Effective penetration testing with Metasploit framework and methodologies F Holik, J Horalek, O Marik, S Neradova, S Zitta 2014 IEEE 15th International Symposium on Computational Intelligence and …, 2014 | 59 | 2014 |
Vulnerabilities of Modern Web Applications F Holik, S Neradova Information and Communication Technology, Electronics and Microelectronics …, 2017 | 17 | 2017 |
The deployment of Security Information and Event Management in cloud infrastructure F Holik, J Horalek, S Neradova, S Zitta, O Marik 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 399-404, 2015 | 15 | 2015 |
Analysis of the use of Rainbow Tables to break hash J Horalek, F Holík, O Horák, L Petr, V Sobeslav Journal of Intelligent & Fuzzy Systems 32 (2), 1523-1534, 2017 | 8 | 2017 |
Methods of deploying security standards in a business environment F Holik, J Horalek, S Neradova, S Zitta, M Novak 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 411-414, 2015 | 4 | 2015 |
Analysis of the wireless communication latency and its dependency on a data size J Horalek, T Svoboda, F Holik 2016 IEEE 17th International symposium on computational intelligence and …, 2016 | 3 | 2016 |
Measuring information quality of geosocial networks J Kysela, J Horálek, F Holík New Trends in Intelligent Information and Database Systems, 171-180, 2015 | 3 | 2015 |
Industrial Network Protection by SDN-Based IPS with AI F Holik, P Dolezel Asian Conference on Intelligent Information and Database Systems, 192-203, 2020 | 2 | 2020 |
Meeting Smart City Latency Demands with SDN F Holik Asian Conference on Intelligent Information and Database Systems, 43-54, 2019 | 2 | 2019 |
Implementation and Testing of Cisco IP SLA in Smart Grid Environments J Horalek, F Holik, V Hurtova Information and Communication Technology, Electronics and Microelectronics …, 2017 | 2 | 2017 |
Implementing SDN into computer network lessons F Holik, J Horalek Journal of Telecommunication, Electronic and Computer Engineering, volume 9 …, 2017 | 2 | 2017 |
The methodology of measuring throughput of a wireless network F Holik, J Horalek, O Marik, S Neradova, S Zitta 2014 IEEE 15th International Symposium on Computational Intelligence and …, 2014 | 2 | 2014 |
Safe and Secure Software-Defined Networks for Smart Electricity Substations F Holik, M Broadbent, M Findrik, P Smith, N Race Asian Conference on Intelligent Information and Database Systems, 179-191, 2020 | 1 | 2020 |
Using SDN to Enhance IoT Security F Holík Univerzita Pardubice, 2018 | 1 | 2018 |
Modeling tool of TRILL protocol F Holik, S Karamazov Journal of Telecommunication, Electronic and Computer Engineering, volume 9 …, 2017 | 1 | 2017 |
Communication technology for smart heat metering F Holik, J Horalek, S Neradova, M Novak, O Marik 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 405-410, 2015 | 1 | 2015 |
Proposal to centralize operational data outputs of airport facilities J Horalek, S Neradova, S Karamazov, F Holik, O Marik, S Zitta Computational Collective Intelligence, 346-354, 2015 | 1 | 2015 |
Analysis of the use of cloud services and their effects on the efficient functioning of a company J Horalek, S Karamazov, F Holik, T Svoboda Computational Collective Intelligence, 336-345, 2015 | 1 | 2015 |
Metodika měření propustnosti bezdrátové sítě F Holík Univerzita Pardubice, 2014 | 1 | 2014 |
Development of Artificial Intelligence Based Module to Industrial Network Protection System F Holik, P Dolezel, J Merta, D Stursa Proceedings of SAI Intelligent Systems Conference, 229-240, 2020 | | 2020 |