Flow monitoring explained: From packet capture to data analysis with netflow and ipfix R Hofstede, P Čeleda, B Trammell, I Drago, R Sadre, A Sperotto, A Pras IEEE Communications Surveys & Tutorials 16 (4), 2037-2064, 2014 | 621 | 2014 |
A survey of methods for encrypted traffic classification and analysis P Velan, M Čermák, P Čeleda, M Drašar International Journal of Network Management 25 (5), 355-374, 2015 | 401 | 2015 |
Survey of attack projection, prediction, and forecasting in cyber security M Husák, J Komárková, E Bou-Harb, P Čeleda IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018 | 307 | 2018 |
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting M Husák, M Čermák, T Jirsík, P Čeleda EURASIP Journal on Information Security 2016, 1-14, 2016 | 148 | 2016 |
Kypo cyber range: Design and use cases J Vykopal, R Ošlejšek, P Čeleda, M Vizvary, D Tovarňák SciTePress, 2017 | 126 | 2017 |
Lessons learned from complex hands-on defence exercises in a cyber range J Vykopal, M Vizvary, R Oslejsek, P Celeda, D Tovarnak 2017 IEEE Frontiers in education conference (FIE), 1-8, 2017 | 120 | 2017 |
What are cybersecurity education papers about? a systematic literature review of sigcse and iticse conferences V Švábenský, J Vykopal, P Čeleda Proceedings of the 51st ACM technical symposium on computer science …, 2020 | 113 | 2020 |
Cybersecurity knowledge and skills taught in capture the flag challenges V Švábenský, P Čeleda, J Vykopal, S Brišáková Computers & Security 102, 102154, 2021 | 83 | 2021 |
Adaptive multiagent system for network traffic monitoring M Rehák, M Pechoucek, M Grill, J Stiborek, K Bartos, P Celeda IEEE Intelligent Systems 24 (3), 16-25, 2009 | 80 | 2009 |
Kypo–a platform for cyber defence exercises P Čeleda, J Čegan, J Vykopal, D Tovarňák M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber …, 2015 | 66 | 2015 |
Network-based HTTPS client identification using SSL/TLS fingerprinting M Husák, M Cermák, T Jirsík, P Celeda 2015 10th international conference on availability, reliability and security …, 2015 | 60 | 2015 |
Passive os fingerprinting methods in the jungle of wireless networks M Lastovicka, T Jirsik, P Celeda, S Spacek, D Filakovsky NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018 | 50 | 2018 |
Embedded malware-an analysis of the chuck norris botnet P Čeleda, R Krejčí, J Vykopal, M Drašar 2010 European Conference on Computer Network Defense, 3-10, 2010 | 48 | 2010 |
Toward stream-based IP flow analysis T Jirsik, M Cermak, D Tovarnak, P Celeda IEEE Communications Magazine 55 (7), 70-76, 2017 | 44 | 2017 |
Scalable learning environments for teaching cybersecurity hands-on J Vykopal, P Čeleda, P Seda, V Švábenský, D Tovarňák 2021 IEEE Frontiers in Education Conference (FIE), 1-9, 2021 | 43 | 2021 |
Multiparameter Multichannel Analyser System for Characterisation of Mixed Neutron–Gamma Field in the Experimental Reactor Lr-O Z Bureš, J Cvachovec, F Cvachovec, P Čeleda, B Ošmera Reactor Dosimetry in the 21st Century, 194-201, 2003 | 43 | 2003 |
A performance benchmark for NetFlow data analysis on distributed stream processing systems M Čermák, D Tovarňák, M Laštovička, P Čeleda NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 919-924, 2016 | 37 | 2016 |
Network traffic characterisation using flow-based statistics P Velan, J Medková, T Jirsík, P Čeleda NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 907-912, 2016 | 34 | 2016 |
Flow-based security issue detection in building automation and control networks P Čeleda, R Krejčí, V Krmíček Information and Communication Technologies: 18th EUNICE/IFIP WG 6.2, 6.6 …, 2012 | 31 | 2012 |
Kypo4industry: A testbed for teaching cybersecurity of industrial control systems P Čeleda, J Vykopal, V Švábenský, K Slavíček Proceedings of the 51st acm technical symposium on computer science …, 2020 | 29 | 2020 |