Detection of advanced persistent threat using machine-learning correlation analysis I Ghafir, M Hammoudeh, V Prenosil, L Han, R Hegarty, K Rabie, ... Future Generation Computer Systems 89, 349-359, 2018 | 292 | 2018 |
Security threats to critical infrastructure: the human factor I Ghafir, J Saleem, M Hammoudeh, H Faour, V Prenosil, S Jaf, S Jabbar, ... The Journal of Supercomputing 74, 4986-5002, 2018 | 253 | 2018 |
A survey on network security monitoring systems I Ghafir, V Prenosil, J Svoboda, M Hammoudeh 2016 IEEE 4th International Conference on Future Internet of Things and …, 2016 | 126 | 2016 |
Social engineering attack strategies and defence approaches I Ghafir, V Prenosil, A Alhejailan, M Hammoudeh 2016 IEEE 4th international conference on future internet of things and …, 2016 | 125 | 2016 |
Advanced persistent threat attack detection: an overview I Ghafir, V Prenosil Int J Adv Comput Netw Secur 4 (4), 5054, 2014 | 106 | 2014 |
Network monitoring approaches: An overview J Svoboda, I Ghafir, V Prenosil Int J Adv Comput Netw Secur 5 (2), 88-93, 2015 | 88 | 2015 |
Botdet: A system for real time botnet command and control traffic detection I Ghafir, V Prenosil, M Hammoudeh, T Baker, S Jabbar, S Khalid, S Jaf IEEE Access 6, 38947-38958, 2018 | 86 | 2018 |
Malicious ssl certificate detection: A step towards advanced persistent threat defence I Ghafir, V Prenosil, M Hammoudeh, L Han, U Raza Proceedings of the international conference on future networks and …, 2017 | 58 | 2017 |
Proposed approach for targeted attacks detection I Ghafir, V Prenosil Advanced Computer and Communication Engineering Technology: Proceedings of …, 2016 | 56 | 2016 |
Blacklist-based malicious ip traffic detection I Ghafir, V Prenosil 2015 Global Conference on Communication Technologies (GCCT), 229-233, 2015 | 54 | 2015 |
Tor-based malware and Tor connection detection I Ghafir, J Svoboda, V Prenosil International Conference on Frontiers of Communications, Networks and …, 2014 | 47 | 2014 |
A survey on botnet command and control traffic detection I Ghafir, J Svoboda, V Prenosil International Journal of Advances in Computer Networks and Its Security …, 2015 | 45 | 2015 |
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat I Ghafir, V Prenosil, M Hammoudeh, FJ Aparicio-Navarro, K Rabie, ... Proceedings of the 2nd International Conference on Future Networks and …, 2018 | 43 | 2018 |
Digitalized two parametric system for gamma/neutron spectrometry M Veškrna, Z Matěj, F Mravec, V Přenosil, F Cvachovec, M Košťál 18th Topical Meeting of the Radiation Protection & Shielding Division of ANS …, 2014 | 42 | 2014 |
DNS traffic analysis for malicious domains detection I Ghafir, V Prenosil 2015 2nd International Conference on Signal Processing and Integrated …, 2015 | 40 | 2015 |
Botnet command and control traffic detection challenges: a correlation-based solution I Ghafir, V Prenosil, M Hammoudeh Int J Adv Comput Netw Secur 7 (2), 2731, 2015 | 40 | 2015 |
Malicious file hash detection and drive-by download attacks I Ghafir, V Prenosil Proceedings of the Second International Conference on Computer and …, 2016 | 39 | 2016 |
Advanced persistent threat and spear phishing emails I Ghafir, V Prenosil International Conference Distance Learning, Simulation and Communication …, 2015 | 37 | 2015 |
Safe path planning using cell decomposition approximation A Abbadi, V Přenosil Distance Learning, Simulation and Communication 8, 1-6, 2015 | 33 | 2015 |
A survey on intrusion detection and prevention systems I Ghafir, M Husak, V Prenosil Proceedings of student conference Zvule, IEEE/UREL. Brno University of …, 2014 | 31 | 2014 |