NES@FIT - Výzkumná skupina počítačové sítě
Publikace
-
2024
MATOUŠEK, P.; RYŠAVÝ, O.; BURGETOVÁ, I. Experience Report: Using JA4+ Fingerprints for Malware Detection in Encrypted Traffic. 2024.
p. 0-0. DetailMUTUA, N.; NADJM-TEHRANI, S.; MATOUŠEK, P. Penetrating the Power Grid: Realistic Adversarial Attacks on Smart Grid Intrusion Detection Systrems. 2024.
p. 1-19. Detail -
2023
BURGET, R. Scraping Data from Web Pages using SPARQL Queries. Web Engineering - 23rd International Conference, ICWE 2023. Lecture Notes in Computer Science. Alicante: Springer Nature Switzerland AG, 2023.
p. 293-300. ISBN: 978-3-031-34443-5. DetailBURGET, R.; SALEM, H. Creating Searchable Web Page Snapshots using Semantic Technologies. Web Engineering - 23rd International Conference, ICWE 2023. Lecture Notes in Computer Science. Alicante: Springer Nature Switzerland AG, 2023.
p. 355-358. ISBN: 978-3-031-34443-5. DetailDOLEJŠKA, D.; KOUTENSKÝ, M.; VESELÝ, V.; PLUSKAL, J. Busting up Monopoly: Methods for Modern Darknet Marketplace Forensics. Forensic Science International: Digital Investigation, 2023, vol. 46, no. 1,
p. 1-11. ISSN: 2666-2817. DetailHAVLENA, V.; MATOUŠEK, P.; RYŠAVÝ, O.; HOLÍK, L. Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication. IEEE Transactions on Smart Grid, 2023, vol. 2023, no. 14,
p. 2352-2366. ISSN: 1949-3053. DetailIMERI, A.; RYŠAVÝ, O. Deep learning for predictive alerting and cyber-attack mitigation. In IEEE 13th Annual Computing and Communication Workshop and Conference, CCWC 2023. Las Vegas: IEEE Computer Society, 2023.
p. 476-481. ISBN: 978-3-319-93490-7. DetailJEŘÁBEK, K.; HYNEK, K.; RYŠAVÝ, O.; BURGETOVÁ, I. DNS over HTTPS Detection Using Standard Flow Telemetry. IEEE Access, 2023, vol. 2023, no. 11,
p. 50000-50012. ISSN: 2169-3536. DetailPOLČÁK, L.; JEŘÁBEK, K. Data Protection and Security Issues with Network Error Logging. In Proceedings of the 20th International Conference on Security and Cryptography. Řím: SciTePress - Science and Technology Publications, 2023.
p. 683-690. ISBN: 978-989-758-666-8. DetailPOLČÁK, L.; SALOŇ, M.; MAONE, G.; HRANICKÝ, R.; MCMAHON, M. JShelter: Give Me My Browser Back. In Proceedings of the 20th International Conference on Security and Cryptography. Řím: SciTePress - Science and Technology Publications, 2023.
p. 287-294. ISBN: 978-989-758-666-8. DetailPOLČÁK, L.; SLEZÁKOVÁ, A. Data Exfiltration by Hotjar Revisited. In Proceedings of the 19th International Conference on Web Information Systems and Technologies. Řím: SciTePress - Science and Technology Publications, 2023.
p. 347-354. ISBN: 978-989-758-672-9. DetailRADER, R.; JEŘÁBEK, K.; RYŠAVÝ, O. Detecting DoH-Based Data Exfiltration: FluBot Malware Case Study. IEEE 48th Conference on Local Computer Networks (LCN). Daytona Beach: IEEE Computer Society, 2023.
p. 50-54. ISBN: 979-8-3503-0074-1. DetailVONDRÁČEK, M.; BAGGILI, I.; CASEY, P.; MEKNI, M. Rise of the Metaverse's Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses. COMPUTERS & SECURITY, 2023, vol. 127, no. 1,
p. 1-13. ISSN: 0167-4048. Detail -
2022
DOLEJŠKA, D.; VESELÝ, V. Workshop on Correlating Blockchain Activity with Real-Life Events and Users. ISS World Europe 2022, Praha: 2022.
p. 0-20. DetailDOLEJŠKA, D.; VESELÝ, V.; GRÉGR, M.; JEŘÁBEK, V. Možnosti monitorování a korelování aktivit na temných tržišť při ztotožňování uživatelů. Brno: 2022.
s. 0-0. DetailDOLEJŠKA, D.; VESELÝ, V.; PLUSKAL, J.; KOUTENSKÝ, M. Shedding Light on Monopoly: Temporal Analysis of Drug Trades. 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Boston, MA: Springer Nature Switzerland AG, 2022.
p. 151-168. ISBN: 978-3-031-36573-7. ISSN: 1867-8211. DetailJEŘÁBEK, K.; HYNEK, K.; ČEJKA, T.; RYŠAVÝ, O. Collection of Datasets with DNS over HTTPS Traffic. Data in Brief (Online), 2022, vol. 2022, no. 42,
p. 1-13. ISSN: 2352-3409. DetailJEŘÁBEK, K.; RYŠAVÝ, O.; BURGETOVÁ, I. Measurement and characterization of DNS over HTTPS traffic. 2022, vol. 2022, no. 2204,
p. 1-27. ISSN: 2331-8422. DetailPLUSKAL, J.; VESELÝ, V. Intercepting and Collecting Web Evidence in the Times of TLS1.3 and HTTP3.0. ISS World Europe 2022, Praha: 2022.
p. 0-50. DetailPOLČÁK, L.; MATOUŠEK, P. Metering Homes: Do Energy Efficiency and Privacy Need to be in Conflict?. In Proceedings of the 19th International Conference on Security and Cryptography. Lisabon: SciTePress - Science and Technology Publications, 2022.
p. 47-58. ISBN: 978-989-758-590-6. DetailVESELÝ, V.; DOLEJŠKA, D. Cryptocurrency Investigation Workshop. ISS World Europe 2022, Praha: 2022.
p. 0-70. Detail -
2021
BURGETOVÁ, I.; MATOUŠEK, P.; MUTUA, N. Statistical Methods for Anomaly Detection in Industrial Communication. IT-TR-2021-01, Brno: Faculty of Information Technology BUT, 2021.
p. 0-0. DetailBURGETOVÁ, I.; MATOUŠEK, P.; RYŠAVÝ, O. Anomaly Detection of ICS Communication Using Statistical Models. In Proceedings of the 17th International Conference on Network Service Management (CNSM 2021). Izmir: Institute of Electrical and Electronics Engineers, 2021.
p. 166-172. ISBN: 978-3-903176-36-2. DetailHOLKOVIČ, M.; BOHUŠ, M.; RYŠAVÝ, O. Network Problem Diagnostics using Typographic Error Correction. In Proceedings of the 17th International Conference on Network Service Management (CNSM 2021). Izmir: Institute of Electrical and Electronics Engineers, 2021.
p. 482-490. ISBN: 978-3-903176-36-2. DetailMATOUŠEK, P. Bezpečnostní rizika IoT. Brno: 2021.
s. 1-12. DetailMATOUŠEK, P. Security of Smart Grid Communication. Brno: Faculty of Information Technology BUT, 2021.
p. 0-0. DetailMATOUŠEK, P.; BURGETOVÁ, I.; RYŠAVÝ, O.; VICTOR, M. On Reliability of JA3 Hashes for Fingerprinting Mobile Applications. In Digital Forensics and Cyber Crime. ICDF2C 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Boston: Springer International Publishing, 2021.
p. 1-22. ISBN: 978-3-030-68733-5. DetailMATOUŠEK, P.; GROFČÍK, P. ICS Virtual Testbed. FIT-TR-2021-02, Brno: Faculty of Information Technology BUT, 2021.
p. 0-0. DetailMATOUŠEK, P.; HAVLENA, V.; HOLÍK, L. Efficient Modelling of ICS Communication For Anomaly Detection Using Probabilistic Automata. In Proceedings of IFIP/IEEE International Symposium on Integrated Network Management. Bordeaux: International Federation for Information Processing, 2021.
p. 81-89. ISBN: 978-3-903176-32-4. DetailMATOUŠEK, P.; KRAJČ, P. Monitoring of IoT Devices Using SNMP. IT-TR-2020-10, Brno: Faculty of Information Technology BUT, 2021.
p. 0-0. DetailMATOUŠEK, P.; PRISTAŠ, J.; MASÁROVÁ, M. Simulation of Industrial Processes using I/O Factory and UniPi. IT-TR-2020-09, Brno: Faculty of Information Technology BUT, 2021.
p. 0-0. DetailMATOUŠEK, P.; RYŠAVÝ, O. Teaching ICS Security in Blended Classroom Environment. In Proceedings of the 2021 30th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE). Prague: Czech Technical University, 2021.
p. 148-153. ISBN: 978-1-7281-9324-3. DetailMATOUŠEK, P.; RYŠAVÝ, O.; POLČÁK, L. Unified SNMP Interface for IoT Monitoring. In Proceedings of the IM 2021 - 2021 IFIP/IEEE International Symposium on Integrated Network Management. Bordeaux: International Federation for Information Processing, 2021.
p. 938-943. ISBN: 978-3-903176-32-4. DetailMUTUA, N.; MATOUŠEK, P. Outlier Detection in Smart Grid Communication. Fast Abstracts and Student Forum Proceedings, 17th European Dependable Computing Conference. Munich: 2021.
p. 1-4. DetailPOLČÁK, L. CVE-2021-34571, CVE-2021-34572, CVE-2021-34573, CVE-2021-34576. Frankfurt am Main: 2021.
p. 0-0. DetailRYŠAVÝ, O.; MATOUŠEK, P. A Network Traffic Processing Library for ICS Anomaly Detection. In ECBS '21: Proceedings of the 7th Conference on the Engineering of Computer Based Systems. Novi Sad: Association for Computing Machinery, 2021.
p. 144-151. ISBN: 978-1-4503-9057-6. DetailUHLÁR, J.; HOLKOVIČ, M.; RUSŇÁK, V. PCAPFunnel: A Tool for Rapid Exploration of Packet Capture Files. In 2021 25TH INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV): AI & VISUAL ANALYTICS & DATA SCIENCE. Proceedings. Sydney: IEEE Biometric Council, 2021.
p. 69-76. ISBN: 978-1-6654-3827-8. ISSN: 2375-0138. DetailVESELÝ, V. Correlating Blockchain Activities with Real-Life events. Dubaj: 2021.
p. 0-50. DetailVESELÝ, V.; ZAVŘEL, J. Quality Control Methodology for Simulation Models of Computer Network Protocols. Proceedings of 8th Virutal OMNeT++ Community Summit. Ithaca, NY: Cornell University Library, 2021.
p. 1-19. ISSN: 2331-8422. Detail -
2020
BURGET, R.; RYCHLÝ, M. Extrakce událostí ze souborových systémů - Návrh a implementace distribuované architektury. FIT-TR-2020-08, Brno: Fakulta informačních technologií VUT v Brně, 2020.
s. 0-0. DetailHAVLENA, V.; HOLÍK, L.; MATOUŠEK, P. Learning Probabilistic Automata in the Context of IEC 104. IT-TR-2020-01, Brno: Faculty of Information Technology BUT, 2020.
p. 0-0. DetailHOLKOVIČ, M.; BOHUŠ, M.; RYŠAVÝ, O. Pattern Detection Based Network Diagnostics. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications. Setubal: SciTePress - Science and Technology Publications, 2020.
p. 35-42. ISBN: 978-989-758-445-9. DetailHOLKOVIČ, M.; POLČÁK, L.; RYŠAVÝ, O. Application Error Detection in Networks by Protocol Behavior Model. In Communications in Computer and Information Science. Communications in Computer and Information Science. Praha: Springer Verlag, 2020.
p. 3-28. ISBN: 978-3-030-52685-6. ISSN: 1865-0929. DetailHOLKOVIČ, M.; RYŠAVÝ, O. Using Rule-Based Decision Trees for Automatic Passive Diagnostics of the Network Problems. International Journal on Advances in Networks and Services, 2020, vol. 2020, no. 1,
p. 1-10. ISSN: 1942-2644. DetailHRANICKÝ, R. Forenzní analýza šifrovaných dat. DSM Data Security Management, 2020, roč. 2020, č. 4,
s. 14-18. ISSN: 1211-8737. DetailHRANICKÝ, R.; ZOBAL, L.; VEČEŘA, V.; MÚČKA, M.; HORÁK, A.; BOLVANSKÝ, D.; ŽENČÁK, T. The architecture of Fitcrack distributed password cracking system, version 2. FIT-TR-2020-04, Brno: Faculty of Information Technology BUT, 2020.
p. 0-0. DetailHYNEK, J.; RYŠAVÝ, O. Visual Representation of Network Forensic Data. FIT-TR-2020-07: 2020.
p. 0-0. DetailKOUTENSKÝ, M.; VESELÝ, V.; MAFFIONE, V. Addressing Bandwidth-driven Flow Allocation in RINA. Computers, 2020, vol. 9, no. 3,
p. 1-23. ISSN: 2073-431X. DetailKOUTENSKÝ, M.; VESELÝ, V.; MAFFIONE, V. Bandwidth-driven Flow Allocation Policy for RINA. In Proceedings of the 23rd Conference on Innovation in Clouds, Internet and Networks (ICIN 2020). Paris: IEEE Communications Society, 2020.
p. 51-56. ISBN: 978-1-7281-5127-4. DetailMATOUŠEK, P.; BURGETOVÁ, I.; VICTOR, M. Mobile Device Fingerprinting. FIT-TR-2020-05, Brno: 2020.
p. 0-0. DetailMATOUŠEK, P.; RYŠAVÝ, O.; HAVLENA, V.; GRÉGR, M. Flow based monitoring of ICS communication in the smart grid. Journal of Information Security and Applications, 2020, vol. 2020, no. 54,
p. 102535-102535. ISSN: 2214-2126. DetailMUTUA, N. Application of Approximate Matching on Industrial Control System (ICS) Network Communication Using Ssdeep Algorithm. Brno: 2020.
p. 0-0. DetailPLUSKAL, J. SSL/TLS Interception Workshop (TLS1.3 edition). Dubai: 2020.
p. 0-0. DetailPLUSKAL, J. Towards Fully Automated Infinitely Scalable and Maximally Effective Password Cracking of Encrypted Documents. Dubai: 2020.
p. 0-0. DetailPOLČÁK, L. Soukromí uživatelů v prostředí internetové reklamy na českém webu. DSM Data Security Management, 2020, roč. 2020, č. 1,
s. 11-16. ISSN: 1211-8737. DetailPOLČÁK, L.; RYŠAVÝ, O.; MATOUŠEK, P. Identity Linking in Computer Networks. In Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, DCNET, OPTICS, SIGMAP and WINSYS. Setubal: SciTePress - Science and Technology Publications, 2020.
p. 45-52. ISBN: 978-989-758-445-9. DetailVESELÝ, V.; ZAVŘEL, J. Enhanced Interior Gateway Routing Protocol. Budapešť: 2020.
p. 0-17. DetailVICTOR, M. PC Browser and Android Applications Fingerprinting. Brno: 2020.
p. 0-0. DetailWACHIURI, S. Security Analysis of the GOOSE Communication Protocol Using Statistical Profiling. Brno: 2020.
p. 0-0. DetailYOUSSEF, S.; RYŠAVÝ, O. Behavioral Anomaly Detection in Industrial Control Systems: An Evaluation of Flowmon ADS. FIT-TR-2020-02, Brno: Faculty of Information Technology BUT, 2020.
p. 0-0. DetailYOUSSEF, S.; RYŠAVÝ, O. Proposed Method for Partial Node Replacement by Software Defined Network. Position Papers of the 2020 Federated Conference on Computer Science and Information Systems. Annals of Computer Science and Information Systems. Warsaw: Polish Information Processing Society, 2020.
p. 11-14. ISBN: 978-83-959183-0-8. ISSN: 2300-5963. Detail -
2019
GRÉGR, M. Study on visual representation of IoT diagnostic information. Brno: 2019.
p. 0-0. DetailHOLKOVIČ, M.; RYŠAVÝ, O. Network Diagnostics Using Passive Network Monitoring and Packet Analysis. ICNS 2019. The Fifteenth International Conference on Networking and Services. Athens: The International Academy, Research and Industry Association, 2019.
p. 47-51. ISBN: 978-1-61208-711-5. DetailHOLKOVIČ, M.; RYŠAVÝ, O.; DUDEK, J. Automating Network Security Analysis at Packet-level by using Rule-based Engine. In Proceedings of the Sixth European Conference on the Engineering of Computer-Based Systems. Bucharest: Association for Computing Machinery, 2019.
p. 1-8. ISBN: 978-1-4503-7636-5. DetailHOLKOVIČ, M.; RYŠAVÝ, O.; POLČÁK, L. Using Network Traces to Generate Models for Automatic Network Application Protocols Diagnostics. In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications Volume 1: DCNET, ICE-B, OPTICS, SIGMAP and WINSYS. Praha: SciTePress - Science and Technology Publications, 2019.
p. 37-47. ISBN: 978-989-758-378-0. DetailHRANICKÝ, R.; LIŠTIAK, F.; MIKUŠ, D.; RYŠAVÝ, O. On Practical Aspects of PCFG Password Cracking. In Data and Applications Security and Privacy. Lecture Notes in Computer Science. Charleston: Springer Nature Switzerland AG, 2019.
p. 43-60. ISBN: 978-3-030-22478-3. ISSN: 0302-9743. DetailHRANICKÝ, R.; MIKUŠ, D.; ZOBAL, L. Lámání hesel pomocí pravděpodobnostních gramatik. FIT-TR-2019-03, Brno: Fakulta informačních technologií VUT v Brně, 2019.
s. 0-0. DetailHRANICKÝ, R.; ZOBAL, L.; RYŠAVÝ, O.; KOLÁŘ, D. Distributed password cracking with BOINC and hashcat. Digital Investigation, 2019, vol. 30, no. 1,
p. 161-172. ISSN: 1742-2876. DetailJEŘÁBEK, K. Big Data cluster založený na kontejnerech. FIT-TR-2019-04, Brno: Fakulta informačních technologií VUT v Brně, 2019.
s. 0-0. DetailJEŘÁBEK, K. DNS Over HTTPS Analysis and Detection in Regular HTTPS. FIT-TR-2019-05, Brno: Faculty of Information Technology BUT, 2019.
p. 0-0. DetailJEŘÁBEK, K.; RYŠAVÝ, O. Big Data Network Flow Processing Using Apache Spark. In Proceedings of the 6th Conference on the Engineering of Computer Based Systems (ECBS 2019), 2019. Bukurešť: Association for Computing Machinery, 2019.
p. 1-9. ISBN: 978-1-4503-7636-5. DetailJEŘÁBEK, K.; VESELÝ, V. One of the Ways How to Make RIB Distributed. In Proceedings of the 22nd Conference on Innovation in Clouds, Internet and Networks (ICIN 2019). Paříž: IEEE Communications Society, 2019.
p. 49-53. ISBN: 978-1-5386-3458-5. DetailKOCMAN, T. Představení knihovny Scrapy pro tvorbu web crawlerů. ROOT, informace nejen ze světa Linuxu. 2019.
s. 0-0. ISSN: 1212-8309. DetailLETAVAY, V.; PLUSKAL, J.; RYŠAVÝ, O. A Scalable Architecture for Network Traffic Forensics. The Fifteenth International Conference on Networking and Services ICNS 2019. Athens: The International Academy, Research and Industry Association, 2019.
p. 32-36. ISBN: 978-1-61208-711-5. DetailLETAVAY, V.; PLUSKAL, J.; RYŠAVÝ, O. Network Forensic Analysis for Lawful Enforcement Steroids, Distributed and Scalable. In Proceedings of the 6th Conference on the Engineering of Computer Based Systems (ECBS 2019), 2019. Bucharest: Association for Computing Machinery, 2019.
p. 1-10. ISBN: 978-1-4503-7636-5. DetailMATOUŠEK, P.; RYŠAVÝ, O.; BURGETOVÁ, I. Extending Networking Curriculum with Applied Artificial Intelligence. In Proceedings of EAEEIE 2019. Ruse: Institute of Electrical and Electronics Engineers, 2019.
p. 11-16. ISBN: 978-1-7281-3222-8. DetailMATOUŠEK, P.; RYŠAVÝ, O.; GRÉGR, M. Increasing Visibility of IEC 104 Communication in the Smart Grid. 6th International Symposium for ICS & SCADA Cyber Security Research 2019. Swindon: BCS Learning and Development Ltd., 2019.
p. 21-30. ISBN: 978-1-78017-523-2. DetailMATOUŠEK, P.; RYŠAVÝ, O.; GRÉGR, M. Security Monitoring of IoT Communication Using Flows. In Proceedings of the 6th Conference on the Engineering of Computer Based Systems. ECBS '19. New York: Association for Computing Machinery, 2019.
p. 1-9. ISBN: 978-1-4503-7636-5. DetailPLUSKAL, J.; KOUTENSKÝ, M.; VONDRÁČEK, M.; RYŠAVÝ, O. Network Forensic Investigations of Tunneled Traffic: A Case Study. Revue Roumaine des Sciences Techniques - Serie Électrotechnique et Énergétique, 2019, vol. 64, no. 4,
p. 429-434. ISSN: 0035-4066. DetailPLUSKAL, J.; VESELÝ, V. SSL/TLS Interception Workshop (TLS1.3 edition). Kuala Lumpur: 2019.
p. 0-0. DetailPLUSKAL, J.; VESELÝ, V. SSL/TLS Interception Workshop. Praha: 2019.
p. 0-0. DetailPLUSKAL, J.; VONDRÁČEK, M.; RYŠAVÝ, O. Network Forensics in GSE Overlay Networks. In ECBS '19: Proceedings of the 6th Conference on the Engineering of Computer Based Systems. Bukurešť: Association for Computing Machinery, 2019.
p. 1-10. ISBN: 978-1-4503-7636-5. DetailPOLČÁK, L. Wireless M-Bus: Kdo ví, že perete?. DSM Data Security Management, 2019, roč. 2019, č. 4,
s. 13-17. ISSN: 1211-8737. DetailRYŠAVÝ, O.; MATOUŠEK, P. An IPFIX Extension for MQTT Protocol Monitoring. FIT-TR-2019-01, Brno: Faculty of Information Technology BUT, 2019.
p. 0-0. DetailVESELÝ, V. Cryptocurrency Investigation Workshop. Kuala Lumpur: 2019.
p. 0-0. DetailVESELÝ, V. Hunting Down Cryptocurrency Users. Dubaj: 2019.
p. 0-0. DetailVESELÝ, V. Hunting Down Cryptocurrency Users. Praha: 2019.
p. 0-0. DetailVESELÝ, V. Towards Fully Automated Infinitely Scalable and Maximally Effective Password Cracking of Encrypted Documents. Dubai: 2019.
p. 0-0. DetailVESELÝ, V. Towards Fully Automated Infinitely Scalable and Maximally Effective Password Cracking of Encrypted Documents. Praha: 2019.
p. 0-0. DetailVESELÝ, V. Workshop on Evidence Collection and Analysis of Webpages. Kuala Lumpur: 2019.
p. 0-0. DetailVESELÝ, V.; MAREK, M.; JEŘÁBEK, K. RINASim. EAI/Springer Innovations in Communication and Computing, 2019, vol. 2019, no. 1,
p. 139-181. ISSN: 2522-8595. DetailVESELÝ, V.; MAREK, M.; JEŘÁBEK, K.; NOVÁK, A. Everything You Always Wanted to Know About BGPv4 in OMNeT++ But Were Afraid to Ask. In Proceedings of 6th OMNeT++ Community Summit. Manchester: EasyChair, 2019.
p. 1-8. ISSN: 2398-7340. DetailVESELÝ, V.; ŽÁDNÍK, M. How to detect cryptocurrency miners? By traffic forensics!. Digital Investigation, 2019, vol. 31, no. 31,
p. 1-14. ISSN: 1742-2876. Detail -
2018
GRÉGR, M. Souhrnná zpráva k projektu DDoS ochrana člena sdružení CESNET. Brno: CESNET, zájmové sdružení právnických osob, 2018.
s. 1-7. DetailHRANICKÝ, R.; ZOBAL, L.; VEČEŘA, V.; MÚČKA, M. Distribuce výpočtů pro nástroj hashcat. FIT-TR-2018-04, Brno: 2018.
s. 0-0. DetailHRANICKÝ, R.; ZOBAL, L.; VEČEŘA, V.; MÚČKA, M. The architecture of Fitcrack distributed password cracking system. FIT-TR-2018-03, Brno: Faculty of Information Technology BUT, 2018.
p. 0-0. DetailMATOUŠEK, P. Description of IEC 61850 Communication. FIT-TR-2018-01, Brno: Faculty of Information Technology BUT, 2018.
p. 0-0. DetailMATOUŠEK, P.; RYŠAVÝ, O.; JAMES, J.; JANG, Y. Interconnecting Education and Research Through International Partnership: IoT Case Study. In 2018 28th EAEEIE Annual Conference, EAEEIE 2018. Hafnarfjordur: Institute of Electrical and Electronics Engineers, 2018.
p. 1-6. ISBN: 978-1-5386-7711-7. DetailMATOUŠEK, P.; SCHMIEDECKER, M. Digital Forensics and Cyber Crime. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Cham: Springer International Publishing, 2018. 235 p. ISBN: 978-3-319-73697-6. Detail
PLUSKAL, J.; LICHTNER, O.; RYŠAVÝ, O. Traffic Classification and Application Identification in Network Forensics. In Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics. IFIP Advances in Information and Communication Technology. New Delhi: Springer International Publishing, 2018.
p. 161-181. ISBN: 978-3-319-99277-8. ISSN: 1868-4238. DetailPLUSKAL, J.; VESELÝ, V. TLS/SSL Decryption Workshop. Praha: 2018.
p. 0-0. DetailPOLČÁK, L. Co skrývá síť BitTorrent?. FIT-TR-2018-05, Brno: 2018.
s. 0-0. DetailRYCHLÝ, M.; RYŠAVÝ, O. Big Data Security Analysis with TARZAN Platform. Journal of Cyber Security and Mobility, 2018, vol. 8, no. 2,
p. 165-188. ISSN: 2245-1439. DetailVESELÝ, V. Cryptocurrency Forensics Utilizing a Multi-currency Blockchain Explorer. Praha: 2018.
p. 0-0. DetailVESELÝ, V. Hunting Down Cryptocurrency Users. Kuala Lumpur: 2018.
p. 0-0. DetailVESELÝ, V. Towards Fully Automated Infinitely Scalable and Maximally Effective Password Cracking of Encrypted Documents. Kuala Lumpur: 2018.
p. 0-0. DetailVESELÝ, V.; PLUSKAL, J. SSL/TLS Interception Workshop. Kuala Lumpur: 2018.
p. 0-0. DetailVONDRÁČEK, M.; PLUSKAL, J.; RYŠAVÝ, O. Automated Man-in-the-Middle Attack Against Wi-Fi Networks. The Journal of Digital Forensics, Security and Law, 2018, vol. 2018, no. 13,
p. 59-80. ISSN: 1558-7215. Detail -
2017
GRÉGR, M. Bezpečnost v sítích IoT. FIT-TR-2017-10: 2017.
s. 0-0. DetailGRÉGR, M. Souhrnná zpráva k projektu DDoS ochrana člena sdružení CESNET. Brno: CESNET, zájmové sdružení právnických osob, 2017.
s. 1-2. DetailHRANICKÝ, R.; ZOBAL, L.; VEČEŘA, V.; MATOUŠEK, P. Distributed Password Cracking in a Hybrid Environment. Proceedings of SPI 2017. Brno: University of Defence in Brno, 2017.
p. 75-90. ISBN: 978-80-7231-414-0. DetailKARPÍŠEK, F.; BAGGILI, I.; BREITINGER, F. Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digital Investigation, 2017, vol. 2017, no. 22,
p. 26-38. ISSN: 1742-2876. DetailMAREK, M.; RYŠAVÝ, O.; VESELÝ, V. Towards analysis of IP communication in a constrained environment of tactical radio networks. In Proceedings of European Conference on the Engineering of Computer Based Systems. Larnaca: Association for Computing Machinery, 2017.
p. 50-57. ISBN: 978-1-4503-4843-0. DetailMATOUŠEK, P. Analysis of DLMS Protocol. FIT-TR-2017-13, Brno: 2017.
p. 0-0. DetailMATOUŠEK, P. Description and analysis of IEC 104 Protocol. FIT-TR-2017-12, Brno: Faculty of Information Technology BUT, 2017.
p. 0-0. DetailMATOUŠEK, P. Detekce mobilních zařízení v síťové komunikaci. FIT-TR-2017-08, Brno: Fakulta informačních technologií VUT v Brně, 2017.
s. 0-0. DetailMATOUŠEK, P.; LOUB, R. On the Similarity of User-specific Features on Mobile Devices. Proceedings of SPI 2017. Brno: University of Defence in Brno, 2017.
p. 1-11. DetailMATOUŠEK, P.; RYŠAVÝ, O.; ONYANGO, C.; SEVILLA, J. Delivering ICT Security Courses over 5.944 km. In Proceedings of the 27th EAEEIE Annual Conference. Grenoble: Grenoble Institute of Technology, 2017.
p. 1-7. ISBN: 978-1-7281-0907-7. DetailNAGY, P.; GRÉGR, M.; PODERMAŃSKI, T. Mitigace DDoS útoků s využitím komoditního hardwaru. FIT-TR-2017-09: 2017.
s. 0-0. DetailPLUSKAL, J. Netfox Detective 2.0 - Nástroj pro síťovou forenzní analýzu. FIT-TR-2017-06: Fakulta informačních technologií VUT v Brně, 2017.
s. 0-0. DetailPLUSKAL, J.; LICHTNER, O.; RYŠAVÝ, O. Netfox Detective - Identifikace aplikačních protokolů pomocí algoritmů strojového učení. FIT-TR-2017-05: 2017.
s. 0-0. DetailPLUSKAL, J.; RYŠAVÝ, O. Detection, and Analysis of SIP Fraud Attack on 100Gb Ethernet with NEMEA System. Pristina: 2017.
p. 0-0. DetailPLUSKAL, J.; RYŠAVÝ, O. Traffic Extraction and Classification in Network Forensics. 9th International Conference on Digital Forensics & Cyber Crime. Praha: 2017.
p. 1-2. DetailPODERMAŃSKI, T.; GRÉGR, M.; NAGY, P. Základní charakteristika DDoS útoků. FIT-TR-2017-14: 2017.
s. 0-0. DetailPOLČÁK, L. Základní informace o síti Tor. FIT-TR-2017-01, Brno: 2017.
s. 0-0. DetailRYCHLÝ, M.; RYŠAVÝ, O. Platforma pro zpracovaní dat síťové forenzní analýzy. FIT-TR-2017-07, Brno: 2017.
s. 0-0. DetailRYCHLÝ, M.; RYŠAVÝ, O. TARZAN: An Integrated Platform for Security Analysis. In Proceedings of the 2017 Federated Conference on Computer Science and Information Systems. Annals of Computer Science and Information Systems, Volume 11. Praha: IEEE Computer Society, 2017.
p. 561-567. ISBN: 978-83-946253-7-5. DetailRYŠAVÝ, O. Analysis of Constrained Application Protocol. FIT-TR-2017-15, Brno: Faculty of Information Technology BUT, 2017.
p. 0-0. DetailRYŠAVÝ, O. Security Monitoring of LwM2M communication. FIT-TR-2017-16, Brno: Faculty of Information Technology BUT, 2017.
p. 0-0. DetailVESELÝ, V. Detekce kryptoměnových těžařů. FIT-TR-2017-03, Brno: 2017.
s. 0-0. DetailVESELÝ, V.; HOLUŠA, J.; RYŠAVÝ, O. First-hop Redundancy Protocols in OMNeT++. In Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - Volume 1: SIMULTECH. Madrid: SciTePress - Science and Technology Publications, 2017.
p. 331-339. ISBN: 978-989-758-265-3. DetailVESELÝ, V.; RAJCA, T. Discovering Neighbor Devices in Computer Network - Development of CDP and LLDP Simulation Modules for OMNeT++. Proceedings of 4th OMNeT++ Community Summit. Ithaca, NY: Cornell University Library, 2017.
p. 1-4. ISSN: 2331-8422. DetailVONDRÁČEK, M.; PLUSKAL, J.; RYŠAVÝ, O. Automation of MitM Attack on Wi-Fi Networks. In 9th International Conference on Digital Forensics & Cyber Crime. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST). Prague: Springer International Publishing, 2017.
p. 207-220. ISBN: 978-3-319-73696-9. ISSN: 1867-8211. Detail -
2016
GRASA, E.; RYŠAVÝ, O.; LICHTNER, O.; ASGARI, H.; DAY, J.; CHITKUSHEV, L. From protecting protocols to layers: designing, implementing and experimenting with security policies in RINA. In 2016 IEEE International Conference on Communications (ICC). Kuala-Lumpur: Institute of Electrical and Electronics Engineers, 2016.
p. 736-742. ISBN: 978-1-4799-6665-3. DetailHRANICKÝ, R.; HOLKOVIČ, M.; MATOUŠEK, P.; RYŠAVÝ, O. On Efficiency of Distributed Password Recovery. The Journal of Digital Forensics, Security and Law, 2016, vol. 11, no. 2,
p. 79-95. ISSN: 1558-7215. DetailKARMAZÍN, J.; OČENÁŠEK, P. The state of Near-Field Communication (NFC) on the Android platform. In Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Toronto: Springer Verlag, 2016.
p. 247-254. ISBN: 978-3-319-39380-3. ISSN: 0302-9743. DetailPLUSKAL, J.; RYŠAVÝ, O. Síťový forenzní nástroj Netfox Detective. Pristina: 2016.
s. 0-0. DetailPLUSKAL, J.; RYŠAVÝ, O.; MATOUŠEK, P. On the Identification of Applications from Captured Network Traffic. New York: 2016.
p. 0-0. DetailPLUSKAL, J.; VESELÝ, V.; GRÉGR, M.; RYŠAVÝ, O. TLS/SSL Decryption Workshop. Praha: 2016.
p. 0-0. DetailPOLČÁK, L.; CALDAROLA, L.; CUDA, D.; DONDERO, M.; FICARA, D.; FRANKOVÁ, B.; HOLKOVIČ, M.; CHOUKIR, A.; MUCCIFORA, R.; TRIFILO, A. High Level Policies in SDN. In Communications in Computer and Information Science. Communications in Computer and Information Science. Berlin: Springer International Publishing, 2016.
p. 39-57. ISBN: 978-3-319-30221-8. ISSN: 1865-0929. DetailVESELÝ, V.; REK, V.; RYŠAVÝ, O. Babel Routing Protocol for OMNeT++ - More than just a new simulation module for INET framework. Proceedings of 3rd OMNeT++ Community Summit. Ithaca, NY: Cornell University Library, 2016.
p. 1-5. ISSN: 2331-8422. Detail -
2015
CALDAROLA, L.; CHOUKIR, A.; CUDA, D.; DONDERO, M.; FICARA, D.; MUCCIFORA, R.; POLČÁK, L.; TRIFILO, A. Towards a real application-aware network. In Proceedings of the 6th International Conference on Data Communication Networking (DCNET-2015). Colmar: SciTePress - Science and Technology Publications, 2015.
p. 5-12. ISBN: 978-989-758-112-0. DetailFRANKOVÁ, B.; HOLKOVIČ, M.; POLČÁK, L. Optimalizace řízení a bezpečnosti síťových toků pomocí softwarově definovaných sítí. FIT-TR-2015-02, Brno: Fakulta informačních technologií VUT v Brně, 2015.
s. 0-0. DetailGRÉGR, M. Souhrnná zpráva k projektu Návrh systému pro testování zabezpečení sítě IPv6 a zpracování incidentů v prostoru privátních adres za rok 2015. Brno: CESNET, zájmové sdružení právnických osob, 2015.
s. 1 (1 s.). DetailGRÉGR, M.; PODERMAŃSKI, T. IPv6: Doporučení pro konfiguraci aktivních prvků. Brno: Ministerstvo vnitra České republiky, 2015.
s. 0-0. DetailGRÉGR, M.; PODERMAŃSKI, T. Metodika testování bezpečnostních vlastností IPv6 u aktivních prvků. Brno: Ministerstvo vnitra České republiky, 2015.
s. 0-0. DetailGRÉGR, M.; PODERMAŃSKI, T. Bezpečné IPv6: příliš mnoho sousedů. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailGRÉGR, M.; PODERMAŃSKI, T. Bezpečné IPv6: trable s multicastem. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailGRÉGR, M.; PODERMAŃSKI, T. Bezpečné IPv6: vícehlavý útočník. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailGRÉGR, M.; PODERMAŃSKI, T. Bezpečné IPv6: zkrocení zlých směrovačů. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailGRÉGR, M.; PODERMAŃSKI, T.; ŠOLTÉS, M.; ŽÁDNÍK, M. IPv6: Bezpečná správa adresového prostoru. Brno: Ministerstvo vnitra České republiky, 2015.
s. 0-0. DetailKARPÍŠEK, F.; BAGGILI, I.; BREITINGER, F. WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Digital Investigation, 2015, vol. 2015, no. 15,
p. 110-118. ISSN: 1742-2876. DetailMATOUŠEK, P.; PLUSKAL, J.; RYŠAVÝ, O.; VESELÝ, V.; KMEŤ, M.; KARPÍŠEK, F.; VYMLÁTIL, M. Advanced Techniques for Reconstruction of Incomplete Network Data. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, 2015, vol. 2015, no. 157,
p. 69-84. ISSN: 1867-8211. DetailOČENÁŠEK, P. Effective Synchronization of Data in Distributed Systems. In Information, Computer and Application Engineering - Proceedings of the International Conference on Information Technology and Computer Application Engineering, ITCAE 2014. Leiden: CRC Press LLC, 2015.
p. 177-180. ISBN: 978-1-138-02717-6. DetailOČENÁŠEK, P. Information and Communication Management in Business Information Systems. In 2015 International Conference on Simulation, Modelling and Mathematical Statistics (SMMS 2015). Lancaster: DEStech Publications, Inc., 2015.
p. 384-388. ISBN: 978-1-60595-112-6. DetailOČENÁŠEK, P.; TRCHALÍK, R. System for Remote Monitoring of Engineering Services. International Conference on Advances in Manufacturing and Materials Engineering (ICAMME 2014). Chennai: Elsevier Science, 2015.
p. 1-3. ISBN: 978-1-63439-365-2. DetailPLUSKAL, J.; MATOUŠEK, P.; RYŠAVÝ, O.; KMEŤ, M.; VESELÝ, V.; KARPÍŠEK, F.; VYMLÁTIL, M. Netfox Detective: A tool for advanced network forensics analysis. Proceedings of Security and Protection of Information (SPI) 2015. Brno: University of Defence in Brno, 2015.
p. 147-163. ISBN: 978-80-7231-997-8. DetailPLUSKAL, J.; RYŠAVÝ, O. Concepts of Intercepted Communication Processing with Netfox Detective. Praha: 2015.
p. 0-0. DetailPODERMAŃSKI, T.; GRÉGR, M. Bezpečné IPv6 : směrovač se hlásí. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2014, č. 1,
s. 1-10. ISSN: 1212-8309. DetailPODERMAŃSKI, T.; GRÉGR, M. Bezpečné IPv6: když dojde keš - obrana. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailPODERMAŃSKI, T.; GRÉGR, M. Bezpečné IPv6: když dojde keš. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailPODERMAŃSKI, T.; GRÉGR, M. Bezpečné IPv6: trable s hlavičkami. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailPODERMAŃSKI, T.; GRÉGR, M. Implementujeme Carrier Grade NAT: Nečekané nástrahy. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailPODERMAŃSKI, T.; GRÉGR, M. Implementujeme Carrier Grade NAT: Zákon, alternativy a IPv6. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailPODERMAŃSKI, T.; GRÉGR, M. Implementujeme Carrier Grade NAT: Zálohování. ROOT, informace nejen ze světa Linuxu, 2015, roč. 2015, č. 1,
s. 1-10. ISSN: 1212-8309. DetailPOLČÁK, L.; FRANKOVÁ, B. Clock-Skew-Based Computer Identification: Traps and Pitfalls. Journal of Universal Computer Science, 2015, vol. 21, no. 9,
p. 1210-1233. ISSN: 0948-6968. DetailVESELÝ, V.; MAREK, M.; HYKEL, T.; RYŠAVÝ, O. Skip This Paper - RINASim: Your Recursive InterNetwork Architecture Simulator. Proceedings of 2nd OMNeT++ Community Summit. Ithaca, NY: Cornell University Library, 2015.
p. 1-4. ISSN: 2331-8422. DetailVESELÝ, V.; MAREK, M.; HYKEL, T.; RYŠAVÝ, O.; LICHTNER, O. Deliverable 2.4: RINASim - basic functionality. Brno: 2015.
p. 0-0. DetailVESELÝ, V.; MAREK, M.; HYKEL, T.; RYŠAVÝ, O.; LICHTNER, O.; JEŘÁBEK, K. Deliverable 2.6: RINASim - advanced functionality. Brno: 2015.
p. 0-0. DetailVESELÝ, V.; REK, V.; RYŠAVÝ, O. Enhanced Interior Gateway Routing Protocol with IPv4 and IPv6 Support for OMNeT++. Advances in Intelligent Systems and Computing, 2015, vol. 402, no. 1,
p. 65-82. ISSN: 2194-5357. DetailVESELÝ, V.; RYŠAVÝ, O. Locator/Id Split Protocol Improvement for High-Availability Environment. Proceedings of The Eleventh International Conference on Networking and Services ICNS 2015. Roma: The International Academy, Research and Industry Association, 2015.
p. 61-67. ISBN: 978-1-61208-404-6. DetailVESELÝ, V.; RYŠAVÝ, O. Map-Cache Synchronization and Merged RLOC Probing Study for LISP. The International Journal on Advances in Intelligent Systems, 2015, vol. 2015, no. 34,
p. 494-506. ISSN: 1942-2679. Detail -
2014
GREGA, W.; HILBURN, T.; KORNECKI, A.; MAYR, R.; PYLE, I.; ROZENBLIT, J.; RYŠAVÝ, O.; ŠVÉDA, M.; ZHANG, L.; ZHANG, L. Proceedings of the International workshop on Cyber-Physical Systems. In 2013 Federated Conference on Computer Science and Information Systems. Krakow: Elsevier Science, 2014.
p. 1-200. ISBN: 978-1-4673-4471-5. DetailGRÉGR, M.; MATOUŠEK, P.; PODERMAŃSKI, T.; ŠVÉDA, M. Practical IPv6 Monitoring on Campus - Best Practice Document. Vědecký sborník, 2014, vol. 2014, no. 1,
p. 1-20. ISSN: 0572-3043. DetailGRÉGR, M.; PODERMAŃSKI, T.; ŠVÉDA, M. Measuring Quality and Penetration of IPv6 Services. The Tenth International Conference on Networking and Services. 74400 CHAMONIX MONT-BLANC: Institute for Systems and Technologies of Information, Control and Communication, 2014.
p. 96-101. ISBN: 978-1-61208-330-8. DetailGRÉGR, M.; ŠVÉDA, M. Challenges with Transition and User Accounting in Next Generation Networks. In Proceedings 2014 IEEE 22nd International Conference on Network Protocols. Raleigh, NC, USA: Institute of Electrical and Electronics Engineers, 2014.
p. 501-503. ISBN: 978-1-4799-6203-7. DetailHALFAR, P.; ŠVÉDA, M. Cyber-Physical Information Systems for Enterprise Engineering -- Cyber-Physical Applications Timing. In ICEIS Proceedings 2014. Lisabon: Institute for Systems and Technologies of Information, Control and Communication, 2014.
p. 1-7. ISBN: 978-989-758-029-1. DetailHRANICKÝ, R. Rozšíření systému pro zákonné odposlechy. Proceedings of the 20th Conference STUDENT EEICT 2014. Volume 2. Brno: Vysoké učení technické v Brně, 2014.
s. 271-273. ISBN: 978-80-214-4923-7. DetailKMEŤ, M. Analýza a detekce typu multimediálních dat v provozu RTP. Proceedings of the 20th Conference STUDENT EEICT 2014 Volume 2. Brno: Vysoké učení technické v Brně, 2014.
s. 274-276. ISBN: 978-80-214-4923-7. DetailMATOUŠEK, P. Síťové služby a jejich architektura. Brno: Nakladatelství Vysokého učení technického v Brně VUTIUM, 2014. 396 s. ISBN: 978-80-214-3766-1. Detail
MATOUŠEK, P.; KMEŤ, M.; BASEL, M. On-line Monitoring of VoIP Quality Using IPFIX. Advances in Electrical and Electronic Engineering - intenetový časopis (http://advances.utc.sk), 2014, vol. 2014, no. 4,
p. 325-333. ISSN: 1804-3119. DetailMATOUŠEK, P.; RYŠAVÝ, O.; GRÉGR, M.; VYMLÁTIL, M. Towards Identification of Operating Systems from the Internet Traffic. IPFIX Monitoring with Fingerprinting and Clustering. In DCNET2014. Proceedings of the 5th International Conference on Data Communication Networking. Wien: SciTePress - Science and Technology Publications, 2014.
p. 21-27. ISBN: 978-989-758-042-0. DetailMATOUŠEK, P.; RYŠAVÝ, O.; KMEŤ, M. Fast RTP Detection and Codecs Classification in Internet Traffic. The Journal of Digital Forensics, Security and Law, 2014, vol. 2014, no. 2,
p. 99-110. ISSN: 1558-7215. DetailPLUSKAL, J. NetFox.Framework - The network forensic extandable analysis tool. Proceedings of the 20th Conference STUDENT EEICT 2014 Volume 2. Brno: Brno University of Technology, 2014.
p. 280-282. ISBN: 978-80-214-4923-7. DetailPLUSKAL, J.; RYŠAVÝ, O.; VESELÝ, V. NetFox - The network forensic extandable analysis tool. 6th AFCEA Student Conference Future of Information and Communication Technology. Bucharest: University Politehnica of Bucharest, 2014.
p. 68-71. ISBN: 978-606-551-047-0. DetailPODERMAŃSKI, T.; ŠVÉDA, M. IP45: Architecture, Design and Implementation. In The 22nd IEEE International Conference on Network Protocols (ICNP 2014). The Research Triangle, North Carolina, USA: IEEE Computer Society, 2014.
p. 492-494. ISBN: 978-1-4799-6204-4. DetailPOLČÁK, L.; FRANKOVÁ, B. On Reliability of Clock-skew-based Remote Computer Identification. In Proceedings of the 11th International Conference on Security and Cryptography. Wien: SciTePress - Science and Technology Publications, 2014.
p. 291-298. ISBN: 978-989-758-045-1. DetailPOLČÁK, L.; HOLKOVIČ, M.; MATOUŠEK, P. Host Identity Detection in IPv6 Networks. In E-Business and Telecommunications. Communications in Computer and Information Science. Berlin: Springer Verlag, 2014.
p. 74-89. ISBN: 978-3-662-44787-1. ISSN: 1865-0929. DetailPOLČÁK, L.; HRANICKÝ, R.; MARTÍNEK, T. On Identities in Modern Networks. The Journal of Digital Forensics, Security and Law, 2014, vol. 2014, no. 2,
p. 9-22. ISSN: 1558-7215. DetailPOLČÁK, L.; JIRÁSEK, J.; MATOUŠEK, P. Comment on "Remote Physical Device Fingerprinting". IEEE Transactions on Dependable and Secure Computing, 2014, vol. 11, no. 5,
p. 494-496. ISSN: 1545-5971. DetailŠVÉDA, M. Dependability in Cyber-Physical Systems Network Applications. Proceedings of the 5th International Conference on Circuits, Systems, Control, Signals 2014. Invited Talk. Salerno: North Atlantic University Union, 2014.
p. 1-6. ISBN: 978-1-61804-204-0. DetailVESELÝ, V.; BLOUDÍČEK, J.; RYŠAVÝ, O. Enhanced Interior Gateway Routing Protocol for OMNeT++. Proceedings of the 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2014). Wien: SciTePress - Science and Technology Publications, 2014.
p. 50-58. ISBN: 978-989-758-045-1. DetailVESELÝ, V.; MAREK, M.; RYŠAVÝ, O.; ŠVÉDA, M. Multicast, TRILL and LISP Extensions for INET. International Journal on Advances in Networks and Services, 2014, vol. 2014, no. 4,
p. 240-251. ISSN: 1942-2644. DetailVESELÝ, V.; RYŠAVÝ, O.; ŠVÉDA, M. Protocol Independent Multicast in OMNeT++. The Tenth International Conference on Networking and Services. 74400 CHAMONIX MONT-BLANC: The International Academy, Research and Industry Association, 2014.
p. 132-137. ISBN: 978-1-61208-330-8. Detail -
2013
DE SILVA, G.; RYŠAVÝ, O.; MATOUŠEK, P.; ŠVÉDA, M. On formal reachability analysis in networks with dynamic behavior. TELECOMMUNICATION SYSTEMS, 2013, vol. 52, no. 2,
p. 919-929. ISSN: 1018-4864. DetailOČENÁŠEK, P. Effective Design and Implementation of Distributed Business Information Systems. Applied Mechanics and Materials, 2013, vol. 2013, no. 307,
p. 451-454. ISSN: 1660-9336. DetailOČENÁŠEK, P. Effective Design and Implementation of Distributed Business Information Systems. In Proceedings of 2012 International Conference on Mechatronics and Applied Mechanics. Applied Mechanics and Materials. Hong Kong: National Taiwan University, 2013.
p. 451-454. ISBN: 978-3-03785-659-8. ISSN: 1660-9336. DetailOČENÁŠEK, P. The Practice of Global Internet Filtering. In Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2013.
p. 332-337. ISBN: 978-3-642-39344-0. ISSN: 0302-9743. DetailOČENÁŠEK, P.; KARMAZÍN, J. On the Secure and Safe Data Synchronization. In Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2013.
p. 326-331. ISBN: 978-3-642-39344-0. ISSN: 0302-9743. DetailOČENÁŠEK, P.; ŠVÉDA, M. Communication in Business Information Systems - New Perspectives. International Academic Research Journal of Business and Management, 2013, vol. 1, no. 7,
p. 87-92. ISSN: 2227-1287. DetailOČENÁŠEK, P.; ŠVÉDA, M. On the Effective Internet Communication Filtering. Applied Mechanics and Materials, 2013, vol. 2013, no. 307,
p. 478-481. ISSN: 1660-9336. DetailOČENÁŠEK, P.; ŠVÉDA, M. On the Effective Internet Communication Filtering. In Proceedings of the 2012 ICMCM Conference. Applied Mechanics and Materials. Dubaj: Trans Tech Publications Inc., 2013.
p. 478-481. ISBN: 978-3-03785-659-8. ISSN: 1660-9336. DetailPODERMAŃSKI, T. S IPv6 na věčné časy a nikdy jinak. Praha: 2013.
s. 0-0. DetailRYŠAVÝ, O.; RÁB, J.; ŠVÉDA, M. Improving security in SCADA systems through firewall policy analysis. Proceedings of the Federated Conference on Computer Science and Information Systems. Krakow: IEEE Computer Society, 2013.
p. 1435-1440. ISBN: 978-1-4673-4471-5. DetailŠVÉDA, M. Time in Cyber-Physical Systems: Specifications, Modeling and Measurements. Proceedings of the SCSI 2013. Recent Advances in Electrical Engineering Series, 16. Rhodes Island: European Society for Environmental Research and Sustainable Development, 2013.
p. 413-419. ISBN: 978-1-61804-204-0. DetailŠVÉDA, M. Time Specification, Modeling and Measurement in frame of Cyber-Physical System Applications Design. International Journal of Systems Applications, Engineering & Development, 2013, vol. 7, no. 5,
p. 263-270. ISSN: 2074-1308. DetailŠVÉDA, M.; RYŠAVÝ, O. Dependable Cyber-Physical Systems Networking: An Approach for Real-Time, Software Intensive Systems. Programmable Devices and Embedded Systems. Programmable devices and systems. Volume #12. Laxenburg: IFAC, 2013.
p. 1-4. ISBN: 978-3-902823-21-2. ISSN: 1474-6670. DetailŠVÉDA, M.; VRBA, R. Cyber-Physical Systems Networking with TCP/IP -- A Security Application Approach. IEEE Proceedings AFRICON 2013. New York: Institute of Electrical and Electronics Engineers, 2013.
p. 101-106. ISBN: 978-1-4673-5943-6. DetailVESELÝ, V. Map-keš synchronizace pro LISP. Proceedings of the 19th Conference Student EEICT 2013 Volume 3. Brno: Fakulta informačních technologií VUT v Brně, 2013.
s. 234-239. ISBN: 978-80-214-4695-3. DetailVESELÝ, V. LISP: nové paradigma ve směrování (1.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 9,
s. 1-6. ISSN: 1212-8309. DetailVESELÝ, V. LISP: nové paradigma ve směrování (2.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 9,
s. 1-6. ISSN: 1212-8309. DetailVESELÝ, V. LISP: nové paradigma ve směrování (3.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 10,
s. 1-6. ISSN: 1212-8309. DetailVESELÝ, V. LISP: nové paradigma ve směrování (4.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 10,
s. 1-6. ISSN: 1212-8309. DetailVESELÝ, V. LISP: nové paradigma ve směrování (5.). ROOT, informace nejen ze světa Linuxu, 2013, roč. 2013, č. 10,
s. 1-6. ISSN: 1212-8309. DetailVESELÝ, V.; MATOUŠEK, P.; ŠVÉDA, M. Multicast simulation and modeling in OMNeT++. SimuTools '13 Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques. Brussels: International Communication Sciences and Technology Association, 2013.
p. 142-145. ISBN: 978-1-4503-2464-9. DetailVESELÝ, V.; RYŠAVÝ, O.; ŠVÉDA, M. IPv6 Unicast and IPv4 Multicast Routing in OMNeT++. Proceedings of the IEEE 6th International ICST Conference on Simulation Tools and Techniques. Cannes: International Communication Sciences and Technology Association, 2013.
p. 1-4. ISBN: 978-1-936968-47-3. DetailVESELÝ, V.; ŠVÉDA, M. Comparison of Proposals Suggesting Internet Architecture Change. Sborník příspěvků Mezinárodní Masarykovy konference pro doktorandy a mladé vědecké pracovníky 2013. Hradec Králové: Akademické sdružení MAGNANIMITAS Assn., 2013.
p. 1-11. ISBN: 978-80-87952-00-9. Detail -
2012
GRÉGR, M.; PODERMAŃSKI, T.; ŠVÉDA, M. User identification in IPV6 network. In IP Networking 1 -- Theory and Practice. Žilina: Zilina University Publisher, 2012.
p. 5-8. ISBN: 978-80-554-0494-3. DetailHALFAR, P.; RÁB, J.; RYŠAVÝ, O.; ŠVÉDA, M. A Formal Authorization Framework for Networked SCADA Systems. Proceedings IEEE ECBS 2012. Novy Sad: IEEE Computer Society, 2012.
p. 298-302. ISBN: 978-0-7695-4664-3. DetailHRANICKÝ, R. Podvržená data v počítačových sítích. Proceedings of the 18th Conference Student EEICT 2012. Volume 1. Brno: Vysoké učení technické v Brně, 2012.
s. 164-166. ISBN: 978-80-214-4460-7. DetailOČENÁŠEK, P.; HRANÁČ, J. Design of Authentication and Key Distribution Protocols with Routing Functionality. Journal of Information & Communication Technology, 2012, vol. 5, no. 1,
p. 1-11. ISSN: 1816-613X. DetailOČENÁŠEK, P.; MÍCHAL, L. Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae. Applied Mechanics and Materials, 2012, vol. 2012, no. 157,
p. 870-873. ISSN: 1660-9336. DetailOČENÁŠEK, P.; MÍCHAL, L. Automation of Authentication and Key Distribution Schemes Design based on Trace Formulae. In Proceedings of 2011 International Conference on Mechatronics and Applied Mechanics (ICMAM 2011). Applied Mechanics and Materials. Hongkong: Trans Tech Publications Inc., 2012.
p. 870-873. ISBN: 978-3-03785-380-1. ISSN: 1660-9336. DetailOČENÁŠEK, P.; ŠVÉDA, M. Communication in Business Information Systems - New Perspectives. Proceedings of ARC 2012 International Conference on Business and Management. Bangalore: Siemens, Corporate Research and Development, 2012.
p. 257-262. ISBN: 978-0-615-73960-1. DetailOČENÁŠEK, P.; ŠVÉDA, M. Analysis and Filtering of Network Communication in ISP Firewalls. Lecture Notes in Information Technology, 2012, vol. 2012, no. 38,
p. 491-494. ISSN: 2070-1918. DetailPLUSKAL, J. Analýza a rekonstrukce komunikace typu instant messaging (YMSG a ICQ). Proceedings of the 18th Conference Student EEICT 2012 Volume 1. Brno: Fakulta informačních technologií VUT v Brně, 2012.
s. 176-178. ISBN: 978-80-214-4460-7. DetailRYŠAVÝ, O.; ŠVÉDA, M.; VRBA, R. A Framework for Cyber-Physical Systems Design - A Concept Study. Proceedings ICONS 2012. Saint Gilles, Reunion Island: International Academy, Research, and Industry Association, 2012.
p. 79-82. ISBN: 978-1-61208-184-7. DetailŠVÉDA, M.; RYŠAVÝ, O.; DE SILVA, G.; MATOUŠEK, P.; RÁB, J. Static Analysis of Routing and Firewall Policy Configurations. In e-Business and Telecommunications. Communications in Computer and Information Science. LNCS CCIS, Vol.222. Heidelberg: Springer Science+Business Media B.V., 2012.
p. 39-53. ISBN: 978-3-642-25205-1. ISSN: 1865-0929. DetailŠVÉDA, M.; SEKLETÁR, M.; FIDLER, T.; RYŠAVÝ, O. A High-level Network-wide Router Configuration Language. Proceedings ICN 2012. Saint Gilles, Reunion Island: International Academy, Research, and Industry Association, 2012.
p. 18-21. ISBN: 978-1-61208-183-0. DetailTRCHALÍK, R.; ŠVÉDA, M. Unified Sensor Gateway Interconnection of Sensor Networks. Proceedings 11th IFAC/IEEE International Conference on Programmable Devices and Embedded Sy. Programmable devices and systems. Programmable Devices and Embedded Systems, Volume # 11 | Part# 1. Brno: Faculty of Electrical Engineering and Communication BUT, 2012.
p. 372-377. ISBN: 978-3-902823-21-2. ISSN: 1474-6670. DetailVESELÝ, V. Srovnávací studie spojování PCAP souborů. Proceedings of the 18th Conference Student EEICT 2012 Volume 3. Brno: Fakulta informačních technologií VUT v Brně, 2012.
s. 457-461. ISBN: 978-80-214-4462-1. DetailVESELÝ, V. Rozšíření porovnávací studie o spojování PCAP souborů. ElectroScope - http://www.electroscope.zcu.cz, 2012, roč. 2012, č. 5,
s. 1-6. ISSN: 1802-4564. DetailVESELÝ, V.; MATOUŠEK, P.; ŠVÉDA, M. Multicast Simulation and Modeling in OMNeT++. Proceedings of the IEEE 5th International ICST Conference on Simulation Tools and Techniques. Desenzano del Garda: International Communication Sciences and Technology Association, 2012.
p. 298-301. ISBN: 978-1-936968-47-3. DetailVESELÝ, V.; ŠVÉDA, M. L2 protocols in OMNeT++. In IP Networking 1 -- Theory and Practice. Žilina: Zilina University Publisher, 2012.
p. 37-40. ISBN: 978-80-554-0494-3. Detail -
2011
ELICH, M.; GRÉGR, M.; ČELEDA, P. Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX. Traffic Monitoring and Analysis. Lecture Notes in Computer Science. Vienna: Springer Verlag, 2011.
p. 64-71. ISBN: 978-3-642-20304-6. DetailGRÉGR, M.; MATOUŠEK, P.; PODERMAŃSKI, T.; ŠVÉDA, M. Practical IPv6 Monitoring - Challenges and Techniques. Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011). Dublin: IEEE Computer Society, 2011.
p. 660-663. ISBN: 978-1-4244-9220-6. DetailOČENÁŠEK, P. An Approach for Security Protocol Design Based on Zero-knowledge Primitives Composition. Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2011.
p. 374-378. ISBN: 978-3-642-21792-0. DetailOČENÁŠEK, P. Analysis of Authentication Protocols with Scyter: Case Study. Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2011.
p. 359-365. ISBN: 978-3-642-21792-0. DetailOČENÁŠEK, P. Specification of Traces in the Security Protocols Analysis. Proceedings of 33rd International Conference on INFORMATION TECHNOLOGY INTERFACES. Dubrovnik: Institute of Electrical and Electronics Engineers, 2011.
p. 115-118. ISBN: 978-953-7138-20-2. DetailOČENÁŠEK, P.; HRANÁČ, J. Routing Functionality in the Logic Approach for Authentication Protocol Design. Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2011.
p. 366-373. ISBN: 978-3-642-21792-0. DetailOČENÁŠEK, P.; TRCHALÍK, R. Approaches to the Security and Payment Protocols Design: State of the Art. International Conference on INFORMATION TECHNOLOGY INTERFACES. Dubrovnik: Institute of Electrical and Electronics Engineers, 2011.
p. 1-4. ISBN: 978-953-7138-21-9. DetailPODERMAŃSKI, T. IPv6 - bezpečnostní hrozby (aneb IPSec to srovná). Sborník příspěvků z 38. konference EurOpen.CZ, 8.-11. května 2011. Plzeň: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2011.
s. 37-50. ISBN: 978-80-86583-21-1. DetailPODERMAŃSKI, T. IPv6 Mýty a skutečnost, díl I. - Jak jsme na tom. Lupa, 2011, roč. 2011, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPODERMAŃSKI, T. IPv6 Mýty a skutečnost, díl II. - Adresový prostor. Lupa, 2011, roč. 2011, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPODERMAŃSKI, T. IPv6 Mýty a skutečnost, díl IX. - Quo Vadis, IPv6?. Lupa, 2011, roč. 2011, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPODERMAŃSKI, T. IPv6 Mýty a skutečnost: díl III. - podpora end-to-end služeb. Lupa, 2011, roč. 2011, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPODERMAŃSKI, T.; GRÉGR, M. IPv6 Mýty a skutečnost, díl IV. - Podpora autokonfigurace. Lupa, 2011, roč. 2011, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPODERMAŃSKI, T.; GRÉGR, M. IPv6 Mýty a skutečnost, díl V. - Zjednodušené hlavičky. Lupa, 2011, roč. 2011, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPODERMAŃSKI, T.; GRÉGR, M. IPv6 Mýty a skutečnost, díl VI. - Bezpečnostní mechanizmy. Lupa, 2011, roč. 2011, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPODERMAŃSKI, T.; GRÉGR, M. IPv6 Mýty a skutečnost, díl VIII. - Přechodové mechanizmy. Lupa, 2011, roč. 2011, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPODERMAŃSKI, T.; VESELÝ, V. IPv6 Mýty a skutečnost, díl VII. - Podpora Multicast a anycast provozu. Lupa, 2011, roč. 2011, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPOLČÁK, L. Designing Lawful Interception System. Proceedings of the 17th Conference STUDENT EEICT 2011 Volume 3. Brno: Faculty of Information Technology BUT, 2011.
p. 569-573. ISBN: 978-80-214-4273-3. DetailPOLČÁK, L.; GRÉGR, M.; KAJAN, M.; MATOUŠEK, P.; VESELÝ, V. Designing Lawful Interception in IPv6 Networks. Security and Protection of Information. Brno: University of Defence in Brno, 2011.
p. 114-126. ISBN: 978-80-7231-777-6. DetailŠVÉDA, M. Design Experience with Routing SW and Related Applications. Proceedings of The Tenth International Conference on Networks - ICN 2011. St. Maarten: International Academy, Research, and Industry Association, 2011.
p. 133-138. ISBN: 978-1-61208-002-4. DetailŠVÉDA, M.; RYŠAVÝ, O.; DE SILVA, G.; MATOUŠEK, P.; RÁB, J. Reachability Analysis in Dynamically Routed Networks. Proceedings of the IEEE ECBS 2011. Piscataway, NJ: IEEE Computer Society, 2011.
p. 197-205. ISBN: 978-0-7695-4379-6. DetailŠVÉDA, M.; RYŠAVÝ, O.; MATOUŠEK, P. Supporting Safe and Secure Networked System Design. Computer Aided Systems Theory (EUROCAST´11), Extended Abstracts. Las Palmas de Gran Canaria: The Universidad de Las Palmas de Gran Canaria, 2011.
p. 22-23. ISBN: 978-84-693-9560-8. DetailŠVÉDA, M.; VRBA, R. A Cyber-Physical System Design Approach. Proceedings of The Sixth International Conference on Systems - ICONS 2011. St. Maarten: International Academy, Research, and Industry Association, 2011.
p. 12-18. ISBN: 978-1-61208-002-4. DetailVOGEL, I.; OČENÁŠEK, P.; ZEDEK, F. Computational molecular evolution - from mathematical models to novel distance metric based on intra-group analysis. EDS '11 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2011.
p. 264-269. ISBN: 978-80-214-4303-7. DetailVOGEL, I.; ZEDEK, F.; OČENÁŠEK, P. Constructing Phylogenetic Trees Based on Intra-Group Analysis of Human Mitochondrial DNA. In Human Interface and the Management of Information. Interacting with Information. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Berlin Heidelberg: Springer Verlag, 2011.
p. 165-169. ISBN: 978-3-642-21792-0. ISSN: 0302-9743. Detail -
2010
GRÉGR, M. Portscan detection using NetFlow data. Proceedings of the 16th Conference Student EEICT 2010 Volume 5. Brno: Faculty of Information Technology BUT, 2010.
p. 229-233. ISBN: 978-80-214-4080-7. DetailKORNECKI, A.; GREGA, W.; HILBURN, T.; THIRIET, J.; ŠVÉDA, M.; RYŠAVÝ, O.; PILAT, A. Transatlantic Engineering Programs: An Experience in International Cooperation. In Safeeullah Soomro (Editor): Engineering the Computer Science and IT. 2010. Vienna: IN-TECH Education and Publishing, 2010.
p. 65-84. ISBN: 978-953-307-012-4. DetailMATOUŠEK, P.; RYŠAVÝ, O.; DE SILVA, G.; DANKO, M. Combination of Simulation and Formal Methods to Analyse Network Survivability. Proceedings of the IEEE 3rd International ICST Conference on Simulation Tools and Techniques. Malaga: International Communication Sciences and Technology Association, 2010.
p. 150-155. ISBN: 978-963-9799-87-5. DetailOČENÁŠEK, P. On the Design of Communication in Business Information Systems. Proceedings of 2010 International Conference on Economics, Business and Management. Chengdu: Institute of Electrical and Electronics Engineers, 2010.
p. 98-101. ISBN: 978-1-4244-9202-2. DetailOČENÁŠEK, P.; FELIX, M. Camera and Sensor Monitoring System. EDS '10 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2010.
p. 241-245. ISBN: 978-80-214-4138-5. DetailOČENÁŠEK, P.; HRANÁČ, J. Regression Based Logic for Authentication Protocol Design. 2010 International Conference on Communication and Vehicular Technology. Chengdu: Institute of Electrical and Electronics Engineers, 2010.
p. 89-92. ISBN: 978-1-4244-9674-7. DetailOČENÁŠEK, P.; KUČEROVÁ, P. Analysis of Selected Payment Protocols. EDS '10 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2010.
p. 235-240. ISBN: 978-80-214-4138-5. DetailOČENÁŠEK, P.; PAPEŽ, Z. A Knowledge-Belief Approach to the Security Protocol Analysis. 2010 International Conference on Communication and Vehicular Technology. Chengdu: Institute of Electrical and Electronics Engineers, 2010.
p. 85-88. ISBN: 978-1-4244-9674-7. DetailPODERMAŃSKI, T. Je libo IPv6 na přepínačích HP ProCurve ?. Lupa, 2010, roč. 2010, č. 1,
s. 0-0. ISSN: 1213-0702. DetailPODERMAŃSKI, T. Redundance od síťové vrstvy až po zařízení (Maximum pro síťovou jistotu). Journal CONNECT!, 2010, roč. 10, č. 4,
s. 18-20. ISSN: 1211-3085. DetailŠVÉDA, M. Fault Management Driven Design with Safety and Security Requirements. Proceedings 17th IEEE International Conference and Workshops on Engineering of Computer-Based Systems ECBS 2010. Oxford: IEEE Computer Society, 2010.
p. 113-120. ISBN: 978-0-7695-4005-4. DetailŠVÉDA, M. NETWORK CONVERGENCY AND MODELING -- Design Experience with Routing SW for Intranets and Fieldbusses. Proceedings of the Fifth International Conference on Software and Data Technologies, ICSOFT 2010. Athens: Institute for Systems and Technologies of Information, Control and Communication, 2010.
p. 173-178. ISBN: 978-989-8425-22-5. DetailŠVÉDA, M.; RYŠAVÝ, O.; MATOUŠEK, P.; RÁB, J. An Approach for Automated Network-Wide Security Analysis. Proceedings of the Ninth International Conference on Networks ICN 2010. Les Menuires: IEEE Computer Society, 2010.
p. 294-299. ISBN: 978-0-7695-3979-9. DetailŠVÉDA, M.; RYŠAVÝ, O.; MATOUŠEK, P.; RÁB, J.; ČEJKA, R. SECURITY ANALYSIS OF TCP/IP NETWORKS -- An Approach to Automatic Analysis of Network Security Properties. Proceedings of the International Conference on Data Communication Networking ICETE-DCNET 2010. Athens: Institute for Systems and Technologies of Information, Control and Communication, 2010.
p. 5-11. ISBN: 978-989-8425-25-6. DetailŠVÉDA, M.; TRCHALÍK, R. Development of Interconnecting SW for Intranets and Fieldbuses. Programmable devices and systems, 2010, vol. 2010, no. 10,
p. 119-124. ISSN: 1474-6670. DetailŠVÉDA, M.; VRBA, R. An Embedded Application Regarded as Cyber-Physical System. Proceedings of the Fifth International Conference on Systems ICONS 2010. Les Menuires: IEEE Computer Society, 2010.
p. 170-174. ISBN: 978-0-7695-3980-5. DetailVESELÝ, V. Security Issues of Bootstrap Router Mechanism in Protocol Independent Multicast. Proceedings of the 16th Conference Student EEICT 2010 Volume 5. Brno: Faculty of Information Technology BUT, 2010.
p. 239-243. ISBN: 978-80-214-4080-7. Detail -
2009
GREGA, W.; HILBURN, T.; KORNECKI, A.; RYŠAVÝ, O.; ŠVÉDA, M.; THIRIET, J. Methodology for Creation of Multidisciplinary, Transatlantic Engineering Program in Information Technology. Proceedings of the European Association for Education in Electrical and Information Engineering Council's Annual Conference 2009. Valencia: Politechnical University of Valencia, 2009.
p. 1-5. ISBN: 978-84-8363-428-8. DetailKORNECKI, A.; HILBURN, T.; GREGA, W.; ŠVÉDA, M.; THIRIET, J. ILERT - International Learning Environment for Real-Time Software-Intensive Control Systems. Journal of Automation, Mobile Robotics and Intelligent Systems, 2009, vol. 3, no. 1,
p. 66-71. ISSN: 1897-8649. DetailOČENÁŠEK, P. An Approach for the Design of Secure Communication in Embedded Systems. Human Interface and the Management of Information. Designing Information Environments. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2009.
p. 579-586. ISBN: 978-3-642-02555-6. DetailOČENÁŠEK, P. Towards Security Issues in ZigBee Architecture. Human Interface and the Management of Information. Designing Information Environments. Berlin: Springer Verlag, 2009.
p. 587-593. ISBN: 978-3-642-02555-6. DetailOČENÁŠEK, P. Universal Access to the Internet Web Pages for Users with Special Needs. Universal Access in Human-Computer Interaction. Applications and Services. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2009.
p. 764-767. ISBN: 978-3-642-02712-3. DetailOČENÁŠEK, P.; KUČEROVÁ, P. Payment Protocols Verification: A Case Study. EDS '09 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2009.
p. 38-43. ISBN: 978-80-214-3933-7. DetailOČENÁŠEK, P.; ŠVÉDA, M. A Model for Measurement and Analysis of the Workflow Processes. Human Interface and the Management of Information. Designing Information Environments. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2009.
p. 149-153. ISBN: 978-3-642-02555-6. DetailOČENÁŠEK, P.; ŠVÉDA, M. AVISPA: Towards Practical Verification of Communication Properties. Proceedings 9th IFAC International Conference on Programmable Devices and Embedded Systems. Programmable devices and systems. Programmable Devices and Embedded Systems, Volume # 9 | Part# 1. Ostrava: IFAC, 2009.
p. 153-156. ISBN: 978-3-902661-41-8. ISSN: 1474-6670. DetailOČENÁŠEK, P.; TRCHALÍK, R.; ŠVÉDA, M. On the Implementation of Metrics in Industrial Embedded Systems. Proceedings 9th IFAC International Conference on Programmable Devices and Embedded Systems. Programmable devices and systems. Programmable Devices and Embedded Systems, Volume # 9 | Part# 1. Ostrava: IFAC, 2009.
p. 157-160. ISBN: 978-3-902661-41-8. ISSN: 1474-6670. DetailRYŠAVÝ, O.; RÁB, J. A Formal Model of Composing Components: The TLA+ Approach. Innovations in Systems and Software Engineering, 2009, vol. 5, no. 2,
p. 139-149. ISSN: 1614-5046. DetailŠVÉDA, M. Fault Management for Secure Embedded Systems. International Conference on Systems Proceedings, ICONS 2009. New York, NY: IEEE Computer Society, 2009.
p. 23-28. ISBN: 978-0-7695-3551-7. DetailŠVÉDA, M. Safe and Secure Networked Embedded Applications. Proceedings of the 4th International Conference on Broadband Communication. Wroclaw: Institute of Electrical and Electronics Engineers, 2009.
p. 137-142. ISBN: 978-83-7493-405-3. DetailŠVÉDA, M.; KORNECKI, A.; HILBURN, T.; GREGA, W.; THIRIET, J.; RYŠAVÝ, O. Real-Time Software-Intensive Systems Engineering: An International Perspective. European Association for Education in Electrical and Information Engineering Council's Annual Conference 2009. Valencia: Politechnical University of Valencia, 2009.
p. 1-6. ISBN: 978-84-8363-428-8. DetailŠVÉDA, M.; VRBA, R. Specifications of Secure and Safe Embedded System Networks. 8th International Conference on Networks Proceedings ICN 2009. New York, NY: IEEE Computer Society, 2009.
p. 220-225. ISBN: 978-0-7695-3552-4. DetailŠVÉDA, M.; VRBA, R. Meta-Design with Safe and Secure Embedded System Networking. International Journal On Advances in Security., 2009, vol. 2, no. 1,
p. 8-15. ISSN: 1942-2636. DetailTHIRIET, J.; HILBURN, T.; KORNECKI, A.; GREGA, W.; ŠVÉDA, M. Organization of a US-European Trans-national Degree in Engineering. J3eA - Journal sur l'enseignement des sciences et technologies de l'information et des systèmes, 2009, vol. 2009, no. 1,
p. 1-7. ISSN: 1638-1963. DetailTRCHALÍK, R. A Component-Based model for Embedded Software. EDS '09 IMAPS CS International Conference Proceedings. Brno, CZ: Brno University of Technology, 2009.
p. 1-5. ISBN: 978-80-214-3933-7. Detail -
2008
ČEJKA, R. Nekempujte v serverovně. Journal CONNECT!, 2008, roč. 2008, č. 5,
s. 44-45. ISSN: 1211-3085. DetailČEJKA, R. Zálohováním ke klidnějšímu spánku. Journal CONNECT!, 2008, roč. 2008, č. 7,
s. 57-59. ISSN: 1211-3085. DetailHILBURN, T.; KORNECKI, A.; THIRIET, J.; GREGA, W.; ŠVÉDA, M. An RSIC-SE2004 Curriculum Framework. IEEE Proceedings of International Multiconference on Computer Science and Information Technology - Real-Time Software. Computer Science and Information Technology. Wisla: IEEE Computer Society, 2008.
p. 633-638. ISBN: 978-83-60810-14-9. ISSN: 1896-7094. DetailHILBURN, T.; THIRIET, J.; KORNECKI, A.; GREGA, W.; ŠVÉDA, M. Credits and Accreditation in the U.S.A. and Europe: Towards a Framework for Trans-national Engineering Degrees. Inovations, 2008, vol. 2008, no. 1,
p. 29-42. ISSN: 1553-9911. DetailKORNECKI, A.; HILBURN, T.; GREGA, W.; THIRIET, J.; ŠVÉDA, M. A COMMON US-EUROPE CURRICULUM: An Approach for Real-Time Software Intensive Systems. Proceedings of the 2008 ASEE Anual Conference & Exposition. Pittsburgh, PA: American Society for Engineering Education, 2008.
p. 1359-1371. ISBN: 0-87823-196-X. DetailMATOUŠEK, P.; RYŠAVÝ, O.; RÁB, J.; ŠVÉDA, M. A Formal Model for Network-wide Security Analysis. Proceeding of the 15 IEEE International Symposium and Workshop on the Engineering of Computer-based Systems. Belfast: University of Ulster, 2008.
p. 171-181. ISBN: 0-7695-3141-5. DetailOČENÁŠEK, P. A Proxy-Based System for Translation of Internet Content into Specific Form. Computer-Human Interaction. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2008.
p. 413-419. ISBN: 978-3-540-70584-0. DetailOČENÁŠEK, P. Modification of Web Content According to the User Requirements. Technologies for E-Learning and Digital Entertainment. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2008.
p. 324-327. ISBN: 978-3-540-69734-3. DetailOČENÁŠEK, P.; BRENER, R. Financial Portal: systém pro sledování a analýzu finančního trhu. Management, Economics and Business Development in the New European Conditions. Brno: Akademické nakladatelství CERM sro., 2008.
s. 1-9. ISBN: 978-80-7204-582-2. DetailOČENÁŠEK, P.; KUČEROVÁ, P. Srovnání platebních systémů v ČR a zahraničí. Management, Economics and Business Development in the New European Conditions. Brno: Akademické nakladatelství CERM sro., 2008.
s. 1-10. ISBN: 978-80-7204-582-2. DetailOČENÁŠEK, P.; TRCHALÍK, R. Using AVISPA in the Education of Network Security. EDS '08 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2008.
p. 1-8. ISBN: 978-80-214-3717-3. DetailPILAT, A.; KORNECKI, A.; THIRIET, J.; GREGA, W.; ŠVÉDA, M. Industry Feedback on Skills and Knowledge. Proceedings of the 19th EAEEIE Annual Conference. Tallin: IEEE Computer Society, 2008.
p. 129-133. ISBN: 978-1-4244-2009-4. DetailRYŠAVÝ, O.; RÁB, J. A Component-based Approach to Verification of Embedded Control Systems using TLA+. IEEE Proceedings of International Multiconference on Computer Science and Information Technology. Wisla: IEEE Computer Society Press, 2008.
p. 719-725. ISBN: 978-83-60810-14-9. DetailŠVÉDA, M.; RYŠAVÝ, O.; VRBA, R. Pattern-driven Reuse of Behavioral Specifications in Embedded Control System Design. In Frontiers in Robotics, Automation and Control. Vienna: IN-TECH Education and Publishing, 2008.
p. 151-164. ISBN: 978-953-7619-17-6. DetailŠVÉDA, M.; VRBA, R. Meta-Design Support for Safe and Secure Networked Embedded Systems. IEEE Proceedings of the Third International Conference on Systems, ICONS 2008. New York: IEEE Computer Society, 2008.
p. 69-74. ISBN: 978-0-7695-3105-2. DetailTHIRIET, J.; HILBURN, T.; KORNECKI, A.; GREGA, W.; ŠVÉDA, M. Implementation for a US-European Trans-national Degree in Real-Time Software Engineering. Proceedings of the 19th EAEEIE Annual Conference. Tallin: IEEE Computer Society, 2008.
p. 134-137. ISBN: 978-1-4244-2009-4. DetailTRCHALÍK, R.; OČENÁŠEK, P.; ŠVÉDA, M. Using MSC and SDL Languages for Description of Network Communication. EDS '08 IMAPS CS International Conference Proceedings. Brno: Brno University of Technology, 2008.
p. 1-5. ISBN: 978-80-214-3717-3. DetailŽÁDNÍK, M. Monitorování sítí na základě IP toků. Journal CONNECT!, 2008, roč. 2008, č. 2,
s. 14-15. ISSN: 1211-3085. Detail -
2007
KORNECKI, A.; HILBURN, T.; GREGA, W.; THIRIET, J.; ŠVÉDA, M. ILERT - International Learning Environment for Real-Time Software Intensive Control Systems. Computer Science and Information Technology, 2007, vol. 2007, no. 2,
p. 943-948. ISSN: 1896-7094. Detail -
2004
OČENÁŠEK, P. On Inductive Approach in Security Protocol Verification. Proceedings of the 10th Conference and Competition STUDENT EEICT 2004. Brno: Faculty of Electrical Engineering and Communication BUT, 2004.
p. 272-276. ISBN: 80-214-2635-7. DetailVRBA, R.; ŠVÉDA, M.; MAREČEK, K. Pressure Transducer with Multiplexed Frequency Transmitter. Proceedings of the 2004 ISA/IEEE Sensors for Industry Conference. New Orleans, LA: IEEE Computer Society, 2004.
p. 7-10. ISBN: 0-7803-8143-2. Detail -
2003
OČENÁŠEK, P. Verifikace bezpečnostních protokolů. Proceedings of the 9th Conference and Competition STUDENT EEICT 2003. Brno: Fakulta elektrotechniky a komunikačních technologií VUT v Brně, 2003.
s. 211-213. ISBN: 80-214-2377-3. DetailŠČUGLÍK, F. Visualizing formal specifications using diagrams. 11. International Conference on Software, Telecommunications & Computer Networks. Split: Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture , University of Split, 2003.
p. 165-169. ISBN: 953-6114-64-X. Detail -
2002
ŠČUGLÍK, F. Comparing CSP representation and First order logic. Proceedings of the 9th Electronic Devices and Systems Conference EDS'02. Brno: Brno University of Technology, 2002.
p. 341-344. ISBN: 80-214-2180-0. DetailŠČUGLÍK, F. Formal specification and verification of already composed systems. Proceedings of 8th Conference STUDENT EEICT 2002. Brno: Faculty of Electrical Engineering and Communication BUT, 2002.
p. 511-515. ISBN: 80-214-2116-9. Detail