Early-stage detection of cyber attacks M Pivarníková, P Sokol, T Bajtoš Information 11 (12), 560, 2020 | 26 | 2020 |
Predictive cyber situational awareness and personalized blacklisting: A sequential rule mining approach M Husák, T Bajtoš, J Kašpar, E Bou-Harb, P Čeleda ACM Transactions on Management Information Systems (TMIS) 11 (4), 1-16, 2020 | 24 | 2020 |
Network intrusion detection with threat agent profiling T Bajtoš, A Gajdoš, L Kleinová, K Lučivjanská, P Sokol Security and Communication Networks 2018, 2018 | 24 | 2018 |
Classification of malicious emails E Marková, T Bajtoš, P Sokol, T Mézešová 2019 IEEE 15th International Scientific Conference on Informatics, 000279-000284, 2019 | 17 | 2019 |
Data collection and data analysis in honeypots and honeynets P Sokol, P Pekarčík, T Bajtoš Proceedings of the Security and Protection of Information. University of Defence, 2015 | 15 | 2015 |
Multi-stage cyber-attacks detection in the industrial control systems T Bajtoš, P Sokol, T Mézešová Recent developments on industrial control systems resilience, 151-173, 2020 | 12 | 2020 |
Virtual honeypots and detection of telnet botnets T Bajtoš, P Sokol, T Mézešová Proceedings of the Central European Cybersecurity Conference 2018, 1-6, 2018 | 10 | 2018 |
Evaluation of attackers’ skill levels in multi-stage attacks T Mézešová, P Sokol, T Bajtoš Information 11 (11), 537, 2020 | 8 | 2020 |
Analysis of the Infection and the Injection Phases of the Telnet Botnets. T Bajtos, P Sokol, A Gajdos, K Lucivjanska, T Mezesova J. Univers. Comput. Sci. 25 (11), 1417-1436, 2019 | 2 | 2019 |
Processing of IDS alerts in multi-step attacks T Bajtoš, P Sokol, F Kurimský Software Impacts 19, 100622, 2024 | | 2024 |
Malicious Emails Classification Based on Machine Learning E Marková, T Bajtoš, P Sokol, T Mézešová, P Pekarčík Proceedings of the Computational Methods in Systems and Software, 797-810, 2021 | | 2021 |
Evaluation of Attackers’ Skill Levels in Multi-Stage Attacks P Sokol, T Bajtoš Information 11 (11), 537, 2020 | | 2020 |
Research Article Network Intrusion Detection with Threat Agent Profiling T Bajtoš, A Gajdoš, L Kleinová, K LuIivjanská, P Sokol | | 2018 |