Martin Žádník
Title
Cited by
Cited by
Year
Flowmon probe
P Čeleda, M Kováčik, T Koníř, V Krmíček, P Špringl, M Žádník
Networking Studies, 67, 2006
282006
On evolutionary synthesis of linear transforms in FPGA
Z Vašíček, M Žádník, L Sekanina, J Tobola
International Conference on Evolvable Systems, 141-152, 2008
252008
Nemea: Framework for stream-wise analysis of network traffic
V Bartoš, M Žádník, T Čejka
CESNET, ale, Tech. Rep, 2013
182013
NFA reduction for regular expressions matching using FPGA
V Košař, M Žádník, J Kořenek
2013 International Conference on Field-Programmable Technology (FPT), 338-341, 2013
122013
Fast lookup for dynamic packet filtering in FPGA
L Kekely, M Žádník, J Kořenek
17th International Symposium on Design and Diagnostics of Electronic …, 2014
102014
Is spam visible in flow-level statistic
M Žádník, Z Michlovský
CESNET National Research and Education Network, Tech. Rep., CESNET 1, 2008
82008
Detecting IP spoofing by modelling history of IP address entry points
M Kováčik, M Kajan, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2013
62013
Network anomaly detection: comparison and real-time issues
V Bartoš, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2012
52012
Hardware-accelerated netflow probe
M Žádník, L Lhotka
Technical Report 32/2005, CESNET, Praha, Tech. Rep, 2005
42005
Augmented ddos mitigation with reputation scores
T Jánský, T Čejka, M Žádník, V Bartoš
Proceedings of the 13th International Conference on Availability …, 2018
32018
Preserving Relations in Parallel Flow Data Processing
T Čejka, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2017
32017
Building a feedback loop to capture evidence of network incidents
Z Rosa, T Čejka, M Žádník, V Pus
2016 12th International Conference on Network and Service Management (CNSM …, 2016
32016
Framework for comparison of network anomaly detection algorithms
V Bartoš, M Žádník
Technická zpráva FIT-TR-2012-02, Fakulta Informacnıch Technologiı, VUT v …, 2012
32012
Dataset of intrusion detection alerts from a sharing platform
M Husák, M Žádník, V Bartoš, P Sokol
Data in Brief, 106530, 2020
22020
How to detect cryptocurrency miners? By traffic forensics!
V Veselý, M Žádník
Digital Investigation 31, 100884, 2019
22019
Network Monitoring Based on IP Data Flows
M Žádník
Best Practice Document GN3-NA3-T4-CBPD131, 2010
22010
COMBOv2-hardware accelerators for high-speed networking
J Novotný, M Žádník
XILINX Academic Forum, San Jose, USA, 2008
22008
Optimization of network flow monitoring
M Žádník
Information Sciences & Technologies: Bulletin of the ACM Slovakia 5 (2), 2013
12013
Flexible FlowMon
M Žádnik, P Špringl, P Čeleda
Technical report 36/2007, Praha: CESNET, 2007
12007
FlowMon Cache Simulation and Analysis of Inter-Packet Gaps
M Kramáreková, D Jakubík, M Žádník, D Šafránek
CESNET, zspo, 2006
12006
The system can't perform the operation now. Try again later.
Articles 1–20