Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants K Bartos, M Sofka, V Franc 25th USENIX Security Symposium (USENIX Security 16), 807-822, 2016 | 72 | 2016 |
Adaptive multiagent system for network traffic monitoring M Rehak, M Pechoucek, M Grill, J Stiborek, K Bartos, P Celeda IEEE Intelligent Systems, 16-25, 2009 | 72 | 2009 |
Identifying threats based on hierarchical classification K Bartos, M Sofka US Patent 9,462,008, 2016 | 47 | 2016 |
Runtime monitoring and dynamic reconfiguration for intrusion detection systems M Rehak, E Staab, V Fusenig, M Pechoucek, M Grill, J Stiborek, K Bartos, ... Recent Advances in Intrusion Detection, 61-80, 2009 | 38 | 2009 |
CAMNEP: An intrusion detection system for high-speed networks M Rehak, M Pechoucek, K Bartos, M Grill, P Celeda, V Krmicek Progress in Informatics, 65-74, 0 | 26* | |
Learning detector of malicious network traffic from weak labels V Franc, M Sofka, K Bartos Joint European Conference on Machine Learning and Knowledge Discovery in …, 2015 | 19 | 2015 |
Towards efficient flow sampling technique for anomaly detection K Bartos, M Rehak International Workshop on Traffic Monitoring and Analysis, 93-106, 2012 | 19 | 2012 |
Dynamic information source selection for intrusion detection systems M Rehak, E Staab, M Pechoucek, J Stiborek, M Grill, K Bartos Proceedings of The 8th International Conference on Autonomous Agents and …, 2009 | 19 | 2009 |
Trust-based classifier combination for network anomaly detection M Rehak, M Pechoucek, M Grill, K Bartos Cooperative Information Agents XII, 116-130, 2008 | 19* | 2008 |
Optimizing flow sampling for network anomaly detection K Bartos, M Rehak, V Krmicek 2011 7th international wireless communications and mobile computing …, 2011 | 18 | 2011 |
Process for producing building materials from raw paint sludge RR Matheson, DM Dixon, JR Moore, DA Fischer US Patent 7,128,780, 2006 | 16 | 2006 |
Robust representation for domain adaptation in network security K Bartos, M Sofka Joint European Conference on Machine Learning and Knowledge Discovery in …, 2015 | 15 | 2015 |
Multi-agent approach to network intrusion detection M Rehak, M Pechoucek, P Celeda, V Krmicek, M Grill, K Bartos Proceedings of the 7th international joint conference on Autonomous agents …, 2008 | 15 | 2008 |
Network intrusion detection by means of community of trusting agents M Rehak, M Pechoucek, K Bartos, M Grill, P Celeda 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology …, 2007 | 14 | 2007 |
Method and apparatus for aggregating indicators of compromise for use in network security K Bartos, M Sofka, V Franc, J Havelka US Patent 9,985,982, 2018 | 12 | 2018 |
Global clustering of incidents based on malware similarity and online trustfulness K Bartos, M Rehak, M Sofka US Patent 9,432,393, 2016 | 10 | 2016 |
Learning detector of malicious network traffic from weak labels V Franc, M Sofka, K Bartos US Patent 9,923,912, 2018 | 9 | 2018 |
Learning detectors of malicious web requests for intrusion detection in network traffic L Machlica, K Bartos, M Sofka arXiv preprint arXiv:1702.02530, 2017 | 9 | 2017 |
Flow Based Network Intrusion Detection System using Hardware-Accelerated NetFlow Probes K Bartos, M Grill, V Krmicek, M Rehak, P Celeda CESNET Conference, 49-56, 2008 | 9 | 2008 |
IFS: Intelligent flow sampling for network security–an adaptive approach K Bartos, M Rehak International Journal of Network Management 25 (5), 263-282, 2015 | 8 | 2015 |