Výzkumná skupina bezpečnosti informačních technologií

Publikace

  • 2024

    FIRC Anton, MALINKA Kamil a HANÁČEK Petr. Deepfake Speech Detection: A Spectrogram Analysis. In: SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. 2024, s. 9.
    Detail

    ŠALKO Milan, FIRC Anton a MALINKA Kamil. Security Implications of Deepfakes in Face Authentication. In: SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing. 2024.
    Detail

  • 2023

    LI Zengpeng, SZALACHOWSKI Pawel, VENUGOPALAN Sarad a HOMOLIAK Ivan. BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting with Fault Recovery. In: 2023, s. 15.
    Detail

    DRGA Jozef, HOMOLIAK Ivan, VANČO Juraj, PEREŠÍNI Martin, HANÁČEK Petr a VASILAKOS Athanasios. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In: 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023, s. 1-4. ISBN 0-06-000020-1.
    Detail

    STANČÍKOVÁ Ivana a HOMOLIAK Ivan. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In: SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023, s. 203-2011. ISBN 978-1-4503-9517-5.
    Detail

    FIRC Anton, MALINKA Kamil a HANÁČEK Petr. Deepfakes as a threat to a speaker and facial recognition: an overview of tools and attack vectors. Heliyon, roč. 9, č. 4, 2023, s. 1-33. ISSN 2405-8440.
    Detail

    FIRC Anton, MALINKA Kamil a HANÁČEK Petr. Deepfakes: Bezpečnostní výzva pro naše uši. DSM Data Security Management, roč. 2023, č. 02, s. 41-44. ISSN 1211-8737.
    Detail

    HUJŇÁK Ondřej, MALINKA Kamil a HANÁČEK Petr. Indirect Bluetooth Low Energy Connection Detection. In: 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023, s. 328-333. ISBN 978-1-6654-6268-6.
    Detail

    ZBOŘIL Jan, HUJŇÁK Ondřej a MALINKA Kamil. IoT Gateways Network Communication Analysis. In: 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023, s. 334-339. ISBN 978-1-6654-6268-6.
    Detail

    MALINKA Kamil, FIRC Anton, PEREŠÍNI Martin, JANUŠ Filip a HUJŇÁK Ondřej. On the educational impact of ChatGPT: Is Artificial Intelligence ready to obtain a University degree?. In: Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE. Turku: Association for Computing Machinery, 2023, s. 47-53. ISBN 979-8-4007-0138-2.
    Detail

    PRUDKÝ Daniel, FIRC Anton a MALINKA Kamil. Assessing the Human Ability to Recognize Synthetic Speech in Ordinary Conversation. In: 2023 International Conference of the Biometrics Special Interest Group (BIOSIG). Proceedings of the 22nd International Conference of the Biometrics Special Interest Group. Darmstadt: GI - Gesellschaft für Informatik e.V., 2023, s. 1-5. ISBN 978-3-88579-733-3.
    Detail

    MALINKA Kamil, FIRC Anton a HANÁČEK Petr. Deepfakes a lidé: dokážeme ještě rozlišit pravou řeč od umělé?. DSM Data Security Management, roč. 2023, č. 04, s. 22-26. ISSN 1211-8737.
    Detail

  • 2022

    BREITENBACHER Dominik, HOMOLIAK Ivan, AUNG Yan Lin, ELOVICI Yuval a TIPPENHAUER Nils Ole. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, roč. 9, č. 12, 2022, s. 9640-9658. ISSN 2327-4662.
    Detail

    FIRC Anton a MALINKA Kamil. The dawn of a text-dependent society: deepfakes as a threat to speech verification systems. In: SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. New York, NY: Association for Computing Machinery, 2022, s. 1646-1655. ISBN 978-1-4503-8713-2.
    Detail

    MALINKA Kamil, HUJŇÁK Ondřej, HANÁČEK Petr a HELLEBRANDT Lukáš. E-Banking Security Study - 10 years later. IEEE Access, roč. 2022, č. 10, s. 16681-16699. ISSN 2169-3536.
    Detail

    HOLÍKOVÁ Lenka, HOLÍK Lukáš, HOMOLIAK Ivan, LENGÁL Ondřej, VEANES Margus a VOJNAR Tomáš. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In: Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022, s. 4165-4182. ISBN 978-1-939133-31-1.
    Detail

    FIRC Anton, MALINKA Kamil a HANÁČEK Petr. Creation and detection of malicious synthetic media - a preliminary survey on deepfakes. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2022, s. 125-145. ISBN 978-80-86583-34-1.
    Detail

    FIRC Anton a MALINKA Kamil. Practical lessons of (deep)faking human speech. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2022, s. 161-172. ISBN 978-80-86583-34-1.
    Detail

    HUJŇÁK Ondřej, MALINKA Kamil a HANÁČEK Petr. E-Banking Authentication - Dynamic Password Generators and Hardware Tokens. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2022, s. 211-221. ISBN 978-80-86583-34-1.
    Detail

    PEREŠÍNI Martin, MALINKA Kamil, HOMOLIAK Ivan, BENČIĆ Federico M. a HLADKÝ Tomáš. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2022, s. 173-184. ISBN 978-80-86583-34-1.
    Detail

    FIRC Anton, MALINKA Kamil a HANÁČEK Petr. Deepfakes: A Dangerous Entertainment?. In: Recenzovaný sborník příspěvků mezinárodní vědecké konference MMK2022. Hradec Králové: Akademické sdružení MAGNANIMITAS Assn., 2022, s. 1073-1082. ISBN 978-80-87952-37-5.
    Detail

    HOMOLIAK Ivan. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2022, s. 185-210. ISBN 978-80-86583-34-1.
    Detail

  • 2021

    HOMOLIAK Ivan, VENUGOPALAN Sarad, REIJSBERGEN Daniel, HUM Qingze, SCHUMI Richard a SZALACHOWSKI Pawel. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE Communications Surveys and Tutorials, roč. 23, č. 1, 2021, s. 341-390. ISSN 1553-877X.
    Detail

  • 2020

    HOMOLIAK Ivan, MALINKA Kamil a HANÁČEK Petr. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, roč. 8, č. 6, 2020, s. 112427-112453. ISSN 2169-3536.
    Detail

    BINDER Alexander, BREITENBACHER Dominik, HARTEL Pieter H., SZALACHOWSKI Pawel, HOMOLIAK Ivan a HUJŇÁK Ondřej. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020, s. 145-162. ISBN 978-1-4503-8139-0.
    Detail

    OČENÁŠ Martin, HOMOLIAK Ivan, MALINKA Kamil a HANÁČEK Petr. Security and Encryption at Modern Databases. In: ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020, s. 19-23. ISBN 978-1-4503-7744-7.
    Detail

    HUM Qingze, TAN Wei Jin, TEY Shi Ying, LENUS Latasha, HOMOLIAK Ivan, LIN Yun a SUN Jun. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In: 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020, s. 17-25. ISBN 978-0-7381-0495-9.
    Detail

  • 2019

    HOMOLIAK Ivan, TOFFALINI Flavio, GUARNIZO Juan D., ELOVICI Yuval a OCHOA Martín. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Computing Surveys, roč. 52, č. 2, 2019, s. 1-40. ISSN 0360-0300.
    Detail

    HARTEL Pieter H., HOMOLIAK Ivan a REIJSBERGEN Daniel. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, roč. 07, č. 12, 2019, s. 177539-177555. ISSN 2169-3536.
    Detail

    HELLEBRANDT Lukáš, HOMOLIAK Ivan, MALINKA Kamil a HANÁČEK Petr. Increasing Trust in Tor Node List Using Blockchain. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019, s. 29-32. ISBN 978-1-7281-1328-9.
    Detail

    HUJŇÁK Ondřej a KREJČÍ Radek. Security Framework for IoT and Fog Computing Networks. In: 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud). Palladam: Institute of Electrical and Electronics Engineers, 2019, s. 87-92. ISBN 978-1-7281-4365-1.
    Detail

  • 2018

    HOMOLIAK Ivan, TEKNŐS Martin, BREITENBACHER Dominik a HANÁČEK Petr. Improving Network Intrusion Detection Classifiers by Non-Payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, roč. 5, č. 17, 2018, s. 1-15. ISSN 2032-9393.
    Detail

  • 2017

    HOMOLIAK Ivan, ŠULÁK Ladislav a HANÁČEK Petr. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In: Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science, roč. 10144. Jeju Island: Springer International Publishing, 2017, s. 66-78. ISBN 978-3-319-56549-1. ISSN 0302-9743.
    Detail

    HOMOLIAK Ivan, TEKNŐS Martin, BARABAS Maroš a HANÁČEK Petr. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In: Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017, s. 770-773. ISBN 978-3-319-59607-5.
    Detail

    KAČIC Matej a BARABAS Maroš. Klasifikace informací v souvislostech. In: IS2 - Other Dimensions of Security. Praha: Tate International s.r.o., 2017, s. 133-141. ISBN 978-80-86813-30-1.
    Detail

    HELLEBRANDT Lukáš, HUJŇÁK Ondřej, HANÁČEK Petr a HOMOLIAK Ivan. Survey of Privacy Enabling Strategies in IoT Networks. In: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017, s. 216-221. ISBN 978-1-4503-5392-2.
    Detail

    OČENÁŠ Martin. Bitcoin blockchain analysis. In: Mikulášská kryptobesídka. Praha: Trusted Network Solutions, a.s., 2017, s. 67-68.
    Detail

  • 2016

    BREITENBACHER Dominik, HOMOLIAK Ivan, JAROŠ Jiří a HANÁČEK Petr. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In: Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings, roč. 1. Orlando: The International Institute of Informatics and Systemics, 2016, s. 55-62. ISBN 978-1-941763-47-6. ISSN 1690-4524.
    Detail

    ARON Lukáš a HANÁČEK Petr. A Concept of Dynamic Permission Mechanism on Android. In: Progress in Applied Mathematics in Science and Engineering Proceedings. Bali, Indonesia: American Institute of Physics, 2016, s. 22-30. ISBN 978-0-7354-1352-8.
    Detail

    ARON Lukáš a HANÁČEK Petr. Dynamic Permission Mechanism on Android. Journal of Software, roč. 2016, č. 12, s. 1124-1230. ISSN 1796-217X.
    Detail

    SMETKA Tomáš, HOMOLIAK Ivan a HANÁČEK Petr. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In: Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016, s. 305-312. ISBN 978-1-5090-1072-1.
    Detail

    BREITENBACHER Dominik, HOMOLIAK Ivan, JAROŠ Jiří a HANÁČEK Petr. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, roč. 14, č. 3, 2016, s. 51-58. ISSN 1690-4524.
    Detail

    VANČO Matúš a ARON Lukáš. Dynamic Security Policy Enforcement on Android. International Journal of Security and Its Applications, roč. 2016, č. 10, s. 141-148. ISSN 1738-9976.
    Detail

    HELLEBRANDT Lukáš. URI-based HBAC in FreeIPA. In: SantaCrypt, proceedings. Bílovice nad Svitavou: Trusted Network Solutions, a.s., 2016, s. 45-46. ISBN 978-80-904257-8-1.
    Detail

  • 2015

    DRAHANSKÝ Martin, HANÁČEK Petr, ZBOŘIL František, HENZL Martin, ZBOŘIL František V., YIM Jaegeol a SHIM Kyubark. Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks. Improving Information Security Practices through Computational Intelligence. Washington: IGI Global, 2015, s. 198-227. ISBN 978-1-4666-9426-2.
    Detail

    SMETKA Tomáš, HOMOLIAK Ivan a HANÁČEK Petr. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. In: Santa's Crypto Get-Together 2015. Praha: TNS, a.s., 2015, s. 43-44. ISBN 978-80-904257-7-4.
    Detail

    IAREMKO Iaroslav, ARON Lukáš a HANÁČEK Petr. Improving IP Geolocation Using Network Measurement Characteristics. In: HKICEAS. Hong Kong: Higher Education Forum, 2015, s. 210-220. ISBN 978-986-87417-4-4.
    Detail

    BREITENBACHER Dominik, HOMOLIAK Ivan a HANÁČEK Petr. Parallelized Self-Initializing Quadratic Sieve using OpenMP. In: Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015, s. 39-40. ISBN 978-80-904257-7-4.
    Detail

  • 2014

    ANTAL Lukáš, BARABAS Maroš a HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část I. DSM Data Security Management, roč. 18, č. 1, 2014, s. 36-39. ISSN 1211-8737.
    Detail

    HOMOLIAK Ivan, OVŠONKA Daniel, KORANDA Karel a HANÁČEK Petr. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In: International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014, s. 188-193. ISBN 978-1-4799-3531-4.
    Detail

    HOMOLIAK Ivan, OVŠONKA Daniel, GRÉGR Matěj a HANÁČEK Petr. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In: Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014, s. 310-317. ISBN 978-1-908320-40-7.
    Detail

    ANTAL Lukáš, BARABAS Maroš a HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část II. DSM Data Security Management, roč. 18, č. 2, 2014, s. 32-35. ISSN 1211-8737.
    Detail

    HENZL Martin, BARABAS Maroš, JANČA Radim a HANÁČEK Petr. Bezpečnost bezkontaktních platebních karet. DSM Data Security Management, roč. 28, č. 2, 2014, s. 41-43. ISSN 1211-8737.
    Detail

    ANTAL Lukáš, BARABAS Maroš a HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část III. DSM Data Security Management, roč. 18, č. 3, 2014, s. 25-29. ISSN 1211-8737.
    Detail

    KAČIC Matej, OVŠONKA Daniel, BARABAS Maroš a HANÁČEK Petr. Traffic generator based on behavioral pattern. In: Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for. London: IEEE Computer Society, 2014, s. 229-233. ISBN 978-1-908320-40-7.
    Detail

  • 2013

    BARABAS Maroš, HOMOLIAK Ivan, DROZD Michal a HANÁČEK Petr. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, roč. 5, č. 2, 2013, s. 249-253. ISSN 1793-8236.
    Detail

    SEKANINA Lukáš, RŮŽIČKA Richard, VAŠÍČEK Zdeněk, ŠIMEK Václav a HANÁČEK Petr. Implementing a Unique Chip ID on a Reconfigurable Polymorphic Circuit. Information Technology And Control, roč. 42, č. 1, 2013, s. 7-14. ISSN 1392-124X.
    Detail

    HOMOLIAK Ivan, BARABAS Maroš, CHMELAŘ Petr, DROZD Michal a HANÁČEK Petr. ASNM: Advanced Security Network Metrics for Attack Vector Description. In: Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013, s. 350-358. ISBN 1-60132-259-3.
    Detail

    KAČIC Matej, HENZL Martin, JURNEČKA Peter a HANÁČEK Petr. Malware injection in wireless networks. In: Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Volume 1. Berlin: Institute of Electrical and Electronics Engineers, 2013, s. 483-487. ISBN 978-1-4799-1426-5.
    Detail

    HENZL Martin a HANÁČEK Petr. Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding. In: 2013 International Symposium on Biometrics and Security Technologies (ISBAST). Chengdu: IEEE Computer Society, 2013, s. 141-148. ISBN 978-0-7695-5010-7.
    Detail

    HANÁČEK Petr, JURNEČKA Peter a KAČIC Matej. Concept of parallel code generating and refactoring system for safety standards compliance. In: Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Berlin: Institute of Electrical and Electronics Engineers, 2013, s. 630-635. ISBN 978-1-4799-1426-5.
    Detail

    BARABAS Maroš a DROZD Michal. Pokročilé formy útoků a jejich detekce. IT System, roč. 2013, č. 1, s. 8-10. ISSN 1212-4567.
    Detail

    KAČIC Matej, HANÁČEK Petr, HENZL Martin a HOMOLIAK Ivan. A Concept of Behavioral Reputation System in Wireless Networks. In: The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013, s. 86-90. ISBN 978-958-8790-65-7.
    Detail

    BARABAS Maroš, HANÁČEK Petr, HOMOLIAK Ivan a KAČIC Matej. Detection of Network Buffer Overflow Attacks: A Case Study. In: The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013, s. 128-131. ISBN 978-958-8790-65-7.
    Detail

    DRAHANSKÝ Martin, HANÁČEK Petr, ZBOŘIL František V., ZBOŘIL František, BARABAS Maroš a ANTAL Lukáš. Threats in Networks using Agent and Biometric Systems. International Journal of Bio-Science and Bio-Technology, roč. 5, č. 3, 2013, s. 119-133. ISSN 2233-7849.
    Detail

    HOMOLIAK Ivan, BARABAS Maroš, CHMELAŘ Petr, DROZD Michal a HANÁČEK Petr. Advanced Security Network Metrics. Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013, s. 187-202. ISBN 978-0-12-411474-6.
    Detail

    JURNEČKA Peter, HANÁČEK Petr, BARABAS Maroš, HENZL Martin a KAČIC Matej. A method for parallel software refactoring for safety standards compliance. In: System Safety 2013 collection of papers. Cardiff: The Institution of Engineering and Technology, 2013, s. 1-6. ISBN 978-1-84919-777-9. ISSN 0537-9989.
    Detail

    JURNEČKA Peter, HANÁČEK Petr, BARABAS Maroš, HENZL Martin a KAČIC Matej. A method for parallel software refactoring for safety standards compliance. Resilience, Security & Risk in Transport. London: The Institution of Engineering and Technology, 2013, s. 42-48. ISBN 978-1-84919-787-8.
    Detail

  • 2012

    BARABAS Maroš, DROZD Michal a HANÁČEK Petr. Behavioral signature generation using shadow honeypot. World Academy of Science, Engineering and Technology, roč. 2012, č. 65, s. 829-833. ISSN 2010-376X.
    Detail

    HENZL Martin, HANÁČEK Petr, JURNEČKA Peter a KAČIC Matej. A Concept of Automated Vulnerability Search in Contactless Communication Applications. In: Proceedings 46th Annual IEEE International Carnahan Conference on Security Technology. Boston: Institute of Electrical and Electronics Engineers, 2012, s. 180-186. ISBN 978-1-4673-4807-2.
    Detail

    MALINKA Kamil a HANÁČEK Petr. Computational Social Networks - Security and Privacy. Computational Social Networks - Security and Privacy. London: Springer London, 2012, s. 311-340. ISBN 978-1-4471-4050-4.
    Detail

    BARABAS Maroš a DROZD Michal. Jak na pokročilé útoky. SecurityWorld, roč. 2012, č. 4, s. 20-20. ISSN 1802-4505.
    Detail

    HOMOLIAK Ivan. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. In: Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Fakulta elektrotechniky a komunikačních technologií VUT v Brně, 2012, s. 281-283. ISBN 978-80-214-4461-4.
    Detail

    ANTAL Lukáš. Bezpečnost 801.1X WLAN sítí. In: Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Fakulta elektrotechniky a komunikačních technologií VUT v Brně, 2012, s. 279-281. ISBN 978-80-214-4461-4.
    Detail

  • 2011

    KAČIC Matej. New Approach in Wireless Intrusion Detection System. In: Proceedings of the 17th Conference STUDENT EEICT 2011. Volume 3. Brno: Vysoké učení technické v Brně, 2011, s. 590-594. ISBN 978-80-214-4273-3.
    Detail

    ZBOŘIL František, HANÁČEK Petr, ŽÁK Jakub, HORÁČEK Jan, DRAHANSKÝ Martin, HÁJEK Josef a MARVAN Aleš. Studie využití autentizačně - bezpečnostních technologií pro automatizaci a zlepšení efektivity vybraných procesů sledování stavu a pohybu majetku a osob ve firmě nebo instituci. Brno: Siemens Industry Software, s.r.o., 2011.
    Detail

    ŽÁK Jakub, HORÁČEK Jan, ZBOŘIL František, KOČÍ Radek a GÁBOR Martin. Remote controlling and monitoring tool for wireless sensor network using WSageNt platform. In: Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Ústav inteligentních systémů FIT VUT v Brně, 2011, s. 1-8. ISBN 978-80-214-4320-4.
    Detail

    SAMEK Jan, MALAČKA Ondřej, ZBOŘIL František a HANÁČEK Petr. Multi-Agent Experimental Framework with Hierarchical Model of Trust in Contexts for Decision Making. In: Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Ústav inteligentních systémů FIT VUT v Brně, 2011, s. 128-136. ISBN 978-80-214-4320-4.
    Detail

    HANÁČEK Petr a ŠVENDA Petr. Cryptography for (partially) Compromised Sensor Networks. In: Information Security Summit 2011. Praha: Tate International s.r.o., 2011, s. 103-109. ISBN 978-80-86813-22-6.
    Detail

    MALINKA Kamil, HANÁČEK Petr a TRZOS Michal. Evaluation of Biometric Authentication Based on Visual Evoked Potentials. In: Proceedings 45th International Carnahan Conference on Security Technology. Piscataway: Institute of Electrical and Electronics Engineers, 2011, s. 13-19. ISBN 978-1-4577-0901-2.
    Detail

    HANÁČEK Petr a JURNEČKA Peter. Využitie grafických kariet na útoky silou. DSM Data Security Management, roč. 15, č. 2, 2011, s. 10-13. ISSN 1211-8737.
    Detail

    DROZD Michal, BARABAS Maroš, GRÉGR Matěj a CHMELAŘ Petr. Buffer Overflow Attacks Data Acquisition. In: Proceedings of the 6th IEEE International Conference on IDAACS 2011. Volume 2. Praha: Institute of Electrical and Electronics Engineers, 2011, s. 775-779. ISBN 978-1-4577-1423-8.
    Detail

    HENZL Martin a HANÁČEK Petr. NFC z pohledu bezpečnosti. DSM Data Security Management, roč. 15, č. 3, 2011, s. 4. ISSN 1211-8737.
    Detail

    HANÁČEK Petr, NAGY Jan, SCHÄFER Jiří a ZADINA Martin. Návrh zabezpečeného monitorovacího systému v oblasti e-Health. In: Proceedings of the Annual Database conference Datakon 2011. Brno: Vysoké učení technické v Brně, 2011, s. 223-226. ISBN 978-80-214-4329-7.
    Detail

    KAČIC Matej a HANÁČEK Petr. WPA2: Útoky z vnútra siete. DSM Data Security Management, roč. 15, č. 4, 2011, s. 30-33. ISSN 1211-8737.
    Detail

    ZADINA Martin, NAGY Jan a HANÁČEK Petr. Zabezpečení bezdrátových sítí založených na protokolu IEEE 802.11 v aplikaci rozsáhlých distribučních sítí. In: Sborník příspěvků z 39. konference EurOpen.CZ, 2.-5. října 2011. Plzeň: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2011, s. 37-48. ISBN 978-80-86583-22-8.
    Detail

  • 2010

    PECHO Peter, HANÁČEK Petr a NAGY Jan. Simulation and Evaluation of CTP and Secure-CTP Protocols. Radioengineering, roč. 2010, č. 1, s. 89-98. ISSN 1210-2512.
    Detail

    HANÁČEK Petr, DRAHANSKÝ Martin a ORSÁG Filip. Angriffe auf sichere Hardwarelösungen. Die Datenschleuder, roč. 2010, č. 94, s. 12-14. ISSN 0930-1054.
    Detail

    HANÁČEK Petr a DRAHANSKÝ Martin. Analyse sicherer Hardwarelösungen. DuD - Datenschutz und Datensicherheit, roč. 2010, č. 11, s. 766-770. ISSN 1614-0702.
    Detail

    HANÁČEK Petr a ŠVENDA Petr. Cryptographic Protocols in Wireless Sensor Networks. In: Sborník příspěvků MKB 2010. Bílovice nad Svitavou: TNS, a.s., 2010, s. 59-76. ISBN 978-80-904257-1-2.
    Detail

    HANÁČEK Petr, MALINKA Kamil a SCHÄFER Jiří. E-Banking Security - Comparative Study. IEEE Aerospace and Electronic Systems Magazine, roč. 25, č. 1, 2010, s. 29-34. ISSN 0885-8985.
    Detail

    BARABAS Maroš. Automated Processes in Computer Security. In: Proceedings of the 16th Conference STUDENT EEICT 2010. Volume 5. Brno: Vysoké učení technické v Brně, 2010, s. 246-250. ISBN 978-80-214-4079-1.
    Detail

  • 2009

    MALINKA Kamil a SCHÄFER Jiří. Development of Social Networks in Email Communication. In: The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009, s. 5. ISBN 978-0-7695-3612-5.
    Detail

    MALINKA Kamil. Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication. In: The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009, s. 6. ISBN 978-0-7695-3612-5.
    Detail

    SCHÄFER Jiří, SCHÄFER Jiří, MALINKA Kamil a MALINKA Kamil. Security in Peer-to-Peer Networks: Empiric model of file diffusion in BitTorrent. In: The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009, s. 6. ISBN 978-0-7695-3612-5.
    Detail

    SCHÄFER Jiří, MALINKA Kamil a HANÁČEK Petr. Peer-to-peer Networks: Security Analysis. International Journal On Advances in Security., roč. 2009, č. 1, s. 53-61. ISSN 1942-2636.
    Detail

    PECHO Peter, ZBOŘIL František, DRAHANSKÝ Martin a HANÁČEK Petr. Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. Journal of Universal Computer Science, roč. 15, č. 6, 2009, s. 992-1006. ISSN 0948-6968.
    Detail

    CVRČEK Daniel, MATYÁŠ Václav a ŠVENDA Petr. The Future of Identity in the Information Society. IFIP Advances in Information and Communication Technology, vol. 298. Berlin: Springer Verlag, 2009. ISBN 978-3-642-03314-8.
    Detail

    CVRČEK Daniel. Security of Wireless Communication. 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers. Berlin: Springer Verlag, 2009, s. 119-134. ISBN 978-3-642-03314-8.
    Detail

    DRAHANSKÝ Martin, ORSÁG Filip a HANÁČEK Petr. Securing of Communication in GSM Networks. In: Proceedings of NGWS2009. Melbourne: Lambert Academic Publishing, 2009, s. 30-36. ISBN 978-3-8383-5346-3.
    Detail

    MALINKA Kamil, HANÁČEK Petr a CVRČEK Daniel. Analyses of Real Email Traffic Properties. Radioengineering, roč. 2009, č. 4, s. 644-650. ISSN 1210-2512.
    Detail

    HANÁČEK Petr, NAGY Jan a PECHO Peter. Power Consumption of Hardware Cryptography Platform for Wireless Sensor. In: Proceedings of International Conference on Parallel and Distributed Computing. Higashu Hiroshima: IEEE Computer Society, 2009, s. 6. ISBN 978-0-7695-3914-0.
    Detail

  • 2008

    CVRČEK Daniel, KRHOVJÁK Jan, KUMPOŠT Marek a MATYÁŠ Václav. Authorizing card payments with PINs. Computer, roč. 41, č. 2, 2008, s. 64-68. ISSN 0018-9162.
    Detail

    CVRČEK Daniel a DANEZIS George. Fighting the 'Good' Internet War. In: Remodelling the Attacker. Hertfodshire: University of Hertfordshire, 2008, s. 1-6.
    Detail

    STAJANO Frank, CVRČEK Daniel a LEWIS Matt. Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. In: ACNS 2008. LNCS. Berlin: Springer Verlag, 2008, s. 460-478. ISSN 0302-9743.
    Detail

    MATYÁŠ Václav, KRHOVJÁK Jan, LORENC Václav, KUMPOŠT Marek, ŘÍHA Zdeněk, CVRČEK Daniel, STAUDEK Jan, HOLER Vlastimil, MALINKA Kamil, ŠVENDA Petr a HANÁČEK Petr. Autentizace elektronických transakcí a autorizace dat i uživatelů. Brno: Masarykova universita, 2008. ISBN 978-80-210-4556-9.
    Detail

    MALINKA Kamil a PECHO Peter. Evoluční teorie v podání spear phishingu. CONNECT!, roč. 2008, č. 6, s. 22-23. ISSN 1211-3085.
    Detail

    ENDRYS Břetislav a HANÁČEK Petr. Trust in Security of Identification Devices - Feeling of Unity. In: Information Security Summit IS2 2008. Praha: Tate International s.r.o., 2008, s. 43-50. ISBN 978-80-86813-15-8.
    Detail

    SCHÄFER Jiří, MALINKA Kamil a HANÁČEK Petr. Peer-to-peer networks security. In: The Third International Conference on Internet Monitoring and Protection. Bucharest: IEEE Computer Society, 2008, s. 13-13. ISBN 978-0-7695-3189-2.
    Detail

    HANÁČEK Petr, MALINKA Kamil a SCHÄFER Jiří. E-Banking Security - Comparative Study. In: Proceedings ICCST 2008. Prague: IEEE Computer Society, 2008, s. 326-330. ISBN 978-1-4244-1816-9.
    Detail

    SCHÄFER Jiří, MALINKA Kamil a HANÁČEK Petr. Malware Spreading Models In Peer-to-Peer Networks. In: Proceedings ICCST 2008. Praha: IEEE Computer Society, 2008, s. 339-345. ISBN 978-1-4244-1816-9.
    Detail

    CVRČEK Daniel. Security of MICA*-based wireless sensor networks. In: 25th Chaos Communication Congress. Berlin, 2008, s. 5.
    Detail

    MALINKA Kamil a PECHO Peter. Co když vás sledují?. CONNECT!, roč. 2008, č. 12, s. 54-55. ISSN 1211-3085.
    Detail

  • 2007

    DRAHANSKÝ Martin, ORSÁG Filip a MALINKA Kamil. Testování snímačů firmy Suprema. Brno: Digitus s.r.o., 2007.
    Detail

    BLAHÁK Petr a CVRČEK Daniel. Alternativní zabezpečení WiFi sití. IT System, roč. 2007, č. 2, s. 1-6. ISSN 1212-4567.
    Detail

    HANÁČEK Petr. Vliv nových IT technologií na management bezpečnosti v organizaci. In: Security 2007. Praha, 2007, s. 18-22.
    Detail

    CVRČEK Daniel a MALINKA Kamil. Chování uživatelů elektronické pošty. In: Datakon 2007 - Sborník databázové konference. Brno: Fakulta informatiky MU, 2007, s. 92-101. ISBN 978-80-7355-076-9.
    Detail

    CVRČEK Daniel a MALINKA Kamil. Effects of Social Networks On Anonymity Systems. In: Proceedings of ISAT 2007. Wroclaw: Politechnika Wrocławska, 2007, s. 8. ISBN 978-83-7493-348-3.
    Detail

    PECHO Peter a SCHÄFER Jiří. Bezpečnost čipových karet a detekce vykonávaných operací pomocí genetického programování. In: Datakon 2007. Brno, 2007, s. 169-175. ISBN 978-80-7355-076-9.
    Detail

    MATYÁŠ Václav, KRHOVJÁK Jan, LORENC Václav, KUMPOŠT Marek, ŘÍHA Zdeněk, CVRČEK Daniel, STAUDEK Jan, HOLER Vlastimil, MALINKA Kamil, ŠVENDA Petr a HANÁČEK Petr. Autentizace uživatelů a autorizace elektronických transakcí. Příručka manažera VIII. Praha: Tate International s.r.o., 2007. ISBN 978-80-86813-14-1.
    Detail

    CVRČEK Daniel a MATYÁŠ Václav, ed. Moraviacrypt '05. Tatra Mountains Mathematical Publications, roč. 2007, č. 37. ISSN 1210-3195.
    Detail

    CVRČEK Daniel, KRHOVJÁK Jan a MATYÁŠ Václav. PIN (and Chip) or Signature: Beating the Cheating?. In: Security Protocols - 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers. LNCS, roč. 2007. Berlin, 2007, s. 69-75. ISSN 0302-9743.
    Detail

  • 2006

    CVRČEK Daniel, KUMPOŠT Marek a MATYÁŠ Václav. A Privacy Classification Model Based on Linkability Valuation. In: Security and Embedded Systems. NATO Security through Science Series, D: Information and Communication Security, Volume 2. NL: Kluwer Academic Publishers, 2006, s. 91-98. ISBN 978-1-58603-580-8.
    Detail

    CVRČEK Daniel, DANEZIS George, KUMPOŠT Marek a MATYÁŠ Václav. The Value of Location Information. In: not yet known. Berlin, 2006, s. 1-4.
    Detail

    CVRČEK Daniel a SEDLÁK Michal. Zabezpečení systémů VoIP. In: DATAKON 2006. Brno, 2006, s. 1-8.
    Detail

    BLAHÁK Petr a CVRČEK Daniel. Alternativní zabezpečení pro WiFi sítě. In: DATAKON 2006. Brno, 2006, s. 1-8.
    Detail

    CVRČEK Daniel a PECHO Peter. Systém prihlasovania čipovými kartami v OS Linux. In: DATAKON 2006. Brno, 2006, s. 1-8.
    Detail

    CVRČEK Daniel, DANEZIS George, KUMPOŠT Marek a MATYÁŠ Václav. A Study on The Value of Location Privacy. In: Workshop on Privacy in Electronic Society 2006. Washington, 2006, s. 10.
    Detail

    CVRČEK Daniel, KOUŘIL Daniel, LORENC Václav a MATYÁŠ Václav. Autentizační hardwarový token nové generace. In: DATAKON 2006. Brno: Masarykova universita, 2006, s. 229-238. ISBN 80-210-4102-1.
    Detail

  • 2005

    CVRČEK Daniel, MATYÁŠ Václav a PATEL Ahmed. Evidence processing and privacy issues in evidence-based reputation systems. Computer Standards & Interfaces, roč. 27, č. 5, 2005, s. 533-545. ISSN 0920-5489.
    Detail

    CVRČEK Daniel a MOODY Ken. Combining Trust and Risk to Reduce the Cost of Attacks. In: iTrust 2005. Lecture Notes in Computer Science, roč. 3477. Berlin: Springer Verlag, 2005, s. 372-383. ISSN 0302-9743.
    Detail

    BOND Mike a CVRČEK Daniel. Penetration to Secure Hardware. In: SPI 2005. Brno, 2005, s. 1.
    Detail

    CVRČEK Daniel a MATYÁŠ Václav. PIN (&Chip) or signature - beating or cheating?. In: SPW 05 Proceedings - The System Likes You and Wants To Be Your Friend. Berlin: University of Hertfordshire, 2005, s. 5.
    Detail

    CVRČEK Daniel a LATISLAV Richard. TCP - resetovací útok. In: DATAKON 2005, Proceedings of the Annual Database Conference. Brno: Masarykova universita, 2005, s. 301-310. ISBN 8021038136.
    Detail

    ŠVENDA Petr a CVRČEK Daniel. Smart dust security - key infection revisited. In: STM 2005. ENTCS, roč. 157. Milano, 2005, s. 11-25. ISSN 1571-0661.
    Detail

    HANÁČEK Petr a STAUDEK Jan. Správa identity. In: Sborník konference DATAKON 2005. Brno: Masarykova universita, 2005, s. 123-146. ISBN 80-210-3813-6.
    Detail

    CVRČEK Daniel. RFID - přeceněné ambice?. In: SmartWorld 2005 - soubor prezentací. Zlín, 2005, s. 7.
    Detail

    CVRČEK Daniel, KUMPOŠT Marek a MATYÁŠ Václav. On Privacy Classification in Ubiquitous Computing Systems. International Scientific Journal of Computing, roč. 4, č. 2, 2005, s. 26-35. ISSN 1727-6209.
    Detail

  • 2004

    CVRČEK Daniel. Projekt SECURE. DSM Data Security Management, roč. 2004, č. 4, s. 1-10. ISSN 1211-8737.
    Detail

    BOND Mike, CVRČEK Daniel a MURDOCH Steven J. Bezpečný hardware, který není zase tak bezpečný - kryptoanalyza Luny CA3. DSM Data Security Management, roč. 2004, č. 5, s. 44-47. ISSN 1211-8737.
    Detail

Nahoru