NES@FIT - Výzkumná skupina počítačové sítě

Publikace

  • 2024

    MATOUŠEK, P.; RYŠAVÝ, O.; BURGETOVÁ, I. Experience Report: Using JA4+ Fingerprints for Malware Detection in Encrypted Traffic. 2024. p. 0-0. Detail

    MUTUA, N.; NADJM-TEHRANI, S.; MATOUŠEK, P. Penetrating the Power Grid: Realistic Adversarial Attacks on Smart Grid Intrusion Detection Systrems. 2024. p. 1-19. Detail

  • 2023

    BURGET, R. Scraping Data from Web Pages using SPARQL Queries. Web Engineering - 23rd International Conference, ICWE 2023. Lecture Notes in Computer Science. Alicante: Springer Nature Switzerland AG, 2023. p. 293-300. ISBN: 978-3-031-34443-5. Detail

    BURGET, R.; SALEM, H. Creating Searchable Web Page Snapshots using Semantic Technologies. Web Engineering - 23rd International Conference, ICWE 2023. Lecture Notes in Computer Science. Alicante: Springer Nature Switzerland AG, 2023. p. 355-358. ISBN: 978-3-031-34443-5. Detail

    DOLEJŠKA, D.; KOUTENSKÝ, M.; VESELÝ, V.; PLUSKAL, J. Busting up Monopoly: Methods for Modern Darknet Marketplace Forensics. Forensic Science International: Digital Investigation, 2023, vol. 46, no. 1, p. 1-11. ISSN: 2666-2817. Detail

    HAVLENA, V.; MATOUŠEK, P.; RYŠAVÝ, O.; HOLÍK, L. Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication. IEEE Transactions on Smart Grid, 2023, vol. 2023, no. 14, p. 2352-2366. ISSN: 1949-3053. Detail

    IMERI, A.; RYŠAVÝ, O. Deep learning for predictive alerting and cyber-attack mitigation. In IEEE 13th Annual Computing and Communication Workshop and Conference, CCWC 2023. Las Vegas: IEEE Computer Society, 2023. p. 476-481. ISBN: 978-3-319-93490-7. Detail

    JEŘÁBEK, K.; HYNEK, K.; RYŠAVÝ, O.; BURGETOVÁ, I. DNS over HTTPS Detection Using Standard Flow Telemetry. IEEE Access, 2023, vol. 2023, no. 11, p. 50000-50012. ISSN: 2169-3536. Detail

    POLČÁK, L.; JEŘÁBEK, K. Data Protection and Security Issues with Network Error Logging. In Proceedings of the 20th International Conference on Security and Cryptography. Řím: SciTePress - Science and Technology Publications, 2023. p. 683-690. ISBN: 978-989-758-666-8. Detail

    POLČÁK, L.; SALOŇ, M.; MAONE, G.; HRANICKÝ, R.; MCMAHON, M. JShelter: Give Me My Browser Back. In Proceedings of the 20th International Conference on Security and Cryptography. Řím: SciTePress - Science and Technology Publications, 2023. p. 287-294. ISBN: 978-989-758-666-8. Detail

    POLČÁK, L.; SLEZÁKOVÁ, A. Data Exfiltration by Hotjar Revisited. In Proceedings of the 19th International Conference on Web Information Systems and Technologies. Řím: SciTePress - Science and Technology Publications, 2023. p. 347-354. ISBN: 978-989-758-672-9. Detail

    RADER, R.; JEŘÁBEK, K.; RYŠAVÝ, O. Detecting DoH-Based Data Exfiltration: FluBot Malware Case Study. IEEE 48th Conference on Local Computer Networks (LCN). Daytona Beach: IEEE Computer Society, 2023. p. 50-54. ISBN: 979-8-3503-0074-1. Detail

    VONDRÁČEK, M.; BAGGILI, I.; CASEY, P.; MEKNI, M. Rise of the Metaverse's Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses. COMPUTERS & SECURITY, 2023, vol. 127, no. 1, p. 1-13. ISSN: 0167-4048. Detail

  • 2022

    DOLEJŠKA, D.; VESELÝ, V. Workshop on Correlating Blockchain Activity with Real-Life Events and Users. ISS World Europe 2022, Praha: 2022. p. 0-20. Detail

    DOLEJŠKA, D.; VESELÝ, V.; GRÉGR, M.; JEŘÁBEK, V. Možnosti monitorování a korelování aktivit na temných tržišť při ztotožňování uživatelů. Brno: 2022. s. 0-0. Detail

    DOLEJŠKA, D.; VESELÝ, V.; PLUSKAL, J.; KOUTENSKÝ, M. Shedding Light on Monopoly: Temporal Analysis of Drug Trades. 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Boston, MA: Springer Nature Switzerland AG, 2022. p. 151-168. ISBN: 978-3-031-36573-7. ISSN: 1867-8211. Detail

    JEŘÁBEK, K.; HYNEK, K.; ČEJKA, T.; RYŠAVÝ, O. Collection of Datasets with DNS over HTTPS Traffic. Data in Brief (Online), 2022, vol. 2022, no. 42, p. 1-13. ISSN: 2352-3409. Detail

    JEŘÁBEK, K.; RYŠAVÝ, O.; BURGETOVÁ, I. Measurement and characterization of DNS over HTTPS traffic. 2022, vol. 2022, no. 2204, p. 1-27. ISSN: 2331-8422. Detail

    PLUSKAL, J.; VESELÝ, V. Intercepting and Collecting Web Evidence in the Times of TLS1.3 and HTTP3.0. ISS World Europe 2022, Praha: 2022. p. 0-50. Detail

    POLČÁK, L.; MATOUŠEK, P. Metering Homes: Do Energy Efficiency and Privacy Need to be in Conflict?. In Proceedings of the 19th International Conference on Security and Cryptography. Lisabon: SciTePress - Science and Technology Publications, 2022. p. 47-58. ISBN: 978-989-758-590-6. Detail

    VESELÝ, V.; DOLEJŠKA, D. Cryptocurrency Investigation Workshop. ISS World Europe 2022, Praha: 2022. p. 0-70. Detail

  • 2021

    BURGETOVÁ, I.; MATOUŠEK, P.; MUTUA, N. Statistical Methods for Anomaly Detection in Industrial Communication. IT-TR-2021-01, Brno: Faculty of Information Technology BUT, 2021. p. 0-0. Detail

    BURGETOVÁ, I.; MATOUŠEK, P.; RYŠAVÝ, O. Anomaly Detection of ICS Communication Using Statistical Models. In Proceedings of the 17th International Conference on Network Service Management (CNSM 2021). Izmir: Institute of Electrical and Electronics Engineers, 2021. p. 166-172. ISBN: 978-3-903176-36-2. Detail

    HOLKOVIČ, M.; BOHUŠ, M.; RYŠAVÝ, O. Network Problem Diagnostics using Typographic Error Correction. In Proceedings of the 17th International Conference on Network Service Management (CNSM 2021). Izmir: Institute of Electrical and Electronics Engineers, 2021. p. 482-490. ISBN: 978-3-903176-36-2. Detail

    MATOUŠEK, P. Bezpečnostní rizika IoT. Brno: 2021. s. 1-12. Detail

    MATOUŠEK, P. Security of Smart Grid Communication. Brno: Faculty of Information Technology BUT, 2021. p. 0-0. Detail

    MATOUŠEK, P.; BURGETOVÁ, I.; RYŠAVÝ, O.; VICTOR, M. On Reliability of JA3 Hashes for Fingerprinting Mobile Applications. In Digital Forensics and Cyber Crime. ICDF2C 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Boston: Springer International Publishing, 2021. p. 1-22. ISBN: 978-3-030-68733-5. Detail

    MATOUŠEK, P.; GROFČÍK, P. ICS Virtual Testbed. FIT-TR-2021-02, Brno: Faculty of Information Technology BUT, 2021. p. 0-0. Detail

    MATOUŠEK, P.; HAVLENA, V.; HOLÍK, L. Efficient Modelling of ICS Communication For Anomaly Detection Using Probabilistic Automata. In Proceedings of IFIP/IEEE International Symposium on Integrated Network Management. Bordeaux: International Federation for Information Processing, 2021. p. 81-89. ISBN: 978-3-903176-32-4. Detail

    MATOUŠEK, P.; KRAJČ, P. Monitoring of IoT Devices Using SNMP. IT-TR-2020-10, Brno: Faculty of Information Technology BUT, 2021. p. 0-0. Detail

    MATOUŠEK, P.; PRISTAŠ, J.; MASÁROVÁ, M. Simulation of Industrial Processes using I/O Factory and UniPi. IT-TR-2020-09, Brno: Faculty of Information Technology BUT, 2021. p. 0-0. Detail

    MATOUŠEK, P.; RYŠAVÝ, O. Teaching ICS Security in Blended Classroom Environment. In Proceedings of the 2021 30th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE). Prague: Czech Technical University, 2021. p. 148-153. ISBN: 978-1-7281-9324-3. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; POLČÁK, L. Unified SNMP Interface for IoT Monitoring. In Proceedings of the IM 2021 - 2021 IFIP/IEEE International Symposium on Integrated Network Management. Bordeaux: International Federation for Information Processing, 2021. p. 938-943. ISBN: 978-3-903176-32-4. Detail

    MUTUA, N.; MATOUŠEK, P. Outlier Detection in Smart Grid Communication. Fast Abstracts and Student Forum Proceedings, 17th European Dependable Computing Conference. Munich: 2021. p. 1-4. Detail

    POLČÁK, L. CVE-2021-34571, CVE-2021-34572, CVE-2021-34573, CVE-2021-34576. Frankfurt am Main: 2021. p. 0-0. Detail

    RYŠAVÝ, O.; MATOUŠEK, P. A Network Traffic Processing Library for ICS Anomaly Detection. In ECBS '21: Proceedings of the 7th Conference on the Engineering of Computer Based Systems. Novi Sad: Association for Computing Machinery, 2021. p. 144-151. ISBN: 978-1-4503-9057-6. Detail

    UHLÁR, J.; HOLKOVIČ, M.; RUSŇÁK, V. PCAPFunnel: A Tool for Rapid Exploration of Packet Capture Files. In 2021 25TH INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV): AI & VISUAL ANALYTICS & DATA SCIENCE. Proceedings. Sydney: IEEE Biometric Council, 2021. p. 69-76. ISBN: 978-1-6654-3827-8. ISSN: 2375-0138. Detail

    VESELÝ, V. Correlating Blockchain Activities with Real-Life events. Dubaj: 2021. p. 0-50. Detail

    VESELÝ, V.; ZAVŘEL, J. Quality Control Methodology for Simulation Models of Computer Network Protocols. Proceedings of 8th Virutal OMNeT++ Community Summit. Ithaca, NY: Cornell University Library, 2021. p. 1-19. ISSN: 2331-8422. Detail

  • 2020

    BURGET, R.; RYCHLÝ, M. Extrakce událostí ze souborových systémů - Návrh a implementace distribuované architektury. FIT-TR-2020-08, Brno: Fakulta informačních technologií VUT v Brně, 2020. s. 0-0. Detail

    HAVLENA, V.; HOLÍK, L.; MATOUŠEK, P. Learning Probabilistic Automata in the Context of IEC 104. IT-TR-2020-01, Brno: Faculty of Information Technology BUT, 2020. p. 0-0. Detail

    HOLKOVIČ, M.; BOHUŠ, M.; RYŠAVÝ, O. Pattern Detection Based Network Diagnostics. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications. Setubal: SciTePress - Science and Technology Publications, 2020. p. 35-42. ISBN: 978-989-758-445-9. Detail

    HOLKOVIČ, M.; POLČÁK, L.; RYŠAVÝ, O. Application Error Detection in Networks by Protocol Behavior Model. In Communications in Computer and Information Science. Communications in Computer and Information Science. Praha: Springer Verlag, 2020. p. 3-28. ISBN: 978-3-030-52685-6. ISSN: 1865-0929. Detail

    HOLKOVIČ, M.; RYŠAVÝ, O. Using Rule-Based Decision Trees for Automatic Passive Diagnostics of the Network Problems. International Journal on Advances in Networks and Services, 2020, vol. 2020, no. 1, p. 1-10. ISSN: 1942-2644. Detail

    HRANICKÝ, R. Forenzní analýza šifrovaných dat. DSM Data Security Management, 2020, roč. 2020, č. 4, s. 14-18. ISSN: 1211-8737. Detail

    HRANICKÝ, R.; ZOBAL, L.; VEČEŘA, V.; MÚČKA, M.; HORÁK, A.; BOLVANSKÝ, D.; ŽENČÁK, T. The architecture of Fitcrack distributed password cracking system, version 2. FIT-TR-2020-04, Brno: Faculty of Information Technology BUT, 2020. p. 0-0. Detail

    HYNEK, J.; RYŠAVÝ, O. Visual Representation of Network Forensic Data. FIT-TR-2020-07: 2020. p. 0-0. Detail

    KOUTENSKÝ, M.; VESELÝ, V.; MAFFIONE, V. Addressing Bandwidth-driven Flow Allocation in RINA. Computers, 2020, vol. 9, no. 3, p. 1-23. ISSN: 2073-431X. Detail

    KOUTENSKÝ, M.; VESELÝ, V.; MAFFIONE, V. Bandwidth-driven Flow Allocation Policy for RINA. In Proceedings of the 23rd Conference on Innovation in Clouds, Internet and Networks (ICIN 2020). Paris: IEEE Communications Society, 2020. p. 51-56. ISBN: 978-1-7281-5127-4. Detail

    MATOUŠEK, P.; BURGETOVÁ, I.; VICTOR, M. Mobile Device Fingerprinting. FIT-TR-2020-05, Brno: 2020. p. 0-0. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; HAVLENA, V.; GRÉGR, M. Flow based monitoring of ICS communication in the smart grid. Journal of Information Security and Applications, 2020, vol. 2020, no. 54, p. 102535-102535. ISSN: 2214-2126. Detail

    MUTUA, N. Application of Approximate Matching on Industrial Control System (ICS) Network Communication Using Ssdeep Algorithm. Brno: 2020. p. 0-0. Detail

    PLUSKAL, J. SSL/TLS Interception Workshop (TLS1.3 edition). Dubai: 2020. p. 0-0. Detail

    PLUSKAL, J. Towards Fully Automated Infinitely Scalable and Maximally Effective Password Cracking of Encrypted Documents. Dubai: 2020. p. 0-0. Detail

    POLČÁK, L. Soukromí uživatelů v prostředí internetové reklamy na českém webu. DSM Data Security Management, 2020, roč. 2020, č. 1, s. 11-16. ISSN: 1211-8737. Detail

    POLČÁK, L.; RYŠAVÝ, O.; MATOUŠEK, P. Identity Linking in Computer Networks. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, DCNET, OPTICS, SIGMAP and WINSYS. Setubal: SciTePress - Science and Technology Publications, 2020. p. 45-52. ISBN: 978-989-758-445-9. Detail

    VESELÝ, V.; ZAVŘEL, J. Enhanced Interior Gateway Routing Protocol. Budapešť: 2020. p. 0-17. Detail

    VICTOR, M. PC Browser and Android Applications Fingerprinting. Brno: 2020. p. 0-0. Detail

    WACHIURI, S. Security Analysis of the GOOSE Communication Protocol Using Statistical Profiling. Brno: 2020. p. 0-0. Detail

    YOUSSEF, S.; RYŠAVÝ, O. Behavioral Anomaly Detection in Industrial Control Systems: An Evaluation of Flowmon ADS. FIT-TR-2020-02, Brno: Faculty of Information Technology BUT, 2020. p. 0-0. Detail

    YOUSSEF, S.; RYŠAVÝ, O. Proposed Method for Partial Node Replacement by Software Defined Network. Position Papers of the 2020 Federated Conference on Computer Science and Information Systems. Annals of Computer Science and Information Systems. Warsaw: Polish Information Processing Society, 2020. p. 11-14. ISBN: 978-83-959183-0-8. ISSN: 2300-5963. Detail

  • 2019

    GRÉGR, M. Study on visual representation of IoT diagnostic information. Brno: 2019. p. 0-0. Detail

    HOLKOVIČ, M.; RYŠAVÝ, O. Network Diagnostics Using Passive Network Monitoring and Packet Analysis. ICNS 2019. The Fifteenth International Conference on Networking and Services. Athens: The International Academy, Research and Industry Association, 2019. p. 47-51. ISBN: 978-1-61208-711-5. Detail

    HOLKOVIČ, M.; RYŠAVÝ, O.; DUDEK, J. Automating Network Security Analysis at Packet-level by using Rule-based Engine. In Proceedings of the Sixth European Conference on the Engineering of Computer-Based Systems. Bucharest: Association for Computing Machinery, 2019. p. 1-8. ISBN: 978-1-4503-7636-5. Detail

    HOLKOVIČ, M.; RYŠAVÝ, O.; POLČÁK, L. Using Network Traces to Generate Models for Automatic Network Application Protocols Diagnostics. In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications Volume 1: DCNET, ICE-B, OPTICS, SIGMAP and WINSYS. Praha: SciTePress - Science and Technology Publications, 2019. p. 37-47. ISBN: 978-989-758-378-0. Detail

    HRANICKÝ, R.; LIŠTIAK, F.; MIKUŠ, D.; RYŠAVÝ, O. On Practical Aspects of PCFG Password Cracking. In Data and Applications Security and Privacy. Lecture Notes in Computer Science. Charleston: Springer Nature Switzerland AG, 2019. p. 43-60. ISBN: 978-3-030-22478-3. ISSN: 0302-9743. Detail

    HRANICKÝ, R.; MIKUŠ, D.; ZOBAL, L. Lámání hesel pomocí pravděpodobnostních gramatik. FIT-TR-2019-03, Brno: Fakulta informačních technologií VUT v Brně, 2019. s. 0-0. Detail

    HRANICKÝ, R.; ZOBAL, L.; RYŠAVÝ, O.; KOLÁŘ, D. Distributed password cracking with BOINC and hashcat. Digital Investigation, 2019, vol. 30, no. 1, p. 161-172. ISSN: 1742-2876. Detail

    JEŘÁBEK, K. Big Data cluster založený na kontejnerech. FIT-TR-2019-04, Brno: Fakulta informačních technologií VUT v Brně, 2019. s. 0-0. Detail

    JEŘÁBEK, K. DNS Over HTTPS Analysis and Detection in Regular HTTPS. FIT-TR-2019-05, Brno: Faculty of Information Technology BUT, 2019. p. 0-0. Detail

    JEŘÁBEK, K.; RYŠAVÝ, O. Big Data Network Flow Processing Using Apache Spark. In Proceedings of the 6th Conference on the Engineering of Computer Based Systems (ECBS 2019), 2019. Bukurešť: Association for Computing Machinery, 2019. p. 1-9. ISBN: 978-1-4503-7636-5. Detail

    JEŘÁBEK, K.; VESELÝ, V. One of the Ways How to Make RIB Distributed. In Proceedings of the 22nd Conference on Innovation in Clouds, Internet and Networks (ICIN 2019). Paříž: IEEE Communications Society, 2019. p. 49-53. ISBN: 978-1-5386-3458-5. Detail

    KOCMAN, T. Představení knihovny Scrapy pro tvorbu web crawlerů. ROOT, informace nejen ze světa Linuxu. 2019. s. 0-0. ISSN: 1212-8309. Detail

    LETAVAY, V.; PLUSKAL, J.; RYŠAVÝ, O. A Scalable Architecture for Network Traffic Forensics. The Fifteenth International Conference on Networking and Services ICNS 2019. Athens: The International Academy, Research and Industry Association, 2019. p. 32-36. ISBN: 978-1-61208-711-5. Detail

    LETAVAY, V.; PLUSKAL, J.; RYŠAVÝ, O. Network Forensic Analysis for Lawful Enforcement Steroids, Distributed and Scalable. In Proceedings of the 6th Conference on the Engineering of Computer Based Systems (ECBS 2019), 2019. Bucharest: Association for Computing Machinery, 2019. p. 1-10. ISBN: 978-1-4503-7636-5. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; BURGETOVÁ, I. Extending Networking Curriculum with Applied Artificial Intelligence. In Proceedings of EAEEIE 2019. Ruse: Institute of Electrical and Electronics Engineers, 2019. p. 11-16. ISBN: 978-1-7281-3222-8. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; GRÉGR, M. Increasing Visibility of IEC 104 Communication in the Smart Grid. 6th International Symposium for ICS & SCADA Cyber Security Research 2019. Swindon: BCS Learning and Development Ltd., 2019. p. 21-30. ISBN: 978-1-78017-523-2. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; GRÉGR, M. Security Monitoring of IoT Communication Using Flows. In Proceedings of the 6th Conference on the Engineering of Computer Based Systems. ECBS '19. New York: Association for Computing Machinery, 2019. p. 1-9. ISBN: 978-1-4503-7636-5. Detail

    PLUSKAL, J.; KOUTENSKÝ, M.; VONDRÁČEK, M.; RYŠAVÝ, O. Network Forensic Investigations of Tunneled Traffic: A Case Study. Revue Roumaine des Sciences Techniques - Serie Électrotechnique et Énergétique, 2019, vol. 64, no. 4, p. 429-434. ISSN: 0035-4066. Detail

    PLUSKAL, J.; VESELÝ, V. SSL/TLS Interception Workshop (TLS1.3 edition). Kuala Lumpur: 2019. p. 0-0. Detail

    PLUSKAL, J.; VESELÝ, V. SSL/TLS Interception Workshop. Praha: 2019. p. 0-0. Detail

    PLUSKAL, J.; VONDRÁČEK, M.; RYŠAVÝ, O. Network Forensics in GSE Overlay Networks. In ECBS '19: Proceedings of the 6th Conference on the Engineering of Computer Based Systems. Bukurešť: Association for Computing Machinery, 2019. p. 1-10. ISBN: 978-1-4503-7636-5. Detail

    POLČÁK, L. Wireless M-Bus: Kdo ví, že perete?. DSM Data Security Management, 2019, roč. 2019, č. 4, s. 13-17. ISSN: 1211-8737. Detail

    RYŠAVÝ, O.; MATOUŠEK, P. An IPFIX Extension for MQTT Protocol Monitoring. FIT-TR-2019-01, Brno: Faculty of Information Technology BUT, 2019. p. 0-0. Detail

    VESELÝ, V. Cryptocurrency Investigation Workshop. Kuala Lumpur: 2019. p. 0-0. Detail

    VESELÝ, V. Hunting Down Cryptocurrency Users. Dubaj: 2019. p. 0-0. Detail

    VESELÝ, V. Hunting Down Cryptocurrency Users. Praha: 2019. p. 0-0. Detail

    VESELÝ, V. Towards Fully Automated Infinitely Scalable and Maximally Effective Password Cracking of Encrypted Documents. Dubai: 2019. p. 0-0. Detail

    VESELÝ, V. Towards Fully Automated Infinitely Scalable and Maximally Effective Password Cracking of Encrypted Documents. Praha: 2019. p. 0-0. Detail

    VESELÝ, V. Workshop on Evidence Collection and Analysis of Webpages. Kuala Lumpur: 2019. p. 0-0. Detail

    VESELÝ, V.; MAREK, M.; JEŘÁBEK, K. RINASim. EAI/Springer Innovations in Communication and Computing, 2019, vol. 2019, no. 1, p. 139-181. ISSN: 2522-8595. Detail

    VESELÝ, V.; MAREK, M.; JEŘÁBEK, K.; NOVÁK, A. Everything You Always Wanted to Know About BGPv4 in OMNeT++ But Were Afraid to Ask. In Proceedings of 6th OMNeT++ Community Summit. Manchester: EasyChair, 2019. p. 1-8. ISSN: 2398-7340. Detail

    VESELÝ, V.; ŽÁDNÍK, M. How to detect cryptocurrency miners? By traffic forensics!. Digital Investigation, 2019, vol. 31, no. 31, p. 1-14. ISSN: 1742-2876. Detail

  • 2018

    GRÉGR, M. Souhrnná zpráva k projektu DDoS ochrana člena sdružení CESNET. Brno: CESNET, zájmové sdružení právnických osob, 2018. s. 1-7. Detail

    HRANICKÝ, R.; ZOBAL, L.; VEČEŘA, V.; MÚČKA, M. Distribuce výpočtů pro nástroj hashcat. FIT-TR-2018-04, Brno: 2018. s. 0-0. Detail

    HRANICKÝ, R.; ZOBAL, L.; VEČEŘA, V.; MÚČKA, M. The architecture of Fitcrack distributed password cracking system. FIT-TR-2018-03, Brno: Faculty of Information Technology BUT, 2018. p. 0-0. Detail

    MATOUŠEK, P. Description of IEC 61850 Communication. FIT-TR-2018-01, Brno: Faculty of Information Technology BUT, 2018. p. 0-0. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; JAMES, J.; JANG, Y. Interconnecting Education and Research Through International Partnership: IoT Case Study. In 2018 28th EAEEIE Annual Conference, EAEEIE 2018. Hafnarfjordur: Institute of Electrical and Electronics Engineers, 2018. p. 1-6. ISBN: 978-1-5386-7711-7. Detail

    MATOUŠEK, P.; SCHMIEDECKER, M. Digital Forensics and Cyber Crime. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Cham: Springer International Publishing, 2018. 235 p. ISBN: 978-3-319-73697-6. Detail

    PLUSKAL, J.; LICHTNER, O.; RYŠAVÝ, O. Traffic Classification and Application Identification in Network Forensics. In Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics. IFIP Advances in Information and Communication Technology. New Delhi: Springer International Publishing, 2018. p. 161-181. ISBN: 978-3-319-99277-8. ISSN: 1868-4238. Detail

    PLUSKAL, J.; VESELÝ, V. TLS/SSL Decryption Workshop. Praha: 2018. p. 0-0. Detail

    POLČÁK, L. Co skrývá síť BitTorrent?. FIT-TR-2018-05, Brno: 2018. s. 0-0. Detail

    RYCHLÝ, M.; RYŠAVÝ, O. Big Data Security Analysis with TARZAN Platform. Journal of Cyber Security and Mobility, 2018, vol. 8, no. 2, p. 165-188. ISSN: 2245-1439. Detail

    VESELÝ, V. Cryptocurrency Forensics Utilizing a Multi-currency Blockchain Explorer. Praha: 2018. p. 0-0. Detail

    VESELÝ, V. Hunting Down Cryptocurrency Users. Kuala Lumpur: 2018. p. 0-0. Detail

    VESELÝ, V. Towards Fully Automated Infinitely Scalable and Maximally Effective Password Cracking of Encrypted Documents. Kuala Lumpur: 2018. p. 0-0. Detail

    VESELÝ, V.; PLUSKAL, J. SSL/TLS Interception Workshop. Kuala Lumpur: 2018. p. 0-0. Detail

    VONDRÁČEK, M.; PLUSKAL, J.; RYŠAVÝ, O. Automated Man-in-the-Middle Attack Against Wi-Fi Networks. The Journal of Digital Forensics, Security and Law, 2018, vol. 2018, no. 13, p. 59-80. ISSN: 1558-7215. Detail

  • 2017

    GRÉGR, M. Bezpečnost v sítích IoT. FIT-TR-2017-10: 2017. s. 0-0. Detail

    GRÉGR, M. Souhrnná zpráva k projektu DDoS ochrana člena sdružení CESNET. Brno: CESNET, zájmové sdružení právnických osob, 2017. s. 1-2. Detail

    HRANICKÝ, R.; ZOBAL, L.; VEČEŘA, V.; MATOUŠEK, P. Distributed Password Cracking in a Hybrid Environment. Proceedings of SPI 2017. Brno: University of Defence in Brno, 2017. p. 75-90. ISBN: 978-80-7231-414-0. Detail

    KARPÍŠEK, F.; BAGGILI, I.; BREITINGER, F. Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digital Investigation, 2017, vol. 2017, no. 22, p. 26-38. ISSN: 1742-2876. Detail

    MAREK, M.; RYŠAVÝ, O.; VESELÝ, V. Towards analysis of IP communication in a constrained environment of tactical radio networks. In Proceedings of European Conference on the Engineering of Computer Based Systems. Larnaca: Association for Computing Machinery, 2017. p. 50-57. ISBN: 978-1-4503-4843-0. Detail

    MATOUŠEK, P. Analysis of DLMS Protocol. FIT-TR-2017-13, Brno: 2017. p. 0-0. Detail

    MATOUŠEK, P. Description and analysis of IEC 104 Protocol. FIT-TR-2017-12, Brno: Faculty of Information Technology BUT, 2017. p. 0-0. Detail

    MATOUŠEK, P. Detekce mobilních zařízení v síťové komunikaci. FIT-TR-2017-08, Brno: Fakulta informačních technologií VUT v Brně, 2017. s. 0-0. Detail

    MATOUŠEK, P.; LOUB, R. On the Similarity of User-specific Features on Mobile Devices. Proceedings of SPI 2017. Brno: University of Defence in Brno, 2017. p. 1-11. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; ONYANGO, C.; SEVILLA, J. Delivering ICT Security Courses over 5.944 km. In Proceedings of the 27th EAEEIE Annual Conference. Grenoble: Grenoble Institute of Technology, 2017. p. 1-7. ISBN: 978-1-7281-0907-7. Detail

    NAGY, P.; GRÉGR, M.; PODERMAŃSKI, T. Mitigace DDoS útoků s využitím komoditního hardwaru. FIT-TR-2017-09: 2017. s. 0-0. Detail

    PLUSKAL, J. Netfox Detective 2.0 - Nástroj pro síťovou forenzní analýzu. FIT-TR-2017-06: Fakulta informačních technologií VUT v Brně, 2017. s. 0-0. Detail

    PLUSKAL, J.; LICHTNER, O.; RYŠAVÝ, O. Netfox Detective - Identifikace aplikačních protokolů pomocí algoritmů strojového učení. FIT-TR-2017-05: 2017. s. 0-0. Detail

    PLUSKAL, J.; RYŠAVÝ, O. Detection, and Analysis of SIP Fraud Attack on 100Gb Ethernet with NEMEA System. Pristina: 2017. p. 0-0. Detail

    PLUSKAL, J.; RYŠAVÝ, O. Traffic Extraction and Classification in Network Forensics. 9th International Conference on Digital Forensics & Cyber Crime. Praha: 2017. p. 1-2. Detail

    PODERMAŃSKI, T.; GRÉGR, M.; NAGY, P. Základní charakteristika DDoS útoků. FIT-TR-2017-14: 2017. s. 0-0. Detail

    POLČÁK, L. Základní informace o síti Tor. FIT-TR-2017-01, Brno: 2017. s. 0-0. Detail

    RYCHLÝ, M.; RYŠAVÝ, O. Platforma pro zpracovaní dat síťové forenzní analýzy. FIT-TR-2017-07, Brno: 2017. s. 0-0. Detail

    RYCHLÝ, M.; RYŠAVÝ, O. TARZAN: An Integrated Platform for Security Analysis. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems. Annals of Computer Science and Information Systems, Volume 11. Praha: IEEE Computer Society, 2017. p. 561-567. ISBN: 978-83-946253-7-5. Detail

    RYŠAVÝ, O. Analysis of Constrained Application Protocol. FIT-TR-2017-15, Brno: Faculty of Information Technology BUT, 2017. p. 0-0. Detail

    RYŠAVÝ, O. Security Monitoring of LwM2M communication. FIT-TR-2017-16, Brno: Faculty of Information Technology BUT, 2017. p. 0-0. Detail

    VESELÝ, V. Detekce kryptoměnových těžařů. FIT-TR-2017-03, Brno: 2017. s. 0-0. Detail

    VESELÝ, V.; HOLUŠA, J.; RYŠAVÝ, O. First-hop Redundancy Protocols in OMNeT++. In Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - Volume 1: SIMULTECH. Madrid: SciTePress - Science and Technology Publications, 2017. p. 331-339. ISBN: 978-989-758-265-3. Detail

    VESELÝ, V.; RAJCA, T. Discovering Neighbor Devices in Computer Network - Development of CDP and LLDP Simulation Modules for OMNeT++. Proceedings of 4th OMNeT++ Community Summit. Ithaca, NY: Cornell University Library, 2017. p. 1-4. ISSN: 2331-8422. Detail

    VONDRÁČEK, M.; PLUSKAL, J.; RYŠAVÝ, O. Automation of MitM Attack on Wi-Fi Networks. In 9th International Conference on Digital Forensics & Cyber Crime. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST). Prague: Springer International Publishing, 2017. p. 207-220. ISBN: 978-3-319-73696-9. ISSN: 1867-8211. Detail

  • 2016

    GRASA, E.; RYŠAVÝ, O.; LICHTNER, O.; ASGARI, H.; DAY, J.; CHITKUSHEV, L. From protecting protocols to layers: designing, implementing and experimenting with security policies in RINA. In 2016 IEEE International Conference on Communications (ICC). Kuala-Lumpur: Institute of Electrical and Electronics Engineers, 2016. p. 736-742. ISBN: 978-1-4799-6665-3. Detail

    HRANICKÝ, R.; HOLKOVIČ, M.; MATOUŠEK, P.; RYŠAVÝ, O. On Efficiency of Distributed Password Recovery. The Journal of Digital Forensics, Security and Law, 2016, vol. 11, no. 2, p. 79-95. ISSN: 1558-7215. Detail

    KARMAZÍN, J.; OČENÁŠEK, P. The state of Near-Field Communication (NFC) on the Android platform. In Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Toronto: Springer Verlag, 2016. p. 247-254. ISBN: 978-3-319-39380-3. ISSN: 0302-9743. Detail

    PLUSKAL, J.; RYŠAVÝ, O. Síťový forenzní nástroj Netfox Detective. Pristina: 2016. s. 0-0. Detail

    PLUSKAL, J.; RYŠAVÝ, O.; MATOUŠEK, P. On the Identification of Applications from Captured Network Traffic. New York: 2016. p. 0-0. Detail

    PLUSKAL, J.; VESELÝ, V.; GRÉGR, M.; RYŠAVÝ, O. TLS/SSL Decryption Workshop. Praha: 2016. p. 0-0. Detail

    POLČÁK, L.; CALDAROLA, L.; CUDA, D.; DONDERO, M.; FICARA, D.; FRANKOVÁ, B.; HOLKOVIČ, M.; CHOUKIR, A.; MUCCIFORA, R.; TRIFILO, A. High Level Policies in SDN. In Communications in Computer and Information Science. Communications in Computer and Information Science. Berlin: Springer International Publishing, 2016. p. 39-57. ISBN: 978-3-319-30221-8. ISSN: 1865-0929. Detail

    VESELÝ, V.; REK, V.; RYŠAVÝ, O. Babel Routing Protocol for OMNeT++ - More than just a new simulation module for INET framework. Proceedings of 3rd OMNeT++ Community Summit. Ithaca, NY: Cornell University Library, 2016. p. 1-5. ISSN: 2331-8422. Detail

  • 2015

    CALDAROLA, L.; CHOUKIR, A.; CUDA, D.; DONDERO, M.; FICARA, D.; MUCCIFORA, R.; POLČÁK, L.; TRIFILO, A. Towards a real application-aware network. In Proceedings of the 6th International Conference on Data Communication Networking (DCNET-2015). Colmar: SciTePress - Science and Technology Publications, 2015. p. 5-12. ISBN: 978-989-758-112-0. Detail

    FRANKOVÁ, B.; HOLKOVIČ, M.; POLČÁK, L. Optimalizace řízení a bezpečnosti síťových toků pomocí softwarově definovaných sítí. FIT-TR-2015-02, Brno: Fakulta informačních technologií VUT v Brně, 2015. s. 0-0. Detail

    GRÉGR, M. Souhrnná zpráva k projektu Návrh systému pro testování zabezpečení sítě IPv6 a zpracování incidentů v prostoru privátních adres za rok 2015. Brno: CESNET, zájmové sdružení právnických osob, 2015. s. 1 (1 s.). Detail

    GRÉGR, M.; PODERMAŃSKI, T. IPv6: Doporučení pro konfiguraci aktivních prvků. Brno: Ministerstvo vnitra České republiky, 2015. s. 0-0. Detail

    GRÉGR, M.; PODERMAŃSKI, T. Metodika testování bezpečnostních vlastností IPv6 u aktivních prvků. Brno: Ministerstvo vnitra České republiky, 2015. s. 0-0. Detail

    GRÉGR, M.; PODERMAŃSKI, T. Bezpečné IPv6: příliš mnoho sousedů. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    GRÉGR, M.; PODERMAŃSKI, T. Bezpečné IPv6: trable s multicastem. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    GRÉGR, M.; PODERMAŃSKI, T. Bezpečné IPv6: vícehlavý útočník. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    GRÉGR, M.; PODERMAŃSKI, T. Bezpečné IPv6: zkrocení zlých směrovačů. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    GRÉGR, M.; PODERMAŃSKI, T.; ŠOLTÉS, M.; ŽÁDNÍK, M. IPv6: Bezpečná správa adresového prostoru. Brno: Ministerstvo vnitra České republiky, 2015. s. 0-0. Detail

    KARPÍŠEK, F.; BAGGILI, I.; BREITINGER, F. WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Digital Investigation, 2015, vol. 2015, no. 15, p. 110-118. ISSN: 1742-2876. Detail

    MATOUŠEK, P.; PLUSKAL, J.; RYŠAVÝ, O.; VESELÝ, V.; KMEŤ, M.; KARPÍŠEK, F.; VYMLÁTIL, M. Advanced Techniques for Reconstruction of Incomplete Network Data. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2015, vol. 2015, no. 157, p. 69-84. ISSN: 1867-8211. Detail

    OČENÁŠEK, P. Effective Synchronization of Data in Distributed Systems. In Information, Computer and Application Engineering - Proceedings of the International Conference on Information Technology and Computer Application Engineering, ITCAE 2014. Leiden: CRC Press LLC, 2015. p. 177-180. ISBN: 978-1-138-02717-6. Detail

    OČENÁŠEK, P. Information and Communication Management in Business Information Systems. In 2015 International Conference on Simulation, Modelling and Mathematical Statistics (SMMS 2015). Lancaster: DEStech Publications, Inc., 2015. p. 384-388. ISBN: 978-1-60595-112-6. Detail

    OČENÁŠEK, P.; TRCHALÍK, R. System for Remote Monitoring of Engineering Services. International Conference on Advances in Manufacturing and Materials Engineering (ICAMME 2014). Chennai: Elsevier Science, 2015. p. 1-3. ISBN: 978-1-63439-365-2. Detail

    PLUSKAL, J.; MATOUŠEK, P.; RYŠAVÝ, O.; KMEŤ, M.; VESELÝ, V.; KARPÍŠEK, F.; VYMLÁTIL, M. Netfox Detective: A tool for advanced network forensics analysis. Proceedings of Security and Protection of Information (SPI) 2015. Brno: University of Defence in Brno, 2015. p. 147-163. ISBN: 978-80-7231-997-8. Detail

    PLUSKAL, J.; RYŠAVÝ, O. Concepts of Intercepted Communication Processing with Netfox Detective. Praha: 2015. p. 0-0. Detail

    PODERMAŃSKI, T.; GRÉGR, M. Bezpečné IPv6 : směrovač se hlásí. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2014, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    PODERMAŃSKI, T.; GRÉGR, M. Bezpečné IPv6: když dojde keš - obrana. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    PODERMAŃSKI, T.; GRÉGR, M. Bezpečné IPv6: když dojde keš. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    PODERMAŃSKI, T.; GRÉGR, M. Bezpečné IPv6: trable s hlavičkami. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    PODERMAŃSKI, T.; GRÉGR, M. Implementujeme Carrier Grade NAT: Nečekané nástrahy. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    PODERMAŃSKI, T.; GRÉGR, M. Implementujeme Carrier Grade NAT: Zákon, alternativy a IPv6. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    PODERMAŃSKI, T.; GRÉGR, M. Implementujeme Carrier Grade NAT: Zálohování. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1, s. 1-10. ISSN: 1212-8309. Detail

    POLČÁK, L.; FRANKOVÁ, B. Clock-Skew-Based Computer Identification: Traps and Pitfalls. Journal of Universal Computer Science, 2015, vol. 21, no. 9, p. 1210-1233. ISSN: 0948-6968. Detail

    VESELÝ, V.; MAREK, M.; HYKEL, T.; RYŠAVÝ, O. Skip This Paper - RINASim: Your Recursive InterNetwork Architecture Simulator. Proceedings of 2nd OMNeT++ Community Summit. Ithaca, NY: Cornell University Library, 2015. p. 1-4. ISSN: 2331-8422. Detail

    VESELÝ, V.; MAREK, M.; HYKEL, T.; RYŠAVÝ, O.; LICHTNER, O. Deliverable 2.4: RINASim - basic functionality. Brno: 2015. p. 0-0. Detail

    VESELÝ, V.; MAREK, M.; HYKEL, T.; RYŠAVÝ, O.; LICHTNER, O.; JEŘÁBEK, K. Deliverable 2.6: RINASim - advanced functionality. Brno: 2015. p. 0-0. Detail

    VESELÝ, V.; REK, V.; RYŠAVÝ, O. Enhanced Interior Gateway Routing Protocol with IPv4 and IPv6 Support for OMNeT++. Advances in Intelligent Systems and Computing, 2015, vol. 402, no. 1, p. 65-82. ISSN: 2194-5357. Detail

    VESELÝ, V.; RYŠAVÝ, O. Locator/Id Split Protocol Improvement for High-Availability Environment. Proceedings of The Eleventh International Conference on Networking and Services ICNS 2015. Roma: The International Academy, Research and Industry Association, 2015. p. 61-67. ISBN: 978-1-61208-404-6. Detail

    VESELÝ, V.; RYŠAVÝ, O. Map-Cache Synchronization and Merged RLOC Probing Study for LISP. The International Journal on Advances in Intelligent Systems, 2015, vol. 2015, no. 34, p. 494-506. ISSN: 1942-2679. Detail

  • 2014

    GREGA, W.; HILBURN, T.; KORNECKI, A.; MAYR, R.; PYLE, I.; ROZENBLIT, J.; RYŠAVÝ, O.; ŠVÉDA, M.; ZHANG, L.; ZHANG, L. Proceedings of the International workshop on Cyber-Physical Systems. In 2013 Federated Conference on Computer Science and Information Systems. Krakow: Elsevier Science, 2014. p. 1-200. ISBN: 978-1-4673-4471-5. Detail

    GRÉGR, M.; MATOUŠEK, P.; PODERMAŃSKI, T.; ŠVÉDA, M. Practical IPv6 Monitoring on Campus - Best Practice Document. Vědecký sborník, 2014, vol. 2014, no. 1, p. 1-20. ISSN: 0572-3043. Detail

    GRÉGR, M.; PODERMAŃSKI, T.; ŠVÉDA, M. Measuring Quality and Penetration of IPv6 Services. The Tenth International Conference on Networking and Services. 74400 CHAMONIX MONT-BLANC: Institute for Systems and Technologies of Information, Control and Communication, 2014. p. 96-101. ISBN: 978-1-61208-330-8. Detail

    GRÉGR, M.; ŠVÉDA, M. Challenges with Transition and User Accounting in Next Generation Networks. In Proceedings 2014 IEEE 22nd International Conference on Network Protocols. Raleigh, NC, USA: Institute of Electrical and Electronics Engineers, 2014. p. 501-503. ISBN: 978-1-4799-6203-7. Detail

    HALFAR, P.; ŠVÉDA, M. Cyber-Physical Information Systems for Enterprise Engineering -- Cyber-Physical Applications Timing. In ICEIS Proceedings 2014. Lisabon: Institute for Systems and Technologies of Information, Control and Communication, 2014. p. 1-7. ISBN: 978-989-758-029-1. Detail

    HRANICKÝ, R. Rozšíření systému pro zákonné odposlechy. Proceedings of the 20th Conference STUDENT EEICT 2014. Volume 2. Brno: Vysoké učení technické v Brně, 2014. s. 271-273. ISBN: 978-80-214-4923-7. Detail

    KMEŤ, M. Analýza a detekce typu multimediálních dat v provozu RTP. Proceedings of the 20th Conference STUDENT EEICT 2014 Volume 2. Brno: Vysoké učení technické v Brně, 2014. s. 274-276. ISBN: 978-80-214-4923-7. Detail

    MATOUŠEK, P. Síťové služby a jejich architektura. Brno: Nakladatelství Vysokého učení technického v Brně VUTIUM, 2014. 396 s. ISBN: 978-80-214-3766-1. Detail

    MATOUŠEK, P.; KMEŤ, M.; BASEL, M. On-line Monitoring of VoIP Quality Using IPFIX. Advances in Electrical and Electronic Engineering - intenetový časopis (http://advances.utc.sk), 2014, vol. 2014, no. 4, p. 325-333. ISSN: 1804-3119. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; GRÉGR, M.; VYMLÁTIL, M. Towards Identification of Operating Systems from the Internet Traffic. IPFIX Monitoring with Fingerprinting and Clustering. In DCNET2014. Proceedings of the 5th International Conference on Data Communication Networking. Wien: SciTePress - Science and Technology Publications, 2014. p. 21-27. ISBN: 978-989-758-042-0. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; KMEŤ, M. Fast RTP Detection and Codecs Classification in Internet Traffic. The Journal of Digital Forensics, Security and Law, 2014, vol. 2014, no. 2, p. 99-110. ISSN: 1558-7215. Detail

    PLUSKAL, J. NetFox.Framework - The network forensic extandable analysis tool. Proceedings of the 20th Conference STUDENT EEICT 2014 Volume 2. Brno: Brno University of Technology, 2014. p. 280-282. ISBN: 978-80-214-4923-7. Detail

    PLUSKAL, J.; RYŠAVÝ, O.; VESELÝ, V. NetFox - The network forensic extandable analysis tool. 6th AFCEA Student Conference Future of Information and Communication Technology. Bucharest: University Politehnica of Bucharest, 2014. p. 68-71. ISBN: 978-606-551-047-0. Detail

    PODERMAŃSKI, T.; ŠVÉDA, M. IP45: Architecture, Design and Implementation. In The 22nd IEEE International Conference on Network Protocols (ICNP 2014). The Research Triangle, North Carolina, USA: IEEE Computer Society, 2014. p. 492-494. ISBN: 978-1-4799-6204-4. Detail

    POLČÁK, L.; FRANKOVÁ, B. On Reliability of Clock-skew-based Remote Computer Identification. In Proceedings of the 11th International Conference on Security and Cryptography. Wien: SciTePress - Science and Technology Publications, 2014. p. 291-298. ISBN: 978-989-758-045-1. Detail

    POLČÁK, L.; HOLKOVIČ, M.; MATOUŠEK, P. Host Identity Detection in IPv6 Networks. In E-Business and Telecommunications. Communications in Computer and Information Science. Berlin: Springer Verlag, 2014. p. 74-89. ISBN: 978-3-662-44787-1. ISSN: 1865-0929. Detail

    POLČÁK, L.; HRANICKÝ, R.; MARTÍNEK, T. On Identities in Modern Networks. The Journal of Digital Forensics, Security and Law, 2014, vol. 2014, no. 2, p. 9-22. ISSN: 1558-7215. Detail

    POLČÁK, L.; JIRÁSEK, J.; MATOUŠEK, P. Comment on "Remote Physical Device Fingerprinting". IEEE Transactions on Dependable and Secure Computing, 2014, vol. 11, no. 5, p. 494-496. ISSN: 1545-5971. Detail

    ŠVÉDA, M. Dependability in Cyber-Physical Systems Network Applications. Proceedings of the 5th International Conference on Circuits, Systems, Control, Signals 2014. Invited Talk. Salerno: North Atlantic University Union, 2014. p. 1-6. ISBN: 978-1-61804-204-0. Detail

    VESELÝ, V.; BLOUDÍČEK, J.; RYŠAVÝ, O. Enhanced Interior Gateway Routing Protocol for OMNeT++. Proceedings of the 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2014). Wien: SciTePress - Science and Technology Publications, 2014. p. 50-58. ISBN: 978-989-758-045-1. Detail

    VESELÝ, V.; MAREK, M.; RYŠAVÝ, O.; ŠVÉDA, M. Multicast, TRILL and LISP Extensions for INET. International Journal on Advances in Networks and Services, 2014, vol. 2014, no. 4, p. 240-251. ISSN: 1942-2644. Detail

    VESELÝ, V.; RYŠAVÝ, O.; ŠVÉDA, M. Protocol Independent Multicast in OMNeT++. The Tenth International Conference on Networking and Services. 74400 CHAMONIX MONT-BLANC: The International Academy, Research and Industry Association, 2014. p. 132-137. ISBN: 978-1-61208-330-8. Detail

  • 2013

    DE SILVA, G.; RYŠAVÝ, O.; MATOUŠEK, P.; ŠVÉDA, M. On formal reachability analysis in networks with dynamic behavior. TELECOMMUNICATION SYSTEMS, 2013, vol. 52, no. 2, p. 919-929. ISSN: 1018-4864. Detail

    OČENÁŠEK, P. Effective Design and Implementation of Distributed Business Information Systems. Applied Mechanics and Materials, 2013, vol. 2013, no. 307, p. 451-454. ISSN: 1660-9336. Detail

    OČENÁŠEK, P. Effective Design and Implementation of Distributed Business Information Systems. In Proceedings of 2012 International Conference on Mechatronics and Applied Mechanics. Applied Mechanics and Materials. Hong Kong: National Taiwan University, 2013. p. 451-454. ISBN: 978-3-03785-659-8. ISSN: 1660-9336. Detail

    OČENÁŠEK, P. The Practice of Global Internet Filtering. In Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2013. p. 332-337. ISBN: 978-3-642-39344-0. ISSN: 0302-9743. Detail

    OČENÁŠEK, P.; KARMAZÍN, J. On the Secure and Safe Data Synchronization. In Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2013. p. 326-331. ISBN: 978-3-642-39344-0. ISSN: 0302-9743. Detail

    OČENÁŠEK, P.; ŠVÉDA, M. Communication in Business Information Systems - New Perspectives. International Academic Research Journal of Business and Management, 2013, vol. 1, no. 7, p. 87-92. ISSN: 2227-1287. Detail

    OČENÁŠEK, P.; ŠVÉDA, M. On the Effective Internet Communication Filtering. Applied Mechanics and Materials, 2013, vol. 2013, no. 307, p. 478-481. ISSN: 1660-9336. Detail

    OČENÁŠEK, P.; ŠVÉDA, M. On the Effective Internet Communication Filtering. In Proceedings of the 2012 ICMCM Conference. Applied Mechanics and Materials. Dubaj: Trans Tech Publications Inc., 2013. p. 478-481. ISBN: 978-3-03785-659-8. ISSN: 1660-9336. Detail

    PODERMAŃSKI, T. S IPv6 na věčné časy a nikdy jinak. Praha: 2013. s. 0-0. Detail

    RYŠAVÝ, O.; RÁB, J.; ŠVÉDA, M. Improving security in SCADA systems through firewall policy analysis. Proceedings of the Federated Conference on Computer Science and Information Systems. Krakow: IEEE Computer Society, 2013. p. 1435-1440. ISBN: 978-1-4673-4471-5. Detail

    ŠVÉDA, M. Time in Cyber-Physical Systems: Specifications, Modeling and Measurements. Proceedings of the SCSI 2013. Recent Advances in Electrical Engineering Series, 16. Rhodes Island: European Society for Environmental Research and Sustainable Development, 2013. p. 413-419. ISBN: 978-1-61804-204-0. Detail

    ŠVÉDA, M. Time Specification, Modeling and Measurement in frame of Cyber-Physical System Applications Design. International Journal of Systems Applications, Engineering & Development, 2013, vol. 7, no. 5, p. 263-270. ISSN: 2074-1308. Detail

    ŠVÉDA, M.; RYŠAVÝ, O. Dependable Cyber-Physical Systems Networking: An Approach for Real-Time, Software Intensive Systems. Programmable Devices and Embedded Systems. Programmable devices and systems. Volume #12. Laxenburg: IFAC, 2013. p. 1-4. ISBN: 978-3-902823-21-2. ISSN: 1474-6670. Detail

    ŠVÉDA, M.; VRBA, R. Cyber-Physical Systems Networking with TCP/IP -- A Security Application Approach. IEEE Proceedings AFRICON 2013. New York: Institute of Electrical and Electronics Engineers, 2013. p. 101-106. ISBN: 978-1-4673-5943-6. Detail

    VESELÝ, V. Map-keš synchronizace pro LISP. Proceedings of the 19th Conference Student EEICT 2013 Volume 3. Brno: Fakulta informačních technologií VUT v Brně, 2013. s. 234-239. ISBN: 978-80-214-4695-3. Detail

    VESELÝ, V. LISP: nové paradigma ve směrování (1.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 9, s. 1-6. ISSN: 1212-8309. Detail

    VESELÝ, V. LISP: nové paradigma ve směrování (2.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 9, s. 1-6. ISSN: 1212-8309. Detail

    VESELÝ, V. LISP: nové paradigma ve směrování (3.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 10, s. 1-6. ISSN: 1212-8309. Detail

    VESELÝ, V. LISP: nové paradigma ve směrování (4.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 10, s. 1-6. ISSN: 1212-8309. Detail

    VESELÝ, V. LISP: nové paradigma ve směrování (5.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 10, s. 1-6. ISSN: 1212-8309. Detail

    VESELÝ, V.; MATOUŠEK, P.; ŠVÉDA, M. Multicast simulation and modeling in OMNeT++. SimuTools '13 Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques. Brussels: International Communication Sciences and Technology Association, 2013. p. 142-145. ISBN: 978-1-4503-2464-9. Detail

    VESELÝ, V.; RYŠAVÝ, O.; ŠVÉDA, M. IPv6 Unicast and IPv4 Multicast Routing in OMNeT++. Proceedings of the IEEE 6th International ICST Conference on Simulation Tools and Techniques. Cannes: International Communication Sciences and Technology Association, 2013. p. 1-4. ISBN: 978-1-936968-47-3. Detail

    VESELÝ, V.; ŠVÉDA, M. Comparison of Proposals Suggesting Internet Architecture Change. Sborník příspěvků Mezinárodní Masarykovy konference pro doktorandy a mladé vědecké pracovníky 2013. Hradec Králové: Akademické sdružení MAGNANIMITAS Assn., 2013. p. 1-11. ISBN: 978-80-87952-00-9. Detail

  • 2012

    GRÉGR, M.; PODERMAŃSKI, T.; ŠVÉDA, M. User identification in IPV6 network. In IP Networking 1 -- Theory and Practice. Žilina: Zilina University Publisher, 2012. p. 5-8. ISBN: 978-80-554-0494-3. Detail

    HALFAR, P.; RÁB, J.; RYŠAVÝ, O.; ŠVÉDA, M. A Formal Authorization Framework for Networked SCADA Systems. Proceedings IEEE ECBS 2012. Novy Sad: IEEE Computer Society, 2012. p. 298-302. ISBN: 978-0-7695-4664-3. Detail

    HRANICKÝ, R. Podvržená data v počítačových sítích. Proceedings of the 18th Conference Student EEICT 2012. Volume 1. Brno: Vysoké učení technické v Brně, 2012. s. 164-166. ISBN: 978-80-214-4460-7. Detail

    OČENÁŠEK, P.; HRANÁČ, J. Design of Authentication and Key Distribution Protocols with Routing Functionality. Journal of Information & Communication Technology, 2012, vol. 5, no. 1, p. 1-11. ISSN: 1816-613X. Detail

    OČENÁŠEK, P.; MÍCHAL, L. Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae. Applied Mechanics and Materials, 2012, vol. 2012, no. 157, p. 870-873. ISSN: 1660-9336. Detail

    OČENÁŠEK, P.; MÍCHAL, L. Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae. In Proceedings of 2011 International Conference on Mechatronics and Applied Mechanics (ICMAM 2011). Applied Mechanics and Materials. Hongkong: Trans Tech Publications Inc., 2012. p. 870-873. ISBN: 978-3-03785-380-1. ISSN: 1660-9336. Detail

    OČENÁŠEK, P.; ŠVÉDA, M. Communication in Business Information Systems - New Perspectives. Proceedings of ARC 2012 International Conference on Business and Management. Bangalore: Siemens, Corporate Research and Development, 2012. p. 257-262. ISBN: 978-0-615-73960-1. Detail

    OČENÁŠEK, P.; ŠVÉDA, M. Analysis and Filtering of Network Communication in ISP Firewalls. Lecture Notes in Information Technology, 2012, vol. 2012, no. 38, p. 491-494. ISSN: 2070-1918. Detail

    PLUSKAL, J. Analýza a rekonstrukce komunikace typu instant messaging (YMSG a ICQ). Proceedings of the 18th Conference Student EEICT 2012 Volume 1. Brno: Fakulta informačních technologií VUT v Brně, 2012. s. 176-178. ISBN: 978-80-214-4460-7. Detail

    RYŠAVÝ, O.; ŠVÉDA, M.; VRBA, R. A Framework for Cyber-Physical Systems Design - A Concept Study. Proceedings ICONS 2012. Saint Gilles, Reunion Island: International Academy, Research, and Industry Association, 2012. p. 79-82. ISBN: 978-1-61208-184-7. Detail

    ŠVÉDA, M.; RYŠAVÝ, O.; DE SILVA, G.; MATOUŠEK, P.; RÁB, J. Static Analysis of Routing and Firewall Policy Configurations. In e-Business and Telecommunications. Communications in Computer and Information Science. LNCS CCIS, Vol.222. Heidelberg: Springer Science+Business Media B.V., 2012. p. 39-53. ISBN: 978-3-642-25205-1. ISSN: 1865-0929. Detail

    ŠVÉDA, M.; SEKLETÁR, M.; FIDLER, T.; RYŠAVÝ, O. A High-level Network-wide Router Configuration Language. Proceedings ICN 2012. Saint Gilles, Reunion Island: International Academy, Research, and Industry Association, 2012. p. 18-21. ISBN: 978-1-61208-183-0. Detail

    TRCHALÍK, R.; ŠVÉDA, M. Unified Sensor Gateway Interconnection of Sensor Networks. Proceedings 11th IFAC/IEEE International Conference on Programmable Devices and Embedded Sy. Programmable devices and systems. Programmable Devices and Embedded Systems, Volume # 11 | Part# 1. Brno: Faculty of Electrical Engineering and Communication BUT, 2012. p. 372-377. ISBN: 978-3-902823-21-2. ISSN: 1474-6670. Detail

    VESELÝ, V. Srovnávací studie spojování PCAP souborů. Proceedings of the 18th Conference Student EEICT 2012 Volume 3. Brno: Fakulta informačních technologií VUT v Brně, 2012. s. 457-461. ISBN: 978-80-214-4462-1. Detail

    VESELÝ, V. Rozšíření porovnávací studie o spojování PCAP souborů. ElectroScope - http://www.electroscope.zcu.cz, 2012, roč. 2012, č. 5, s. 1-6. ISSN: 1802-4564. Detail

    VESELÝ, V.; MATOUŠEK, P.; ŠVÉDA, M. Multicast Simulation and Modeling in OMNeT++. Proceedings of the IEEE 5th International ICST Conference on Simulation Tools and Techniques. Desenzano del Garda: International Communication Sciences and Technology Association, 2012. p. 298-301. ISBN: 978-1-936968-47-3. Detail

    VESELÝ, V.; ŠVÉDA, M. L2 protocols in OMNeT++. In IP Networking 1 -- Theory and Practice. Žilina: Zilina University Publisher, 2012. p. 37-40. ISBN: 978-80-554-0494-3. Detail

  • 2011

    ELICH, M.; GRÉGR, M.; ČELEDA, P. Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX. Traffic Monitoring and Analysis. Lecture Notes in Computer Science. Vienna: Springer Verlag, 2011. p. 64-71. ISBN: 978-3-642-20304-6. Detail

    GRÉGR, M.; MATOUŠEK, P.; PODERMAŃSKI, T.; ŠVÉDA, M. Practical IPv6 Monitoring - Challenges and Techniques. Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). Dublin: IEEE Computer Society, 2011. p. 660-663. ISBN: 978-1-4244-9220-6. Detail

    OČENÁŠEK, P. An Approach for Security Protocol Design Based on Zero-knowledge Primitives Composition. Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2011. p. 374-378. ISBN: 978-3-642-21792-0. Detail

    OČENÁŠEK, P. Analysis of Authentication Protocols with Scyter: Case Study. Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2011. p. 359-365. ISBN: 978-3-642-21792-0. Detail

    OČENÁŠEK, P. Specification of Traces in the Security Protocols Analysis. Proceedings of 33rd International Conference on INFORMATION TECHNOLOGY INTERFACES. Dubrovnik: Institute of Electrical and Electronics Engineers, 2011. p. 115-118. ISBN: 978-953-7138-20-2. Detail

    OČENÁŠEK, P.; HRANÁČ, J. Routing Functionality in the Logic Approach for Authentication Protocol Design. Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2011. p. 366-373. ISBN: 978-3-642-21792-0. Detail

    OČENÁŠEK, P.; TRCHALÍK, R. Approaches to the Security and Payment Protocols Design: State of the Art. International Conference on INFORMATION TECHNOLOGY INTERFACES. Dubrovnik: Institute of Electrical and Electronics Engineers, 2011. p. 1-4. ISBN: 978-953-7138-21-9. Detail

    PODERMAŃSKI, T. IPv6 - bezpečnostní hrozby (aneb IPSec to srovná). Sborník příspěvků z 38. konference EurOpen.CZ, 8.-11. května 2011. Plzeň: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2011. s. 37-50. ISBN: 978-80-86583-21-1. Detail

    PODERMAŃSKI, T. IPv6 Mýty a skutečnost, díl I. - Jak jsme na tom. Lupa, 2011, roč. 2011, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    PODERMAŃSKI, T. IPv6 Mýty a skutečnost, díl II. - Adresový prostor. Lupa, 2011, roč. 2011, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    PODERMAŃSKI, T. IPv6 Mýty a skutečnost, díl IX. - Quo Vadis, IPv6?. Lupa, 2011, roč. 2011, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    PODERMAŃSKI, T. IPv6 Mýty a skutečnost: díl III. - podpora end-to-end služeb. Lupa, 2011, roč. 2011, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    PODERMAŃSKI, T.; GRÉGR, M. IPv6 Mýty a skutečnost, díl IV. - Podpora autokonfigurace. Lupa, 2011, roč. 2011, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    PODERMAŃSKI, T.; GRÉGR, M. IPv6 Mýty a skutečnost, díl V. - Zjednodušené hlavičky. Lupa, 2011, roč. 2011, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    PODERMAŃSKI, T.; GRÉGR, M. IPv6 Mýty a skutečnost, díl VI. - Bezpečnostní mechanizmy. Lupa, 2011, roč. 2011, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    PODERMAŃSKI, T.; GRÉGR, M. IPv6 Mýty a skutečnost, díl VIII. - Přechodové mechanizmy. Lupa, 2011, roč. 2011, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    PODERMAŃSKI, T.; VESELÝ, V. IPv6 Mýty a skutečnost, díl VII. - Podpora Multicast a anycast provozu. Lupa, 2011, roč. 2011, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    POLČÁK, L. Designing Lawful Interception System. Proceedings of the 17th Conference STUDENT EEICT 2011 Volume 3. Brno: Faculty of Information Technology BUT, 2011. p. 569-573. ISBN: 978-80-214-4273-3. Detail

    POLČÁK, L.; GRÉGR, M.; KAJAN, M.; MATOUŠEK, P.; VESELÝ, V. Designing Lawful Interception in IPv6 Networks. Security and Protection of Information. Brno: University of Defence in Brno, 2011. p. 114-126. ISBN: 978-80-7231-777-6. Detail

    ŠVÉDA, M. Design Experience with Routing SW and Related Applications. Proceedings of The Tenth International Conference on Networks - ICN 2011. St. Maarten: International Academy, Research, and Industry Association, 2011. p. 133-138. ISBN: 978-1-61208-002-4. Detail

    ŠVÉDA, M.; RYŠAVÝ, O.; DE SILVA, G.; MATOUŠEK, P.; RÁB, J. Reachability Analysis in Dynamically Routed Networks. Proceedings of the IEEE ECBS 2011. Piscataway, NJ: IEEE Computer Society, 2011. p. 197-205. ISBN: 978-0-7695-4379-6. Detail

    ŠVÉDA, M.; RYŠAVÝ, O.; MATOUŠEK, P. Supporting Safe and Secure Networked System Design. Computer Aided Systems Theory (EUROCAST´11), Extended Abstracts. Las Palmas de Gran Canaria: The Universidad de Las Palmas de Gran Canaria, 2011. p. 22-23. ISBN: 978-84-693-9560-8. Detail

    ŠVÉDA, M.; VRBA, R. A Cyber-Physical System Design Approach. Proceedings of The Sixth International Conference on Systems - ICONS 2011. St. Maarten: International Academy, Research, and Industry Association, 2011. p. 12-18. ISBN: 978-1-61208-002-4. Detail

    VOGEL, I.; OČENÁŠEK, P.; ZEDEK, F. Computational molecular evolution - from mathematical models to novel distance metric based on intra-group analysis. EDS '11 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2011. p. 264-269. ISBN: 978-80-214-4303-7. Detail

    VOGEL, I.; ZEDEK, F.; OČENÁŠEK, P. Constructing Phylogenetic Trees Based on Intra-Group Analysis of Human Mitochondrial DNA. In Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2011. p. 165-169. ISBN: 978-3-642-21792-0. ISSN: 0302-9743. Detail

  • 2010

    GRÉGR, M. Portscan detection using NetFlow data. Proceedings of the 16th Conference Student EEICT 2010 Volume 5. Brno: Faculty of Information Technology BUT, 2010. p. 229-233. ISBN: 978-80-214-4080-7. Detail

    KORNECKI, A.; GREGA, W.; HILBURN, T.; THIRIET, J.; ŠVÉDA, M.; RYŠAVÝ, O.; PILAT, A. Transatlantic Engineering Programs: An Experience in International Cooperation. In Safeeullah Soomro (Editor): Engineering the Computer Science and IT. 2010. Vienna: IN-TECH Education and Publishing, 2010. p. 65-84. ISBN: 978-953-307-012-4. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; DE SILVA, G.; DANKO, M. Combination of Simulation and Formal Methods to Analyse Network Survivability. Proceedings of the IEEE 3rd International ICST Conference on Simulation Tools and Techniques. Malaga: International Communication Sciences and Technology Association, 2010. p. 150-155. ISBN: 978-963-9799-87-5. Detail

    OČENÁŠEK, P. On the Design of Communication in Business Information Systems. Proceedings of 2010 International Conference on Economics, Business and Management. Chengdu: Institute of Electrical and Electronics Engineers, 2010. p. 98-101. ISBN: 978-1-4244-9202-2. Detail

    OČENÁŠEK, P.; FELIX, M. Camera and Sensor Monitoring System. EDS '10 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2010. p. 241-245. ISBN: 978-80-214-4138-5. Detail

    OČENÁŠEK, P.; HRANÁČ, J. Regression Based Logic for Authentication Protocol Design. 2010 International Conference on Communication and Vehicular Technology. Chengdu: Institute of Electrical and Electronics Engineers, 2010. p. 89-92. ISBN: 978-1-4244-9674-7. Detail

    OČENÁŠEK, P.; KUČEROVÁ, P. Analysis of Selected Payment Protocols. EDS '10 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2010. p. 235-240. ISBN: 978-80-214-4138-5. Detail

    OČENÁŠEK, P.; PAPEŽ, Z. A Knowledge-Belief Approach to the Security Protocol Analysis. 2010 International Conference on Communication and Vehicular Technology. Chengdu: Institute of Electrical and Electronics Engineers, 2010. p. 85-88. ISBN: 978-1-4244-9674-7. Detail

    PODERMAŃSKI, T. Je libo IPv6 na přepínačích HP ProCurve ?. Lupa, 2010, roč. 2010, č. 1, s. 0-0. ISSN: 1213-0702. Detail

    PODERMAŃSKI, T. Redundance od síťové vrstvy až po zařízení (Maximum pro síťovou jistotu). Journal CONNECT!, 2010, roč. 10, č. 4, s. 18-20. ISSN: 1211-3085. Detail

    ŠVÉDA, M. Fault Management Driven Design with Safety and Security Requirements. Proceedings 17th IEEE International Conference and Workshops on Engineering of Computer-Based Systems ECBS 2010. Oxford: IEEE Computer Society, 2010. p. 113-120. ISBN: 978-0-7695-4005-4. Detail

    ŠVÉDA, M. NETWORK CONVERGENCY AND MODELING -- Design Experience with Routing SW for Intranets and Fieldbusses. Proceedings of the Fifth International Conference on Software and Data Technologies, ICSOFT 2010. Athens: Institute for Systems and Technologies of Information, Control and Communication, 2010. p. 173-178. ISBN: 978-989-8425-22-5. Detail

    ŠVÉDA, M.; RYŠAVÝ, O.; MATOUŠEK, P.; RÁB, J. An Approach for Automated Network-Wide Security Analysis. Proceedings of the Ninth International Conference on Networks ICN 2010. Les Menuires: IEEE Computer Society, 2010. p. 294-299. ISBN: 978-0-7695-3979-9. Detail

    ŠVÉDA, M.; RYŠAVÝ, O.; MATOUŠEK, P.; RÁB, J.; ČEJKA, R. SECURITY ANALYSIS OF TCP/IP NETWORKS -- An Approach to Automatic Analysis of Network Security Properties. Proceedings of the International Conference on Data Communication Networking ICETE-DCNET 2010. Athens: Institute for Systems and Technologies of Information, Control and Communication, 2010. p. 5-11. ISBN: 978-989-8425-25-6. Detail

    ŠVÉDA, M.; TRCHALÍK, R. Development of Interconnecting SW for Intranets and Fieldbuses. Programmable devices and systems, 2010, vol. 2010, no. 10, p. 119-124. ISSN: 1474-6670. Detail

    ŠVÉDA, M.; VRBA, R. An Embedded Application Regarded as Cyber-Physical System. Proceedings of the Fifth International Conference on Systems ICONS 2010. Les Menuires: IEEE Computer Society, 2010. p. 170-174. ISBN: 978-0-7695-3980-5. Detail

    VESELÝ, V. Security Issues of Bootstrap Router Mechanism in Protocol Independent Multicast. Proceedings of the 16th Conference Student EEICT 2010 Volume 5. Brno: Faculty of Information Technology BUT, 2010. p. 239-243. ISBN: 978-80-214-4080-7. Detail

  • 2009

    GREGA, W.; HILBURN, T.; KORNECKI, A.; RYŠAVÝ, O.; ŠVÉDA, M.; THIRIET, J. Methodology for Creation of Multidisciplinary, Transatlantic Engineering Program in Information Technology. Proceedings of the European Association for Education in Electrical and Information Engineering Council's Annual Conference 2009. Valencia: Politechnical University of Valencia, 2009. p. 1-5. ISBN: 978-84-8363-428-8. Detail

    KORNECKI, A.; HILBURN, T.; GREGA, W.; ŠVÉDA, M.; THIRIET, J. ILERT - International Learning Environment for Real-Time Software-Intensive Control Systems. Journal of Automation, Mobile Robotics and Intelligent Systems, 2009, vol. 3, no. 1, p. 66-71. ISSN: 1897-8649. Detail

    OČENÁŠEK, P. An Approach for the Design of Secure Communication in Embedded Systems. Human Interface and the Management of Information. Designing Information Environments. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2009. p. 579-586. ISBN: 978-3-642-02555-6. Detail

    OČENÁŠEK, P. Towards Security Issues in ZigBee Architecture. Human Interface and the Management of Information. Designing Information Environments. Berlin: Springer Verlag, 2009. p. 587-593. ISBN: 978-3-642-02555-6. Detail

    OČENÁŠEK, P. Universal Access to the Internet Web Pages for Users with Special Needs. Universal Access in Human-Computer Interaction. Applications and Services. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2009. p. 764-767. ISBN: 978-3-642-02712-3. Detail

    OČENÁŠEK, P.; KUČEROVÁ, P. Payment Protocols Verification: A Case Study. EDS '09 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2009. p. 38-43. ISBN: 978-80-214-3933-7. Detail

    OČENÁŠEK, P.; ŠVÉDA, M. A Model for Measurement and Analysis of the Workflow Processes. Human Interface and the Management of Information. Designing Information Environments. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2009. p. 149-153. ISBN: 978-3-642-02555-6. Detail

    OČENÁŠEK, P.; ŠVÉDA, M. AVISPA: Towards Practical Verification of Communication Properties. Proceedings 9th IFAC International Conference on Programmable Devices and Embedded Systems. Programmable devices and systems. Programmable Devices and Embedded Systems, Volume # 9 | Part# 1. Ostrava: IFAC, 2009. p. 153-156. ISBN: 978-3-902661-41-8. ISSN: 1474-6670. Detail

    OČENÁŠEK, P.; TRCHALÍK, R.; ŠVÉDA, M. On the Implementation of Metrics in Industrial Embedded Systems. Proceedings 9th IFAC International Conference on Programmable Devices and Embedded Systems. Programmable devices and systems. Programmable Devices and Embedded Systems, Volume # 9 | Part# 1. Ostrava: IFAC, 2009. p. 157-160. ISBN: 978-3-902661-41-8. ISSN: 1474-6670. Detail

    RYŠAVÝ, O.; RÁB, J. A Formal Model of Composing Components: The TLA+ Approach. Innovations in Systems and Software Engineering, 2009, vol. 5, no. 2, p. 139-149. ISSN: 1614-5046. Detail

    ŠVÉDA, M. Fault Management for Secure Embedded Systems. International Conference on Systems Proceedings, ICONS 2009. New York, NY: IEEE Computer Society, 2009. p. 23-28. ISBN: 978-0-7695-3551-7. Detail

    ŠVÉDA, M. Safe and Secure Networked Embedded Applications. Proceedings of the 4th International Conference on Broadband Communication. Wroclaw: Institute of Electrical and Electronics Engineers, 2009. p. 137-142. ISBN: 978-83-7493-405-3. Detail

    ŠVÉDA, M.; KORNECKI, A.; HILBURN, T.; GREGA, W.; THIRIET, J.; RYŠAVÝ, O. Real-Time Software-Intensive Systems Engineering: An International Perspective. European Association for Education in Electrical and Information Engineering Council's Annual Conference 2009. Valencia: Politechnical University of Valencia, 2009. p. 1-6. ISBN: 978-84-8363-428-8. Detail

    ŠVÉDA, M.; VRBA, R. Specifications of Secure and Safe Embedded System Networks. 8th International Conference on Networks Proceedings ICN 2009. New York, NY: IEEE Computer Society, 2009. p. 220-225. ISBN: 978-0-7695-3552-4. Detail

    ŠVÉDA, M.; VRBA, R. Meta-Design with Safe and Secure Embedded System Networking. International Journal On Advances in Security., 2009, vol. 2, no. 1, p. 8-15. ISSN: 1942-2636. Detail

    THIRIET, J.; HILBURN, T.; KORNECKI, A.; GREGA, W.; ŠVÉDA, M. Organization of a US-European Trans-national Degree in Engineering. J3eA - Journal sur l'enseignement des sciences et technologies de l'information et des systèmes, 2009, vol. 2009, no. 1, p. 1-7. ISSN: 1638-1963. Detail

    TRCHALÍK, R. A Component-Based model for Embedded Software. EDS '09 IMAPS CS International Conference Proceedings. Brno, CZ: Brno University of Technology, 2009. p. 1-5. ISBN: 978-80-214-3933-7. Detail

  • 2008

    ČEJKA, R. Nekempujte v serverovně. Journal CONNECT!, 2008, roč. 2008, č. 5, s. 44-45. ISSN: 1211-3085. Detail

    ČEJKA, R. Zálohováním ke klidnějšímu spánku. Journal CONNECT!, 2008, roč. 2008, č. 7, s. 57-59. ISSN: 1211-3085. Detail

    HILBURN, T.; KORNECKI, A.; THIRIET, J.; GREGA, W.; ŠVÉDA, M. An RSIC-SE2004 Curriculum Framework. IEEE Proceedings of International Multiconference on Computer Science and Information Technology - Real-Time Software. Computer Science and Information Technology. Wisla: IEEE Computer Society, 2008. p. 633-638. ISBN: 978-83-60810-14-9. ISSN: 1896-7094. Detail

    HILBURN, T.; THIRIET, J.; KORNECKI, A.; GREGA, W.; ŠVÉDA, M. Credits and Accreditation in the U.S.A. and Europe: Towards a Framework for Trans-national Engineering Degrees. Inovations, 2008, vol. 2008, no. 1, p. 29-42. ISSN: 1553-9911. Detail

    KORNECKI, A.; HILBURN, T.; GREGA, W.; THIRIET, J.; ŠVÉDA, M. A COMMON US-EUROPE CURRICULUM: An Approach for Real-Time Software Intensive Systems. Proceedings of the 2008 ASEE Anual Conference & Exposition. Pittsburgh, PA: American Society for Engineering Education, 2008. p. 1359-1371. ISBN: 0-87823-196-X. Detail

    MATOUŠEK, P.; RYŠAVÝ, O.; RÁB, J.; ŠVÉDA, M. A Formal Model for Network-wide Security Analysis. Proceeding of the 15 IEEE International Symposium and Workshop on the Engineering of Computer-based Systems. Belfast: University of Ulster, 2008. p. 171-181. ISBN: 0-7695-3141-5. Detail

    OČENÁŠEK, P. A Proxy-Based System for Translation of Internet Content into Specific Form. Computer-Human Interaction. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2008. p. 413-419. ISBN: 978-3-540-70584-0. Detail

    OČENÁŠEK, P. Modification of Web Content According to the User Requirements. Technologies for E-Learning and Digital Entertainment. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2008. p. 324-327. ISBN: 978-3-540-69734-3. Detail

    OČENÁŠEK, P.; BRENER, R. Financial Portal: systém pro sledování a analýzu finančního trhu. Management, Economics and Business Development in the New European Conditions. Brno: Akademické nakladatelství CERM sro., 2008. s. 1-9. ISBN: 978-80-7204-582-2. Detail

    OČENÁŠEK, P.; KUČEROVÁ, P. Srovnání platebních systémů v ČR a zahraničí. Management, Economics and Business Development in the New European Conditions. Brno: Akademické nakladatelství CERM sro., 2008. s. 1-10. ISBN: 978-80-7204-582-2. Detail

    OČENÁŠEK, P.; TRCHALÍK, R. Using AVISPA in the Education of Network Security. EDS '08 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2008. p. 1-8. ISBN: 978-80-214-3717-3. Detail

    PILAT, A.; KORNECKI, A.; THIRIET, J.; GREGA, W.; ŠVÉDA, M. Industry Feedback on Skills and Knowledge. Proceedings of the 19th EAEEIE Annual Conference. Tallin: IEEE Computer Society, 2008. p. 129-133. ISBN: 978-1-4244-2009-4. Detail

    RYŠAVÝ, O.; RÁB, J. A Component-based Approach to Verification of Embedded Control Systems using TLA+. IEEE Proceedings of International Multiconference on Computer Science and Information Technology. Wisla: IEEE Computer Society Press, 2008. p. 719-725. ISBN: 978-83-60810-14-9. Detail

    ŠVÉDA, M.; RYŠAVÝ, O.; VRBA, R. Pattern-driven Reuse of Behavioral Specifications in Embedded Control System Design. In Frontiers in Robotics, Automation and Control. Vienna: IN-TECH Education and Publishing, 2008. p. 151-164. ISBN: 978-953-7619-17-6. Detail

    ŠVÉDA, M.; VRBA, R. Meta-Design Support for Safe and Secure Networked Embedded Systems. IEEE Proceedings of the Third International Conference on Systems, ICONS 2008. New York: IEEE Computer Society, 2008. p. 69-74. ISBN: 978-0-7695-3105-2. Detail

    THIRIET, J.; HILBURN, T.; KORNECKI, A.; GREGA, W.; ŠVÉDA, M. Implementation for a US-European Trans-national Degree in Real-Time Software Engineering. Proceedings of the 19th EAEEIE Annual Conference. Tallin: IEEE Computer Society, 2008. p. 134-137. ISBN: 978-1-4244-2009-4. Detail

    TRCHALÍK, R.; OČENÁŠEK, P.; ŠVÉDA, M. Using MSC and SDL Languages for Description of Network Communication. EDS '08 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2008. p. 1-5. ISBN: 978-80-214-3717-3. Detail

    ŽÁDNÍK, M. Monitorování sítí na základě IP toků. Journal CONNECT!, 2008, roč. 2008, č. 2, s. 14-15. ISSN: 1211-3085. Detail

  • 2007

    KORNECKI, A.; HILBURN, T.; GREGA, W.; THIRIET, J.; ŠVÉDA, M. ILERT - International Learning Environment for Real-Time Software Intensive Control Systems. Computer Science and Information Technology, 2007, vol. 2007, no. 2, p. 943-948. ISSN: 1896-7094. Detail

  • 2004

    OČENÁŠEK, P. On Inductive Approach in Security Protocol Verification. Proceedings of the 10th Conference and Competition STUDENT EEICT 2004. Brno: Faculty of Electrical Engineering and Communication BUT, 2004. p. 272-276. ISBN: 80-214-2635-7. Detail

    VRBA, R.; ŠVÉDA, M.; MAREČEK, K. Pressure Transducer with Multiplexed Frequency Transmitter. Proceedings of the 2004 ISA/IEEE Sensors for Industry Conference. New Orleans, LA: IEEE Computer Society, 2004. p. 7-10. ISBN: 0-7803-8143-2. Detail

  • 2003

    OČENÁŠEK, P. Verifikace bezpečnostních protokolů. Proceedings of the 9th Conference and Competition STUDENT EEICT 2003. Brno: Fakulta elektrotechniky a komunikačních technologií VUT v Brně, 2003. s. 211-213. ISBN: 80-214-2377-3. Detail

    ŠČUGLÍK, F. Visualizing formal specifications using diagrams. 11. International Conference on Software, Telecommunications & Computer Networks. Split: Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture , University of Split, 2003. p. 165-169. ISBN: 953-6114-64-X. Detail

  • 2002

    ŠČUGLÍK, F. Comparing CSP representation and First order logic. Proceedings of the 9th Electronic Devices and Systems Conference EDS'02. Brno: Brno University of Technology, 2002. p. 341-344. ISBN: 80-214-2180-0. Detail

    ŠČUGLÍK, F. Formal specification and verification of already composed systems. Proceedings of 8th Conference STUDENT EEICT 2002. Brno: Faculty of Electrical Engineering and Communication BUT, 2002. p. 511-515. ISBN: 80-214-2116-9. Detail

Nahoru