Husák, Martin
102  results:
Search for persons X
?
1

Identification of Device Dependencies Using Link Prediction:

, In: NOMS 2024-2024 IEEE Network Operations and Management Symposium,
 
?
2

Unraveling Network-Based Pivoting Maneuvers: Empirical Insi..:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Digital Forensics and Cyber Crime,
 
?
3

A review on graph-based approaches for network security mon..:

Lagraa, Sofiane ; Husák, Martin ; Seba, Hamida...
International Journal of Information Security.  23 (2023)  1 - p. 119-140 , 2023
 
?
4

Lessons Learned from Automated Sharing of Intrusion Detecti..:

Husák, Martin ; Sokol, Pavol ; Žádník, Martin..
Digital Threats: Research and Practice.  4 (2023)  4 - p. 1-11 , 2023
 
?
5

On the Provision of Network-Wide Cyber Situational Awarenes..:

, In: Complex Computational Ecosystems; Lecture Notes in Computer Science,
 
?
6

Recommending Similar Devices in Close Proximity for Network..:

, In: 2023 19th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob),
Boucek, Vladimir ; Husak, Martin - p. 481-484 , 2023
 
?
7

Lightweight Impact Assessment and Projection of Lateral Mov..:

, In: 2023 IEEE Conference on Communications and Network Security (CNS),
Husak, Martin ; Javornik, Michal - p. 1-6 , 2023
 
?
10

SoK: Applications and Challenges of using Recommender Syste..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
Husák, Martin ; Čermák, Milan - p. 1-10 , 2022
 
?
15

Limiting the Size of a Predictive Blacklist While Maintaini..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
Šuľan, Samuel ; Husák, Martin - p. 1-6 , 2022
 
1-15