Pavel Čeleda
Pavel Čeleda
Institute of Computer Science, Masaryk University
Verified email at - Homepage
Cited by
Cited by
Flow monitoring explained: From packet capture to data analysis with netflow and ipfix
R Hofstede, P Čeleda, B Trammell, I Drago, R Sadre, A Sperotto, A Pras
IEEE Communications Surveys & Tutorials 16 (4), 2037-2064, 2014
A survey of methods for encrypted traffic classification and analysis
P Velan, M Čermák, P Čeleda, M Drašar
International Journal of Network Management 25 (5), 355-374, 2015
Adaptive multiagent system for network traffic monitoring
M Rehak, M Pechoucek, M Grill, J Stiborek, K Bartoš, P Celeda
IEEE Intelligent Systems 24 (3), 16-25, 2009
Survey of attack projection, prediction, and forecasting in cyber security
M Husák, J Komárková, E Bou-Harb, P Čeleda
IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
M Husák, M Čermák, T Jirsík, P Čeleda
EURASIP Journal on Information Security 2016 (1), 6, 2016
Kypo cyber range: Design and use cases
J Vykopal, R Ošlejšek, P Čeleda, M Vizvary, D Tovarňák
SciTePress, 2017
Lessons learned from complex hands-on defence exercises in a cyber range
J Vykopal, M Vizváry, R Oslejsek, P Celeda, D Tovarnak
2017 IEEE Frontiers in Education Conference (FIE), 1-8, 2017
Multiparameter multichannel analyser system for characterisation of mixed neutron-gamma field in the experimental reactor LR-0
Z Bureš, J Cvachovec, F Cvachovec, P Čeleda, B Ošmera
World Scientific Publishing Company, 2003
Kypo–a platform for cyber defence exercises
P Čeleda, J Čegan, J Vykopal, D Tovarňák
M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber …, 2015
Network-based HTTPS client identification using SSL/TLS fingerprinting
M Husák, M Cermák, T Jirsík, P Celeda
2015 10th International Conference on Availability, Reliability and Security …, 2015
Toward stream-based IP flow analysis
T Jirsik, M Cermak, D Tovarnak, P Celeda
IEEE Communications Magazine 55 (7), 70-76, 2017
Embedded malware-an analysis of the Chuck Norris botnet
P Celeda, R Krejcí, J Vykopal, M Drasar
2010 European Conference on Computer Network Defense, 3-10, 2010
Flowmon probe
P Čeleda, M Kováčik, T Koníř, V Krmíček, P Špringl, M Žádník
Networking Studies, 67, 2006
A performance benchmark for NetFlow data analysis on distributed stream processing systems
M Čermák, D Tovarňák, M Laštovička, P Čeleda
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 919-924, 2016
CAMNEP: An intrusion detection system for high-speed networks
M Rehak, M Pěchouček, K Bartoš, M Grill, P Čeleda, V Krmíček
Progress in informatics, 2008
Design and evaluation of http protocol parsers for ipfix measurement
P Velan, T Jirsík, P Čeleda
Meeting of the European Network of Universities and Companies in Information …, 2013
Flow-based security issue detection in building automation and control networks
P Čeleda, R Krejčí, V Krmíček
Meeting of the European Network of Universities and Companies in Information …, 2012
CAMNEP: agent-based network intrusion detection system
M Rehak, M Pechoucek, P Celeda, J Novotny, P Minarik
Proceedings of the 7th international joint conference on Autonomous agents …, 2008
Traffic measurement and analysis of building automation and control networks
R Krejčí, P Čeleda, J Dobrovolný
IFIP International Conference on Autonomous Infrastructure, Management and …, 2012
Passive os fingerprinting methods in the jungle of wireless networks
M Lastovicka, T Jirsik, P Celeda, S Spacek, D Filakovsky
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018
The system can't perform the operation now. Try again later.
Articles 1–20