NEMEA: a framework for network traffic analysis T Cejka, V Bartos, M Svepes, Z Rosa, H Kubatova 2016 12th International Conference on Network and Service Management (CNSM …, 2016 | 90 | 2016 |
Towards real-time intrusion detection for NetFlow and IPFIX R Hofstede, V Bartoš, A Sperotto, A Pras Proceedings of the 9th International Conference on Network and Service …, 2013 | 78 | 2013 |
GRU-based deep learning approach for network intrusion alert prediction MS Ansari, V Bartoš, B Lee Future Generation Computer Systems 128, 235-247, 2022 | 57 | 2022 |
Predictive methods in cyber defense: Current experience and research challenges M Husák, V Bartoš, P Sokol, A Gajdoš Future Generation Computer Systems 115, 517-530, 2021 | 39 | 2021 |
Network entity characterization and attack prediction V Bartos, M Zadnik, SM Habib, E Vasilomanolakis Future Generation Computer Systems 97, 674-686, 2019 | 38 | 2019 |
Nemea: Framework for stream-wise analysis of network traffic V Bartos, M Zadnik, T Cejka CESNET, ale, Tech. Rep, 2013 | 22 | 2013 |
Shallow and deep learning approaches for network intrusion alert prediction MS Ansari, V Bartos, B Lee Procedia Computer Science 171, 644-653, 2020 | 21 | 2020 |
Dataset of intrusion detection alerts from a sharing platform M Husák, M Žádník, V Bartoš, P Sokol Data in Brief 33, 106530, 2020 | 17 | 2020 |
Using application-aware flow monitoring for sip fraud detection T Cejka, V Bartos, L Truxa, H Kubatova Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6 …, 2015 | 12 | 2015 |
NERD: Network entity reputation database V Bartoš Proceedings of the 14th International Conference on Availability …, 2019 | 11 | 2019 |
An analysis of correlations of intrusion alerts in an NREN V Bartos, M Zadnik 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design …, 2014 | 9 | 2014 |
Evaluating reputation of internet entities V Bartoš, J Kořenek Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 …, 2016 | 7 | 2016 |
Augmented ddos mitigation with reputation scores T Jánský, T Čejka, M Žádník, V Bartoš Proceedings of the 13th International Conference on Availability …, 2018 | 6 | 2018 |
Analysis of alerts reported to Warden V Bartoš Technická zpráva 1, 2016 | 5 | 2016 |
Hunting sip authentication attacks efficiently T Jansky, T Čejka, V Bartoš Security of Networks and Services in an All-Connected World: 11th IFIP WG 6 …, 2017 | 4 | 2017 |
Network anomaly detection: comparison and real-time issues V Bartoš, M Žádník Dependable Networks and Services: 6th IFIP WG 6.6 International Conference …, 2012 | 4 | 2012 |
Heartbleed Detection at CESNET using Extended Flow Monitoring V Bartoš Proceedings of 8th International Scientific Conference on Security and …, 2015 | 3 | 2015 |
Framework for comparison of network anomaly detection algorithms V Bartoš, M Žádník Technická zpráva FIT-TR-2012-02, Fakulta Informacnıch Technologiı, VUT v …, 2012 | 3 | 2012 |
Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform M Husák, P Sokol, M Žádník, V Bartoš, M Horák Digital Threats: Research and Practice 4 (4), 1-11, 2023 | 2 | 2023 |
Detection of network flow timestamp reliability M Žádnik, E Šabik, V Bartoš Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014 | 2 | 2014 |