关注
Václav Přenosil
Václav Přenosil
profesor-embedded systems, Masarykova univerzita
在 mail.muni.cz 的电子邮件经过验证
标题
引用次数
引用次数
年份
Detection of advanced persistent threat using machine-learning correlation analysis
I Ghafir, M Hammoudeh, V Prenosil, L Han, R Hegarty, K Rabie, ...
Future Generation Computer Systems 89, 349-359, 2018
2922018
Security threats to critical infrastructure: the human factor
I Ghafir, J Saleem, M Hammoudeh, H Faour, V Prenosil, S Jaf, S Jabbar, ...
The Journal of Supercomputing 74, 4986-5002, 2018
2532018
A survey on network security monitoring systems
I Ghafir, V Prenosil, J Svoboda, M Hammoudeh
2016 IEEE 4th International Conference on Future Internet of Things and …, 2016
1262016
Social engineering attack strategies and defence approaches
I Ghafir, V Prenosil, A Alhejailan, M Hammoudeh
2016 IEEE 4th international conference on future internet of things and …, 2016
1252016
Advanced persistent threat attack detection: an overview
I Ghafir, V Prenosil
Int J Adv Comput Netw Secur 4 (4), 5054, 2014
1062014
Network monitoring approaches: An overview
J Svoboda, I Ghafir, V Prenosil
Int J Adv Comput Netw Secur 5 (2), 88-93, 2015
882015
Botdet: A system for real time botnet command and control traffic detection
I Ghafir, V Prenosil, M Hammoudeh, T Baker, S Jabbar, S Khalid, S Jaf
IEEE Access 6, 38947-38958, 2018
862018
Malicious ssl certificate detection: A step towards advanced persistent threat defence
I Ghafir, V Prenosil, M Hammoudeh, L Han, U Raza
Proceedings of the international conference on future networks and …, 2017
582017
Proposed approach for targeted attacks detection
I Ghafir, V Prenosil
Advanced Computer and Communication Engineering Technology: Proceedings of …, 2016
562016
Blacklist-based malicious ip traffic detection
I Ghafir, V Prenosil
2015 Global Conference on Communication Technologies (GCCT), 229-233, 2015
542015
Tor-based malware and Tor connection detection
I Ghafir, J Svoboda, V Prenosil
International Conference on Frontiers of Communications, Networks and …, 2014
472014
A survey on botnet command and control traffic detection
I Ghafir, J Svoboda, V Prenosil
International Journal of Advances in Computer Networks and Its Security …, 2015
452015
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat
I Ghafir, V Prenosil, M Hammoudeh, FJ Aparicio-Navarro, K Rabie, ...
Proceedings of the 2nd International Conference on Future Networks and …, 2018
432018
Digitalized two parametric system for gamma/neutron spectrometry
M Veškrna, Z Matěj, F Mravec, V Přenosil, F Cvachovec, M Košťál
18th Topical Meeting of the Radiation Protection & Shielding Division of ANS …, 2014
422014
DNS traffic analysis for malicious domains detection
I Ghafir, V Prenosil
2015 2nd International Conference on Signal Processing and Integrated …, 2015
402015
Botnet command and control traffic detection challenges: a correlation-based solution
I Ghafir, V Prenosil, M Hammoudeh
Int J Adv Comput Netw Secur 7 (2), 2731, 2015
402015
Malicious file hash detection and drive-by download attacks
I Ghafir, V Prenosil
Proceedings of the Second International Conference on Computer and …, 2016
392016
Advanced persistent threat and spear phishing emails
I Ghafir, V Prenosil
International Conference Distance Learning, Simulation and Communication …, 2015
372015
Safe path planning using cell decomposition approximation
A Abbadi, V Přenosil
Distance Learning, Simulation and Communication 8, 1-6, 2015
332015
A survey on intrusion detection and prevention systems
I Ghafir, M Husak, V Prenosil
Proceedings of student conference Zvule, IEEE/UREL. Brno University of …, 2014
312014
系统目前无法执行此操作,请稍后再试。
文章 1–20