Martin Husák
Martin Husák
Institute of Computer Science, Masaryk University
E-mailová adresa ověřena na: mail.muni.cz - Domovská stránka
Název
Citace
Citace
Rok
HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting
M Husák, M Čermák, T Jirsík, P Čeleda
EURASIP Journal on Information Security, 2016
532016
Survey of attack projection, prediction, and forecasting in cyber security
M Husák, J Komárková, E Bou-Harb, P Čeleda
IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018
462018
Network-based HTTPS client identification using SSL/TLS fingerprinting
M Husák, M Cermák, T Jirsík, P Celeda
2015 10th International Conference on Availability, Reliability and Security …, 2015
272015
Honeypots and honeynets: issues of privacy
P Sokol, J Míšek, M Husák
EURASIP Journal on Information Security 2017 (1), 1-9, 2017
222017
PhiGARo: Automatic phishing detection and incident response framework
M Husák, J Cegan
2014 ninth international conference on availability, reliability and …, 2014
172014
Security monitoring of http traffic using extended flows
M Husák, P Velan, J Vykopal
2015 10th International Conference on Availability, Reliability and Security …, 2015
152015
A survey on intrusion detection and prevention systems
I Ghafir, M Husak, V Prenosil
Proceedings of student conference Zvule, IEEE/UREL. Brno University of …, 2014
132014
Cloud-based security research testbed: A DDoS use case
T Jirsı́k, M Husak, P Celeda, Z Eichler
2014 IEEE Network Operations and Management Symposium (NOMS), 1-2, 2014
112014
Towards predicting cyber attacks using information exchange and data mining
M Husák, J Kašpar
2018 14th International Wireless Communications & Mobile Computing …, 2018
102018
On the sequential pattern and rule mining in the analysis of cyber security alerts
M Husák, J Kašpar, E Bou-Harb, P Čeleda
Proceedings of the 12th International Conference on Availability …, 2017
102017
Assessing internet-wide cyber situational awareness of critical sectors
M Husák, N Neshenko, MS Pour, E Bou-Harb, P Čeleda
Proceedings of the 13th International Conference on Availability …, 2018
82018
POSTER: Reflected attacks abusing honeypots
M Husák, M Vizváry
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
82013
GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform
M Horák, V Stupka, M Husák
Proceedings of the 14th International Conference on Availability …, 2019
72019
CRUSOE: Data model for cyber situational awareness
J Komárková, M Husák, M Laštovička, D Tovarňák
Proceedings of the 13th International Conference on Availability …, 2018
72018
Exchanging security events: Which and how many alerts can we aggregate?
M Husák, M Čermák, M Laštovička, J Vykopal
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
72017
Flow-based monitoring of honeypots
M Husák, M Drašar
7th International Conference on Security and Protection of Information (SPI …, 2013
72013
Protection of personal data in security alert sharing platforms
V Stupka, M Horák, M Husák
Proceedings of the 12th International Conference on Availability …, 2017
52017
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization
P Sokol, L Kleinová, M Husák
IEEE EUROCON 2015-International Conference on Computer as a Tool (EUROCON), 1-6, 2015
52015
Big data sanitization and cyber situational awareness: a network telescope perspective
E Bou-Harb, M Husák, M Debbabi, C Assi
IEEE transactions on big data, 2017
42017
Deploying Honeypots and Honeynets: Issue of Privacy
P Sokol, M Husak, F Lipták
2015 10th International Conference on Availability, Reliability and Security …, 2015
42015
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20