A survey of methods for encrypted traffic classification and analysis P Velan, M Čermák, P Čeleda, M Drašar International Journal of Network Management 25 (5), 355-374, 2015 | 403 | 2015 |
Embedded malware-an analysis of the chuck norris botnet P Čeleda, R Krejčí, J Vykopal, M Drašar 2010 European Conference on Computer Network Defense, 3-10, 2010 | 48 | 2010 |
Cloud-based testbed for simulation of cyber attacks D Kouril, T Rebok, T Jirsik, J Cegan, M Drasar, M Vizváry, J Vykopal 2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014 | 40 | 2014 |
Autonomous intelligent cyber-defense agent (AICA) reference architecture. Release 2.0 A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ... arXiv preprint arXiv:1803.10664, 2018 | 28 | 2018 |
Session-level adversary intent-driven cyberattack simulator M Drašar, S Moskal, S Yang, P Zat'ko 2020 IEEE/ACM 24th International Symposium on Distributed Simulation and …, 2020 | 24 | 2020 |
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture P Theron, A Kott, M Drašar, K Rzadca, B LeBlanc, M Pihelgas, L Mancini, ... 2018 International conference on military communications and information …, 2018 | 24 | 2018 |
Similarity as a central approach to flow‐based anomaly detection M Drašar, M Vizváry, J Vykopal International Journal of Network Management 24 (4), 318-336, 2014 | 23 | 2014 |
Towards provable network traffic measurement and analysis via semi-labeled trace datasets M Cermak, T Jirsik, P Velan, J Komarkova, S Spacek, M Drasar, T Plesnik 2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018 | 22 | 2018 |
Flow-based brute-force attack detection M Drašar, J Vykopal, P Winter Fraunhofer Verlag, 2013 | 20 | 2013 |
Reference architecture of an autonomous agent for cyber defense of complex military systems P Theron, A Kott, M Drašar, K Rzadca, B LeBlanc, M Pihelgas, L Mancini, ... Adaptive autonomous secure cyber systems, 1-21, 2020 | 19 | 2020 |
Protocol-independent detection of dictionary attacks M Drašar Advances in Communication Networking: 19th EUNICE/IFIP WG 6.6 International …, 2013 | 19 | 2013 |
Initial reference architecture of an intelligent autonomous agent for cyber defense A Kott, P Therón, LV Mancini, M Drašar, E Dushku, G Heiko, M Kont, ... | 13 | 2018 |
Autonomous intelligent cyber-defense agent (AICA) reference architecture A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ... Release 2, 20783-1138, 2019 | 8 | 2019 |
Toward intelligent autonomous agents for cyber defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG A Kott, R Thomas, M Drašar, M Kont, A Poylisher, B Blakely, P Theron, ... arXiv preprint arXiv:1804.07646, 2018 | 8 | 2018 |
Flow-based monitoring of honeypots M Husák, M Drašar 7th International Conference on Security and Protection of Information (SPI …, 2013 | 8 | 2013 |
An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0 A Kott, P Théron, LV Mancini, E Dushku, A Panico, M Drašar, B LeBlanc, ... The Journal of Defense Modeling and Simulation 17 (1), 51-54, 2020 | 7 | 2020 |
Behavioral detection of distributed dictionary attacks M Drašar Doctoral theses, dissertations, Masaryk University, Faculty of Informatics, Brno, 2015 | 7 | 2015 |
Management and Security in the Age of Hyperconnectivity R Badonnel, R Koch, A Pras, M Drašar, B Stiller Springer International Publishing, 2016 | 5 | 2016 |
Network defence strategy evaluation: Simulation vs. live network J Medková, M Husák, M Drašar 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017 | 4 | 2017 |
Enhancing network intrusion detection by correlation of modularly hashed sketches M Drašar, T Jirsík, M Vizváry Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014 | 3 | 2014 |