European ICT Law 2013 Texts, Cases, Materials (2013)
Perun - user and resources management system (2013)
RemSig - Bezpečné úložiště digitálních certifikátů (2013)
Cybernetic Proving Ground (2013)
FlowMon - TCP Input Filter Plugin (2013)
ExternalDNS (2013)
PhiGARo HTTP(S) – tool for phishing incident processing (2013)
libanim - JavaScript animation library (2013)
Systém pro automatizaci zpracování hlášení z nástrojů pro detekci anomálií (2013)
trendMonitoring (2013)
Cloud-based Testbed for Simulation of Cyber Attacks (2014)
Cloud-based Security Research Testbed: A DDoS Use Case (2014)
Enhancing Network Security: Host Trustworthiness Estimation (2014)
Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX (2014)
Next Generation Application-Aware Flow Monitoring (2014)
Vulnerability analysis methods for road networks (2014)
POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats (2014)
Future of DDoS Attacks Mitigation in Software Defined Networks (2014)
e-Sbírka a e-Legislativa (2014)
Jazyková analýza a autorské právo (2014)
Předávání informací mezi CERT a policií (2014)
Aktuální otázky kyberkriminality II. (2014)
Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches (2014)
8th International Conference on Autonomous Infrastructure, Management and Security (AIMS 2014) (2014)
Similarity as a central approach to flow-based anomaly detection (2014)
Perun – Modern Approach for User and Service Management (2014)
Continuous Queries over Distributed Streams of Heterogeneous Monitoring Data in Cloud Datacenters (2014)
Identifying Operating System Using Flow-based Traffic Fingerprinting (2014)
Detection of DNS Traffic Anomalies in Large Networks (2014)
PhiGARo: Automatic Phishing Detection and Incident Response Framework (2014)
Intellectual property on the internet - filesharing and legal protection of the software (2014)
Autorský zákon (2014)
A Survey on Intrusion Detection and Prevention Systems (2014)
Cyber security in the Czech republic (2014)
European ICT Law 2014 Texts, Cases, Materials (2014)
Uspořádání vícecestného dvouparametrického spektrometrického systému (2015)
Užívání znaků Masarykovy univerzity (2014)
Cooperation between CERT and LEA in the Czech republic (2014)
Computer applications systems and networks for medical education : MEFANET: Czech and Slovak Medical Faculties Network (2014)
Uchovávání provozních údajů pro účely vyúčtování poskytnutých služeb elektronických komunikací (2013)
Cybernetic Proving Ground - Cloud-based Testbed for Simulation of Cyber Attacks (2014)
Data advokátů v cloudu (2015)
Rozvoj detekčních schopností a platformy sonda/kolektor (2014)
Deploying Honeypots and Honeynets: Issue of Privacy (2015)
Network-based HTTPS Client Identification Using SSL/TLS Fingerprinting (2015)
Lessons Learned from KYPO – Cyber Exercise & Research Platform Project (2015)
Security Monitoring of HTTP Traffic Using Extended Flows (2015)
High-Density Network Flow Monitoring (2015)
Hardware Accelerated Flow Measurement of 100G Ethernet (2015)
A Survey of Methods for Encrypted Traffic Classification and Analysis (2015)
European ICT Law 2015 Texts, Cases, Materials (2015)
Tor-based Malware and Tor Connection Detection (2014)
KYPO - Kybernetický polygon (2015)
Software pro konfiguraci a monitorování virtuálního prostředí KYPO (2015)
Software pro vizualizaci virtuálního prostředí KYPO (2015)
KYPO – A Platform for Cyber Defence Exercises (2015)
Celkové závěry a doporučení k projektu přípravných rešerší k AMM (2015)
HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting (2016)
A Performance Benchmark of NetFlow Data Analysis on Distributed Stream Processing Systems (2016)
Legalita penetračního testování (2015)
Analýza SSL provozu (2015)
Electronic legislation in the Czech Republic (2015)
Trestněprávní souvislosti bezpečnostních incidentů (2015)
Kybernetická bezpečnost v ČR (2015)
Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark (2016)
Elektronické důkazní prostředky (2015)
Data jako důkaz v trestním řízení (2015)
Dokazování odposlechem (2015)
Trestní odpovědnost při zajišťování kybernetické bezpečnosti (2015)
Detekce zranitelností a útoků pomocí NetFlow dat, validace zranitelností na systému FlowMon (2015)
Detecting Advanced Network Threats Using a Similarity Search (2016)
Break your network. Responsibly. (2015)
Network Traffic Characterisation Using Flow-Based Statistics (2016)
Elektronické důkazy v trestním řízení (2015)
Elektronické důkazy v trestním řízení (2015)
Network Defence Using Attacker-Defender Interaction Modelling (2016)
On the Design of Security Games: From Frustrating to Engaging Learning (2016)
On Information Value of Top N Statistics (2016)
Představení dokumentů vytvořených v rámci projektu InovaCOM (2013)
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization (2015)
Exchanging Security Events: Which And How Many Alerts Can We Aggregate? (2017)
Finding Exercise Equilibrium: How to Support the Game Balance at the Very Beginning? (2017)
Honeypot Testbed for Network Defence Strategy Evaluation (2017)
Analyzing an Off-the-Shelf Surveillance Software: Hacking Team Case Study (2017)
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts (2017)
Towards a Unified Data Storage and Generic Visualizations in Cyber Ranges (2017)
Situational Awareness: Detecting Critical Dependencies and Devices in a Network (2017)
Visual Analytics for Network Security and Critical Infrastructures (2017)
Toward Stream-Based IP Flow Analysis (2017)
KYPO Cyber Range: Design and Use Cases (2017)
Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range (2017)
Timely Feedback in Unstructured Cybersecurity Exercises (2018)
Challenges Arising from Prerequisite Testing in Cybersecurity Games (2018)
Passive OS Fingerprinting Methods in the Jungle of Wireless Networks (2018)
Passive OS Fingerprinting Prototype Demonstration (2018)
Community Based Platform for Vulnerability Categorization (2018)
Enhancing Cybersecurity Skills by Creating Serious Games (2018)
Towards Predicting Cyber Attacks Using Information Exchange and Data Mining (2018)
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors (2018)
Machine Learning Fingerprinting Methods in Cyber Security Domain: Which one to Use? (2018)
CRUSOE: Data Model for Cyber Situation Awareness (2018)
Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets (2018)
Toward Real-time Network-wide Cyber Situational Awareness (2018)
Evaluation of Cyber Defense Exercises Using Visual Analytics Process (2018)
Gathering Insights from Teenagers' Hacking Experience with Authentic Cybersecurity Tools (2018)
Data-Driven Intelligence for Characterizing Internet-scale IoT Exploitations (2018)
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security (2019)
Common ELIXIR Service for Researcher Authentication and Authorisation (2018)
Towards Learning Analytics in Cybersecurity Capture the Flag Games (2019)
Real-time Pattern Detection in IP Flow Data using Apache Spark (2019)
Quality of Service Forecasting with LSTM Neural Network (2019)
Threat Detection Through Correlation of Network Flows and Logs (2018)
Current Issues of Malicious Domains Blocking (2019)
DNS Firewall Data Visualization (2019)
Enabling SSH Protocol Visibility in Flow Monitoring (2019)
Application-Aware Flow Monitoring (2019)
IT Operations Analytics: Root Cause Analysis via Complex Event Processing (2019)
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture (2018)
Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense (2018)
Informační bezpečnost žáků základních škol. Lekce v knihovnách (2019)
Informační bezpečnost žáků základních škol. Lekce v knihovnách (2019)
Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study (2019)
Evolution of SSL/TLS Indicators and Warnings in Web Browsers (2020)
Informační bezpečnost žáků základních škol : lekce v knihovnách (2019)
Připravujeme copyright asistenty? (2019)
Copyright Literacy of LIS Students in the Czech Republic (2019)
Information Literacy of Masaryk University Students and Evaluation of Campus-Wide Course (2019)
Software pro simulaci obecných i kritických informačních infrastruktur (2019)
Software pro detekci a analýzu napadení KII (2019)
Nástroje pro ověřování bezpečnosti SW/HW a simulaci útoků na prvky kritické informační infrastruktury (2019)
Nástroj pro zmírňování a potlačování útoků na kritickou informační infrastrukturu (2019)
Software pro provádění bezpečnostních cvičení a školení (2019)
CEP-Server: Software pro vyhodnocování a dotazování komplexních událostí v doméně ITOA (2019)
Kurz rozvoje digitálních kompetencí: zkušenost se vzájemným hodnocením v univerzitním online kurzu (2020)
Will You Trust This TLS Certificate? Perceptions of People Working in IT (Extended Version) (2020)
Software pro evidenci zranitelností v počítačové síti (2020)
Budoucnost knihoven (2019)
Adaptér pro systém pro správu zdrojů (2020)
Remove all the items
Operations on the selected outcomes
Export and print
List of selected records
Other applications
Publications
Information System