E-banking security-comparative study P Hanaek, K Malinka, J Schafer 2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008 | 42 | 2008 |
Improving network intrusion detection classifiers by non-payload-based exploit-independent obfuscations: An adversarial approach I Homoliak, M Teknos, M Ochoa, D Breitenbacher, S Hosseini, P Hanacek arXiv preprint arXiv:1805.02684, 2018 | 40 | 2018 |
ASNM: Advanced security network metrics for attack vector description I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek Proceedings of the International Conference on Security and Management (SAM), 1, 2013 | 27 | 2013 |
Bezpečnost informačních systémů P Hanáček, J Staudek Praha: Úřad pro státní informační systém, 2000 | 27 | 2000 |
Implementing a unique chip ID on a reconfigurable polymorphic circuit L Sekanina, R Ruzicka, Z Vasicek, V Simek, P Hanacek Information Technology And Control 42 (1), 7-14, 2013 | 20 | 2013 |
Accelerometer based digital video stabilization for general security surveillance systems M Drahanský, F Orság, P Hanáček International Journal of Security and Its Applications 4 (1), 1-10, 2010 | 20 | 2010 |
ASNM Datasets: A collection of network attacks for testing of adversarial classifiers and intrusion detectors I Homoliak, K Malinka, P Hanacek IEEE Access 8, 112427-112453, 2020 | 17 | 2020 |
Peer-to-peer networks security J Schäfer, K Malinka, P Hanácek 2008 The Third International Conference on Internet Monitoring and …, 2008 | 17 | 2008 |
Characteristics of buffer overflow attacks tunneled in HTTP traffic I Homoliak, D Ovsonka, K Koranda, P Hanacek 2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014 | 15 | 2014 |
Autorizace elektronických transakcí a autentizace dat i uživatelů VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ... Masarykova univerzita, 2008 | 15 | 2008 |
Behavioral signature generation using shadow honeypot M Barabas, M Drozd, P Hanacek World Academy of Science, Engineering and Technology, ser, 829-833, 2012 | 14 | 2012 |
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic I Homoliak, D Ovsonka, M Gregr, P Hanacek The 9th International Conference for Internet Technology and Secured …, 2014 | 12 | 2014 |
Security of electronic money P Hanáček International Conference on Current Trends in Theory and Practice of …, 1998 | 12 | 1998 |
Increasing trust in tor node list using blockchain L Hellebrandt, I Homoliak, K Malinka, P Hanáček 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019 | 11 | 2019 |
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. I Homoliak, D Breitenbacher, P Hanacek J. Comput. 12 (2), 143-155, 2017 | 11 | 2017 |
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. P Pecho, F Zboril Jr, M Drahanský, P Hanacek J. Univers. Comput. Sci. 15 (5), 992-1006, 2009 | 11 | 2009 |
Secure collection tree protocol for tamper-resistant wireless sensors P Pecho, J Nagy, P Hanáček, M Drahanský Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009 | 11 | 2009 |
Bezpečnost informačních systémů. 1 vyd. Praha: Úřad pro státní informační systém, 2000. 127 s P Hanáček, J Staudek | 11 | |
Simulation and evaluation of CTP and secure-CTP protocols P Pecho, P Hanacek, J Nagy Radioengineering 19 (1), 89-99, 2010 | 10 | 2010 |
Exploitation of netem utility for non-payload-based obfuscation techniques improving network anomaly detection I Homoliak, M Teknos, M Barabas, P Hanacek Security and Privacy in Communication Networks: 12th International …, 2017 | 9 | 2017 |