Follow
Petr Hanáček
Petr Hanáček
Verified email at vutbr.cz
Title
Cited by
Cited by
Year
E-banking security-comparative study
P Hanaek, K Malinka, J Schafer
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
422008
Improving network intrusion detection classifiers by non-payload-based exploit-independent obfuscations: An adversarial approach
I Homoliak, M Teknos, M Ochoa, D Breitenbacher, S Hosseini, P Hanacek
arXiv preprint arXiv:1805.02684, 2018
392018
Bezpečnost informačních systémů
P Hanáček, J Staudek
Praha: Úřad pro státní informační systém, 2000
272000
ASNM: Advanced security network metrics for attack vector description
I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek
Proceedings of the International Conference on Security and Management (SAM), 1, 2013
242013
Implementing a unique chip ID on a reconfigurable polymorphic circuit
L Sekanina, R Ruzicka, Z Vasicek, V Simek, P Hanacek
Information Technology And Control 42 (1), 7-14, 2013
202013
Accelerometer based digital video stabilization for general security surveillance systems
M Drahanský, F Orság, P Hanáček
International Journal of Security and Its Applications 4 (1), 1-10, 2010
202010
Peer-to-peer networks security
J Schäfer, K Malinka, P Hanácek
2008 The Third International Conference on Internet Monitoring and …, 2008
172008
ASNM Datasets: A collection of network attacks for testing of adversarial classifiers and intrusion detectors
I Homoliak, K Malinka, P Hanacek
IEEE Access 8, 112427-112453, 2020
152020
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
152008
Characteristics of buffer overflow attacks tunneled in HTTP traffic
I Homoliak, D Ovsonka, K Koranda, P Hanacek
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
142014
Behavioral signature generation using shadow honeypot
M Barabas, M Drozd, P Hanacek
World Academy of Science, Engineering and Technology, ser, 829-833, 2012
142012
Security of electronic money
P Hanáček
International Conference on Current Trends in Theory and Practice of …, 1998
121998
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic
I Homoliak, D Ovsonka, M Gregr, P Hanacek
The 9th International Conference for Internet Technology and Secured …, 2014
112014
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols.
P Pecho, F Zboril Jr, M Drahanský, P Hanacek
J. Univers. Comput. Sci. 15 (5), 992-1006, 2009
112009
Secure collection tree protocol for tamper-resistant wireless sensors
P Pecho, J Nagy, P Hanáček, M Drahanský
Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009
112009
Bezpečnost informačních systémů. 1 vyd. Praha: Úřad pro státní informační systém, 2000. 127 s
P Hanáček, J Staudek
11
Increasing trust in tor node list using blockchain
L Hellebrandt, I Homoliak, K Malinka, P Hanáček
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019
102019
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset.
I Homoliak, D Breitenbacher, P Hanacek
J. Comput. 12 (2), 143-155, 2017
102017
Simulation and evaluation of CTP and secure-CTP protocols
P Pecho, P Hanacek, J Nagy
Radioengineering 19 (1), 89-99, 2010
102010
Exploitation of netem utility for non-payload-based obfuscation techniques improving network anomaly detection
I Homoliak, M Teknos, M Barabas, P Hanacek
Security and Privacy in Communication Networks: 12th International …, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20