Jan Kohout
Title
Cited by
Cited by
Year
Illegitimate typosquatting detection with internet protocol information
M Grill, J Kohout, M Kopp, T Pevny
US Patent 10,491,614, 2019
1552019
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,344,441, 2016
272016
k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach
J Lokoč, J Kohout, P Čech, T Skopal, T Pevný
Pacific-Asia Workshop on Intelligence and Security Informatics, 131-145, 2016
242016
Tracking users over network hosts based on user behavior
J Mrkos, M Grill, J Kohout
US Patent 10,129,271, 2018
222018
Automatic discovery of web servers hosting similar applications
J Kohout, T Pevný
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
212015
Tracking users over network hosts based on user behavior
J Mrkos, M Grill, J KOHOUT
US Patent App. 10/129,271, 2018
19*2018
Learning communication patterns for malware discovery in HTTPs data
J Kohout, T Komárek, P Čech, J Bodnár, J Lokoč
Expert Systems with Applications 101, 129-142, 2018
172018
Unsupervised detection of malware in persistent web traffic
J Kohout, T Pevný
2015 IEEE International Conference on Acoustics, Speech and Signal …, 2015
172015
Using Behavioral Similarity for Botnet Command-and-Control Discovery
J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny
IEEE Intelligent Systems 31 (5), 16-22, 2016
112016
Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce
P Čech, J Kohout, J Lokoč, T Komárek, J Maroušek, T Pevný
International Conference on Similarity Search and Applications, 311-324, 2016
102016
Identifying self-signed certificates using HTTP access logs for malware detection
M Kopp, M Grill, J Kohout
US Patent 10,375,097, 2019
92019
Network traffic fingerprinting based on approximated kernel two-sample test
J Kohout, T Pevný
IEEE Transactions on Information Forensics and Security 13 (3), 788-801, 2017
92017
Two-phase genetic algorithm for social network graphs clustering
J Kohout, R Neruda
2013 27th International Conference on Advanced Information Networking and …, 2013
92013
Malware detection by HTTPS traffic analysis
P Prasse, G Gruben, L Machlika, T Pevny, M Sofka, T Scheffer
52016
An attractive game with the document:(im) possible?
B Hladká, J Mírovský, J Kohout
The Prague Bulletin of Mathematical Linguistics 96, 5, 2011
52011
Statistical fingerprinting of network traffic
J Kohout, T Pevny
US Patent 10,425,434, 2019
32019
Community-based anomaly detection
M Kopp, M Grill, J Kohout
2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018
32018
Classification of IoT devices based on their network traffic
J Kohout, M Grill, M Kopp, L Bajer
US Patent 10,749,770, 2020
22020
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,531,742, 2016
22016
Exploration and exploitation operators for genetic graph clustering algorithm
J Kohout, R Neruda
International Symposium on Methodologies for Intelligent Systems, 87-92, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20