CRUSOE: A toolset for cyber situational awareness and decision support in incident handling M Husák, L Sadlek, S Špaček, M Laštovička, M Javorník, J Komárková Computers & Security 115, 102609, 2022 | 37 | 2022 |
Identification of Attack Paths Using Kill Chain and Attack Graphs L Sadlek, P Čeleda, D Tovarňák NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2022 | 26 | 2022 |
Network monitoring and enumerating vulnerabilities in large heterogeneous networks M Laštovička, M Husák, L Sadlek NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2020 | 17 | 2020 |
Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations D Tovarňák, L Sadlek, P Čeleda 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2021 | 10 | 2021 |
Community based platform for vulnerability categorization J Komárková, L Sadlek, M Laštovička NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-2, 2018 | 7 | 2018 |
Decision support for mission-centric network security management M Javorník, J Komárková, L Sadlek, M Husák NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-6, 2020 | 6 | 2020 |
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations L Sadlek, P Čeleda, D Tovarňák Proceedings of the 17th International Conference on Availability …, 2022 | 5 | 2022 |
Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification Á Ruman, M Drašar, L Sadlek, SJ Yang, P Celeda Proceedings of the 19th International Conference on Availability …, 2024 | 1 | 2024 |
Identification of Device Dependencies Using Link Prediction L Sadlek, M Husák, P Čeleda NOMS 2024-2024 IEEE Network Operations and Management Symposium, 1-10, 2024 | | 2024 |
Cyber Key Terrain Identification Using Adjusted PageRank Centrality L Sadlek, P Čeleda IFIP International Conference on ICT Systems Security and Privacy Protection …, 2023 | | 2023 |
Software pro podporu rozhodování při řešení bezpečnostního incidentu L Sadlek, M Javorník, M Husák | | 2020 |
Automated Identification of Cyber Threat Scenarios L SADLEK | | |
Threat Management Based on Information About Vulnerabilities BL Sadlek | | |
Vulnerability Exploit Effect Categorization L Sadlek | | |