Tomáš Čejka
Tomáš Čejka
CESNET, a.l.e. & Faculty of Information Technology, CTU in Prague
Verified email at cesnet.cz
Title
Cited by
Cited by
Year
NEMEA: a framework for network traffic analysis
T Cejka, V Bartos, M Svepes, Z Rosa, H Kubatova
2016 12th International Conference on Network and Service Management (CNSM …, 2016
362016
Nemea: Framework for stream-wise analysis of network traffic
V Bartoš, M Žádník, T Čejka
CESNET, ale Tech. Rep., 2013
182013
P4-To-VHDL: Automatic generation of high-speed input and output network blocks
P Benáček, V Puš, H Kubátová, T Čejka
Microprocessors and Microsystems 56, 22-33, 2018
162018
Stream-wise detection of surreptitious traffic over DNS
T Cejka, Z Rosa, H Kubatova
2014 IEEE 19th International Workshop on Computer Aided Modeling and Design …, 2014
142014
Using Application-Aware Flow Monitoring for SIP Fraud Detection
T Cejka, V Bartos, L Truxa, H Kubatova
IFIP International Conference on Autonomous Infrastructure, Management and …, 2015
112015
Analysis of Vertical Scans Discovered by Naive Detection
T Cejka, M Svepes
IFIP International Conference on Autonomous Infrastructure, Management and …, 2016
62016
Configuration of open vSwitch using OF-CONFIG
T Čejka, R Krejčí
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 883-888, 2016
52016
Change-point detection method on 100Gb/s Ethernet interface
P Benáček, RB Blažek, T Čejka, H Kubátová
2014 ACM/IEEE Symposium on Architectures for Networking and Communications …, 2014
42014
Augmented DDoS Mitigation with Reputation Scores
T Jánský, T Čejka, M Žádník, V Bartoš
Proceedings of the 13th International Conference on Availability …, 2018
32018
Preserving Relations in Parallel Flow Data Processing
T Čejka, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2017
32017
Hunting SIP Authentication Attacks Efficiently
T Jansky, T Čejka, V Bartoš
IFIP International Conference on Autonomous Infrastructure, Management and …, 2017
32017
Building a feedback loop to capture evidence of network incidents
Z Rosa, T Čejka, M Žádník, V Pus
2016 12th International Conference on Network and Service Management (CNSM …, 2016
32016
DoH Insight: detecting DNS over HTTPS by machine learning
D Vekshin, K Hynek, T Cejka
Proceedings of the 15th International Conference on Availability …, 2020
22020
Stream-wise adaptive blacklist filter based on flow data
F Šuster, T Čejka
6 th Prague Embedded Systems Workshop, 38, 2018
22018
Making Flow-Based Security Detection Parallel
M Švepeš, T Čejka
IFIP International Conference on Autonomous Infrastructure, Management and …, 2017
22017
Nemea: Searching for Botnet Footprints
T Cejka, R Bodó, H Kubatova
The 3rd Prague Embedded Systems Workshop (PESW2015), 2015
22015
Detecting Spoofed Time in NTP Traffic
T Cejka, A Robledo
The 4th Prague Embedded Systems Workshop (PESW2016), 2016
12016
FPGA Accelerated Change-Point Detection Method for 100 Gb/s Networks
T Cejka, L Kekely, P Benácek, RB Blazek, H Kubátová
MEMICS 2014, 40, 0
1
QoD: Ideas about Evaluating Quality of Datasets
D Soukup, K Hynek, T Cejka
8 th Prague Embedded Systems Workshop, 8, 2020
2020
DoH detection: Discovering hidden DNS
K Hynek, T Cejka, D Vekshin
8 th Prague Embedded Systems Workshop, 14, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20