IT Security Research Group

Publications

  • 2023

    DRGA, J.; HOMOLIAK, I.; VANČO, J.; PEREŠÍNI, M.; HANÁČEK, P.; VASILAKOS, A. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023. p. 1-4. ISBN: 979-8-3503-1019-1. Detail

    FIRC, A.; MALINKA, K.; HANÁČEK, P. Deepfakes as a threat to a speaker and facial recognition: an overview of tools and attack vectors. Heliyon, 2023, vol. 9, no. 4, p. 1-33. ISSN: 2405-8440. Detail

    FIRC, A.; MALINKA, K.; HANÁČEK, P. Deepfakes: Bezpečnostní výzva pro naše uši. DSM Data Security Management, 2023, roč. 2023, č. 02, s. 41-44. ISSN: 1211-8737. Detail

    HUJŇÁK, O.; MALINKA, K.; HANÁČEK, P. Indirect Bluetooth Low Energy Connection Detection. In 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023. p. 328-333. ISBN: 978-1-6654-6268-6. Detail

    MALINKA, K.; FIRC, A.; HANÁČEK, P. Deepfakes a lidé: dokážeme ještě rozlišit pravou řeč od umělé?. DSM Data Security Management, 2023, roč. 2023, č. 04, s. 22-26. ISSN: 1211-8737. Detail

    MALINKA, K.; FIRC, A.; PEREŠÍNI, M.; JANUŠ, F.; HUJŇÁK, O. On the educational impact of ChatGPT: Is Artificial Intelligence ready to obtain a University degree?. In Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education. Turku: Association for Computing Machinery, 2023. p. 47-53. ISBN: 979-8-4007-0138-2. Detail

    PRUDKÝ, D.; FIRC, A.; MALINKA, K. Assessing the Human Ability to Recognize Synthetic Speech in Ordinary Conversation. In 2023 International Conference of the Biometrics Special Interest Group (BIOSIG). Proceedings of the 22nd International Conference of the Biometrics Special Interest Group. Darmstadt: GI - Group for computer science, 2023. p. 1-5. ISBN: 978-3-88579-733-3. Detail

    STANČÍKOVÁ, I.; HOMOLIAK, I. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023. p. 203-2011. ISBN: 978-1-4503-9517-5. Detail

    ZBOŘIL, J.; HUJŇÁK, O.; MALINKA, K. IoT Gateways Network Communication Analysis. In 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023. p. 334-339. ISBN: 978-1-6654-6268-6. Detail

  • 2022

    BREITENBACHER, D.; HOMOLIAK, I.; AUNG, Y.; ELOVICI, Y.; TIPPENHAUER, N. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, 2022, vol. 9, no. 12, p. 9640-9658. ISSN: 2327-4662. Detail

    FIRC, A.; MALINKA, K. Practical lessons of (deep)faking human speech. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. p. 161-172. ISBN: 978-80-86583-34-1. Detail

    FIRC, A.; MALINKA, K. The dawn of a text-dependent society: deepfakes as a threat to speech verification systems. In SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. New York, NY: Association for Computing Machinery, 2022. p. 1646-1655. ISBN: 978-1-4503-8713-2. Detail

    FIRC, A.; MALINKA, K.; HANÁČEK, P. Creation and detection of malicious synthetic media - a preliminary survey on deepfakes. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. p. 125-145. ISBN: 978-80-86583-34-1. Detail

    FIRC, A.; MALINKA, K.; HANÁČEK, P. Deepfakes: A Dangerous Entertainment?. Recenzovaný sborník příspěvků mezinárodní vědecké konference MMK2022. Hradec Králové: Akademické sdružení MAGNANIMITAS Assn., 2022. p. 1073-1082. ISBN: 978-80-87952-37-5. Detail

    HOLÍKOVÁ, L.; HOLÍK, L.; HOMOLIAK, I.; LENGÁL, O.; VEANES, M.; VOJNAR, T. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022. p. 4165-4182. ISBN: 978-1-939133-31-1. Detail

    HOMOLIAK, I. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. p. 185-210. ISBN: 978-80-86583-34-1. Detail

    HUJŇÁK, O.; MALINKA, K.; HANÁČEK, P. E-Banking Authentication - Dynamic Password Generators and Hardware Tokens. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. p. 211-221. ISBN: 978-80-86583-34-1. Detail

    MALINKA, K.; HUJŇÁK, O.; HANÁČEK, P.; HELLEBRANDT, L. E-Banking Security Study - 10 years later. IEEE Access, 2022, vol. 2022, no. 10, p. 16681-16699. ISSN: 2169-3536. Detail

    PEREŠÍNI, M.; MALINKA, K.; HOMOLIAK, I.; BENČIĆ, F.; HLADKÝ, T. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. p. 173-184. ISBN: 978-80-86583-34-1. Detail

  • 2021

    HOMOLIAK, I.; VENUGOPALAN, S.; REIJSBERGEN, D.; HUM, Q.; SCHUMI, R.; SZALACHOWSKI, P. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE COMMUN SURV TUT, 2021, vol. 23, no. 1, p. 341-390. ISSN: 1553-877X. Detail

    PEREŠÍNI, M.; BENČIĆ, F.; MALINKA, K.; HOMOLIAK, I. DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy. Rotkreuz: Institute of Electrical and Electronics Engineers, 2021. p. 1-8. Detail

  • 2020

    BINDER, A.; BREITENBACHER, D.; HARTEL, P.; SZALACHOWSKI, P.; HOMOLIAK, I.; HUJŇÁK, O. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020. p. 145-162. ISBN: 978-1-4503-8139-0. Detail

    HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, 2020, vol. 8, no. 6, p. 112427-112453. ISSN: 2169-3536. Detail

    HUM, Q.; TAN, W.; TEY, S.; LENUS, L.; HOMOLIAK, I.; LIN, Y.; SUN, J. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020. p. 17-25. ISBN: 978-0-7381-0495-9. Detail

    OČENÁŠ, M.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Security and Encryption at Modern Databases. In ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020. p. 19-23. ISBN: 978-1-4503-7744-7. Detail

  • 2019

    HARTEL, P.; HOMOLIAK, I.; REIJSBERGEN, D. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, 2019, vol. 07, no. 12, p. 177539-177555. ISSN: 2169-3536. Detail

    HELLEBRANDT, L.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Increasing Trust in Tor Node List Using Blockchain. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019. p. 29-32. ISBN: 978-1-7281-1328-9. Detail

    HOMOLIAK, I.; TOFFALINI, F.; GUARNIZO, J.; ELOVICI, Y.; OCHOA, M. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM COMPUTING SURVEYS, 2019, vol. 52, no. 2, p. 1-40. ISSN: 0360-0300. Detail

  • 2018

    HOMOLIAK, I.; TEKNŐS, M.; BREITENBACHER, D.; HANÁČEK, P. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, 2018, vol. 5, no. 17, p. 1-15. ISSN: 2032-9393. Detail

  • 2017

    HELLEBRANDT, L.; HUJŇÁK, O.; HANÁČEK, P.; HOMOLIAK, I. Survey of Privacy Enabling Strategies in IoT Networks. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017. p. 216-221. ISBN: 978-1-4503-5392-2. Detail

    HOMOLIAK, I.; ŠULÁK, L.; HANÁČEK, P. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Jeju Island: Springer International Publishing, 2017. p. 66-78. ISBN: 978-3-319-56549-1. ISSN: 0302-9743. Detail

    HOMOLIAK, I.; TEKNŐS, M.; BARABAS, M.; HANÁČEK, P. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017. p. 770-773. ISBN: 978-3-319-59607-5. Detail

    KAČIC, M.; BARABAS, M. Klasifikace informací v souvislostech. IS2 - Other Dimensions of Security. Praha: Tate International s.r.o., 2017. s. 133-141. ISBN: 978-80-86813-30-1. Detail

    OČENÁŠ, M. Bitcoin blockchain analysis. Mikulášská kryptobesídka. Praha: Trusted Network Solutions, a.s., 2017. p. 67-68. Detail

  • 2016

    ARON, L.; HANÁČEK, P. A Concept of Dynamic Permission Mechanism on Android. In Progress in Applied Mathematics in Science and Engineering Proceedings. Bali, Indonesia: American Institute of Physics, 2016. p. 22-30. ISBN: 978-0-7354-1352-8. Detail

    ARON, L.; HANÁČEK, P. Dynamic Permission Mechanism on Android. Journal of Software, 2016, vol. 2016, no. 12, p. 1124-1230. ISSN: 1796-217X. Detail

    BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, 2016, vol. 14, no. 3, p. 51-58. ISSN: 1690-4524. Detail

    BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. Journal on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. Orlando: The International Institute of Informatics and Systemics, 2016. p. 55-62. ISBN: 978-1-941763-47-6. ISSN: 1690-4524. Detail

    HELLEBRANDT, L. URI-based HBAC in FreeIPA. SantaCrypt, proceedings. Bílovice nad Svitavou: Trusted Network Solutions, a.s., 2016. p. 45-46. ISBN: 978-80-904257-8-1. Detail

    SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016. p. 305-312. ISBN: 978-1-5090-1072-1. Detail

    VANČO, M.; ARON, L. Dynamic Security Policy Enforcement on Android. International Journal of Security and Its Applications, 2016, vol. 2016, no. 10, p. 141-148. ISSN: 1738-9976. Detail

  • 2015

    BREITENBACHER, D.; HOMOLIAK, I.; HANÁČEK, P. Parallelized Self-Initializing Quadratic Sieve using OpenMP. Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015. p. 39-40. ISBN: 978-80-904257-7-4. Detail

    DRAHANSKÝ, M.; HANÁČEK, P.; ZBOŘIL, F.; HENZL, M.; ZBOŘIL, F.; YIM, J.; SHIM, K. Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks. In Improving Information Security Practices through Computational Intelligence. Washington: IGI Global, 2015. p. 198-227. ISBN: 978-1-4666-9426-2. Detail

    IAREMKO, I.; ARON, L.; HANÁČEK, P. Improving IP Geolocation Using Network Measurement Characteristics. HKICEAS. Hong Kong: Higher Education Forum, 2015. p. 210-220. ISBN: 978-986-87417-4-4. Detail

    SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. Santa's Crypto Get-Together 2015. Praha: TNS, 2015. p. 43-44. ISBN: 978-80-904257-7-4. Detail

  • 2014

    ANTAL, L.; BARABAS, M.; HANÁČEK, P. Kompromitace dat pomocí SQL Injection, část I. DSM Data Security Management, 2014, roč. 18, č. 1, s. 36-39. ISSN: 1211-8737. Detail

    ANTAL, L.; BARABAS, M.; HANÁČEK, P. Kompromitace dat pomocí SQL Injection, část II. DSM Data Security Management, 2014, roč. 18, č. 2, s. 32-35. ISSN: 1211-8737. Detail

    ANTAL, L.; BARABAS, M.; HANÁČEK, P. Kompromitace dat pomocí SQL Injection, část III. DSM Data Security Management, 2014, roč. 18, č. 3, s. 25-29. ISSN: 1211-8737. Detail

    HENZL, M.; BARABAS, M.; JANČA, R.; HANÁČEK, P. Bezpečnost bezkontaktních platebních karet. DSM Data Security Management, 2014, roč. 28, č. 2, s. 41-43. ISSN: 1211-8737. Detail

    HOMOLIAK, I.; OVŠONKA, D.; GRÉGR, M.; HANÁČEK, P. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014. p. 310-317. ISBN: 978-1-908320-40-7. Detail

    HOMOLIAK, I.; OVŠONKA, D.; KORANDA, K.; HANÁČEK, P. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014. p. 188-193. ISBN: 978-1-4799-3531-4. Detail

    KAČIC, M.; OVŠONKA, D.; BARABAS, M.; HANÁČEK, P. Traffic generator based on behavioral pattern. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for. London: IEEE Computer Society, 2014. p. 229-233. ISBN: 978-1-908320-40-7. Detail

  • 2013

    BARABAS, M.; HOMOLIAK, I.; DROZD, M.; HANÁČEK, P. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, 2013, vol. 5, no. 2, p. 249-253. ISSN: 1793-8236. Detail

    BARABAS, M.; HOMOLIAK, I.; HANÁČEK, P.; KAČIC, M. Detection of Network Buffer Overflow Attacks: A Case Study. The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013. p. 128-131. ISBN: 978-958-8790-65-7. Detail

    DRAHANSKÝ, M.; HANÁČEK, P.; ZBOŘIL, F.; ZBOŘIL, F.; BARABAS, M.; ANTAL, L. Threats in Networks using Agent and Biometric Systems. International Journal of Bio-Science and Bio-Technology, 2013, vol. 5, no. 3, p. 119-133. ISSN: 2233-7849. Detail

    HENZL, M.; HANÁČEK, P. Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding. 2013 International Symposium on Biometrics and Security Technologies (ISBAST). Chengdu: IEEE Computer Society, 2013. p. 141-148. ISBN: 978-0-7695-5010-7. Detail

    HOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. ASNM: Advanced Security Network Metrics for Attack Vector Description. Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013. p. 350-358. ISBN: 1-60132-259-3. Detail

    HOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. Advanced Security Network Metrics. In Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013. p. 187-202. ISBN: 978-0-12-411474-6. Detail

    JURNEČKA, P.; HANÁČEK, P.; BARABAS, M.; HENZL, M.; KAČIC, M. A method for parallel software refactoring for safety standards compliance. System Safety 2013 collection of papers. INT. CONF. ON SIMULATORS, (BRIGHTON, U.K.: SEP. 26-30, 1983), LONDON, U.K., INST. ELECTR. ENGRS., 1983, P.267-273. (CONF. Cardiff: The Institution of Engineering and Technology, 2013. p. 1-6. ISBN: 978-1-84919-777-9. ISSN: 0537-9989. Detail

    JURNEČKA, P.; HANÁČEK, P.; BARABAS, M.; HENZL, M.; KAČIC, M. A method for parallel software refactoring for safety standards compliance. In Resilience, Security & Risk in Transport. London: The Institution of Engineering and Technology, 2013. p. 42-48. ISBN: 978-1-84919-787-8. Detail

    JURNEČKA, P.; HANÁČEK, P.; KAČIC, M. Concept of parallel code generating and refactoring system for safety standards compliance. Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Berlin: Institute of Electrical and Electronics Engineers, 2013. p. 630-635. ISBN: 978-1-4799-1426-5. Detail

    KAČIC, M.; HANÁČEK, P.; HENZL, M.; HOMOLIAK, I. A Concept of Behavioral Reputation System in Wireless Networks. The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013. p. 86-90. ISBN: 978-958-8790-65-7. Detail

    KAČIC, M.; HENZL, M.; JURNEČKA, P.; HANÁČEK, P. Malware injection in wireless networks. Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Volume 1. Berlin: Institute of Electrical and Electronics Engineers, 2013. p. 483-487. ISBN: 978-1-4799-1426-5. Detail

    SEKANINA, L.; RŮŽIČKA, R.; VAŠÍČEK, Z.; ŠIMEK, V.; HANÁČEK, P. Implementing a Unique Chip ID on a Reconfigurable Polymorphic Circuit. Information Technology and Control, 2013, vol. 42, no. 1, p. 7-14. ISSN: 1392-124X. Detail

  • 2012

    ANTAL, L. Bezpečnost 801.1X WLAN sítí. Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Fakulta elektrotechniky a komunikačních technologií VUT v Brně, 2012. s. 279-281. ISBN: 978-80-214-4461-4. Detail

    BARABAS, M.; DROZD, M.; HANÁČEK, P. Behavioral signature generation using shadow honeypot. World Academy of Science, Engineering and Technology, 2012, vol. 2012, no. 65, p. 829-833. ISSN: 2010-376X. Detail

    HENZL, M.; HANÁČEK, P.; JURNEČKA, P.; KAČIC, M. A Concept of Automated Vulnerability Search in Contactless Communication Applications. Proceedings 46th Annual IEEE International Carnahan Conference on Security Technology. Boston: Institute of Electrical and Electronics Engineers, 2012. p. 180-186. ISBN: 978-1-4673-4807-2. Detail

    HOMOLIAK, I. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012. p. 281-283. ISBN: 978-80-214-4461-4. Detail

    MALINKA, K.; HANÁČEK, P. Computational Social Networks - Security and Privacy. In Computational Social Networks - Security and Privacy. London: Springer London, 2012. p. 311-340. ISBN: 978-1-4471-4050-4. Detail

  • 2011

    DROZD, M.; BARABAS, M.; GRÉGR, M.; CHMELAŘ, P. Buffer Overflow Attacks Data Acquisition. Proceedings of the 6th IEEE International Conference on IDAACS 2011. Volume 2. Praha: Institute of Electrical and Electronics Engineers, 2011. p. 775-779. ISBN: 978-1-4577-1423-8. Detail

    HANÁČEK, P.; JURNEČKA, P. Využitie grafických kariet na útoky silou. DSM Data Security Management, 2011, roč. 15, č. 2, s. 10-13. ISSN: 1211-8737. Detail

    HANÁČEK, P.; ŠVENDA, P. Cryptography for (partially) Compromised Sensor Networks. Information Security Summit 2011. Praha: Tate International s.r.o., 2011. p. 103-109. ISBN: 978-80-86813-22-6. Detail

    HENZL, M.; HANÁČEK, P. NFC z pohledu bezpečnosti. DSM Data Security Management, 2011, roč. 15, č. 3, s. 0-0. ISSN: 1211-8737. Detail

    KAČIC, M. New Approach in Wireless Intrusion Detection System. Proceedings of the 17th Conference STUDENT EEICT 2011. Volume 3. Brno: Brno University of Technology, 2011. p. 590-594. ISBN: 978-80-214-4273-3. Detail

    KAČIC, M.; HANÁČEK, P. WPA2: Útoky z vnútra siete. DSM Data Security Management, 2011, roč. 15, č. 4, s. 30-33. ISSN: 1211-8737. Detail

    MALINKA, K.; HANÁČEK, P.; TRZOS, M. Evaluation of Biometric Authentication Based on Visual Evoked Potentials. Proceedings 45th International Carnahan Conference on Security Technology. Piscataway: Institute of Electrical and Electronics Engineers, 2011. p. 13-19. ISBN: 978-1-4577-0901-2. Detail

    NAGY, J.; SCHÄFER, J.; ZADINA, M.; HANÁČEK, P. Návrh zabezpečeného monitorovacího systému v oblasti e-Health. Proceedings of the Annual Database conference Datakon 2011. Brno: Vysoké učení technické v Brně, 2011. s. 223-226. ISBN: 978-80-214-4329-7. Detail

    SAMEK, J.; MALAČKA, O.; ZBOŘIL, F.; HANÁČEK, P. Multi-Agent Experimental Framework with Hierarchical Model of Trust in Contexts for Decision Making. Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Department of Intelligent Systems FIT BUT, 2011. p. 128-136. ISBN: 978-80-214-4320-4. Detail

    ZADINA, M.; NAGY, J.; HANÁČEK, P. Zabezpečení bezdrátových sítí založených na protokolu IEEE 802.11 v aplikaci rozsáhlých distribučních sítí. Sborník příspěvků z 39. konference EurOpen.CZ, 2.-5. října 2011. Plzeň: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2011. s. 37-48. ISBN: 978-80-86583-22-8. Detail

    ŽÁK, J.; HORÁČEK, J.; ZBOŘIL, F.; KOČÍ, R.; GÁBOR, M. Remote controling and monitoring tool for wireless sensor network using WSageNt platform. Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Department of Intelligent Systems FIT BUT, 2011. p. 1-8. ISBN: 978-80-214-4320-4. Detail

  • 2010

    BARABAS, M. Automated Processes in Computer Security. Proceedings of the 16th Conference STUDENT EEICT 2010. Volume 5. Brno: Brno University of Technology, 2010. p. 246-250. ISBN: 978-80-214-4079-1. Detail

    HANÁČEK, P.; DRAHANSKÝ, M. Analyse sicherer Hardwarelösungen. DuD - Datenschutz und Datensicherheit, 2010, roč. 2010, č. 11, s. 766-770. ISSN: 1614-0702. Detail

    HANÁČEK, P.; DRAHANSKÝ, M.; ORSÁG, F. Angriffe auf sichere Hardwarelösungen. Die Datenschleuder, 2010, roč. 2010, č. 94, s. 12-14. ISSN: 0930-1054. Detail

    HANÁČEK, P.; MALINKA, K.; SCHÄFER, J. E-Banking Security - Comparative Study. IEEE Aerospace and Electronic Systems Magazine, 2010, vol. 25, no. 1, p. 29-34. ISSN: 0885-8985. Detail

    HANÁČEK, P.; ŠVENDA, P. Cryptographic Protocols in Wireless Sensor Networks. Sborník příspěvků MKB 2010. Bílovice nad Svitavou: TNS, 2010. p. 59-76. ISBN: 978-80-904257-1-2. Detail

    PECHO, P.; HANÁČEK, P.; NAGY, J. Simulation and Evaluation of CTP and Secure-CTP Protocols. Radioengineering, 2010, vol. 2010, no. 1, p. 89-98. ISSN: 1210-2512. Detail

  • 2009

    DRAHANSKÝ, M.; ORSÁG, F.; HANÁČEK, P. Securing of Communication in GSM Networks. Proceedings of NGWS2009. Melbourne: Lambert Academic Publishing, 2009. p. 30-36. ISBN: 978-3-8383-5346-3. Detail

    MALINKA, K. Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication. The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009. p. 1-6. ISBN: 978-0-7695-3612-5. Detail

    MALINKA, K.; SCHÄFER, J. Development of Social Networks in Email Communication. The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009. p. 1-5. ISBN: 978-0-7695-3612-5. Detail

    PECHO, P.; HANÁČEK, P.; NAGY, J. Power Consumption of Hardware Cryptography Platform for Wireless Sensor. Proceedings of International Conference on Parallel and Distributed Computing. Higashu Hiroshima: IEEE Computer Society, 2009. p. 79-84. ISBN: 978-0-7695-3914-0. Detail

    PECHO, P.; ZBOŘIL, F.; DRAHANSKÝ, M.; HANÁČEK, P. Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. Journal of Universal Computer Science, 2009, vol. 15, no. 6, p. 992-1006. ISSN: 0948-6968. Detail

    SCHÄFER, J.; MALINKA, K. Security in Peer-to-Peer Networks: Empiric model of file diffusion in BitTorrent. The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009. p. 1-6. ISBN: 978-0-7695-3612-5. Detail

    SCHÄFER, J.; MALINKA, K.; HANÁČEK, P. Peer-to-peer Networks: Security Analysis. International Journal On Advances in Security., 2009, vol. 2009, no. 1, p. 53-61. ISSN: 1942-2636. Detail

  • 2008

    CVRČEK, D. Security of MICA*-based wireless sensor networks. 25th Chaos Communication Congress. Berlin: 2008. p. 1-5. Detail

    CVRČEK, D.; DANEZIS, G. Fighting the 'Good' Internet War. Remodelling the Attacker. Hertfodshire: University of Hertfordshire, 2008. p. 1-6. Detail

    CVRČEK, D.; KRHOVJÁK, J.; KUMPOŠT, M.; MATYÁŠ, V. Authorizing card payments with PINs. Computer, 2008, vol. 41, no. 2, p. 64-68. ISSN: 0018-9162. Detail

    ENDRYS, B.; HANÁČEK, P. Trust in Security of Identification Devices - Feeling of Unity. Information Security Summit IS2 2008. Praha: Tate International s.r.o., 2008. p. 43-50. ISBN: 978-80-86813-15-8. Detail

    HANÁČEK, P.; MALINKA, K.; SCHÄFER, J. E-Banking Security - Comparative Study. Proceedings ICCST 2008. Prague: IEEE Computer Society, 2008. p. 326-330. ISBN: 978-1-4244-1816-9. Detail

    MALINKA, K.; PECHO, P. Co když vás sledují?. Journal CONNECT!, 2008, roč. 2008, č. 12, s. 54-55. ISSN: 1211-3085. Detail

    MALINKA, K.; PECHO, P. Evoluční teorie v podání spear phishingu. Journal CONNECT!, 2008, roč. 2008, č. 6, s. 22-23. ISSN: 1211-3085. Detail

    MATYÁŠ, V.; KRHOVJÁK, J.; LORENC, V.; KUMPOŠT, M.; ŘÍHA, Z.; CVRČEK, D.; STAUDEK, J.; HOLER, V.; MALINKA, K.; ŠVENDA, P.; HANÁČEK, P. Autentizace elektronických transakcí a autorizace dat i uživatelů. Brno: Masarykova universita, 2008. s. 0-0. ISBN: 978-80-210-4556-9. Detail

    SCHÄFER, J.; MALINKA, K.; HANÁČEK, P. Malware Spreading Models in Peer-to-peer Networks. Proceedings ICCST 2008. Praha: IEEE Computer Society, 2008. p. 339-345. ISBN: 978-1-4244-1816-9. Detail

    SCHÄFER, J.; MALINKA, K.; HANÁČEK, P. Peer-to-peer networks security. The Third International Conference on Internet Monitoring and Protection. Bucharest: IEEE Computer Society, 2008. p. 13-13. ISBN: 978-0-7695-3189-2. Detail

    STAJANO, F.; CVRČEK, D.; LEWIS, M. Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. ACNS 2008. Lecture Notes in Computer Science. LNCS. Berlin: Springer Verlag, 2008. p. 460-478. ISSN: 0302-9743. Detail

  • 2007

    BLAHÁK, P.; CVRČEK, D. Alternativní zabezpečení WiFi sití. IT SYSTEM, 2007, roč. 2007, č. 2, s. 1-6. ISSN: 1212-4567. Detail

    CVRČEK, D.; MALINKA, K. Chování uživatelů elektronické pošty. Datakon 2007 - Sborník databázové konference. Brno: Fakulta informatiky MU, 2007. s. 92-101. ISBN: 978-80-7355-076-9. Detail

    MATYÁŠ, V.; KRHOVJÁK, J.; LORENC, V.; KUMPOŠT, M.; ŘÍHA, Z.; CVRČEK, D.; STAUDEK, J.; HOLER, V.; MALINKA, K.; ŠVENDA, P.; HANÁČEK, P. Autentizace uživatelů a autorizace elektronických transakcí. Příručka manažera VIII. Příručka manažera VIII. Praha: Tate International s.r.o., 2007. 318 s. ISBN: 978-80-86813-14-1. Detail

    PECHO, P.; SCHÄFER, J. Bezpečnost čipových karet a detekce vykonávaných operací pomocí genetického programování. Datakon 2007. Brno: 2007. s. 169-175. ISBN: 978-80-7355-076-9. Detail

  • 2006

    CVRČEK, D.; KOUŘIL, D.; LORENC, V.; MATYÁŠ, V. Autentizační hardwarový token nové generace. DATAKON 2006. Brno: Masarykova universita, 2006. s. 229-238. ISBN: 80-210-4102-1. Detail

  • 2005

    CVRČEK, D.; KRHOVJÁK, J.; MATYÁŠ, V.; ŘÍHA, Z.; ŠVÉDA, P. Čipové karty - závěrečná zpráva pro NBÚ CR. Brno: 2005. s. 0-0. Detail

    CVRČEK, D.; LATISLAV, R. TCP - resetovací útok. DATAKON 2005, Proceedings of the Annual Database Conference. Brno: Masarykova universita, 2005. s. 301-310. ISBN: 8021038136. Detail

    CVRČEK, D.; MATYÁŠ, V. PIN (&Chip) or signature - beating or cheating?. SPW 05 Proceedings - The System Likes You and Wants To Be Your Friend. Berlin: University of Hertfordshire, 2005. p. 10-14. Detail

    CVRČEK, D.; MATYÁŠ, V.; PATEL, A. Evidence processing and privacy issues in evidence-based reputation systems. Computer Standards & Interfaces, 2005, vol. 27, no. 5, p. 533-545. ISSN: 0920-5489. Detail

    CVRČEK, D.; MOODY, K. Combining Trust and Risk to Reduce the Cost of Attacks. iTrust 2005. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2005. p. 372-383. ISSN: 0302-9743. Detail

    HANÁČEK, P.; STAUDEK, J. Správa identity. Sborník konference DATAKON 2005. Brno: Masarykova universita, 2005. s. 123-146. ISBN: 80-210-3813-6. Detail

    MATYÁŠ, V.; CVRČEK, D.; KUMPOŠT, M. On Privacy Classification in Ubiquitous Computing Systems. International Scientific Journal of Computing, 2005, vol. 4, no. 2, p. 26-35. ISSN: 1727-6209. Detail

    MIKE, B.; CVRČEK, D. Penetration to Secure Hardware. SPI 2005. Brno: 2005. p. 1 (1 s.). Detail

    ŠVENDA, P.; CVRČEK, D. Smart dust security - key infection revisited. STM 2005. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE. ENTCS. Milano: 2005. p. 11-25. ISSN: 1571-0661. Detail

  • 2004

    CVRČEK, D. Projekt SECURE. DSM Data Security Management, 2004, roč. 2004, č. 4, s. 1-10. ISSN: 1211-8737. Detail

    MIKE, B.; CVRČEK, D.; STEVEN, M. Bezpečný hardware, který není zase tak bezpečný - kryptoanalyza Luny CA3. DSM Data Security Management, 2004, roč. 2004, č. 5, s. 44-47. ISSN: 1211-8737. Detail

Back to top