Towards real-time intrusion detection for NetFlow and IPFIX R Hofstede, V Bartoš, A Sperotto, A Pras Proceedings of the 9th International Conference on Network and Service …, 2013 | 52 | 2013 |
NEMEA: a framework for network traffic analysis T Cejka, V Bartos, M Svepes, Z Rosa, H Kubatova 2016 12th International Conference on Network and Service Management (CNSM …, 2016 | 37 | 2016 |
Nemea: Framework for stream-wise analysis of network traffic V Bartoš, M Žádník, T Čejka CESNET, ale, Tech. Rep, 2013 | 18 | 2013 |
Network entity characterization and attack prediction V Bartos, M Zadnik, SM Habib, E Vasilomanolakis Future Generation Computer Systems 97, 674-686, 2019 | 14 | 2019 |
Using application-aware flow monitoring for sip fraud detection T Cejka, V Bartos, L Truxa, H Kubatova IFIP International Conference on Autonomous Infrastructure, Management and …, 2015 | 11 | 2015 |
An analysis of correlations of intrusion alerts in an NREN V Bartos, M Zadnik 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design …, 2014 | 8 | 2014 |
Evaluating reputation of internet entities V Bartoš, J Kořenek IFIP International Conference on Autonomous Infrastructure, Management and …, 2016 | 7 | 2016 |
Analysis of alerts reported to Warden V Bartoš Technická zpráva 1, 2016 | 5 | 2016 |
Network anomaly detection: comparison and real-time issues V Bartoš, M Žádník IFIP International Conference on Autonomous Infrastructure, Management and …, 2012 | 5 | 2012 |
Augmented ddos mitigation with reputation scores T Jánský, T Čejka, M Žádník, V Bartoš Proceedings of the 13th International Conference on Availability …, 2018 | 4 | 2018 |
Hunting SIP Authentication Attacks Efficiently T Jansky, T Čejka, V Bartoš IFIP International Conference on Autonomous Infrastructure, Management and …, 2017 | 3 | 2017 |
Heartbleed Detection at CESNET using Extended Flow Monitoring V Bartoš Proceedings of 8th International Scientific Conference on Security and …, 2015 | 3 | 2015 |
Framework for comparison of network anomaly detection algorithms V Bartoš, M Žádník Technická zpráva FIT-TR-2012-02, Fakulta Informacnıch Technologiı, VUT v …, 2012 | 3 | 2012 |
Predictive methods in cyber defense: Current experience and research challenges M Husák, V Bartoš, P Sokol, A Gajdoš Future Generation Computer Systems 115, 517-530, 2021 | 2 | 2021 |
Dataset of intrusion detection alerts from a sharing platform M Husák, M Žádník, V Bartoš, P Sokol Data in Brief 33, 106530, 2020 | 2 | 2020 |
NERD: Network Entity Reputation Database V Bartoš Proceedings of the 14th International Conference on Availability …, 2019 | 1 | 2019 |
Detection of Network Flow Timestamp Reliability M Žádnik, E Šabik, V Bartoš IFIP International Conference on Autonomous Infrastructure, Management and …, 2014 | 1 | 2014 |
Detection of Network Flow Timestamp Reliability M Žádnik, E Šabik, V Bartoš IFIP International Conference on Autonomous Infrastructure, Management and …, 2014 | 1 | 2014 |
Hardware precomputation of entropy for anomaly detection M Žadnik 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and …, 2011 | 1 | 2011 |
Shallow and Deep Learning Approaches for Network Intrusion Alert Prediction MS Ansari, V Bartos, B Lee Procedia Computer Science 171, 644-653, 2020 | | 2020 |