The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Martin Husák" ( http://dblp.L3S.de/Authors/Martin_Husák )

  Author page on DBLP  Author page in RDF  Community of Martin Husák in ASPL-2

Publication years (Num. hits)
2008-2017 (16) 2018-2019 (6)
Publication types (Num. hits)
article(4) inproceedings(18)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 23 publication records. Showing 22 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Martin Husák, Jana Komárková, Elias Bou-Harb, Pavel Celeda Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. Search on Bibsonomy IEEE Communications Surveys and Tutorials The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nataliia Neshenko, Martin Husák, Elias Bou-Harb, Pavel Celeda, Sameera Al-Mulla, Claude Fachkha Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations. Search on Bibsonomy GLOBECOM Workshops The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Husák, Jaroslav Kaspar Towards Predicting Cyber Attacks Using Information Exchange and Data Mining. Search on Bibsonomy IWCMC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Petr Velan, Martin Husák, Daniel Tovarnák Rapid prototyping of flow-based detection methods using complex event processing. Search on Bibsonomy NOMS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jana Komárková, Martin Husák, Martin Lastovicka, Daniel Tovarnák CRUSOE: Data Model for Cyber Situational Awareness. Search on Bibsonomy ARES The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pavol Sokol, Jakub Mísek, Martin Husák Honeypots and honeynets: issues of privacy. Search on Bibsonomy EURASIP J. Information Security The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Václav Stupka, Martin Horák, Martin Husák Protection of personal data in security alert sharing platforms. Search on Bibsonomy ARES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Husák, Milan Cermák, Martin Lastovicka, Jan Vykopal Exchanging security events: Which and how many alerts can we aggregate? Search on Bibsonomy IM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jana Medková, Martin Husák, Martin Drasar Network defence strategy evaluation: Simulation vs. live network. Search on Bibsonomy IM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Husák, Milan Cermák A graph-based representation of relations in network security alert sharing platforms. Search on Bibsonomy IM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jana Medková, Martin Husák, Martin Vizváry, Pavel Celeda Honeypot testbed for network defence strategy evaluation. Search on Bibsonomy IM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting. Search on Bibsonomy EURASIP J. Information Security The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pavol Sokol, Lenka Kleinova, Martin Husák Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. Search on Bibsonomy EUROCON The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin Husák, Petr Velan, Jan Vykopal Security Monitoring of HTTP Traffic Using Extended Flows. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pavol Sokol, Martin Husák, Frantiek Liptak Deploying Honeypots and Honeynets: Issue of Privacy. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting. Search on Bibsonomy ARES The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tomás Jirsík, Martin Husák, Pavel Celeda, Zdenek Eichler Cloud-based security research testbed: A DDoS use case. Search on Bibsonomy NOMS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martin Husák, Jakub Cegan PhiGARo: Automatic Phishing Detection and Incident Response Framework. Search on Bibsonomy ARES The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martin Husák, Martin Vizváry Reflected attacks abusing honeypots. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin Janosov, Martin Husák, Peter Farkas, Ana García Armada New [47, 15, 16] Linear Binary Block Code. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #22 of 22 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license