Survey of attack projection, prediction, and forecasting in cyber security M Husák, J Komárková, E Bou-Harb, P Čeleda IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018 | 309 | 2018 |
HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting M Husák, M Čermák, T Jirsík, P Čeleda EURASIP Journal on Information Security, 2016 | 151 | 2016 |
Honeypots and honeynets: issues of privacy P Sokol, J Míšek, M Husák EURASIP Journal on Information Security 2017, 1-9, 2017 | 61 | 2017 |
Network-based HTTPS client identification using SSL/TLS fingerprinting M Husák, M Cermák, T Jirsík, P Celeda 2015 10th international conference on availability, reliability and security …, 2015 | 60 | 2015 |
GDPR compliance in cybersecurity software: A case study of DPIA in information sharing platform M Horák, V Stupka, M Husák Proceedings of the 14th international conference on availability …, 2019 | 43 | 2019 |
Predictive methods in cyber defense: Current experience and research challenges M Husák, V Bartoš, P Sokol, A Gajdoš Future Generation Computer Systems 115, 517-530, 2021 | 41 | 2021 |
CRUSOE: Data model for cyber situational awareness J Komárková, M Husák, M Laštovička, D Tovarňák Proceedings of the 13th International Conference on Availability …, 2018 | 37 | 2018 |
Security monitoring of http traffic using extended flows M Husák, P Velan, J Vykopal 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 32 | 2015 |
CRUSOE: A toolset for cyber situational awareness and decision support in incident handling M Husák, L Sadlek, S Špaček, M Laštovička, M Javorník, J Komárková Computers & Security 115, 102609, 2022 | 31 | 2022 |
SoK: Contemporary issues and challenges to enable cyber situational awareness for network security M Husák, T Jirsík, SJ Yang Proceedings of the 15th International Conference on Availability …, 2020 | 31 | 2020 |
Towards predicting cyber attacks using information exchange and data mining M Husák, J Kašpar 2018 14th International Wireless Communications & Mobile Computing …, 2018 | 31 | 2018 |
A survey on intrusion detection and prevention systems I Ghafir, M Husak, V Prenosil Proceedings of student conference Zvule, IEEE/UREL. Brno University of …, 2014 | 31 | 2014 |
Aida framework: real-time correlation and prediction of intrusion detection alerts M Husák, J Kašpar Proceedings of the 14th international conference on availability …, 2019 | 28 | 2019 |
On the sequential pattern and rule mining in the analysis of cyber security alerts M Husák, J Kašpar, E Bou-Harb, P Čeleda Proceedings of the 12th International Conference on Availability …, 2017 | 28 | 2017 |
PhiGARo: Automatic phishing detection and incident response framework M Husák, J Cegan 2014 ninth international conference on availability, reliability and …, 2014 | 27 | 2014 |
Assessing internet-wide cyber situational awareness of critical sectors M Husák, N Neshenko, MS Pour, E Bou-Harb, P Čeleda Proceedings of the 13th International Conference on Availability …, 2018 | 26 | 2018 |
Predictive cyber situational awareness and personalized blacklisting: a sequential rule mining approach M Husák, T Bajtoš, J Kašpar, E Bou-Harb, P Čeleda ACM Transactions on Management Information Systems (TMIS) 11 (4), 1-16, 2020 | 25 | 2020 |
Exchanging security events: Which and how many alerts can we aggregate? M Husák, M Čermák, M Laštovička, J Vykopal 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017 | 24 | 2017 |
Dataset of intrusion detection alerts from a sharing platform M Husák, M Žádník, V Bartoš, P Sokol Data in Brief 33, 106530, 2020 | 19 | 2020 |
Big data sanitization and cyber situational awareness: A network telescope perspective E Bou-Harb, M Husák, M Debbabi, C Assi IEEE transactions on big data 5 (4), 439-453, 2017 | 19 | 2017 |