Total number of publications: 13
Articles
-
A review on graph-based approaches for network security monitoring and botnet detection
International Journal of Information Security, year: 2024, volume: 23, edition: 1, DOI
-
Vulnerability of Students of Masaryk University to Two Different Types of Phishing
Applied Cybersecurity & Internet Governance, year: 2024, volume: 4, edition: 2, DOI
Conference proceedings
-
Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure Specification
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and Security, year: 2024
-
Cyber Key Terrain Identification Using Adjusted PageRank Centrality
ICT Systems Security and Privacy Protection. SEC 2023. IFIP Advances in Information and Communication Technology, vol 679., year: 2024
-
Forensic-Ready Analysis Suite: A Tool Support for Forensic-Ready Software Systems Design
International Conference on Research Challenges in Information Science (RCIS 2024), year: 2024
-
From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises
Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24), year: 2024
-
Hierarchical Modeling of Cyber Assets in Kill Chain Attack Graphs
20th International Conference on Network and Service Management, CNSM 2024, year: 2024
-
Identification of Device Dependencies Using Link Prediction
NOMS 2024 - 2024 IEEE/IFIP Network Operations and Management Symposium, year: 2024
-
Machine Learning in Intrusion Detection: An Operational Perspective
Year: 2024
-
Research and Practice of Delivering Tabletop Exercises
Proceedings of the 29th Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE'24), year: 2024