People

ING. JÁN JUSKO, PH.D.

Jusko, J., Rehák, M., Stiborek, J., Kohout, J., Pevný, T. 2016 Using Behavioral Similarity for Botnet Command-and-Control Discovery, detail

Rehák, M., Jusko, J., Pevný, T. 2014 A Memory Efficient Privacy Preserving Representation of Connection Graphs, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2014 Game Theoretical Model for Adaptive Intrusion Detection System, detail

Jusko, J., Rehák, M. 2014 Identifying peer-to-peer communities in the network by connection graph analysis, detail

Jusko, J., Rehák, M. 2013 Revealing Cooperating Hosts by Connection Graph Analysis, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper, detail

Jusko, J., Rehák, M. 2012 Identifying Skype Nodes in the Network Exploiting Mutual Contacts, detail

Jusko, J., Rehák, M. 2012 Identifying Skype Nodes by NetFlow Based Graph Analysis, detail

Lecturer (0):