Follow
Karel Durkota
Karel Durkota
Neuron Soundware
Verified email at neuronsw.com - Homepage
Title
Cited by
Cited by
Year
Optimal Network Security Hardening Using Attack Graph Games
K Durkota, V Lisy, B Bosansky, C Kiekintveld
Proceedings of the Twenty-Fourth International Joint Conference on …, 2015
1522015
Implementation of a discrete firefly algorithm for the QAP problem within the sage framework
K Durkota
BSc thesis, Czech Technical University, 2011
782011
Approximate solutions for attack graph games with imperfect information
K Durkota, V Lisý, B Bošanský, C Kiekintveld
Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015
602015
Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games
J Čermák, B Bošanský, K Durkota, V Lisý, C Kiekintveld
AAAI Conference on Artificial Intelligence (AAAI-16), http://www.aaai.org, 2016
562016
Computing Optimal Policies for Attack Graphs with Action Failures and Costs
K Durkota, V Lisy
STAIRS 264, 101 - 110, 2014
492014
Case Studies of Network Defense with Attack Graph Games
K Durkota, V Lisý, C Kiekintveld, B Bošanský, M Pěchouček
IEEE Intelligent Systems 31 (5), 24-30, 2016
472016
Hardening Networks Against Strategic Attackers Using Attack Graph Games
K Durkota, V Lisý, B Bošanský, C Kiekintveld, M Pěchouček
Computers & Security, 2019
362019
Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
K Durkota, V Lisý, C Kiekintveld, B Bošanský
International Foundation for Autonomous Agents and Multiagent Systems, 1773 …, 2015
332015
Optimal strategies for detecting data exfiltration by internal and external attackers
K Durkota, V Lisý, C Kiekintveld, K Horák, B Bošanský, T Pevný
Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017
172017
Multiagent Planning Supported by Plan Diversity Metrics and Landmark Actions.
J Tozicka, J Jakubuv, K Durkota, A Komenda, M Pechoucek
ICAART (1), 178-189, 2014
152014
Deterministic multiagent planning techniques: experimental comparison (short paper)
K Durkota, A Komenda
Proceedings of DMAP workshop of ICAPS 13, 43-47, 2013
102013
Neuron-net: Siamese network for anomaly detection
K Durkota, M Linda, M Ludvik, J Tozicka
DCASE2020 Challenge, Tech. Rep, 2020
52020
Dadaed-double anomaly detector with aediff
J Tozicka, B Marek, D Karel, L Michal
Tech. Rep., DCASE2022 Challenge, 2022
42022
Unsupervised anomalous sound detection by Siamese network and auto-encoder
J Tozicka, D Karel, L Michal
DCASE2021 Challenge, 2021
32021
Multiagent planning by iterative negotiation over distributed planning graphs
J Tozicka, J Jakubuv, K Durkota, A Komenda
Proceedings of the Workshop on Distributed and Mutiltiagent Planning (ICAPS …, 2014
32014
Demonstrating the principles of aperture synthesis with the very small radio telescope
JM Marr, K Durkota, FP Wilkin, A Pere, AEE Rogers, VL Fish, G Holodak, ...
22011
Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
O Petrova, K Durkota, G Alperovich, K Horak, M Najman, B Bosansky, ...
arXiv preprint arXiv:2004.10638, 2020
12020
Extensibility Based Multiagent Planner with Plan Diversity Metrics
J Tožička, J Jakubův, K Durkota, A Komenda
Transactions on Computational Collective Intelligence XX, 117-139, 2015
12015
Laboratory Exercises Using the Haystack VSRT Interferometer To Teach the Basics of Aperture Synthesis
JM Marr, A Pere, K Durkota, AEE Rogers, V Fish, MB Arndt
arXiv preprint arXiv:1109.3816, 2011
12011
Demonstrating the Principles of Aperture Synthesis with Table-Top Laboratory Exercises
JM Marr, AEE Rogers, VL Fish, FP Wilkin, MB Arndt, G Holodak, ...
EPJ Web of Conferences 200, 02004, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20