متابعة
Martin Žádník
Martin Žádník
CESNET
بريد إلكتروني تم التحقق منه على cesnet.cz - الصفحة الرئيسية
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Flowmon probe
P Čeleda, M Kováčik, T Koníř, V Krmíček, P Špringl, M Žádník
Networking Studies, 67, 2006
302006
On evolutionary synthesis of linear transforms in FPGA
Z Vašíček, M Žádník, L Sekanina, J Tobola
Evolvable Systems: From Biology to Hardware: 8th International Conference …, 2008
282008
How to detect cryptocurrency miners? By traffic forensics!
V Veselý, M Žádník
Digital Investigation 31, 100884, 2019
272019
Nemea: Framework for stream-wise analysis of network traffic
V Bartos, M Zadnik, T Cejka
CESNET, ale, Tech. Rep, 2013
242013
Dataset of intrusion detection alerts from a sharing platform
M Husák, M Žádník, V Bartoš, P Sokol
Data in Brief 33, 106530, 2020
192020
Fast lookup for dynamic packet filtering in FPGA
L Kekely, M Žádník, J Kořenek
17th International Symposium on Design and Diagnostics of Electronic …, 2014
192014
NFA reduction for regular expressions matching using FPGA
V Košař, M Žádník, J Kořenek
2013 International Conference on Field-Programmable Technology (FPT), 338-341, 2013
172013
Is spam visible in flow-level statistic
M Žádník, Z Michlovský
CESNET National Research and Education Network, Tech. Rep., CESNET 1, 2008
82008
Augmented ddos mitigation with reputation scores
T Jánský, T Čejka, M Žádník, V Bartoš
Proceedings of the 13th International Conference on Availability …, 2018
62018
Detecting IP spoofing by modelling history of IP address entry points
M Kováčik, M Kajan, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2013
62013
Lessons learned from automated sharing of intrusion detection alerts: the case of the SABU platform
M Husák, P Sokol, M Žádník, V Bartoš, M Horák
Digital Threats: Research and Practice 4 (4), 1-11, 2023
52023
Preserving Relations in Parallel Flow Data Processing
T Čejka, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2017
52017
Precise Timestamp Generation Module and its Applications in Flow Monitoring
MZT Martínek, M Žádník
Universities of the Czech Republic and the Czech Academy of Sciences 12, 2009
52009
Network anomaly detection: comparison and real-time issues
V Bartoš, M Žádník
Dependable Networks and Services: 6th IFIP WG 6.6 International Conference …, 2012
42012
Network monitoring based on ip data flows
M Žádník
Best Practice Document GN3-NA3-T4-CBPD131, 2010
42010
Hardware-accelerated netflow probe
M Žádník, L Lhotka
Technical Report 32/2005, CESNET, Praha, Tech. Rep, 2005
42005
Towards inference of ddos mitigation rules
M Žádník
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium, 1-5, 2022
32022
Evaluating bad hosts using adaptive blacklist filter
K Hynek, T Čejka, M Žádník, H Kubátová
2020 9th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2020
32020
Building a feedback loop to capture evidence of network incidents
Z Rosa, T Čejka, M Žádník, V Pus
2016 12th International Conference on Network and Service Management (CNSM …, 2016
32016
Framework for comparison of network anomaly detection algorithms
V Bartoš, M Žádník
Technická zpráva FIT-TR-2012-02, Fakulta Informacnıch Technologiı, VUT v …, 2012
32012
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20