KYPO Cyber Range: Design and Use Cases J Vykopal, R Oslejsek, P Celeda, M Vizvary, D Tovarnak Proceedings of the 12th International Conference on Software Technologies …, 2017 | 50 | 2017 |
Lessons learned from complex hands-on defence exercises in a cyber range J Vykopal, M Vizváry, R Oslejsek, P Celeda, D Tovarnak 2017 IEEE Frontiers in Education Conference (FIE), 1-8, 2017 | 46 | 2017 |
Network-based dictionary attack detection J Vykopal, T Plesnik, P Minarik 2009 international conference on future networks, 23-27, 2009 | 36 | 2009 |
Kypo–a platform for cyber defence exercises P Čeleda, J Čegan, J Vykopal, D Tovarňák M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber …, 2015 | 35 | 2015 |
Future of ddos attacks mitigation in software defined networks M Vizváry, J Vykopal IFIP international conference on autonomous infrastructure, management and …, 2014 | 32 | 2014 |
Netflow based system for NAT detection V Krmicek, J Vykopal, R Krejci Proceedings of the 5th international student workshop on Emerging networking …, 2009 | 32 | 2009 |
Cloud-based testbed for simulation of cyber attacks D Kouril, T Rebok, T Jirsík, J Cegan, M Dras̆ar, M Vizváry, J Vykopal 2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014 | 30 | 2014 |
Embedded malware-an analysis of the Chuck Norris botnet P Čeleda, R Krejčí, J Vykopal, M Drašar 2010 European Conference on Computer Network Defense, 3-10, 2010 | 29 | 2010 |
Enhancing cybersecurity skills by creating serious games V Švábenský, J Vykopal, M Cermak, M Laštovička Proceedings of the 23rd Annual ACM Conference on Innovation and Technology …, 2018 | 25 | 2018 |
A flow-level taxonomy and prevalence of brute force attacks J Vykopal International Conference on Advances in Computing and Communications, 666-675, 2011 | 22 | 2011 |
On the design of security games: From frustrating to engaging learning J Vykopal, M Barták 2016 {USENIX} Workshop on Advances in Security Education ({ASE} 16), 2016 | 19 | 2016 |
Security monitoring of http traffic using extended flows M Husák, P Velan, J Vykopal 2015 10th International Conference on Availability, Reliability and Security …, 2015 | 19 | 2015 |
Improving host profiling with bidirectional flows P Minarik, J Vykopal, V Krmicek 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 18 | 2009 |
Similarity as a central approach to flow‐based anomaly detection M Drašar, M Vizváry, J Vykopal International Journal of Network Management 24 (4), 318-336, 2014 | 16 | 2014 |
Flow-based brute-force attack detection in large and high-speed networks J Vykopal Dissertations, Masaryk University, 2013 | 13 | 2013 |
Detection of dns traffic anomalies in large networks M Čermák, P Čeleda, J Vykopal Meeting of the European Network of Universities and Companies in Information …, 2014 | 10 | 2014 |
What are cybersecurity education papers about? a systematic literature review of sigcse and iticse conferences V Švábenský, J Vykopal, P Čeleda Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020 | 9 | 2020 |
Timely feedback in unstructured cybersecurity exercises J Vykopal, R Ošlejšek, K Burská, K Zákopčanová Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018 | 9 | 2018 |
Flow-based detection of RDP brute-force attacks M Vizváry, J Vykopal Proceedings of 7th International Conference on Security and Protection of …, 2013 | 9 | 2013 |
Exchanging security events: Which and how many alerts can we aggregate? M Husák, M Čermák, M Laštovička, J Vykopal 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017 | 8 | 2017 |