Karel Durkota
Karel Durkota
Neuron SoundWare
Verified email at neuronsw.com - Homepage
Title
Cited by
Cited by
Year
Optimal Network Security Hardening Using Attack Graph Games
K Durkota, V Lisy, B Bosansky, C Kiekintveld
Proceedings of the Twenty-Fourth International Joint Conference on …, 2015
662015
Implementation of a discrete firefly algorithm for the QAP problem within the sage framework
K Durkota
BSc thesis, Czech Technical University, 2011
642011
Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games
J Čermák, B Bošanský, K Durkota, V Lisý, C Kiekintveld
AAAI Conference on Artificial Intelligence (AAAI-16), http://www.aaai.org, 2016
362016
Approximate solutions for attack graph games with imperfect information
K Durkota, V Lisý, B Bošanský, C Kiekintveld
International Conference on Decision and Game Theory for Security, 228-249, 2015
292015
Case Studies of Network Defense with Attack Graph Games
K Durkota, V Lisý, C Kiekintveld, B Bošanský, M Pěchouček
IEEE Intelligent Systems 31 (5), 24-30, 2016
282016
Computing Optimal Policies for Attack Graphs with Action Failures and Costs
K Durkota, V Lisy
STAIRS 264, 101 - 110, 2014
262014
Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
K Durkota, V Lisý, C Kiekintveld, B Bošanský
International Foundation for Autonomous Agents and Multiagent Systems, 1773 …, 2015
182015
Multiagent Planning Supported by Plan Diversity Metrics and Landmark Actions.
J Tozicka, J Jakubuv, K Durkota, A Komenda, M Pechoucek
ICAART (1), 178-189, 2014
152014
Optimal strategies for detecting data exfiltration by internal and external attackers
K Durkota, V Lisý, C Kiekintveld, K Horák, B Bošanský, T Pevný
International Conference on Decision and Game Theory for Security, 171-192, 2017
112017
Deterministic multiagent planning techniques: experimental comparison (short paper)
K Durkota, A Komenda
Proceedings of DMAP workshop of ICAPS 13, 43-47, 2013
102013
Hardening Networks Against Strategic Attackers Using Attack Graph Games
K Durkota, V Lisý, B Bošanský, C Kiekintveld, M Pěchouček
Computers & Security, 2019
42019
Multiagent planning by iterative negotiation over distributed planning graphs
J Tozicka, J Jakubuv, K Durkota, A Komenda
Proceedings of the Workshop on Distributed and Mutiltiagent Planning (ICAPS …, 2014
32014
Extensibility Based Multiagent Planner with Plan Diversity Metrics
J Tožička, J Jakubův, K Durkota, A Komenda
Transactions on Computational Collective Intelligence XX, 117-139, 2015
12015
Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
O Petrova, K Durkota, G Alperovich, K Horak, M Najman, B Bosansky, ...
arXiv preprint arXiv:2004.10638, 2020
2020
NEURON-NET: SIAMESE NETWORK FOR ANOMALY DETECTION
K Durkota, M Linda, M Ludvık, J Tozicka, SE NeuronSW
Tech. report in DCASE2020 Challenge Task, 2020
2020
Demonstrating the Principles of Aperture Synthesis with Table-Top Laboratory Exercises
JM Marr, AEE Rogers, VL Fish, FP Wilkin, MB Arndt, G Holodak, ...
EPJ Web of Conferences 200, 02004, 2019
2019
Herněteoretický přístup k optimalizaci konfigurací
K Durkota
České vysoké učení technické v Praze. Vypočetní a informační centrum., 2018
2018
Comparison of Deterministic Distributed and Multi-Agent Planning Techniques
K Durkota
Czech Technical University in Prague, 2013
2013
Laboratory Exercises Using the Haystack VSRT Interferometer To Teach the Basics of Aperture Synthesis
JM Marr, A Pere, K Durkota, AEE Rogers, V Fish, MB Arndt
arXiv preprint arXiv:1109.3816, 2011
2011
Demonstrating the Principles of Aperture Synthesis with the Very Small Radio Telescope
JM Marr, K Durkota, FP Wilkin, A Pere, AEE Rogers, VL Fish, G Holodak, ...
2011
The system can't perform the operation now. Try again later.
Articles 1–20