Other Results
-
2020
Behavioral Anomaly Detection in Industrial Control Systems: An Evaluation of Flowmon ADS, report, 2020
Authors: YOUSSEF, S.; RYŠAVÝ, O. -
2019
An IPFIX Extension for MQTT Protocol Monitoring, report, 2019
Authors: RYŠAVÝ, O.; MATOUŠEK, P. -
2017
Analysis of Constrained Application Protocol, report, 2017
Authors: RYŠAVÝ, O.Netfox Detective - Identifikace aplikačních protokolů pomocí algoritmů strojového učení, report, 2017
Authors: PLUSKAL, J.; LICHTNER, O.; RYŠAVÝ, O.Platforma pro zpracovaní dat síťové forenzní analýzy, report, 2017
Authors: RYCHLÝ, M.; RYŠAVÝ, O.Security Monitoring of LwM2M communication, report, 2017
Authors: RYŠAVÝ, O. -
2016
Network Forensic Tool Netfox Detective, presentation, poster, 2016
Authors: PLUSKAL, J.; RYŠAVÝ, O.On the Identification of Applications from Captured Network Traffic, presentation, poster, 2016
Authors: PLUSKAL, J.; RYŠAVÝ, O.; MATOUŠEK, P.TLS/SSL Decryption Workshop, presentation, poster, 2016
Authors: PLUSKAL, J.; VESELÝ, V.; GRÉGR, M.; RYŠAVÝ, O. -
2015
Concepts of Intercepted Communication Processing with Netfox Detective, presentation, poster, 2015
Authors: PLUSKAL, J.; RYŠAVÝ, O.Deliverable 2.4: RINASim - basic functionality, report, 2015
Authors: VESELÝ, V.; MAREK, M.; HYKEL, T.; RYŠAVÝ, O.; LICHTNER, O.Deliverable 2.6: RINASim - advanced functionality, report, 2015
Authors: VESELÝ, V.; MAREK, M.; HYKEL, T.; RYŠAVÝ, O.; LICHTNER, O.; JEŘÁBEK, K. -
2009
A Calculus of Coercive Subtyping, report, 2009
Authors: KOLLÁR, M.; PETERKA, O.; RYŠAVÝ, O.; ŠKARVADA, L. -
2008
A Formal Approach to Network Security Analysis, report, 2008
Authors: MATOUŠEK, P.; RYŠAVÝ, O.; ŠVÉDA, M.; RÁB, J.; ČEJKA, R. -
2007
A Path to Become a Skillful CCNP Expert During your University Studies, presentation, poster, 2007
Authors: MATOUŠEK, P.; RYŠAVÝ, O. -
2005
Design and development of a library for formal verification: an overview, report, 2005
Authors: RYŠAVÝ, O.; ŠČUGLÍK, F. -
2003
A Survey on Formal Representation of UML, report, 2003
Authors: RYŠAVÝ, O.