Martin Žádník
Martin Žádník
CESNET
Bestätigte E-Mail-Adresse bei cesnet.cz - Startseite
Titel
Zitiert von
Zitiert von
Jahr
On evolutionary synthesis of linear transforms in FPGA
Z Vašíček, M Žádník, L Sekanina, J Tobola
International Conference on Evolvable Systems, 141-152, 2008
262008
Flowmon probe
P Čeleda, M Kováčik, T Koníř, V Krmíček, P Špringl, M Žádník
Networking Studies, 67, 2006
262006
Nemea: Framework for stream-wise analysis of network traffic
V Bartos, M Zadnik, T Cejka
CESNET, ale, Tech. Rep, 2013
182013
NFA reduction for regular expressions matching using FPGA
V Košař, M Žádník, J Kořenek
2013 International Conference on Field-Programmable Technology (FPT), 338-341, 2013
162013
Fast lookup for dynamic packet filtering in FPGA
L Kekely, M Žádník, J Kořenek
17th International Symposium on Design and Diagnostics of Electronic …, 2014
112014
Is spam visible in flow-level statistic
M Žádník, Z Michlovský
CESNET National Research and Education Network, Tech. Rep., CESNET 1, 2008
82008
Detecting IP spoofing by modelling history of IP address entry points
M Kováčik, M Kajan, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2013
62013
How to detect cryptocurrency miners? By traffic forensics!
V Veselý, M Žádník
Digital Investigation 31, 100884, 2019
52019
Preserving Relations in Parallel Flow Data Processing
T Čejka, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2017
52017
Network anomaly detection: comparison and real-time issues
V Bartoš, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2012
52012
Augmented ddos mitigation with reputation scores
T Jánský, T Čejka, M Žádník, V Bartoš
Proceedings of the 13th International Conference on Availability …, 2018
42018
Hardware-accelerated netflow probe
M Žádník, L Lhotka
Technical Report 32/2005, CESNET, Praha, Tech. Rep, 2005
42005
Dataset of intrusion detection alerts from a sharing platform
M Husák, M Žádník, V Bartoš, P Sokol
Data in Brief 33, 106530, 2020
32020
Building a feedback loop to capture evidence of network incidents
Z Rosa, T Čejka, M Žádník, V Pus
2016 12th International Conference on Network and Service Management (CNSM …, 2016
32016
Framework for comparison of network anomaly detection algorithms
V Bartoš, M Žádník
Technická zpráva FIT-TR-2012-02, Fakulta Informacnıch Technologiı, VUT v …, 2012
32012
Network Monitoring Based on IP Data Flows
M Žádník
Best Practice Document GN3-NA3-T4-CBPD131, 2010
32010
Optimization of network flow monitoring
M Žádník
Information Sciences and Technologies Bulletin of the ACM Slovakia 5 (1), 6, 2013
22013
COMBOv2-hardware accelerators for high-speed networking
J Novotný, M Žádník
XILINX Academic Forum, San Jose, USA, 2008
22008
Evaluating Bad Hosts Using Adaptive Blacklist Filter
K Hynek, T Čejka, M Žádník, H Kubátová
2020 9th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2020
12020
Detection of network flow timestamp reliability
M Žádnik, E Šabik, V Bartoš
IFIP International Conference on Autonomous Infrastructure, Management and …, 2014
12014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20