An empirical comparison of botnet detection methods S Garcia, M Grill, J Stiborek, A Zunino computers & security 45, 100-123, 2014 | 978 | 2014 |
Multiple instance learning for malware classification J Stiborek, T Pevný, M Rehák Expert Systems with Applications 93, 346-357, 2018 | 87 | 2018 |
Adaptive multiagent system for network traffic monitoring M Rehák, M Pechoucek, M Grill, J Stiborek, K Bartos, P Celeda IEEE Intelligent Systems 24 (3), 16-25, 2009 | 80 | 2009 |
Runtime monitoring and dynamic reconfiguration for intrusion detection systems M Rehák, E Staab, V Fusenig, M Pěchouček, M Grill, J Stiborek, K Bartoš, ... Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009 | 43 | 2009 |
Game-theoretic approach to adversarial plan recognition V Lisý, R Píbil, J Stiborek, B Bošanský, M Pěchouček ECAI 2012, 546-551, 2012 | 36* | 2012 |
Probabilistic analysis of dynamic malware traces J Stiborek, T Pevný, M Rehák Computers & Security 74, 221-239, 2018 | 32 | 2018 |
Dynamic information source selection for intrusion detection systems M Rehak, E Staab, M Pechoucek, J Stiborek, M Grill, K Bartos Proceedings of The 8th International Conference on Autonomous Agents and …, 2009 | 24 | 2009 |
Using behavioral similarity for botnet command-and-control discovery J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny IEEE Intelligent Systems 31 (5), 16-22, 2016 | 13 | 2016 |
Threat-model-driven runtime adaptation and evaluation of intrusion detection system M Rehak, E Staab, V Fusenig, J Stiborek, M Grill, K Bartos, M Pechoucek, ... Proceedings of the 6th international conference on Autonomic computing, 65-66, 2009 | 8 | 2009 |
Active prioritization of investigation targets in network security J Jusko, J Stiborek, T Pevny US Patent 10,904,271, 2021 | 5 | 2021 |
Game theoretical adaptation model for intrusion detection system J Stiborek, M Grill, M Rehak, K Bartos, J Jusko Advances on Practical Applications of Agents and Multi-Agent Systems: 10th …, 2012 | 5 | 2012 |
Sample selection for data analysis for use in malware detection J Stiborek, M Rehak US Patent 10,015,192, 2018 | 4 | 2018 |
On the value of coordination in distributed self-adaptation of intrusion detection system M Reh, M Grill, J Stiborek 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and …, 2011 | 4 | 2011 |
Game theoretical adaptation model for intrusion detection system M Rehak, M Pechoucek, M Grill, J Stiborek, K Bartos The 10th International Conference on Autonomous Agents and Multiagent …, 2011 | 4 | 2011 |
Towards scalable network host simulation J Stiborek, M Rehák, T Pevný International Workshop on Agents and Cybersecurity, 27-35, 2015 | 3 | 2015 |
Dynamic reconfiguration of intrusion detection systems J Stiborek PQDT-Global, 2017 | 2 | 2017 |
Game Theoretical Model for Adaptive Intrusion Detection System J Stiborek, M Grill, M Rehak, K Bartos, J Jusko Transactions on Computational Collective Intelligence XV, 133-163, 2014 | 1 | 2014 |
Intelligence, not integration: Distributed regret minimization for IDS Control M Rehák, J Stiborek, M Grill 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011 | 1 | 2011 |
Game Theoretical Adaptation Model for Intrusion Detection System-Demo Paper J Stiborek, M Grill, M Rehak, K Bartos, J Jusko Advances on Practical Applications of Agents and Multi-Agent Systems: 10th …, 2012 | | 2012 |
Intelligent Cybersecurity Agents JM Such, N Criado, L Vercouter, M Rehak, Ö Kafali, N Ajmeri, MP Singh, ... | | |