Detecting network services based on network flow data I Nikolaev, M Grill, J Jusko US Patent App. 10/027,562, 2018 | 272* | 2018 |
Detection of malicious network connections J Kohout, J Jusko, T Pevny, M Rehak US Patent 9,344,441, 2016 | 79 | 2016 |
Detecting network services based on network flow data I Nikolaev, M Grill, J Jusko US Patent 10,027,562, 2018 | 24 | 2018 |
Identifying peer‐to‐peer communities in the network by connection graph analysis J Jusko, M Rehak International Journal Of Network Management 24 (4), 235-252, 2014 | 15 | 2014 |
Using Behavioral Similarity for Botnet Command-and-Control Discovery J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny IEEE Intelligent Systems 31 (5), 16-22, 2016 | 13 | 2016 |
Structural command and control detection of polymorphic malware J Jusko, M Rehak, D Khikhlukha, H Nayyar US Patent App. 16/120,580, 2020 | 11 | 2020 |
Detection of malicious network connections J Kohout, J Jusko, T Pevny, M Rehak US Patent 9,531,742, 2016 | 9 | 2016 |
Detection of malicious network connections J Kohout, J Jusko, T Pevny, M Rehak US Patent 9,531,742, 2016 | 9 | 2016 |
Graph-based Detection of Malicious Network Communities J Jusko | 8 | 2017 |
Active prioritization of investigation targets in network security J Jusko, J Stiborek, T Pevny US Patent App. 15/789,022, 2019 | 6 | 2019 |
A memory efficient privacy preserving representation of connection graphs J Jusko, M Rehak, T Pevny Proceedings of the 1st International Workshop on Agents and CyberSecurity, 1-8, 2014 | 6 | 2014 |
Revealing Cooperating Hosts by Connection Graph Analysis. J Jusko, M Rehak SecureComm, 241-255, 2012 | 6 | 2012 |
Game Theoretical Adaptation Model for Intrusion Detection System J Stiborek, M Grill, M Rehak, K Bartos, J Jusko Advances on Practical Applications of Agents and Multi-Agent Systems, 201-210, 2012 | 5 | 2012 |
Game Theoretical Model for Adaptive Intrusion Detection System J Stiborek, M Grill, M Rehak, K Bartos, J Jusko Transactions on Computational Collective Intelligence XV, 133-163, 2014 | 1 | 2014 |
Identifying skype nodes by netflow-based graph analysis J Jusko, M Rehak 2012 8th International Wireless Communications and Mobile Computing …, 2012 | 1 | 2012 |
Automated creation of lightweight behavioral indicators of compromise (iocs) J Jusko, D Khikhlukha, H Nayyar US Patent App. 16/131,146, 2020 | | 2020 |
Network security classification J Jusko, M Sofka US Patent 10,382,462, 2019 | | 2019 |
Correlating endpoint and network views to identify evasive applications BH Anderson, D McGrew, VE Parla, J Jusko, M Grill, M Vejman US Patent App. 15/848,150, 2019 | | 2019 |
CROSS-DATASET MALICIOUS ACTORS IDENTIFICATION J Jusko, D Khikhlukha | | 2019 |
Server grouping system J Jusko, T Pevny, M Rehak US Patent 9,813,442, 2017 | | 2017 |