关注
Lukáš Sadlek
Lukáš Sadlek
Masaryk University, Czech Republic
在 mail.muni.cz 的电子邮件经过验证
标题
引用次数
引用次数
年份
CRUSOE: A toolset for cyber situational awareness and decision support in incident handling
M Husák, L Sadlek, S Špaček, M Laštovička, M Javorník, J Komárková
Computers & Security 115, 102609, 2022
372022
Identification of Attack Paths Using Kill Chain and Attack Graphs
L Sadlek, P Čeleda, D Tovarňák
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2022
262022
Network monitoring and enumerating vulnerabilities in large heterogeneous networks
M Laštovička, M Husák, L Sadlek
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2020
172020
Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations
D Tovarňák, L Sadlek, P Čeleda
2021 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2021
102021
Community based platform for vulnerability categorization
J Komárková, L Sadlek, M Laštovička
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-2, 2018
72018
Decision support for mission-centric network security management
M Javorník, J Komárková, L Sadlek, M Husák
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2020
62020
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
L Sadlek, P Čeleda, D Tovarňák
Proceedings of the 17th International Conference on Availability …, 2022
52022
Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification
Á Ruman, M Drašar, L Sadlek, SJ Yang, P Celeda
Proceedings of the 19th International Conference on Availability …, 2024
12024
Identification of Device Dependencies Using Link Prediction
L Sadlek, M Husák, P Čeleda
NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-10, 2024
2024
Cyber Key Terrain Identification Using Adjusted PageRank Centrality
L Sadlek, P Čeleda
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2023
2023
Software pro podporu rozhodování při řešení bezpečnostního incidentu
L Sadlek, M Javorník, M Husák
2020
Automated Identification of Cyber Threat Scenarios
L SADLEK
Threat Management Based on Information About Vulnerabilities
BL Sadlek
Vulnerability Exploit Effect Categorization
L Sadlek
系统目前无法执行此操作,请稍后再试。
文章 1–14