Effective penetration testing with Metasploit framework and methodologies F Holik, J Horalek, O Marik, S Neradova, S Zitta 2014 IEEE 15th International Symposium on Computational Intelligence and …, 2014 | 35 | 2014 |
The deployment of Security Information and Event Management in cloud infrastructure F Holik, J Horalek, S Neradova, S Zitta, O Marik 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 399-404, 2015 | 16 | 2015 |
Security issues of mobile application using cloud computing R Cimler, J Matyska, L Balík, J Horalek, V Sobeslav Afro-European Conference for Industrial Advancement, 347-357, 2015 | 15 | 2015 |
Communication protocols in substation automation and IEC 61850 based proposal J Horalek, J Matyska, V Sobeslav 2013 IEEE 14th International Symposium on Computational Intelligence and …, 2013 | 15 | 2013 |
Lower layers of a cloud driven smart home system J Horálek, J Matyska, J Stepan, M Vancl, R Cimler, V Sobĕslav New Trends in Intelligent Information and Database Systems, 219-228, 2015 | 13 | 2015 |
Gateway redundancy protocols J Pavlik, A Komarek, V Sobeslav, J Horalek 2014 IEEE 15th International Symposium on Computational Intelligence and …, 2014 | 12 | 2014 |
Datanetworking Aspects of Power Substation Automation J Horalek, V Sobeslav Communication and management in technological innovation and academic …, 2010 | 12 | 2010 |
Statistics and analysis of service availability in cloud computing J Pavlik, V Sobeslav, J Horalek Proceedings of the 18th International Database Engineering & Applications …, 2014 | 7 | 2014 |
Analysis of software routing solution based on mini PC platform for IoT J Horalek, V Sobeslav International Conference on Computational Collective Intelligence, 455-466, 2018 | 6 | 2018 |
Low level communication protocol and hardware for wired sensor networks J Stepan, J Matyska, R Cimler, J Horalek Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 6 | 2017 |
Remote laboratory for computer networks L Balik, J Horalek, V Sobeslav, O Hornig 2014 5th International Conference on Data Communication Networking (DCNET), 1-7, 2014 | 6 | 2014 |
Analysis of the use of Rainbow Tables to break hash J Horalek, F Holík, O Horák, L Petr, V Sobeslav Journal of Intelligent & Fuzzy Systems 32 (2), 1523-1534, 2017 | 5 | 2017 |
Endpoint firewall for local security hardening in academic research environment V Sobeslav, L Balik, O Hornig, J Horalek, O Krejcar Journal of Intelligent & Fuzzy Systems 32 (2), 1475-1484, 2017 | 5 | 2017 |
Measuring of electric energy consumption in households by means of Arduino platform J Horalek, V Sobeslav Advanced Computer and Communication Engineering Technology, 819-830, 2016 | 5 | 2016 |
Utilization of cloud computing in education with focus on open-source technologies V Sobeslav, J Horalek, J Pavlik Proceedings of the 4th International Conference on Computer Engineering and …, 2015 | 5 | 2015 |
Communications and security aspects of smart grid networks design J Horalek, V Sobeslav, O Krejcar, L Balik International Conference on Information and Software Technologies, 35-46, 2014 | 5 | 2014 |
Performance comparison of selected virtualization platforms J Horalek, J Matyska, V Sobeslav 2013 IEEE 14th International Symposium on Computational Intelligence and …, 2013 | 5 | 2013 |
Virtual laboratory A Bodnarova, V Sobeslav, J Horalek, J Matyska, M Hatas 2013 IEEE 11th International Conference on Emerging eLearning Technologies …, 2013 | 5 | 2013 |
Remote control in power substation automation J Horalek, V Sobeslav Recent researches in circuits, systems, communications and computers 1, 110-7, 2011 | 5 | 2011 |
Methods of deploying security standards in a business environment F Holik, J Horalek, S Neradova, S Zitta, M Novak 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 411-414, 2015 | 4 | 2015 |