Martin Husák
Martin Husák
Institute of Computer Science, Masaryk University
E-mailová adresa ověřena na: mail.muni.cz - Domovská stránka
Název
Citace
Citace
Rok
Survey of attack projection, prediction, and forecasting in cyber security
M Husák, J Komárková, E Bou-Harb, P Čeleda
IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018
1062018
HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting
M Husák, M Čermák, T Jirsík, P Čeleda
EURASIP Journal on Information Security, 2016
742016
Honeypots and honeynets: issues of privacy
P Sokol, J Míšek, M Husák
EURASIP Journal on Information Security 2017 (1), 1-9, 2017
362017
Network-based HTTPS client identification using SSL/TLS fingerprinting
M Husák, M Cermák, T Jirsík, P Celeda
2015 10th international conference on availability, reliability and security …, 2015
322015
Security monitoring of http traffic using extended flows
M Husák, P Velan, J Vykopal
2015 10th International Conference on Availability, Reliability and Security …, 2015
242015
PhiGARo: Automatic phishing detection and incident response framework
M Husák, J Cegan
2014 ninth international conference on availability, reliability and …, 2014
212014
A survey on intrusion detection and prevention systems
I Ghafir, M Husak, V Prenosil
Proceedings of student conference Zvule, IEEE/UREL. Brno University of …, 2014
212014
CRUSOE: Data model for cyber situational awareness
J Komárková, M Husák, M Laštovička, D Tovarňák
Proceedings of the 13th International Conference on Availability …, 2018
172018
Towards predicting cyber attacks using information exchange and data mining
M Husák, J Kašpar
2018 14th International Wireless Communications & Mobile Computing …, 2018
172018
GDPR compliance in cybersecurity software: a case study of DPIA in information sharing platform
M Horák, V Stupka, M Husák
Proceedings of the 14th International Conference on Availability …, 2019
162019
Exchanging security events: Which and how many alerts can we aggregate?
M Husák, M Čermák, M Laštovička, J Vykopal
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
132017
Cloud-based security research testbed: A DDoS use case
T Jirsı́k, M Husak, P Celeda, Z Eichler
2014 IEEE Network Operations and Management Symposium (NOMS), 1-2, 2014
132014
Assessing internet-wide cyber situational awareness of critical sectors
M Husák, N Neshenko, MS Pour, E Bou-Harb, P Čeleda
Proceedings of the 13th International Conference on Availability …, 2018
122018
On the sequential pattern and rule mining in the analysis of cyber security alerts
M Husák, J Kašpar, E Bou-Harb, P Čeleda
Proceedings of the 12th International Conference on Availability …, 2017
122017
AIDA framework: Real-time correlation and prediction of intrusion detection alerts
M Husák, J Kašpar
Proceedings of the 14th International Conference on Availability …, 2019
102019
POSTER: Reflected attacks abusing honeypots
M Husák, M Vizváry
Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications …, 2013
82013
Protection of personal data in security alert sharing platforms
V Stupka, M Horák, M Husák
Proceedings of the 12th International Conference on Availability …, 2017
72017
Big data sanitization and cyber situational awareness: a network telescope perspective
E Bou-Harb, M Husák, M Debbabi, C Assi
IEEE transactions on big data 5 (4), 439-453, 2017
72017
Flow-based monitoring of honeypots
M Husák, M Drašar
Security and Protection of Information 2013, 63-70, 2013
72013
Predictive methods in cyber defense: Current experience and research challenges
M Husák, V Bartoš, P Sokol, A Gajdoš
Future Generation Computer Systems 115, 517-530, 2021
62021
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–20