IT Security Research Group

Publications

  • 2024

    FIRC Anton, MALINKA Kamil and HANÁČEK Petr. Deepfake Speech Detection: A Spectrogram Analysis. In: SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. 2024, p. 9.
    Detail

    ŠALKO Milan, FIRC Anton and MALINKA Kamil. Security Implications of Deepfakes in Face Authentication. In: SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. 2024.
    Detail

  • 2023

    LI Zengpeng, SZALACHOWSKI Pawel, VENUGOPALAN Sarad and HOMOLIAK Ivan. BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting with Fault Recovery. In: 2023, p. 15.
    Detail

    DRGA Jozef, HOMOLIAK Ivan, VANČO Juraj, PEREŠÍNI Martin, HANÁČEK Petr and VASILAKOS Athanasios. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In: 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023, pp. 1-4. ISBN 0-06-000020-1.
    Detail

    STANČÍKOVÁ Ivana and HOMOLIAK Ivan. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In: SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023, pp. 203-2011. ISBN 978-1-4503-9517-5.
    Detail

    FIRC Anton, MALINKA Kamil and HANÁČEK Petr. Deepfakes as a threat to a speaker and facial recognition: an overview of tools and attack vectors. Heliyon, vol. 9, no. 4, 2023, pp. 1-33. ISSN 2405-8440.
    Detail

    FIRC Anton, MALINKA Kamil and HANÁČEK Petr. Deepfakes: Bezpečnostní výzva pro naše uši. DSM Data Security Management, vol. 2023, no. 02, pp. 41-44. ISSN 1211-8737.
    Detail

    HUJŇÁK Ondřej, MALINKA Kamil and HANÁČEK Petr. Indirect Bluetooth Low Energy Connection Detection. In: 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023, pp. 328-333. ISBN 978-1-6654-6268-6.
    Detail

    ZBOŘIL Jan, HUJŇÁK Ondřej and MALINKA Kamil. IoT Gateways Network Communication Analysis. In: 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023, pp. 334-339. ISBN 978-1-6654-6268-6.
    Detail

    MALINKA Kamil, FIRC Anton, PEREŠÍNI Martin, JANUŠ Filip and HUJŇÁK Ondřej. On the educational impact of ChatGPT: Is Artificial Intelligence ready to obtain a University degree?. In: Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE. Turku: Association for Computing Machinery, 2023, pp. 47-53. ISBN 979-8-4007-0138-2.
    Detail

    PRUDKÝ Daniel, FIRC Anton and MALINKA Kamil. Assessing the Human Ability to Recognize Synthetic Speech in Ordinary Conversation. In: 2023 International Conference of the Biometrics Special Interest Group (BIOSIG). Proceedings of the 22nd International Conference of the Biometrics Special Interest Group. Darmstadt: GI - Group for computer science, 2023, pp. 1-5. ISBN 978-3-88579-733-3.
    Detail

    MALINKA Kamil, FIRC Anton and HANÁČEK Petr. Deepfakes a lidé: dokážeme ještě rozlišit pravou řeč od umělé?. DSM Data Security Management, vol. 2023, no. 04, pp. 22-26. ISSN 1211-8737.
    Detail

  • 2022

    BREITENBACHER Dominik, HOMOLIAK Ivan, AUNG Yan Lin, ELOVICI Yuval and TIPPENHAUER Nils Ole. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, vol. 9, no. 12, 2022, pp. 9640-9658. ISSN 2327-4662.
    Detail

    FIRC Anton and MALINKA Kamil. The dawn of a text-dependent society: deepfakes as a threat to speech verification systems. In: SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. New York, NY: Association for Computing Machinery, 2022, pp. 1646-1655. ISBN 978-1-4503-8713-2.
    Detail

    MALINKA Kamil, HUJŇÁK Ondřej, HANÁČEK Petr and HELLEBRANDT Lukáš. E-Banking Security Study - 10 years later. IEEE Access, vol. 2022, no. 10, pp. 16681-16699. ISSN 2169-3536.
    Detail

    HOLÍKOVÁ Lenka, HOLÍK Lukáš, HOMOLIAK Ivan, LENGÁL Ondřej, VEANES Margus and VOJNAR Tomáš. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In: Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022, pp. 4165-4182. ISBN 978-1-939133-31-1.
    Detail

    FIRC Anton, MALINKA Kamil and HANÁČEK Petr. Creation and detection of malicious synthetic media - a preliminary survey on deepfakes. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 125-145. ISBN 978-80-86583-34-1.
    Detail

    FIRC Anton and MALINKA Kamil. Practical lessons of (deep)faking human speech. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 161-172. ISBN 978-80-86583-34-1.
    Detail

    HUJŇÁK Ondřej, MALINKA Kamil and HANÁČEK Petr. E-Banking Authentication - Dynamic Password Generators and Hardware Tokens. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 211-221. ISBN 978-80-86583-34-1.
    Detail

    PEREŠÍNI Martin, MALINKA Kamil, HOMOLIAK Ivan, BENČIĆ Federico M. and HLADKÝ Tomáš. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 173-184. ISBN 978-80-86583-34-1.
    Detail

    FIRC Anton, MALINKA Kamil and HANÁČEK Petr. Deepfakes: A Dangerous Entertainment?. In: Recenzovaný sborník příspěvků mezinárodní vědecké konference MMK2022. Hradec Králové: Akademické sdružení MAGNANIMITAS Assn., 2022, pp. 1073-1082. ISBN 978-80-87952-37-5.
    Detail

    HOMOLIAK Ivan. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 185-210. ISBN 978-80-86583-34-1.
    Detail

  • 2021

    HOMOLIAK Ivan, VENUGOPALAN Sarad, REIJSBERGEN Daniel, HUM Qingze, SCHUMI Richard and SZALACHOWSKI Pawel. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE Communications Surveys and Tutorials, vol. 23, no. 1, 2021, pp. 341-390. ISSN 1553-877X.
    Detail

  • 2020

    HOMOLIAK Ivan, MALINKA Kamil and HANÁČEK Petr. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, vol. 8, no. 6, 2020, pp. 112427-112453. ISSN 2169-3536.
    Detail

    BINDER Alexander, BREITENBACHER Dominik, HARTEL Pieter H., SZALACHOWSKI Pawel, HOMOLIAK Ivan and HUJŇÁK Ondřej. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020, pp. 145-162. ISBN 978-1-4503-8139-0.
    Detail

    OČENÁŠ Martin, HOMOLIAK Ivan, MALINKA Kamil and HANÁČEK Petr. Security and Encryption at Modern Databases. In: ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020, pp. 19-23. ISBN 978-1-4503-7744-7.
    Detail

    HUM Qingze, TAN Wei Jin, TEY Shi Ying, LENUS Latasha, HOMOLIAK Ivan, LIN Yun and SUN Jun. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In: 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020, pp. 17-25. ISBN 978-0-7381-0495-9.
    Detail

  • 2019

    HOMOLIAK Ivan, TOFFALINI Flavio, GUARNIZO Juan D., ELOVICI Yuval and OCHOA Martín. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Computing Surveys, vol. 52, no. 2, 2019, pp. 1-40. ISSN 0360-0300.
    Detail

    HARTEL Pieter H., HOMOLIAK Ivan and REIJSBERGEN Daniel. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, vol. 07, no. 12, 2019, pp. 177539-177555. ISSN 2169-3536.
    Detail

    HELLEBRANDT Lukáš, HOMOLIAK Ivan, MALINKA Kamil and HANÁČEK Petr. Increasing Trust in Tor Node List Using Blockchain. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019, pp. 29-32. ISBN 978-1-7281-1328-9.
    Detail

    HUJŇÁK Ondřej and KREJČÍ Radek. Security Framework for IoT and Fog Computing Networks. In: 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud). Palladam: Institute of Electrical and Electronics Engineers, 2019, pp. 87-92. ISBN 978-1-7281-4365-1.
    Detail

  • 2018

    HOMOLIAK Ivan, TEKNŐS Martin, BREITENBACHER Dominik and HANÁČEK Petr. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, vol. 5, no. 17, 2018, pp. 1-15. ISSN 2032-9393.
    Detail

  • 2017

    HOMOLIAK Ivan, ŠULÁK Ladislav and HANÁČEK Petr. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In: Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10144. Jeju Island: Springer International Publishing, 2017, pp. 66-78. ISBN 978-3-319-56549-1. ISSN 0302-9743.
    Detail

    HOMOLIAK Ivan, TEKNŐS Martin, BARABAS Maroš and HANÁČEK Petr. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In: Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017, pp. 770-773. ISBN 978-3-319-59607-5.
    Detail

    KAČIC Matej and BARABAS Maroš. Klasifikace informací v souvislostech. In: IS2 - Other Dimensions of Security. Praha: Tate International s.r.o., 2017, pp. 133-141. ISBN 978-80-86813-30-1.
    Detail

    HELLEBRANDT Lukáš, HUJŇÁK Ondřej, HANÁČEK Petr and HOMOLIAK Ivan. Survey of Privacy Enabling Strategies in IoT Networks. In: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017, pp. 216-221. ISBN 978-1-4503-5392-2.
    Detail

    OČENÁŠ Martin. Bitcoin blockchain analysis. In: Mikulášská kryptobesídka. Praha: Trusted Network Solutions, a.s., 2017, pp. 67-68.
    Detail

  • 2016

    BREITENBACHER Dominik, HOMOLIAK Ivan, JAROŠ Jiří and HANÁČEK Petr. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In: Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings, vol. 1. Orlando: The International Institute of Informatics and Systemics, 2016, pp. 55-62. ISBN 978-1-941763-47-6. ISSN 1690-4524.
    Detail

    ARON Lukáš and HANÁČEK Petr. A Concept of Dynamic Permission Mechanism on Android. In: Progress in Applied Mathematics in Science and Engineering Proceedings. Bali, Indonesia: American Institute of Physics, 2016, pp. 22-30. ISBN 978-0-7354-1352-8.
    Detail

    ARON Lukáš and HANÁČEK Petr. Dynamic Permission Mechanism on Android. Journal of Software, vol. 2016, no. 12, pp. 1124-1230. ISSN 1796-217X.
    Detail

    SMETKA Tomáš, HOMOLIAK Ivan and HANÁČEK Petr. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In: Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016, pp. 305-312. ISBN 978-1-5090-1072-1.
    Detail

    BREITENBACHER Dominik, HOMOLIAK Ivan, JAROŠ Jiří and HANÁČEK Petr. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, vol. 14, no. 3, 2016, pp. 51-58. ISSN 1690-4524.
    Detail

    VANČO Matúš and ARON Lukáš. Dynamic Security Policy Enforcement on Android. International Journal of Security and Its Applications, vol. 2016, no. 10, pp. 141-148. ISSN 1738-9976.
    Detail

    HELLEBRANDT Lukáš. URI-based HBAC in FreeIPA. In: SantaCrypt, proceedings. Bílovice nad Svitavou: Trusted Network Solutions, a.s., 2016, pp. 45-46. ISBN 978-80-904257-8-1.
    Detail

  • 2015

    DRAHANSKÝ Martin, HANÁČEK Petr, ZBOŘIL František, HENZL Martin, ZBOŘIL František V., YIM Jaegeol and SHIM Kyubark. Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks. Improving Information Security Practices through Computational Intelligence. Washington: IGI Global, 2015, pp. 198-227. ISBN 978-1-4666-9426-2.
    Detail

    SMETKA Tomáš, HOMOLIAK Ivan and HANÁČEK Petr. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. In: Santa's Crypto Get-Together 2015. Praha: TNS, 2015, pp. 43-44. ISBN 978-80-904257-7-4.
    Detail

    IAREMKO Iaroslav, ARON Lukáš and HANÁČEK Petr. Improving IP Geolocation Using Network Measurement Characteristics. In: HKICEAS. Hong Kong: Higher Education Forum, 2015, pp. 210-220. ISBN 978-986-87417-4-4.
    Detail

    BREITENBACHER Dominik, HOMOLIAK Ivan and HANÁČEK Petr. Parallelized Self-Initializing Quadratic Sieve using OpenMP. In: Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015, pp. 39-40. ISBN 978-80-904257-7-4.
    Detail

  • 2014

    ANTAL Lukáš, BARABAS Maroš and HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část I. DSM Data Security Management, vol. 18, no. 1, 2014, pp. 36-39. ISSN 1211-8737.
    Detail

    HOMOLIAK Ivan, OVŠONKA Daniel, KORANDA Karel and HANÁČEK Petr. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In: International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014, pp. 188-193. ISBN 978-1-4799-3531-4.
    Detail

    HOMOLIAK Ivan, OVŠONKA Daniel, GRÉGR Matěj and HANÁČEK Petr. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In: Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014, pp. 310-317. ISBN 978-1-908320-40-7.
    Detail

    ANTAL Lukáš, BARABAS Maroš and HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část II. DSM Data Security Management, vol. 18, no. 2, 2014, pp. 32-35. ISSN 1211-8737.
    Detail

    HENZL Martin, BARABAS Maroš, JANČA Radim and HANÁČEK Petr. Bezpečnost bezkontaktních platebních karet. DSM Data Security Management, vol. 28, no. 2, 2014, pp. 41-43. ISSN 1211-8737.
    Detail

    ANTAL Lukáš, BARABAS Maroš and HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část III. DSM Data Security Management, vol. 18, no. 3, 2014, pp. 25-29. ISSN 1211-8737.
    Detail

    KAČIC Matej, OVŠONKA Daniel, BARABAS Maroš and HANÁČEK Petr. Traffic generator based on behavioral pattern. In: Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for. London: IEEE Computer Society, 2014, pp. 229-233. ISBN 978-1-908320-40-7.
    Detail

  • 2013

    BARABAS Maroš, HOMOLIAK Ivan, DROZD Michal and HANÁČEK Petr. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, vol. 5, no. 2, 2013, pp. 249-253. ISSN 1793-8236.
    Detail

    SEKANINA Lukáš, RŮŽIČKA Richard, VAŠÍČEK Zdeněk, ŠIMEK Václav and HANÁČEK Petr. Implementing a Unique Chip ID on a Reconfigurable Polymorphic Circuit. Information Technology And Control, vol. 42, no. 1, 2013, pp. 7-14. ISSN 1392-124X.
    Detail

    HOMOLIAK Ivan, BARABAS Maroš, CHMELAŘ Petr, DROZD Michal and HANÁČEK Petr. ASNM: Advanced Security Network Metrics for Attack Vector Description. In: Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013, pp. 350-358. ISBN 1-60132-259-3.
    Detail

    KAČIC Matej, HENZL Martin, JURNEČKA Peter and HANÁČEK Petr. Malware injection in wireless networks. In: Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Volume 1. Berlin: Institute of Electrical and Electronics Engineers, 2013, pp. 483-487. ISBN 978-1-4799-1426-5.
    Detail

    HENZL Martin and HANÁČEK Petr. Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding. In: 2013 International Symposium on Biometrics and Security Technologies (ISBAST). Chengdu: IEEE Computer Society, 2013, pp. 141-148. ISBN 978-0-7695-5010-7.
    Detail

    HANÁČEK Petr, JURNEČKA Peter and KAČIC Matej. Concept of parallel code generating and refactoring system for safety standards compliance. In: Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Berlin: Institute of Electrical and Electronics Engineers, 2013, pp. 630-635. ISBN 978-1-4799-1426-5.
    Detail

    BARABAS Maroš and DROZD Michal. Pokročilé formy útoků a jejich detekce. IT System, vol. 2013, no. 1, pp. 8-10. ISSN 1212-4567.
    Detail

    KAČIC Matej, HANÁČEK Petr, HENZL Martin and HOMOLIAK Ivan. A Concept of Behavioral Reputation System in Wireless Networks. In: The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013, pp. 86-90. ISBN 978-958-8790-65-7.
    Detail

    BARABAS Maroš, HANÁČEK Petr, HOMOLIAK Ivan and KAČIC Matej. Detection of Network Buffer Overflow Attacks: A Case Study. In: The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013, pp. 128-131. ISBN 978-958-8790-65-7.
    Detail

    DRAHANSKÝ Martin, HANÁČEK Petr, ZBOŘIL František V., ZBOŘIL František, BARABAS Maroš and ANTAL Lukáš. Threats in Networks using Agent and Biometric Systems. International Journal of Bio-Science and Bio-Technology, vol. 5, no. 3, 2013, pp. 119-133. ISSN 2233-7849.
    Detail

    HOMOLIAK Ivan, BARABAS Maroš, CHMELAŘ Petr, DROZD Michal and HANÁČEK Petr. Advanced Security Network Metrics. Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013, pp. 187-202. ISBN 978-0-12-411474-6.
    Detail

    JURNEČKA Peter, HANÁČEK Petr, BARABAS Maroš, HENZL Martin and KAČIC Matej. A method for parallel software refactoring for safety standards compliance. In: System Safety 2013 collection of papers. Cardiff: The Institution of Engineering and Technology, 2013, pp. 1-6. ISBN 978-1-84919-777-9. ISSN 0537-9989.
    Detail

    JURNEČKA Peter, HANÁČEK Petr, BARABAS Maroš, HENZL Martin and KAČIC Matej. A method for parallel software refactoring for safety standards compliance. Resilience, Security & Risk in Transport. London: The Institution of Engineering and Technology, 2013, pp. 42-48. ISBN 978-1-84919-787-8.
    Detail

  • 2012

    BARABAS Maroš, DROZD Michal and HANÁČEK Petr. Behavioral signature generation using shadow honeypot. World Academy of Science, Engineering and Technology, vol. 2012, no. 65, pp. 829-833. ISSN 2010-376X.
    Detail

    HENZL Martin, HANÁČEK Petr, JURNEČKA Peter and KAČIC Matej. A Concept of Automated Vulnerability Search in Contactless Communication Applications. In: Proceedings 46th Annual IEEE International Carnahan Conference on Security Technology. Boston: Institute of Electrical and Electronics Engineers, 2012, pp. 180-186. ISBN 978-1-4673-4807-2.
    Detail

    MALINKA Kamil and HANÁČEK Petr. Computational Social Networks - Security and Privacy. Computational Social Networks - Security and Privacy. London: Springer London, 2012, pp. 311-340. ISBN 978-1-4471-4050-4.
    Detail

    BARABAS Maroš and DROZD Michal. Jak na pokročilé útoky. SecurityWorld, vol. 2012, no. 4, pp. 20-20. ISSN 1802-4505.
    Detail

    HOMOLIAK Ivan. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. In: Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012, pp. 281-283. ISBN 978-80-214-4461-4.
    Detail

    ANTAL Lukáš. 802.1X WLAN Network Security. In: Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012, pp. 279-281. ISBN 978-80-214-4461-4.
    Detail

  • 2011

    KAČIC Matej. New Approach in Wireless Intrusion Detection System. In: Proceedings of the 17th Conference STUDENT EEICT 2011. Volume 3. Brno: Brno University of Technology, 2011, pp. 590-594. ISBN 978-80-214-4273-3.
    Detail

    ZBOŘIL František, HANÁČEK Petr, ŽÁK Jakub, HORÁČEK Jan, DRAHANSKÝ Martin, HÁJEK Josef and MARVAN Aleš. Studie využití autentizačně - bezpečnostních technologií pro automatizaci a zlepšení efektivity vybraných procesů sledování stavu a pohybu majetku a osob ve firmě nebo instituci. Brno: Siemens Industry Software, s.r.o., 2011.
    Detail

    ŽÁK Jakub, HORÁČEK Jan, ZBOŘIL František, KOČÍ Radek and GÁBOR Martin. Remote controling and monitoring tool for wireless sensor network using WSageNt platform. In: Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Department of Intelligent Systems FIT BUT, 2011, pp. 1-8. ISBN 978-80-214-4320-4.
    Detail

    SAMEK Jan, MALAČKA Ondřej, ZBOŘIL František and HANÁČEK Petr. Multi-Agent Experimental Framework with Hierarchical Model of Trust in Contexts for Decision Making. In: Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Department of Intelligent Systems FIT BUT, 2011, pp. 128-136. ISBN 978-80-214-4320-4.
    Detail

    HANÁČEK Petr and ŠVENDA Petr. Cryptography for (partially) Compromised Sensor Networks. In: Information Security Summit 2011. Praha: Tate International s.r.o., 2011, pp. 103-109. ISBN 978-80-86813-22-6.
    Detail

    MALINKA Kamil, HANÁČEK Petr and TRZOS Michal. Evaluation of Biometric Authentication Based on Visual Evoked Potentials. In: Proceedings 45th International Carnahan Conference on Security Technology. Piscataway: Institute of Electrical and Electronics Engineers, 2011, pp. 13-19. ISBN 978-1-4577-0901-2.
    Detail

    HANÁČEK Petr and JURNEČKA Peter. Využitie grafických kariet na útoky silou. DSM Data Security Management, vol. 15, no. 2, 2011, pp. 10-13. ISSN 1211-8737.
    Detail

    DROZD Michal, BARABAS Maroš, GRÉGR Matěj and CHMELAŘ Petr. Buffer Overflow Attacks Data Acquisition. In: Proceedings of the 6th IEEE International Conference on IDAACS 2011. Volume 2. Praha: Institute of Electrical and Electronics Engineers, 2011, pp. 775-779. ISBN 978-1-4577-1423-8.
    Detail

    HENZL Martin and HANÁČEK Petr. NFC z pohledu bezpečnosti. DSM Data Security Management, vol. 15, no. 3, 2011, p. 4. ISSN 1211-8737.
    Detail

    HANÁČEK Petr, NAGY Jan, SCHÄFER Jiří and ZADINA Martin. Návrh zabezpečeného monitorovacího systému v oblasti e-Health. In: Proceedings of the Annual Database conference Datakon 2011. Brno: Brno University of Technology, 2011, pp. 223-226. ISBN 978-80-214-4329-7.
    Detail

    KAČIC Matej and HANÁČEK Petr. WPA2: Útoky z vnútra siete. DSM Data Security Management, vol. 15, no. 4, 2011, pp. 30-33. ISSN 1211-8737.
    Detail

    ZADINA Martin, NAGY Jan and HANÁČEK Petr. Zabezpečení bezdrátových sítí založených na protokolu IEEE 802.11 v aplikaci rozsáhlých distribučních sítí. In: Sborník příspěvků z 39. konference EurOpen.CZ, 2.-5. října 2011. Plzeň: Czech Open Systems User's Group, 2011, pp. 37-48. ISBN 978-80-86583-22-8.
    Detail

  • 2010

    PECHO Peter, HANÁČEK Petr and NAGY Jan. Simulation and Evaluation of CTP and Secure-CTP Protocols. Radioengineering, vol. 2010, no. 1, pp. 89-98. ISSN 1210-2512.
    Detail

    HANÁČEK Petr, DRAHANSKÝ Martin and ORSÁG Filip. Angriffe auf sichere Hardwarelösungen. Die Datenschleuder, vol. 2010, no. 94, pp. 12-14. ISSN 0930-1054.
    Detail

    HANÁČEK Petr and DRAHANSKÝ Martin. Analyse sicherer Hardwarelösungen. DuD - Datenschutz und Datensicherheit, vol. 2010, no. 11, pp. 766-770. ISSN 1614-0702.
    Detail

    HANÁČEK Petr and ŠVENDA Petr. Cryptographic Protocols in Wireless Sensor Networks. In: Sborník příspěvků MKB 2010. Bílovice nad Svitavou: TNS, 2010, pp. 59-76. ISBN 978-80-904257-1-2.
    Detail

    HANÁČEK Petr, MALINKA Kamil and SCHÄFER Jiří. E-Banking Security - Comparative Study. IEEE Aerospace and Electronic Systems Magazine, vol. 25, no. 1, 2010, pp. 29-34. ISSN 0885-8985.
    Detail

    BARABAS Maroš. Automated Processes in Computer Security. In: Proceedings of the 16th Conference STUDENT EEICT 2010. Volume 5. Brno: Brno University of Technology, 2010, pp. 246-250. ISBN 978-80-214-4079-1.
    Detail

  • 2009

    MALINKA Kamil and SCHÄFER Jiří. Development of Social Networks in Email Communication. In: The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009, p. 5. ISBN 978-0-7695-3612-5.
    Detail

    MALINKA Kamil. Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication. In: The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009, p. 6. ISBN 978-0-7695-3612-5.
    Detail

    SCHÄFER Jiří, SCHÄFER Jiří, MALINKA Kamil and MALINKA Kamil. Security in Peer-to-Peer Networks: Empiric model of file diffusion in BitTorrent. In: The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009, p. 6. ISBN 978-0-7695-3612-5.
    Detail

    SCHÄFER Jiří, MALINKA Kamil and HANÁČEK Petr. Peer-to-peer Networks: Security Analysis. International Journal On Advances in Security., vol. 2009, no. 1, pp. 53-61. ISSN 1942-2636.
    Detail

    PECHO Peter, ZBOŘIL František, DRAHANSKÝ Martin and HANÁČEK Petr. Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. Journal of Universal Computer Science, vol. 15, no. 6, 2009, pp. 992-1006. ISSN 0948-6968.
    Detail

    CVRČEK Daniel, MATYÁŠ Václav and ŠVENDA Petr. 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School. IFIP Advances in Information and Communication Technology, vol. 298. Berlin: Springer Verlag, 2009. ISBN 978-3-642-03314-8.
    Detail

    CVRČEK Daniel. Security of Wireless Communication. 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers. Berlin: Springer Verlag, 2009, pp. 119-134. ISBN 978-3-642-03314-8.
    Detail

    DRAHANSKÝ Martin, ORSÁG Filip and HANÁČEK Petr. Securing of Communication in GSM Networks. In: Proceedings of NGWS2009. Melbourne: Lambert Academic Publishing, 2009, pp. 30-36. ISBN 978-3-8383-5346-3.
    Detail

    MALINKA Kamil, HANÁČEK Petr and CVRČEK Daniel. Analyses of Real Email Traffic Properties. Radioengineering, vol. 2009, no. 4, pp. 644-650. ISSN 1210-2512.
    Detail

    HANÁČEK Petr, NAGY Jan and PECHO Peter. Power Consumption of Hardware Cryptography Platform for Wireless Sensor. In: Proceedings of International Conference on Parallel and Distributed Computing. Higashu Hiroshima: IEEE Computer Society, 2009, p. 6. ISBN 978-0-7695-3914-0.
    Detail

  • 2008

    CVRČEK Daniel, KRHOVJÁK Jan, KUMPOŠT Marek and MATYÁŠ Václav. Authorizing card payments with PINs. Computer, vol. 41, no. 2, 2008, pp. 64-68. ISSN 0018-9162.
    Detail

    CVRČEK Daniel and DANEZIS George. Fighting the 'Good' Internet War. In: Remodelling the Attacker. Hertfodshire: University of Hertfordshire, 2008, pp. 1-6.
    Detail

    STAJANO Frank, CVRČEK Daniel and LEWIS Matt. Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. In: ACNS 2008. LNCS. Berlin: Springer Verlag, 2008, pp. 460-478. ISSN 0302-9743.
    Detail

    MATYÁŠ Václav, KRHOVJÁK Jan, LORENC Václav, KUMPOŠT Marek, ŘÍHA Zdeněk, CVRČEK Daniel, STAUDEK Jan, HOLER Vlastimil, MALINKA Kamil, ŠVENDA Petr and HANÁČEK Petr. Autentizace elektronických transakcí a autorizace dat i uživatelů. Brno: Masaryk University, 2008. ISBN 978-80-210-4556-9.
    Detail

    MALINKA Kamil and PECHO Peter. Nenechte se nechytat! (Evoluční teorie v podání spear phishingu). CONNECT!, vol. 2008, no. 6, pp. 22-23. ISSN 1211-3085.
    Detail

    ENDRYS Břetislav and HANÁČEK Petr. Trust in Security of Identification Devices - Feeling of Unity. In: Information Security Summit IS2 2008. Praha: Tate International s.r.o., 2008, pp. 43-50. ISBN 978-80-86813-15-8.
    Detail

    SCHÄFER Jiří, MALINKA Kamil and HANÁČEK Petr. Peer-to-peer networks security. In: The Third International Conference on Internet Monitoring and Protection. Bucharest: IEEE Computer Society, 2008, pp. 13-13. ISBN 978-0-7695-3189-2.
    Detail

    HANÁČEK Petr, MALINKA Kamil and SCHÄFER Jiří. E-Banking Security - Comparative Study. In: Proceedings ICCST 2008. Prague: IEEE Computer Society, 2008, pp. 326-330. ISBN 978-1-4244-1816-9.
    Detail

    SCHÄFER Jiří, MALINKA Kamil and HANÁČEK Petr. Malware Spreading Models in Peer-to-peer Networks. In: Proceedings ICCST 2008. Praha: IEEE Computer Society, 2008, pp. 339-345. ISBN 978-1-4244-1816-9.
    Detail

    CVRČEK Daniel. Security of MICA*-based wireless sensor networks. In: 25th Chaos Communication Congress. Berlin, 2008, p. 5.
    Detail

    MALINKA Kamil and PECHO Peter. Co když vás sledují?. CONNECT!, vol. 2008, no. 12, pp. 54-55. ISSN 1211-3085.
    Detail

  • 2007

    DRAHANSKÝ Martin, ORSÁG Filip and MALINKA Kamil. Testování snímačů firmy Suprema. Brno: Digitus s.r.o., 2007.
    Detail

    BLAHÁK Petr and CVRČEK Daniel. Alternativní zabezpečení WiFi sití. IT System, vol. 2007, no. 2, pp. 1-6. ISSN 1212-4567.
    Detail

    HANÁČEK Petr. Vliv nových IT technologií na management bezpečnosti v organizaci. In: Security 2007. Praha, 2007, pp. 18-22.
    Detail

    CVRČEK Daniel and MALINKA Kamil. Chování uživatelů elektronické pošty. In: Datakon 2007 - Sborník databázové konference. Brno: Faculty of Informatics MU, 2007, pp. 92-101. ISBN 978-80-7355-076-9.
    Detail

    CVRČEK Daniel and MALINKA Kamil. Effects of Social Networks On Anonymity Systems. In: Proceedings of ISAT 2007. Wroclaw: Wroclaw University of Technology, 2007, p. 8. ISBN 978-83-7493-348-3.
    Detail

    PECHO Peter and SCHÄFER Jiří. Bezpečnost čipových karet a detekce vykonávaných operací pomocí genetického programování. In: Datakon 2007. Brno, 2007, pp. 169-175. ISBN 978-80-7355-076-9.
    Detail

    MATYÁŠ Václav, KRHOVJÁK Jan, LORENC Václav, KUMPOŠT Marek, ŘÍHA Zdeněk, CVRČEK Daniel, STAUDEK Jan, HOLER Vlastimil, MALINKA Kamil, ŠVENDA Petr and HANÁČEK Petr. Autentizace uživatelů a autorizace elektronických transakcí. Příručka manažera VIII. Praha: Tate International s.r.o., 2007. ISBN 978-80-86813-14-1.
    Detail

    CVRČEK Daniel and MATYÁŠ Václav, ed. Moraviacrypt '05. Tatra Mountains Mathematical Publications, vol. 2007, no. 37. ISSN 1210-3195.
    Detail

    CVRČEK Daniel, KRHOVJÁK Jan and MATYÁŠ Václav. PIN (and Chip) or Signature: Beating the Cheating?. In: Security Protocols - 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers. LNCS, vol. 2007. Berlin, 2007, pp. 69-75. ISSN 0302-9743.
    Detail

  • 2006

    CVRČEK Daniel, KUMPOŠT Marek and MATYÁŠ Václav. A Privacy Classification Model Based on Linkability Valuation. In: Security and Embedded Systems. NATO Security through Science Series, D: Information and Communication Security, Volume 2. NL: Kluwer Academic Publishers, 2006, pp. 91-98. ISBN 978-1-58603-580-8.
    Detail

    CVRČEK Daniel, DANEZIS George, KUMPOŠT Marek and MATYÁŠ Václav. The Value of Location Information. In: not yet known. Berlin, 2006, pp. 1-4.
    Detail

    CVRČEK Daniel and SEDLÁK Michal. Zabezpečení systémů VoIP. In: DATAKON 2006. Brno, 2006, pp. 1-8.
    Detail

    BLAHÁK Petr and CVRČEK Daniel. Alternativní zabezpečení pro WiFi sítě. In: DATAKON 2006. Brno, 2006, pp. 1-8.
    Detail

    CVRČEK Daniel and PECHO Peter. Systém prihlasovania čipovými kartami v OS Linux. In: DATAKON 2006. Brno, 2006, pp. 1-8.
    Detail

    CVRČEK Daniel, DANEZIS George, KUMPOŠT Marek and MATYÁŠ Václav. A Study on The Value of Location Privacy. In: Workshop on Privacy in Electronic Society 2006. Washington, 2006, p. 10.
    Detail

    CVRČEK Daniel, KOUŘIL Daniel, LORENC Václav and MATYÁŠ Václav. Autentizační hardwarový token nové generace. In: DATAKON 2006. Brno: Masaryk University, 2006, pp. 229-238. ISBN 80-210-4102-1.
    Detail

  • 2005

    CVRČEK Daniel, MATYÁŠ Václav and PATEL Ahmed. Evidence processing and privacy issues in evidence-based reputation systems. Computer Standards & Interfaces, vol. 27, no. 5, 2005, pp. 533-545. ISSN 0920-5489.
    Detail

    CVRČEK Daniel and MOODY Ken. Combining Trust and Risk to Reduce the Cost of Attacks. In: iTrust 2005. Lecture Notes in Computer Science, vol. 3477. Berlin: Springer Verlag, 2005, pp. 372-383. ISSN 0302-9743.
    Detail

    BOND Mike and CVRČEK Daniel. Penetration to Secure Hardware. In: SPI 2005. Brno, 2005, p. 1.
    Detail

    CVRČEK Daniel and MATYÁŠ Václav. PIN (&Chip) or signature - beating or cheating?. In: SPW 05 Proceedings - The System Likes You and Wants To Be Your Friend. Berlin: University of Hertfordshire, 2005, p. 5.
    Detail

    CVRČEK Daniel and LATISLAV Richard. TCP - resetovací útok. In: DATAKON 2005, Proceedings of the Annual Database Conference. Brno: Masaryk University, 2005, pp. 301-310. ISBN 8021038136.
    Detail

    ŠVENDA Petr and CVRČEK Daniel. Smart dust security - key infection revisited. In: STM 2005. ENTCS, vol. 157. Milano, 2005, pp. 11-25. ISSN 1571-0661.
    Detail

    HANÁČEK Petr and STAUDEK Jan. Správa identity. In: Sborník konference DATAKON 2005. Brno: Masaryk University, 2005, pp. 123-146. ISBN 80-210-3813-6.
    Detail

    CVRČEK Daniel. RFID - přeceněné ambice?. In: SmartWorld 2005 - soubor prezentací. Zlín, 2005, p. 7.
    Detail

    CVRČEK Daniel, KUMPOŠT Marek and MATYÁŠ Václav. On Privacy Classification in Ubiquitous Computing Systems. International Scientific Journal of Computing, vol. 4, no. 2, 2005, pp. 26-35. ISSN 1727-6209.
    Detail

  • 2004

    CVRČEK Daniel. Projekt SECURE. DSM Data Security Management, vol. 2004, no. 4, pp. 1-10. ISSN 1211-8737.
    Detail

    BOND Mike, CVRČEK Daniel and MURDOCH Steven J. Bezpečný hardware, který není zase tak bezpečný. DSM Data Security Management, vol. 2004, no. 5, pp. 44-47. ISSN 1211-8737.
    Detail

Back to top