Follow
Rehak Martin
Rehak Martin
Resistant AI
Verified email at martinrehak.com
Title
Cited by
Cited by
Year
Detecting DGA malware using NetFlow
M Grill, I Nikolaev, V Valeros, M Rehak
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
922015
Multiple instance learning for malware classification
J Stiborek, T Pevný, M Rehák
Expert Systems with Applications 93, 346-357, 2018
862018
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing
M Grill, T Pevný, M Rehak
Journal of Computer and System Sciences 83 (1), 43-57, 2017
842017
Adaptive multiagent system for network traffic monitoring
M Rehák, M Pechoucek, M Grill, J Stiborek, K Bartos, P Celeda
IEEE Intelligent Systems 24 (3), 16-25, 2009
812009
A-globe: Agent Development Platform with Inaccessibility and Mobility Support
D Šišlák, M Rehák, M Pěchouček, M Rollo, D Pavlíček
Software agent-based applications, platforms and development kits, 21-46, 2005
692005
Trust modeling with context representation and generalized identities
M Rehák, M Pěchouček
International Workshop on Cooperative Information Agents, 298-312, 2007
672007
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,344,441, 2016
632016
Representing context for multiagent trust modeling
M Rehak, M Gregor, M Pechoucek, JM Bradshaw
2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology …, 2006
462006
Agent-based approach to mass-oriented production planning: Case study
M Pechoucek, M Rehák, P Charvat, T Vlcek, M Kolar
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007
442007
Runtime monitoring and dynamic reconfiguration for intrusion detection systems
M Rehák, E Staab, V Fusenig, M Pěchouček, M Grill, J Stiborek, K Bartoš, ...
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
422009
Trust model for open ubiquitous agent systems
M Rehák, L Foltyn, M Pechoucek, P Benda
IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 536-542, 2005
382005
Leveraging endpoint and network environment inferences for malware traffic classification
BH Anderson, M Rehak, D McGrew, M Vejman, T Pevny, M Grill, J Kohout
US Patent 10,855,698, 2020
372020
Detection of malicious domains using recurring patterns in domain names
M Sofka, M Rehák
US Patent 10,178,107, 2019
372019
Malware detection using http user-agent discrepancy identification
M Grill, M Rehák
2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014
362014
Identifying and modeling botnet C&C behaviors
S García, V Uhlíř, M Rehak
Proceedings of the 1st International Workshop on Agents and CyberSecurity, 1-8, 2014
342014
Probabilistic analysis of dynamic malware traces
J Stiborek, T Pevný, M Rehák
Computers & Security 74, 221-239, 2018
322018
Negotiation-based approach to unmanned aerial vehicles
D Sislak, M Rehak, M Pechoucek, D Pavlicek, M Uller
IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence …, 2006
312006
Optimizing flow sampling for network anomaly detection
K Bartos, M Rehak, V Krmicek
2011 7th international wireless communications and mobile computing …, 2011
282011
CAMNEP: An intrusion detection system for high-speed networks
M Rehak, M Pěchouček, K Bartoš, M Grill, P Čeleda, V Krmíček
Progress in informatics, 2008
282008
CAMNEP: agent-based network intrusion detection system
M Rehak, M Pechoucek, P Celeda, J Novotny, P Minarik
Proceedings of the 7th international joint conference on Autonomous agents …, 2008
252008
The system can't perform the operation now. Try again later.
Articles 1–20