Josef Horálek, Ph.D.
TitleCited byYear
Effective penetration testing with Metasploit framework and methodologies
F Holik, J Horalek, O Marik, S Neradova, S Zitta
2014 IEEE 15th International Symposium on Computational Intelligence and …, 2014
352014
The deployment of Security Information and Event Management in cloud infrastructure
F Holik, J Horalek, S Neradova, S Zitta, O Marik
2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 399-404, 2015
162015
Security issues of mobile application using cloud computing
R Cimler, J Matyska, L Balík, J Horalek, V Sobeslav
Afro-European Conference for Industrial Advancement, 347-357, 2015
152015
Communication protocols in substation automation and IEC 61850 based proposal
J Horalek, J Matyska, V Sobeslav
2013 IEEE 14th International Symposium on Computational Intelligence and …, 2013
152013
Lower layers of a cloud driven smart home system
J Horálek, J Matyska, J Stepan, M Vancl, R Cimler, V Sobĕslav
New Trends in Intelligent Information and Database Systems, 219-228, 2015
132015
Gateway redundancy protocols
J Pavlik, A Komarek, V Sobeslav, J Horalek
2014 IEEE 15th International Symposium on Computational Intelligence and …, 2014
122014
Datanetworking Aspects of Power Substation Automation
J Horalek, V Sobeslav
Communication and management in technological innovation and academic …, 2010
122010
Statistics and analysis of service availability in cloud computing
J Pavlik, V Sobeslav, J Horalek
Proceedings of the 18th International Database Engineering & Applications …, 2014
72014
Analysis of software routing solution based on mini PC platform for IoT
J Horalek, V Sobeslav
International Conference on Computational Collective Intelligence, 455-466, 2018
62018
Low level communication protocol and hardware for wired sensor networks
J Stepan, J Matyska, R Cimler, J Horalek
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
62017
Remote laboratory for computer networks
L Balik, J Horalek, V Sobeslav, O Hornig
2014 5th International Conference on Data Communication Networking (DCNET), 1-7, 2014
62014
Analysis of the use of Rainbow Tables to break hash
J Horalek, F Holík, O Horák, L Petr, V Sobeslav
Journal of Intelligent & Fuzzy Systems 32 (2), 1523-1534, 2017
52017
Endpoint firewall for local security hardening in academic research environment
V Sobeslav, L Balik, O Hornig, J Horalek, O Krejcar
Journal of Intelligent & Fuzzy Systems 32 (2), 1475-1484, 2017
52017
Measuring of electric energy consumption in households by means of Arduino platform
J Horalek, V Sobeslav
Advanced Computer and Communication Engineering Technology, 819-830, 2016
52016
Utilization of cloud computing in education with focus on open-source technologies
V Sobeslav, J Horalek, J Pavlik
Proceedings of the 4th International Conference on Computer Engineering and …, 2015
52015
Communications and security aspects of smart grid networks design
J Horalek, V Sobeslav, O Krejcar, L Balik
International Conference on Information and Software Technologies, 35-46, 2014
52014
Performance comparison of selected virtualization platforms
J Horalek, J Matyska, V Sobeslav
2013 IEEE 14th International Symposium on Computational Intelligence and …, 2013
52013
Virtual laboratory
A Bodnarova, V Sobeslav, J Horalek, J Matyska, M Hatas
2013 IEEE 11th International Conference on Emerging eLearning Technologies …, 2013
52013
Remote control in power substation automation
J Horalek, V Sobeslav
Recent researches in circuits, systems, communications and computers 1, 110-7, 2011
52011
Methods of deploying security standards in a business environment
F Holik, J Horalek, S Neradova, S Zitta, M Novak
2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 411-414, 2015
42015
The system can't perform the operation now. Try again later.
Articles 1–20