An empirical comparison of botnet detection methods S Garcia, M Grill, J Stiborek, A Zunino computers & security 45, 100-123, 2014 | 416 | 2014 |
Adaptive multiagent system for network traffic monitoring M Rehak, M Pechoucek, M Grill, J Stiborek, K Bartoš, P Celeda IEEE Intelligent Systems 24 (3), 16-25, 2009 | 72 | 2009 |
Multiple instance learning for malware classification J Stiborek, T Pevný, M Rehák Expert Systems with Applications 93, 346-357, 2018 | 43 | 2018 |
Runtime monitoring and dynamic reconfiguration for intrusion detection systems M Rehák, E Staab, V Fusenig, M Pěchouček, M Grill, J Stiborek, K Bartoš, ... International Workshop on Recent Advances in Intrusion Detection, 61-80, 2009 | 38 | 2009 |
Game-theoretic approach to adversarial plan recognition V Lisý, R Píbil, J Stiborek, B Bošanský, M Pěchouček Proceedings of the 20th European Conference on Artificial Intelligence, 546-551, 2012 | 26 | 2012 |
Dynamic information source selection for intrusion detection systems M Rehak, E Staab, M Pechoucek, J Stiborek, M Grill, K Bartos Proceedings of The 8th International Conference on Autonomous Agents and …, 2009 | 19 | 2009 |
Probabilistic analysis of dynamic malware traces J Stiborek, T Pevný, M Rehák Computers & Security 74, 221-239, 2018 | 15 | 2018 |
Intelligent Cybersecurity Agents [Guest editors' introduction] JM Such, N Criado, L Vercouter, M Rehak IEEE Intelligent Systems 31 (5), 3-7, 2016 | 12 | 2016 |
Method and system for an extensible client specific address book application in a portal server J Saare, R O'brien, M Sambhus, J Chang, D Polla US Patent App. 10/015,192, 2004 | 12 | 2004 |
Using behavioral similarity for botnet command-and-control discovery J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny IEEE Intelligent Systems 31 (5), 16-22, 2016 | 10 | 2016 |
Game theoretical adaptation model for intrusion detection system J Stiborek, M Grill, M Rehak, K Bartos, J Jusko Advances on Practical Applications of Agents and Multi-Agent Systems, 201-210, 2012 | 6 | 2012 |
Threat-model-driven runtime adaptation and evaluation of intrusion detection system M Rehak, E Staab, V Fusenig, J Stiborek, M Grill, K Bartos, M Pechoucek, ... Proceedings of the 6th international conference on Autonomic computing, 65-66, 2009 | 6 | 2009 |
Towards scalable network host simulation J Stiborek, M Rehák, T Pevný SECOND INTERNATIONAL WORKSHOP ON AGENTS AND CYBERSECURITY, 27, 2015 | 3 | 2015 |
Dynamic reconfiguration of intrusion detection systems J Stiborek | 2 | 2017 |
Game theoretical adaptation model for intrusion detection system M Rehak, M Pechoucek, M Grill, J Stiborek, K Bartos The 10th International Conference on Autonomous Agents and Multiagent …, 2011 | 2 | 2011 |
Game Theoretical Model for Adaptive Intrusion Detection System J Stiborek, M Grill, M Rehak, K Bartos, J Jusko Transactions on Computational Collective Intelligence XV, 133-163, 2014 | 1 | 2014 |
Game theoretic, multi-agent approach to network traffic monitoring M Pechoucek, K Bartos, B Bosansky, M Grill, M Komon, V Lisy, T Pevny, ... CZECH TECHNICAL UNIV PRAGUE, 2012 | 1 | 2012 |
On the value of coordination in distributed self-adaptation of intrusion detection system M Reh, M Grill, J Stiborek 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011 | 1 | 2011 |
Active prioritization of investigation targets in network security J Jusko, J Stiborek, T Pevny US Patent App. 15/789,022, 2019 | | 2019 |
Game Theoretical Adaptation Model for Intrusion Detection System-Demo Paper J Stiborek, M Grill, M Rehak, K Bartos, J Jusko Advances on Practical Applications of Agents and Multi-Agent Systems, 291-294, 2012 | | 2012 |