Folgen
Jan Jusko
Titel
Zitiert von
Zitiert von
Jahr
Detecting network services based on network flow data
I Nikolaev, M Grill, J Jusko
US Patent App. 10/027,562, 2018
270*2018
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,344,441, 2016
632016
Detecting network services based on network flow data
I Nikolaev, M Grill, J Jusko
US Patent 10,027,562, 2018
232018
Using Behavioral Similarity for Botnet Command-and-Control Discovery
J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny
IEEE Intelligent Systems 31 (5), 16-22, 2016
132016
Identifying peer‐to‐peer communities in the network by connection graph analysis
J Jusko, M Rehak
International Journal Of Network Management 24 (4), 235-252, 2014
122014
Structural command and control detection of polymorphic malware
J Jusko, M Rehak, D Khikhlukha, H Nayyar
US Patent App. 16/120,580, 2020
92020
Graph-based Detection of Malicious Network Communities
J Jusko
72017
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,531,742, 2016
62016
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,531,742, 2016
62016
A memory efficient privacy preserving representation of connection graphs
J Jusko, M Rehak, T Pevny
Proceedings of the 1st International Workshop on Agents and CyberSecurity, 1-8, 2014
62014
Revealing Cooperating Hosts by Connection Graph Analysis.
J Jusko, M Rehak
SecureComm, 241-255, 2012
62012
Active prioritization of investigation targets in network security
J Jusko, J Stiborek, T Pevny
US Patent App. 15/789,022, 2019
52019
Game Theoretical Adaptation Model for Intrusion Detection System
J Stiborek, M Grill, M Rehak, K Bartos, J Jusko
Advances on Practical Applications of Agents and Multi-Agent Systems, 201-210, 2012
52012
Game Theoretical Model for Adaptive Intrusion Detection System
J Stiborek, M Grill, M Rehak, K Bartos, J Jusko
Transactions on Computational Collective Intelligence XV, 133-163, 2014
12014
Identifying skype nodes by netflow-based graph analysis
J Jusko, M Rehak
2012 8th International Wireless Communications and Mobile Computing …, 2012
12012
Automated creation of lightweight behavioral indicators of compromise (iocs)
J Jusko, D Khikhlukha, H Nayyar
US Patent App. 16/131,146, 2020
2020
Network security classification
J Jusko, M Sofka
US Patent 10,382,462, 2019
2019
Correlating endpoint and network views to identify evasive applications
BH Anderson, D McGrew, VE Parla, J Jusko, M Grill, M Vejman
US Patent App. 15/848,150, 2019
2019
CROSS-DATASET MALICIOUS ACTORS IDENTIFICATION
J Jusko, D Khikhlukha
2019
Server grouping system
J Jusko, T Pevny, M Rehak
US Patent 9,813,442, 2017
2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20