Illegitimate typosquatting detection with internet protocol information M Grill, J Kohout, M Kopp, T Pevny US Patent 10,491,614, 2019 | 213 | 2019 |
Detection of malicious network connections J Kohout, J Jusko, T Pevny, M Rehak US Patent 9,344,441, 2016 | 37 | 2016 |
k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach J Lokoč, J Kohout, P Čech, T Skopal, T Pevný Pacific-Asia Workshop on Intelligence and Security Informatics, 131-145, 2016 | 29 | 2016 |
Tracking users over network hosts based on user behavior J Mrkos, M Grill, J Kohout US Patent 10,129,271, 2018 | 25 | 2018 |
Learning communication patterns for malware discovery in HTTPs data J Kohout, T Komárek, P Čech, J Bodnár, J Lokoč Expert Systems with Applications 101, 129-142, 2018 | 23 | 2018 |
Automatic discovery of web servers hosting similar applications J Kohout, T Pevný 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 21 | 2015 |
Tracking users over network hosts based on user behavior J Mrkos, M Grill, J KOHOUT US Patent App. 10/129,271, 2018 | 19* | 2018 |
Unsupervised detection of malware in persistent web traffic J Kohout, T Pevný 2015 IEEE International Conference on Acoustics, Speech and Signal …, 2015 | 19 | 2015 |
Analyzing encrypted traffic behavior using contextual traffic data J Kohout, BH Anderson, M Grill, D McGrew, M Kopp, T Pevny US Patent 10,805,338, 2020 | 17 | 2020 |
Using Behavioral Similarity for Botnet Command-and-Control Discovery J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny IEEE Intelligent Systems 31 (5), 16-22, 2016 | 12 | 2016 |
Identifying self-signed certificates using HTTP access logs for malware detection M Kopp, M Grill, J Kohout US Patent 10,375,097, 2019 | 11 | 2019 |
Network traffic fingerprinting based on approximated kernel two-sample test J Kohout, T Pevný IEEE Transactions on Information Forensics and Security 13 (3), 788-801, 2017 | 11 | 2017 |
Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce P Čech, J Kohout, J Lokoč, T Komárek, J Maroušek, T Pevný International Conference on Similarity Search and Applications, 311-324, 2016 | 10 | 2016 |
Two-phase genetic algorithm for social network graphs clustering J Kohout, R Neruda 2013 27th International Conference on Advanced Information Networking and …, 2013 | 9 | 2013 |
Malware detection by HTTPS traffic analysis P Prasse, G Gruben, L Machlika, T Pevny, M Sofka, T Scheffer | 7 | 2016 |
Statistical fingerprinting of network traffic J Kohout, T Pevny US Patent 10,425,434, 2019 | 6 | 2019 |
Framework for joint learning of network traffic representations and traffic classifiers J Kohout, T Pevny US Patent 10,079,768, 2018 | 6 | 2018 |
An attractive game with the document:(im) possible? B Hladká, J Mírovský, J Kohout The Prague Bulletin of Mathematical Linguistics 96, 5, 2011 | 6 | 2011 |
Community-based anomaly detection M Kopp, M Grill, J Kohout 2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018 | 4 | 2018 |
Analyzing encrypted traffic behavior using contextual traffic data J Kohout, BH Anderson, M Grill, D McGrew, M Kopp, T Pevny US Patent App. 17/029,156, 2021 | 3 | 2021 |