People

ING. JÁN JUSKO

Jusko, J., Rehák, M., Stiborek, J., Kohout, J., Pevný, T. 2016 Using Behavioral Similarity for Botnet Command-and-Control Discovery, detail

Buryan, P. 2014 Refinement Action-Based Framework for Utilization of Softcomputing in Inductive Learning, detail

Rehák, M., Jusko, J., Pevný, T. 2014 A Memory Efficient Privacy Preserving Representation of Connection Graphs, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2014 Game Theoretical Model for Adaptive Intrusion Detection System, detail

Jusko, J., Rehák, M. 2014 Identifying peer-to-peer communities in the network by connection graph analysis, detail

Jusko, J., Rehák, M. 2013 Revealing Cooperating Hosts by Connection Graph Analysis, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper, detail

Jusko, J., Rehák, M. 2012 Identifying Skype Nodes in the Network Exploiting Mutual Contacts, detail

Jusko, J., Rehák, M. 2012 Identifying Skype Nodes by NetFlow Based Graph Analysis, detail

Zemanová, M. 2012 Exploiting Ontologies and Higher Order Knowledge in Relational Data Mining, detail

Karel, F. 2009 Quantitative Association Rules Mining, detail

Jiřina, M. 1998 Initial Setting of Weights in the Kohonen Maps, detail

Rozinek, J. 1996 Predikce časových řad neuronovými sítěmi, detail

Lecturer (0):