IT Security Research Group
Publications
-
2023
DRGA, J.; HOMOLIAK, I.; VANČO, J.; PEREŠÍNI, M.; HANÁČEK, P.; VASILAKOS, A. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023.
p. 1-4. ISBN: 979-8-3503-1019-1. DetailFIRC, A.; MALINKA, K.; HANÁČEK, P. Deepfakes as a threat to a speaker and facial recognition: an overview of tools and attack vectors. Heliyon, 2023, vol. 9, no. 4,
p. 1-33. ISSN: 2405-8440. DetailFIRC, A.; MALINKA, K.; HANÁČEK, P. Deepfakes: Bezpečnostní výzva pro naše uši. DSM Data Security Management, 2023, roč. 2023, č. 02,
s. 41-44. ISSN: 1211-8737. DetailHUJŇÁK, O.; MALINKA, K.; HANÁČEK, P. Indirect Bluetooth Low Energy Connection Detection. In 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023.
p. 328-333. ISBN: 978-1-6654-6268-6. DetailMALINKA, K.; FIRC, A.; HANÁČEK, P. Deepfakes a lidé: dokážeme ještě rozlišit pravou řeč od umělé?. DSM Data Security Management, 2023, roč. 2023, č. 04,
s. 22-26. ISSN: 1211-8737. DetailMALINKA, K.; FIRC, A.; PEREŠÍNI, M.; JANUŠ, F.; HUJŇÁK, O. On the educational impact of ChatGPT: Is Artificial Intelligence ready to obtain a University degree?. In Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education. Turku: Association for Computing Machinery, 2023.
p. 47-53. ISBN: 979-8-4007-0138-2. DetailPRUDKÝ, D.; FIRC, A.; MALINKA, K. Assessing the Human Ability to Recognize Synthetic Speech in Ordinary Conversation. In 2023 International Conference of the Biometrics Special Interest Group (BIOSIG). Proceedings of the 22nd International Conference of the Biometrics Special Interest Group. Darmstadt: GI - Group for computer science, 2023.
p. 1-5. ISBN: 978-3-88579-733-3. DetailSTANČÍKOVÁ, I.; HOMOLIAK, I. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023.
p. 203-2011. ISBN: 978-1-4503-9517-5. DetailZBOŘIL, J.; HUJŇÁK, O.; MALINKA, K. IoT Gateways Network Communication Analysis. In 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023.
p. 334-339. ISBN: 978-1-6654-6268-6. Detail -
2022
BREITENBACHER, D.; HOMOLIAK, I.; AUNG, Y.; ELOVICI, Y.; TIPPENHAUER, N. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, 2022, vol. 9, no. 12,
p. 9640-9658. ISSN: 2327-4662. DetailFIRC, A.; MALINKA, K. Practical lessons of (deep)faking human speech. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022.
p. 161-172. ISBN: 978-80-86583-34-1. DetailFIRC, A.; MALINKA, K. The dawn of a text-dependent society: deepfakes as a threat to speech verification systems. In SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. New York, NY: Association for Computing Machinery, 2022.
p. 1646-1655. ISBN: 978-1-4503-8713-2. DetailFIRC, A.; MALINKA, K.; HANÁČEK, P. Creation and detection of malicious synthetic media - a preliminary survey on deepfakes. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022.
p. 125-145. ISBN: 978-80-86583-34-1. DetailFIRC, A.; MALINKA, K.; HANÁČEK, P. Deepfakes: A Dangerous Entertainment?. Recenzovaný sborník příspěvků mezinárodní vědecké konference MMK2022. Hradec Králové: Akademické sdružení MAGNANIMITAS Assn., 2022.
p. 1073-1082. ISBN: 978-80-87952-37-5. DetailHOLÍKOVÁ, L.; HOLÍK, L.; HOMOLIAK, I.; LENGÁL, O.; VEANES, M.; VOJNAR, T. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022.
p. 4165-4182. ISBN: 978-1-939133-31-1. DetailHOMOLIAK, I. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022.
p. 185-210. ISBN: 978-80-86583-34-1. DetailHUJŇÁK, O.; MALINKA, K.; HANÁČEK, P. E-Banking Authentication - Dynamic Password Generators and Hardware Tokens. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022.
p. 211-221. ISBN: 978-80-86583-34-1. DetailMALINKA, K.; HUJŇÁK, O.; HANÁČEK, P.; HELLEBRANDT, L. E-Banking Security Study - 10 years later. IEEE Access, 2022, vol. 2022, no. 10,
p. 16681-16699. ISSN: 2169-3536. DetailPEREŠÍNI, M.; MALINKA, K.; HOMOLIAK, I.; BENČIĆ, F.; HLADKÝ, T. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022.
p. 173-184. ISBN: 978-80-86583-34-1. Detail -
2021
HOMOLIAK, I.; VENUGOPALAN, S.; REIJSBERGEN, D.; HUM, Q.; SCHUMI, R.; SZALACHOWSKI, P. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE COMMUN SURV TUT, 2021, vol. 23, no. 1,
p. 341-390. ISSN: 1553-877X. DetailPEREŠÍNI, M.; BENČIĆ, F.; MALINKA, K.; HOMOLIAK, I. DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy. Rotkreuz: Institute of Electrical and Electronics Engineers, 2021.
p. 1-8. Detail -
2020
BINDER, A.; BREITENBACHER, D.; HARTEL, P.; SZALACHOWSKI, P.; HOMOLIAK, I.; HUJŇÁK, O. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020.
p. 145-162. ISBN: 978-1-4503-8139-0. DetailHOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, 2020, vol. 8, no. 6,
p. 112427-112453. ISSN: 2169-3536. DetailHUM, Q.; TAN, W.; TEY, S.; LENUS, L.; HOMOLIAK, I.; LIN, Y.; SUN, J. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020.
p. 17-25. ISBN: 978-0-7381-0495-9. DetailOČENÁŠ, M.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Security and Encryption at Modern Databases. In ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020.
p. 19-23. ISBN: 978-1-4503-7744-7. Detail -
2019
HARTEL, P.; HOMOLIAK, I.; REIJSBERGEN, D. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, 2019, vol. 07, no. 12,
p. 177539-177555. ISSN: 2169-3536. DetailHELLEBRANDT, L.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Increasing Trust in Tor Node List Using Blockchain. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019.
p. 29-32. ISBN: 978-1-7281-1328-9. DetailHOMOLIAK, I.; TOFFALINI, F.; GUARNIZO, J.; ELOVICI, Y.; OCHOA, M. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM COMPUTING SURVEYS, 2019, vol. 52, no. 2,
p. 1-40. ISSN: 0360-0300. Detail -
2018
HOMOLIAK, I.; TEKNŐS, M.; BREITENBACHER, D.; HANÁČEK, P. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, 2018, vol. 5, no. 17,
p. 1-15. ISSN: 2032-9393. Detail -
2017
HELLEBRANDT, L.; HUJŇÁK, O.; HANÁČEK, P.; HOMOLIAK, I. Survey of Privacy Enabling Strategies in IoT Networks. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017.
p. 216-221. ISBN: 978-1-4503-5392-2. DetailHOMOLIAK, I.; ŠULÁK, L.; HANÁČEK, P. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Jeju Island: Springer International Publishing, 2017.
p. 66-78. ISBN: 978-3-319-56549-1. ISSN: 0302-9743. DetailHOMOLIAK, I.; TEKNŐS, M.; BARABAS, M.; HANÁČEK, P. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017.
p. 770-773. ISBN: 978-3-319-59607-5. DetailKAČIC, M.; BARABAS, M. Klasifikace informací v souvislostech. IS2 - Other Dimensions of Security. Praha: Tate International s.r.o., 2017.
s. 133-141. ISBN: 978-80-86813-30-1. DetailOČENÁŠ, M. Bitcoin blockchain analysis. Mikulášská kryptobesídka. Praha: Trusted Network Solutions, a.s., 2017.
p. 67-68. Detail -
2016
ARON, L.; HANÁČEK, P. A Concept of Dynamic Permission Mechanism on Android. In Progress in Applied Mathematics in Science and Engineering Proceedings. Bali, Indonesia: American Institute of Physics, 2016.
p. 22-30. ISBN: 978-0-7354-1352-8. DetailARON, L.; HANÁČEK, P. Dynamic Permission Mechanism on Android. Journal of Software, 2016, vol. 2016, no. 12,
p. 1124-1230. ISSN: 1796-217X. DetailBREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, 2016, vol. 14, no. 3,
p. 51-58. ISSN: 1690-4524. DetailBREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. Journal on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. Orlando: The International Institute of Informatics and Systemics, 2016.
p. 55-62. ISBN: 978-1-941763-47-6. ISSN: 1690-4524. DetailHELLEBRANDT, L. URI-based HBAC in FreeIPA. SantaCrypt, proceedings. Bílovice nad Svitavou: Trusted Network Solutions, a.s., 2016.
p. 45-46. ISBN: 978-80-904257-8-1. DetailSMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016.
p. 305-312. ISBN: 978-1-5090-1072-1. DetailVANČO, M.; ARON, L. Dynamic Security Policy Enforcement on Android. International Journal of Security and Its Applications, 2016, vol. 2016, no. 10,
p. 141-148. ISSN: 1738-9976. Detail -
2015
BREITENBACHER, D.; HOMOLIAK, I.; HANÁČEK, P. Parallelized Self-Initializing Quadratic Sieve using OpenMP. Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015.
p. 39-40. ISBN: 978-80-904257-7-4. DetailDRAHANSKÝ, M.; HANÁČEK, P.; ZBOŘIL, F.; HENZL, M.; ZBOŘIL, F.; YIM, J.; SHIM, K. Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks. In Improving Information Security Practices through Computational Intelligence. Washington: IGI Global, 2015.
p. 198-227. ISBN: 978-1-4666-9426-2. DetailIAREMKO, I.; ARON, L.; HANÁČEK, P. Improving IP Geolocation Using Network Measurement Characteristics. HKICEAS. Hong Kong: Higher Education Forum, 2015.
p. 210-220. ISBN: 978-986-87417-4-4. DetailSMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. Santa's Crypto Get-Together 2015. Praha: TNS, 2015.
p. 43-44. ISBN: 978-80-904257-7-4. Detail -
2014
ANTAL, L.; BARABAS, M.; HANÁČEK, P. Kompromitace dat pomocí SQL Injection, část I. DSM Data Security Management, 2014, roč. 18, č. 1,
s. 36-39. ISSN: 1211-8737. DetailANTAL, L.; BARABAS, M.; HANÁČEK, P. Kompromitace dat pomocí SQL Injection, část II. DSM Data Security Management, 2014, roč. 18, č. 2,
s. 32-35. ISSN: 1211-8737. DetailANTAL, L.; BARABAS, M.; HANÁČEK, P. Kompromitace dat pomocí SQL Injection, část III. DSM Data Security Management, 2014, roč. 18, č. 3,
s. 25-29. ISSN: 1211-8737. DetailHENZL, M.; BARABAS, M.; JANČA, R.; HANÁČEK, P. Bezpečnost bezkontaktních platebních karet. DSM Data Security Management, 2014, roč. 28, č. 2,
s. 41-43. ISSN: 1211-8737. DetailHOMOLIAK, I.; OVŠONKA, D.; GRÉGR, M.; HANÁČEK, P. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014.
p. 310-317. ISBN: 978-1-908320-40-7. DetailHOMOLIAK, I.; OVŠONKA, D.; KORANDA, K.; HANÁČEK, P. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014.
p. 188-193. ISBN: 978-1-4799-3531-4. DetailKAČIC, M.; OVŠONKA, D.; BARABAS, M.; HANÁČEK, P. Traffic generator based on behavioral pattern. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for. London: IEEE Computer Society, 2014.
p. 229-233. ISBN: 978-1-908320-40-7. Detail -
2013
BARABAS, M.; HOMOLIAK, I.; DROZD, M.; HANÁČEK, P. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, 2013, vol. 5, no. 2,
p. 249-253. ISSN: 1793-8236. DetailBARABAS, M.; HOMOLIAK, I.; HANÁČEK, P.; KAČIC, M. Detection of Network Buffer Overflow Attacks: A Case Study. The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013.
p. 128-131. ISBN: 978-958-8790-65-7. DetailDRAHANSKÝ, M.; HANÁČEK, P.; ZBOŘIL, F.; ZBOŘIL, F.; BARABAS, M.; ANTAL, L. Threats in Networks using Agent and Biometric Systems. International Journal of Bio-Science and Bio-Technology, 2013, vol. 5, no. 3,
p. 119-133. ISSN: 2233-7849. DetailHENZL, M.; HANÁČEK, P. Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding. 2013 International Symposium on Biometrics and Security Technologies (ISBAST). Chengdu: IEEE Computer Society, 2013.
p. 141-148. ISBN: 978-0-7695-5010-7. DetailHOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. ASNM: Advanced Security Network Metrics for Attack Vector Description. Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013.
p. 350-358. ISBN: 1-60132-259-3. DetailHOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. Advanced Security Network Metrics. In Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013.
p. 187-202. ISBN: 978-0-12-411474-6. DetailJURNEČKA, P.; HANÁČEK, P.; BARABAS, M.; HENZL, M.; KAČIC, M. A method for parallel software refactoring for safety standards compliance. System Safety 2013 collection of papers. INT. CONF. ON SIMULATORS, (BRIGHTON, U.K.: SEP. 26-30, 1983), LONDON, U.K., INST. ELECTR. ENGRS., 1983, P.267-273. (CONF. Cardiff: The Institution of Engineering and Technology, 2013.
p. 1-6. ISBN: 978-1-84919-777-9. ISSN: 0537-9989. DetailJURNEČKA, P.; HANÁČEK, P.; BARABAS, M.; HENZL, M.; KAČIC, M. A method for parallel software refactoring for safety standards compliance. In Resilience, Security & Risk in Transport. London: The Institution of Engineering and Technology, 2013.
p. 42-48. ISBN: 978-1-84919-787-8. DetailJURNEČKA, P.; HANÁČEK, P.; KAČIC, M. Concept of parallel code generating and refactoring system for safety standards compliance. Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Berlin: Institute of Electrical and Electronics Engineers, 2013.
p. 630-635. ISBN: 978-1-4799-1426-5. DetailKAČIC, M.; HANÁČEK, P.; HENZL, M.; HOMOLIAK, I. A Concept of Behavioral Reputation System in Wireless Networks. The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013.
p. 86-90. ISBN: 978-958-8790-65-7. DetailKAČIC, M.; HENZL, M.; JURNEČKA, P.; HANÁČEK, P. Malware injection in wireless networks. Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Volume 1. Berlin: Institute of Electrical and Electronics Engineers, 2013.
p. 483-487. ISBN: 978-1-4799-1426-5. DetailSEKANINA, L.; RŮŽIČKA, R.; VAŠÍČEK, Z.; ŠIMEK, V.; HANÁČEK, P. Implementing a Unique Chip ID on a Reconfigurable Polymorphic Circuit. Information Technology and Control, 2013, vol. 42, no. 1,
p. 7-14. ISSN: 1392-124X. Detail -
2012
ANTAL, L. Bezpečnost 801.1X WLAN sítí. Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Fakulta elektrotechniky a komunikačních technologií VUT v Brně, 2012.
s. 279-281. ISBN: 978-80-214-4461-4. DetailBARABAS, M.; DROZD, M.; HANÁČEK, P. Behavioral signature generation using shadow honeypot. World Academy of Science, Engineering and Technology, 2012, vol. 2012, no. 65,
p. 829-833. ISSN: 2010-376X. DetailHENZL, M.; HANÁČEK, P.; JURNEČKA, P.; KAČIC, M. A Concept of Automated Vulnerability Search in Contactless Communication Applications. Proceedings 46th Annual IEEE International Carnahan Conference on Security Technology. Boston: Institute of Electrical and Electronics Engineers, 2012.
p. 180-186. ISBN: 978-1-4673-4807-2. DetailHOMOLIAK, I. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012.
p. 281-283. ISBN: 978-80-214-4461-4. DetailMALINKA, K.; HANÁČEK, P. Computational Social Networks - Security and Privacy. In Computational Social Networks - Security and Privacy. London: Springer London, 2012.
p. 311-340. ISBN: 978-1-4471-4050-4. Detail -
2011
DROZD, M.; BARABAS, M.; GRÉGR, M.; CHMELAŘ, P. Buffer Overflow Attacks Data Acquisition. Proceedings of the 6th IEEE International Conference on IDAACS 2011. Volume 2. Praha: Institute of Electrical and Electronics Engineers, 2011.
p. 775-779. ISBN: 978-1-4577-1423-8. DetailHANÁČEK, P.; JURNEČKA, P. Využitie grafických kariet na útoky silou. DSM Data Security Management, 2011, roč. 15, č. 2,
s. 10-13. ISSN: 1211-8737. DetailHANÁČEK, P.; ŠVENDA, P. Cryptography for (partially) Compromised Sensor Networks. Information Security Summit 2011. Praha: Tate International s.r.o., 2011.
p. 103-109. ISBN: 978-80-86813-22-6. DetailHENZL, M.; HANÁČEK, P. NFC z pohledu bezpečnosti. DSM Data Security Management, 2011, roč. 15, č. 3,
s. 0-0. ISSN: 1211-8737. DetailKAČIC, M. New Approach in Wireless Intrusion Detection System. Proceedings of the 17th Conference STUDENT EEICT 2011. Volume 3. Brno: Brno University of Technology, 2011.
p. 590-594. ISBN: 978-80-214-4273-3. DetailKAČIC, M.; HANÁČEK, P. WPA2: Útoky z vnútra siete. DSM Data Security Management, 2011, roč. 15, č. 4,
s. 30-33. ISSN: 1211-8737. DetailMALINKA, K.; HANÁČEK, P.; TRZOS, M. Evaluation of Biometric Authentication Based on Visual Evoked Potentials. Proceedings 45th International Carnahan Conference on Security Technology. Piscataway: Institute of Electrical and Electronics Engineers, 2011.
p. 13-19. ISBN: 978-1-4577-0901-2. DetailNAGY, J.; SCHÄFER, J.; ZADINA, M.; HANÁČEK, P. Návrh zabezpečeného monitorovacího systému v oblasti e-Health. Proceedings of the Annual Database conference Datakon 2011. Brno: Vysoké učení technické v Brně, 2011.
s. 223-226. ISBN: 978-80-214-4329-7. DetailSAMEK, J.; MALAČKA, O.; ZBOŘIL, F.; HANÁČEK, P. Multi-Agent Experimental Framework with Hierarchical Model of Trust in Contexts for Decision Making. Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Department of Intelligent Systems FIT BUT, 2011.
p. 128-136. ISBN: 978-80-214-4320-4. DetailZADINA, M.; NAGY, J.; HANÁČEK, P. Zabezpečení bezdrátových sítí založených na protokolu IEEE 802.11 v aplikaci rozsáhlých distribučních sítí. Sborník příspěvků z 39. konference EurOpen.CZ, 2.-5. října 2011. Plzeň: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2011.
s. 37-48. ISBN: 978-80-86583-22-8. DetailŽÁK, J.; HORÁČEK, J.; ZBOŘIL, F.; KOČÍ, R.; GÁBOR, M. Remote controling and monitoring tool for wireless sensor network using WSageNt platform. Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Department of Intelligent Systems FIT BUT, 2011.
p. 1-8. ISBN: 978-80-214-4320-4. Detail -
2010
BARABAS, M. Automated Processes in Computer Security. Proceedings of the 16th Conference STUDENT EEICT 2010. Volume 5. Brno: Brno University of Technology, 2010.
p. 246-250. ISBN: 978-80-214-4079-1. DetailHANÁČEK, P.; DRAHANSKÝ, M. Analyse sicherer Hardwarelösungen. DuD - Datenschutz und Datensicherheit, 2010, roč. 2010, č. 11,
s. 766-770. ISSN: 1614-0702. DetailHANÁČEK, P.; DRAHANSKÝ, M.; ORSÁG, F. Angriffe auf sichere Hardwarelösungen. Die Datenschleuder, 2010, roč. 2010, č. 94,
s. 12-14. ISSN: 0930-1054. DetailHANÁČEK, P.; MALINKA, K.; SCHÄFER, J. E-Banking Security - Comparative Study. IEEE Aerospace and Electronic Systems Magazine, 2010, vol. 25, no. 1,
p. 29-34. ISSN: 0885-8985. DetailHANÁČEK, P.; ŠVENDA, P. Cryptographic Protocols in Wireless Sensor Networks. Sborník příspěvků MKB 2010. Bílovice nad Svitavou: TNS, 2010.
p. 59-76. ISBN: 978-80-904257-1-2. DetailPECHO, P.; HANÁČEK, P.; NAGY, J. Simulation and Evaluation of CTP and Secure-CTP Protocols. Radioengineering, 2010, vol. 2010, no. 1,
p. 89-98. ISSN: 1210-2512. Detail -
2009
DRAHANSKÝ, M.; ORSÁG, F.; HANÁČEK, P. Securing of Communication in GSM Networks. Proceedings of NGWS2009. Melbourne: Lambert Academic Publishing, 2009.
p. 30-36. ISBN: 978-3-8383-5346-3. DetailMALINKA, K. Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication. The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009.
p. 1-6. ISBN: 978-0-7695-3612-5. DetailMALINKA, K.; SCHÄFER, J. Development of Social Networks in Email Communication. The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009.
p. 1-5. ISBN: 978-0-7695-3612-5. DetailPECHO, P.; HANÁČEK, P.; NAGY, J. Power Consumption of Hardware Cryptography Platform for Wireless Sensor. Proceedings of International Conference on Parallel and Distributed Computing. Higashu Hiroshima: IEEE Computer Society, 2009.
p. 79-84. ISBN: 978-0-7695-3914-0. DetailPECHO, P.; ZBOŘIL, F.; DRAHANSKÝ, M.; HANÁČEK, P. Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. Journal of Universal Computer Science, 2009, vol. 15, no. 6,
p. 992-1006. ISSN: 0948-6968. DetailSCHÄFER, J.; MALINKA, K. Security in Peer-to-Peer Networks: Empiric model of file diffusion in BitTorrent. The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009.
p. 1-6. ISBN: 978-0-7695-3612-5. DetailSCHÄFER, J.; MALINKA, K.; HANÁČEK, P. Peer-to-peer Networks: Security Analysis. International Journal On Advances in Security., 2009, vol. 2009, no. 1,
p. 53-61. ISSN: 1942-2636. Detail -
2008
CVRČEK, D. Security of MICA*-based wireless sensor networks. 25th Chaos Communication Congress. Berlin: 2008.
p. 1-5. DetailCVRČEK, D.; DANEZIS, G. Fighting the 'Good' Internet War. Remodelling the Attacker. Hertfodshire: University of Hertfordshire, 2008.
p. 1-6. DetailCVRČEK, D.; KRHOVJÁK, J.; KUMPOŠT, M.; MATYÁŠ, V. Authorizing card payments with PINs. Computer, 2008, vol. 41, no. 2,
p. 64-68. ISSN: 0018-9162. DetailENDRYS, B.; HANÁČEK, P. Trust in Security of Identification Devices - Feeling of Unity. Information Security Summit IS2 2008. Praha: Tate International s.r.o., 2008.
p. 43-50. ISBN: 978-80-86813-15-8. DetailHANÁČEK, P.; MALINKA, K.; SCHÄFER, J. E-Banking Security - Comparative Study. Proceedings ICCST 2008. Prague: IEEE Computer Society, 2008.
p. 326-330. ISBN: 978-1-4244-1816-9. DetailMALINKA, K.; PECHO, P. Co když vás sledují?. Journal CONNECT!, 2008, roč. 2008, č. 12,
s. 54-55. ISSN: 1211-3085. DetailMALINKA, K.; PECHO, P. Evoluční teorie v podání spear phishingu. Journal CONNECT!, 2008, roč. 2008, č. 6,
s. 22-23. ISSN: 1211-3085. DetailMATYÁŠ, V.; KRHOVJÁK, J.; LORENC, V.; KUMPOŠT, M.; ŘÍHA, Z.; CVRČEK, D.; STAUDEK, J.; HOLER, V.; MALINKA, K.; ŠVENDA, P.; HANÁČEK, P. Autentizace elektronických transakcí a autorizace dat i uživatelů. Brno: Masarykova universita, 2008.
s. 0-0. ISBN: 978-80-210-4556-9. DetailSCHÄFER, J.; MALINKA, K.; HANÁČEK, P. Malware Spreading Models in Peer-to-peer Networks. Proceedings ICCST 2008. Praha: IEEE Computer Society, 2008.
p. 339-345. ISBN: 978-1-4244-1816-9. DetailSCHÄFER, J.; MALINKA, K.; HANÁČEK, P. Peer-to-peer networks security. The Third International Conference on Internet Monitoring and Protection. Bucharest: IEEE Computer Society, 2008.
p. 13-13. ISBN: 978-0-7695-3189-2. DetailSTAJANO, F.; CVRČEK, D.; LEWIS, M. Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. ACNS 2008. Lecture Notes in Computer Science. LNCS. Berlin: Springer Verlag, 2008.
p. 460-478. ISSN: 0302-9743. Detail -
2007
BLAHÁK, P.; CVRČEK, D. Alternativní zabezpečení WiFi sití. IT SYSTEM, 2007, roč. 2007, č. 2,
s. 1-6. ISSN: 1212-4567. DetailCVRČEK, D.; MALINKA, K. Chování uživatelů elektronické pošty. Datakon 2007 - Sborník databázové konference. Brno: Fakulta informatiky MU, 2007.
s. 92-101. ISBN: 978-80-7355-076-9. DetailMATYÁŠ, V.; KRHOVJÁK, J.; LORENC, V.; KUMPOŠT, M.; ŘÍHA, Z.; CVRČEK, D.; STAUDEK, J.; HOLER, V.; MALINKA, K.; ŠVENDA, P.; HANÁČEK, P. Autentizace uživatelů a autorizace elektronických transakcí. Příručka manažera VIII. Příručka manažera VIII. Praha: Tate International s.r.o., 2007. 318 s. ISBN: 978-80-86813-14-1. Detail
PECHO, P.; SCHÄFER, J. Bezpečnost čipových karet a detekce vykonávaných operací pomocí genetického programování. Datakon 2007. Brno: 2007.
s. 169-175. ISBN: 978-80-7355-076-9. Detail -
2006
CVRČEK, D.; KOUŘIL, D.; LORENC, V.; MATYÁŠ, V. Autentizační hardwarový token nové generace. DATAKON 2006. Brno: Masarykova universita, 2006.
s. 229-238. ISBN: 80-210-4102-1. Detail -
2005
CVRČEK, D.; KRHOVJÁK, J.; MATYÁŠ, V.; ŘÍHA, Z.; ŠVÉDA, P. Čipové karty - závěrečná zpráva pro NBÚ CR. Brno: 2005.
s. 0-0. DetailCVRČEK, D.; LATISLAV, R. TCP - resetovací útok. DATAKON 2005, Proceedings of the Annual Database Conference. Brno: Masarykova universita, 2005.
s. 301-310. ISBN: 8021038136. DetailCVRČEK, D.; MATYÁŠ, V. PIN (&Chip) or signature - beating or cheating?. SPW 05 Proceedings - The System Likes You and Wants To Be Your Friend. Berlin: University of Hertfordshire, 2005.
p. 10-14. DetailCVRČEK, D.; MATYÁŠ, V.; PATEL, A. Evidence processing and privacy issues in evidence-based reputation systems. Computer Standards & Interfaces, 2005, vol. 27, no. 5,
p. 533-545. ISSN: 0920-5489. DetailCVRČEK, D.; MOODY, K. Combining Trust and Risk to Reduce the Cost of Attacks. iTrust 2005. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2005.
p. 372-383. ISSN: 0302-9743. DetailHANÁČEK, P.; STAUDEK, J. Správa identity. Sborník konference DATAKON 2005. Brno: Masarykova universita, 2005.
s. 123-146. ISBN: 80-210-3813-6. DetailMATYÁŠ, V.; CVRČEK, D.; KUMPOŠT, M. On Privacy Classification in Ubiquitous Computing Systems. International Scientific Journal of Computing, 2005, vol. 4, no. 2,
p. 26-35. ISSN: 1727-6209. DetailMIKE, B.; CVRČEK, D. Penetration to Secure Hardware. SPI 2005. Brno: 2005.
p. 1 (1 s.). DetailŠVENDA, P.; CVRČEK, D. Smart dust security - key infection revisited. STM 2005. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE. ENTCS. Milano: 2005.
p. 11-25. ISSN: 1571-0661. Detail -
2004
CVRČEK, D. Projekt SECURE. DSM Data Security Management, 2004, roč. 2004, č. 4,
s. 1-10. ISSN: 1211-8737. DetailMIKE, B.; CVRČEK, D.; STEVEN, M. Bezpečný hardware, který není zase tak bezpečný - kryptoanalyza Luny CA3. DSM Data Security Management, 2004, roč. 2004, č. 5,
s. 44-47. ISSN: 1211-8737. Detail