Flowmon probe P Čeleda, M Kováčik, T Koníř, V Krmíček, P Špringl, M Žádník Networking Studies, 67, 2006 | 30 | 2006 |
On evolutionary synthesis of linear transforms in FPGA Z Vašíček, M Žádník, L Sekanina, J Tobola Evolvable Systems: From Biology to Hardware: 8th International Conference …, 2008 | 28 | 2008 |
How to detect cryptocurrency miners? By traffic forensics! V Veselý, M Žádník Digital Investigation 31, 100884, 2019 | 27 | 2019 |
Nemea: Framework for stream-wise analysis of network traffic V Bartos, M Zadnik, T Cejka CESNET, ale, Tech. Rep, 2013 | 24 | 2013 |
Dataset of intrusion detection alerts from a sharing platform M Husák, M Žádník, V Bartoš, P Sokol Data in Brief 33, 106530, 2020 | 19 | 2020 |
Fast lookup for dynamic packet filtering in FPGA L Kekely, M Žádník, J Kořenek 17th International Symposium on Design and Diagnostics of Electronic …, 2014 | 19 | 2014 |
NFA reduction for regular expressions matching using FPGA V Košař, M Žádník, J Kořenek 2013 International Conference on Field-Programmable Technology (FPT), 338-341, 2013 | 17 | 2013 |
Is spam visible in flow-level statistic M Žádník, Z Michlovský CESNET National Research and Education Network, Tech. Rep., CESNET 1, 2008 | 8 | 2008 |
Augmented ddos mitigation with reputation scores T Jánský, T Čejka, M Žádník, V Bartoš Proceedings of the 13th International Conference on Availability …, 2018 | 6 | 2018 |
Detecting IP spoofing by modelling history of IP address entry points M Kováčik, M Kajan, M Žádník IFIP International Conference on Autonomous Infrastructure, Management and …, 2013 | 6 | 2013 |
Lessons learned from automated sharing of intrusion detection alerts: the case of the SABU platform M Husák, P Sokol, M Žádník, V Bartoš, M Horák Digital Threats: Research and Practice 4 (4), 1-11, 2023 | 5 | 2023 |
Preserving Relations in Parallel Flow Data Processing T Čejka, M Žádník IFIP International Conference on Autonomous Infrastructure, Management and …, 2017 | 5 | 2017 |
Precise Timestamp Generation Module and its Applications in Flow Monitoring MZT Martínek, M Žádník Universities of the Czech Republic and the Czech Academy of Sciences 12, 2009 | 5 | 2009 |
Network anomaly detection: comparison and real-time issues V Bartoš, M Žádník Dependable Networks and Services: 6th IFIP WG 6.6 International Conference …, 2012 | 4 | 2012 |
Network monitoring based on ip data flows M Žádník Best Practice Document GN3-NA3-T4-CBPD131, 2010 | 4 | 2010 |
Hardware-accelerated netflow probe M Žádník, L Lhotka Technical Report 32/2005, CESNET, Praha, Tech. Rep, 2005 | 4 | 2005 |
Towards inference of ddos mitigation rules M Žádník NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1-5, 2022 | 3 | 2022 |
Evaluating bad hosts using adaptive blacklist filter K Hynek, T Čejka, M Žádník, H Kubátová 2020 9th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2020 | 3 | 2020 |
Building a feedback loop to capture evidence of network incidents Z Rosa, T Čejka, M Žádník, V Pus 2016 12th International Conference on Network and Service Management (CNSM …, 2016 | 3 | 2016 |
Framework for comparison of network anomaly detection algorithms V Bartoš, M Žádník Technická zpráva FIT-TR-2012-02, Fakulta Informacnıch Technologiı, VUT v …, 2012 | 3 | 2012 |