Performance evaluations of IPTables firewall solutions under DDoS attacks M Šimon, L Huraj, M Čerňanský Journal of Applied Mathematics, Statistics and Informatics 11 (2), 35-45, 2015 | 41 | 2015 |
Trends in education during the pandemic: modern online technologies as a tool for the sustainability of university education in the field of media and communication studies A Hurajova, D Kollarova, L Huraj Heliyon 8 (5), 2022 | 36 | 2022 |
The vulnerability of the production line using industrial IoT systems under ddos attack T Horak, P Strelec, L Huraj, P Tanuska, A Vaclavova, M Kebisek Electronics 10 (4), 381, 2021 | 36 | 2021 |
Resistance of IoT sensors against DDoS attack in smart home environment L Huraj, M Šimon, T Horák Sensors 20 (18), 5298, 2020 | 35 | 2020 |
Heuristics for spreading alarm throughout a network M Šimon, L Huraj, I Dirgová Luptáková, J Pospíchal Applied Sciences 9 (16), 3269, 2019 | 29 | 2019 |
IoT measuring of UDP-based distributed reflective DoS attack L Huraj, M Simon, T Horák 2018 IEEE 16th international symposium on intelligent systems and …, 2018 | 21 | 2018 |
Mitigation against DDoS attacks on an IoT-based production line using machine learning L Huraj, T Horak, P Strelec, P Tanuska Applied Sciences 11 (4), 1847, 2021 | 20 | 2021 |
A neural tree model for classification of computing grid resources using PSO tasks scheduling J Škrinárová, L Huraj, V Siládi Neural Network World 23 (3), 223-241, 2013 | 19 | 2013 |
Proposal for an IIoT device solution according to Industry 4.0 concept A Vaclavova, P Strelec, T Horak, M Kebisek, P Tanuska, L Huraj Sensors 22 (1), 325, 2022 | 18 | 2022 |
DDoS reflection attack based on IoT: A case study M Šimon, L Huraj, T Horák Cybernetics and Algorithms in Intelligent Systems: Proceedings of 7th …, 2019 | 18 | 2019 |
Combined heuristic attack strategy on complex networks M Šimon, I Dirgová Luptáková, L Huraj, M Hosťovecký, J Pospíchal Mathematical Problems in Engineering 2017 (1), 6108563, 2017 | 15 | 2017 |
A study of DDoS reflection attack on Internet of Things in IPv4/IPv6 networks M Šimon, L Huraj Software Engineering Methods in Intelligent Algorithms: Proceedings of 8th …, 2019 | 14 | 2019 |
Analysis of performance bottleneck of P2P grid applications M Šimon, L Huraj, V Siládi Journal of Applied Mathematics, Statistics and Informatics 9 (2), 5-11, 2013 | 14 | 2013 |
Authorization through trust chains in ad hoc grids L Huraj, V Siládi Proceedings of the 2009 Euro American Conference on Telematics and …, 2009 | 14 | 2009 |
VO intersection trust in ad hoc grid environment L Huraj, H Reiser 2009 Fifth International Conference on Networking and Services, 456-461, 2009 | 13 | 2009 |
Comparison of design and performance of snow cover computing on GPUs and multi-core processors L Huraj, V Siládi, J Siláci WSEAS Transactions on Information Science and Applications 7 (10), 1284-1294, 2010 | 12 | 2010 |
Design and performance evaluation of snow cover computing on GPUs L Huraj, V Siládi, J Siláci Proceedings of the 14th WSEAS international conference on computers: latest …, 2010 | 12 | 2010 |
Neural gas clustering adapted for given size of clusters I Dirgová Luptáková, M Šimon, L Huraj, J Pospíchal Mathematical Problems in Engineering 2016 (1), 9324793, 2016 | 11 | 2016 |
IPv6 network DDoS attack with P2P grid M Šimon, L Huraj, M Hosťovecký Creativity in Intelligent, Technologies and Data Science, 407-415, 2015 | 11 | 2015 |
The vulnerability of securing IoT production lines and their network components in the Industry 4.0 concept T Horak, Z Cervenanska, L Huraj, P Vazan, J Janosik, P Tanuska IFAC-PapersOnLine 53 (2), 11237-11242, 2020 | 10 | 2020 |