Jan Kohout
Jan Kohout
Bestätigte E-Mail-Adresse bei cisco.com
Titel
Zitiert von
Zitiert von
Jahr
k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach
J Lokoč, J Kohout, P Čech, T Skopal, T Pevný
Pacific-Asia Workshop on Intelligence and Security Informatics, 131-145, 2016
192016
Tracking users over network hosts based on user behavior
J Mrkos, M Grill, J KOHOUT
US Patent App. 10/129,271, 2018
18*2018
Automatic discovery of web servers hosting similar applications
J Kohout, T Pevný
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
182015
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,344,441, 2016
142016
Unsupervised detection of malware in persistent web traffic
J Kohout, T Pevný
2015 IEEE International Conference on Acoustics, Speech and Signal …, 2015
132015
Learning communication patterns for malware discovery in HTTPs data
J Kohout, T Komárek, P Čech, J Bodnár, J Lokoč
Expert Systems with Applications 101, 129-142, 2018
112018
Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce
P Čech, J Kohout, J Lokoč, T Komárek, J Maroušek, T Pevný
International Conference on Similarity Search and Applications, 311-324, 2016
102016
Using Behavioral Similarity for Botnet Command-and-Control Discovery
J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny
IEEE Intelligent Systems 31 (5), 16-22, 2016
92016
Two-phase genetic algorithm for social network graphs clustering
J Kohout, R Neruda
2013 27th International Conference on Advanced Information Networking and …, 2013
92013
Network traffic fingerprinting based on approximated kernel two-sample test
J Kohout, T Pevný
IEEE Transactions on Information Forensics and Security 13 (3), 788-801, 2018
72018
Analyzing encrypted traffic behavior using contextual traffic data
J Kohout, BH Anderson, M Grill, D McGrew, M Kopp, T Pevny
US Patent App. 15/286,728, 2018
42018
An attractive game with the document:(im) possible?
B Hladká, J Mírovský, J Kohout
The Prague Bulletin of Mathematical Linguistics 96, 5-26, 2011
42011
Malware Detection by HTTPS Traffic Analysis
P Prasse, G Gruben, L Machlika, T Pevny, M Sofka, T Scheffer
32017
Tracking Users over Network Hosts Based on User Behavior
J Mrkos, M Grill, J Kohout
US Patent App. 14/723,605, 2016
32016
Community-based anomaly detection
M Kopp, M Grill, J Kohout
2018 IEEE International Workshop on Information Forensics and Security (WIFS …, 2018
12018
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,531,742, 2016
12016
Exploration and exploitation operators for genetic graph clustering algorithm
J Kohout, R Neruda
International Symposium on Methodologies for Intelligent Systems, 87-92, 2012
12012
Leveraging endpoint and network environment inferences for malware traffic classification
BH Anderson, M Rehak, D McGrew, M Vejman, T Pevny, M Grill, J Kohout
US Patent App. 15/851,918, 2019
2019
Client device tracking
M Grill, J KOHOUT, M Kopp
US Patent App. 15/598,541, 2018
2018
STATISTICAL FINGERPRINTING OF NETWORK TRAFFIC
J Kohout, T Pevny
US Patent App. 15/409,746, 2018
2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20