Doh insight: Detecting dns over https by machine learning D Vekshin, K Hynek, T Cejka Proceedings of the 15th International Conference on Availability …, 2020 | 83 | 2020 |
Large scale measurement on the adoption of encrypted DNS S García, K Hynek, D Vekshin, T Čejka, A Wasicek arXiv preprint arXiv:2107.04436, 2021 | 26 | 2021 |
Summary of DNS over https abuse K Hynek, D Vekshin, J Luxemburk, T Cejka, A Wasicek IEEE Access 10, 54668-54680, 2022 | 18 | 2022 |
Privacy illusion: Beware of unpadded DoH K Hynek, T Cejka 2020 11th IEEE Annual Information Technology, Electronics and Mobile …, 2020 | 15 | 2020 |
Detection of https brute-force attacks with packet-level feature set J Luxemburk, K Hynek, T Čejka 2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021 | 14 | 2021 |
CESNET-QUIC22: A large one-month QUIC network traffic dataset from backbone lines J Luxemburk, K Hynek, T Čejka, A Lukačovič, P Šiška Data in Brief 46, 108888, 2023 | 13 | 2023 |
Towards evaluating quality of datasets for network traffic domain D Soukup, P Tisovčík, K Hynek, T Čejka 2021 17th International Conference on Network and Service Management (CNSM …, 2021 | 13 | 2021 |
Refined detection of SSH brute-force attackers using machine learning K Hynek, T Beneš, T Čejka, H Kubátová ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International …, 2020 | 13 | 2020 |
Collection of datasets with DNS over HTTPS traffic K Jeřábek, K Hynek, T Čejka, O Ryšavý Data in Brief 42, 108310, 2022 | 9 | 2022 |
Novel HTTPS classifier driven by packet bursts, flows, and machine learning Z Tropková, K Hynek, T Čejka 2021 17th International Conference on Network and Service Management (CNSM …, 2021 | 8 | 2021 |
Encrypted traffic classification: the QUIC case J Luxemburk, K Hynek, T Čejka 2023 7th Network Traffic Measurement and Analysis Conference (TMA), 1-10, 2023 | 6 | 2023 |
Dns over https detection using standard flow telemetry K Jerabek, K Hynek, O Rysavy, I Burgetova IEEE Access, 2023 | 6 | 2023 |
Datasets of cryptomining communication R Plný, K Hynek, T Cejka Acknowledgements This research was funded by the Ministry of Interior of the …, 2022 | 6 | 2022 |
DeCrypto: Finding cryptocurrency miners on ISP networks R Plný, K Hynek, T Čejka Nordic Conference on Secure IT Systems, 139-158, 2022 | 5 | 2022 |
Large scale analysis of doh deployment on the internet S García, J Bogado, K Hynek, D Vekshin, T Čejka, A Wasicek European Symposium on Research in Computer Security, 145-165, 2022 | 5 | 2022 |
Evaluating bad hosts using adaptive blacklist filter K Hynek, T Čejka, M Žádník, H Kubátová 2020 9th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2020 | 4 | 2020 |
BOTA: Explainable IoT malware detection in large networks D Uhříček, K Hynek, T Čejka, D Kolář IEEE Internet of Things Journal, 2022 | 3 | 2022 |
Discovering coordinated groups of IP addresses through temporal correlation of alerts M Zadnik, J Wrona, K Hynek, T Cejka, M Husák IEEE Access 10, 82799-82813, 2022 | 3 | 2022 |
Pipelined ALU for effective external memory access in FPGA T Beneš, M Kekely, K Hynek, T Čejka 2020 23rd Euromicro Conference on Digital System Design (DSD), 97-100, 2020 | 3 | 2020 |
Ultra high resolution jitter measurement method for Ethernet based networks K Hynek, T Beneš, M Bartík, P Kubalík 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 3 | 2019 |