Martin Drašar
Martin Drašar
Institute of Computer Science, Masaryk University
Verified email at mail.muni.cz - Homepage
Title
Cited by
Cited by
Year
A survey of methods for encrypted traffic classification and analysis
P Velan, M Čermák, P Čeleda, M Drašar
International Journal of Network Management 25 (5), 355-374, 2015
1682015
Cloud-based testbed for simulation of cyber attacks
D Kouril, T Rebok, T Jirsík, J Cegan, M Dras̆ar, M Vizváry, J Vykopal
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
302014
Embedded malware-an analysis of the Chuck Norris botnet
P Čeleda, R Krejčí, J Vykopal, M Drašar
2010 European Conference on Computer Network Defense, 3-10, 2010
292010
Similarity as a central approach to flow‐based anomaly detection
M Drašar, M Vizváry, J Vykopal
International Journal of Network Management 24 (4), 318-336, 2014
162014
Flow-based brute-force attack detection
J Vykopal, M Drašar, P Winter
Fraunhofer Verlag, 2013
162013
Protocol-independent detection of dictionary attacks
M Drašar
Meeting of the European Network of Universities and Companies in Information …, 2013
142013
Towards provable network traffic measurement and analysis via semi-labeled trace datasets
M Cermak, T Jirsik, P Velan, J Komarkova, S Spacek, M Drasar, T Plesnik
2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018
102018
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture
P Theron, A Kott, M Drašar, K Rzadca, B LeBlanc, M Pihelgas, L Mancini, ...
2018 International conference on military communications and information …, 2018
102018
Initial reference architecture of an intelligent autonomous agent for cyber defense
A Kott, LV Mancini, P Théron, M Drasar, E Dushku, H Guenther, M Kont, ...
US Army Research Laboratory Army Research Laboratory United States, 2018
102018
Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0
A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ...
arXiv preprint arXiv:1803.10664, 2018
92018
Behavioral detection of distributed dictionary attacks
M Drašar
Doctoral theses, dissertations, Masaryk University, Faculty of Informatics, Brno, 2015
72015
Flow-based monitoring of honeypots
M Husák, M Drašar
Security and Protection of Information 2013, 63-70, 2013
72013
Management and Security in the Age of Hyperconnectivity
R Badonnel, R Koch, A Pras, M Drašar, B Stiller
Springer International Publishing, 2016
42016
Network defence strategy evaluation: Simulation vs. live network
J Medková, M Husák, M Drašar
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
32017
Reference architecture of an autonomous agent for cyber defense of complex military systems
P Theron, A Kott, M Drašar, K Rzadca, B LeBlanc, M Pihelgas, L Mancini, ...
Adaptive Autonomous Secure Cyber Systems, 1-21, 2020
22020
Enhancing network intrusion detection by correlation of modularly hashed sketches
M Drašar, T Jirsík, M Vizváry
IFIP International Conference on Autonomous Infrastructure, Management and …, 2014
22014
Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0
A Kott, L Mancini, P Théron, M Drašar, E Dushku, H Günther, M Kont, ...
12020
Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG
A Kott, R Thomas, M Drašar, M Kont, A Poylisher, B Blakely, P Theron, ...
arXiv preprint arXiv:1804.07646, 2018
12018
Estimating Parameters of Target’s Detection Methods
M Drašar, J Medková
Proceedings of the NATO IST-152 Workshop on Intelligent Autonomous Agents …, 2017
12017
Flow-based Brute-force Attack Detection
M Drašar, J Vykopal, P Winter
Fraunhofer Verlag, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–20