People

ING. KAREL BARTOŠ, PH.D.

Bartoš, K., Sofka, M., Franc, V. 2016 Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants, detail

Bartoš, K., Rehák, M. 2015 IFS: Intelligent flow sampling for network security–an adaptive approach, detail

Bartoš, K., Sofka, M. 2015 Robust Representation for Domain Adaptation in Network Security, detail

Buryan, P. 2014 Refinement Action-Based Framework for Utilization of Softcomputing in Inductive Learning, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2014 Game Theoretical Model for Adaptive Intrusion Detection System, detail

Bartoš, K., Rehák, M. 2013 Self-organized Collaboration of Distributed IDS Sensors, detail

Bartoš, K., Rehák, M. 2013 Self-Organized Mechanism for Distributed Setup of Multiple Heterogeneous Intrusion Detection Systems, detail

Bartoš, K., Rehák, M. 2012 Towards Efficient Flow Sampling Technique for Anomaly Detection, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper, detail

Bartoš, K., Rehák, M. 2012 Distributed Self-organized Collaboration of Autonomous IDS Sensors, detail

Bartoš, K., Rehák, M. 2012 Trust-based Solution for Robust Self-configuration of Distributed Intrusion Detection Systems, detail

Zemanová, M. 2012 Exploiting Ontologies and Higher Order Knowledge in Relational Data Mining, detail

Bartoš, K., Rehák, M., Krmíček, V. 2011 Optimizing Flow Sampling for Network Anomaly Detection, detail

Rehák, M., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K. 2011 Game Theoretical Adaptation Model for Intrusion Detection System, detail

Čeleda, P., Rehák, M., Krmíček, V., Bartoš, K. 2009 Flow Based Security Awareness Framework for High-Speed Networks, detail

Karel, F. 2009 Quantitative Association Rules Mining, detail

Rehák, M., Staab, E., Pěchouček, M., Stiborek, J., Grill, M., Bartoš, K. 2009 Dynamic Information Source Selection for Intrusion Detection Systems, detail

Rehák, M., Staab, E., Fusenig, V., Stiborek, J., Grill, M., Bartoš, K., Pěchouček, M., Engel, T. 2009 Threat-model-driven runtime adaptation and evaluation of intrusion detection system, detail

Rehák, M., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K., Čeleda, P. 2009 Adaptive Multi-Agent System for Network Traffic Monitoring, detail

Rehák, M., Staab, E., Fusenig, V., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K., Engel, T. 2009 Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems, detail

Rehák, M., Pěchouček, M., Grill, M., Bartoš, K., Krmíček, V., Čeleda, P. 2009 Collaborative Approach to Network Behavior Analysis Based on Hardware-Accelerated FlowMon Probes, detail

Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Stiborek, J., Svoboda, M., Pevný, T. 2009 Cooperative Adaptive Mechanism for Network Protection, detail

Rehák, M., Bartoš, K., Grill, M., Stiborek, J., Svoboda, M. 2009 Monitoring sití pomocí NetFlow dat - od paketů ke strategiím, detail

Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Celeda, P., Krmicek, V. 2008 CAMNEP: An intrusion detection system for high speed networks, detail

Rehák, M., Pěchouček, M., Čeleda, P., Krmíček, V., Grill, M., Bartoš, K. 2008 Multi Agent Approach to Network Intrusion Detection (Demo Paper), detail

Rehák, M., Pěchouček, M., Grill, M., Bartoš, K., Čeleda, P., Krmíček, V. 2008 Collaborative Approach to Network Behavior Analysis, detail

Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Celeda, P. 2007 Network Intrusion Detection by Means of Community of Trusting Agents, detail

Jiřina, M. 1998 Initial Setting of Weights in the Kohonen Maps, detail

Rozinek, J. 1996 Predikce časových řad neuronovými sítěmi, detail