Jan Jusko
Title
Cited by
Cited by
Year
Detecting network services based on network flow data
I Nikolaev, M Grill, J Jusko
US Patent App. 10/027,562, 2018
231*2018
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,344,441, 2016
142016
Using Behavioral Similarity for Botnet Command-and-Control Discovery
J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny
IEEE Intelligent Systems 31 (5), 16-22, 2016
92016
Identifying peer‐to‐peer communities in the network by connection graph analysis
J Jusko, M Rehak
International Journal Of Network Management 24 (4), 235-252, 2014
92014
Game Theoretical Adaptation Model for Intrusion Detection System
J Stiborek, M Grill, M Rehak, K Bartos, J Jusko
Advances on Practical Applications of Agents and Multi-Agent Systems, 201-210, 2012
62012
Detecting network services based on network flow data
I Nikolaev, M Grill, J Jusko
US Patent 10,027,562, 2018
52018
A memory efficient privacy preserving representation of connection graphs
J Jusko, M Rehak, T Pevny
Proceedings of the 1st International Workshop on Agents and CyberSecurity, 1-8, 2014
42014
Revealing Cooperating Hosts by Connection Graph Analysis.
J Jusko, M Rehak
SecureComm, 241-255, 2012
42012
Graph-based Detection of Malicious Network Communities
J Jusko
32017
Server grouping system
J Jusko, T Pevny, M Rehak
US Patent 9,813,442, 2017
12017
Server grouping system
J Jusko, T Pevny, M Rehak
US Patent 9,813,442, 2017
12017
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,531,742, 2016
12016
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,531,742, 2016
12016
Game Theoretical Model for Adaptive Intrusion Detection System
J Stiborek, M Grill, M Rehak, K Bartos, J Jusko
Transactions on Computational Collective Intelligence XV, 133-163, 2014
12014
Identifying skype nodes by netflow-based graph analysis
J Jusko, M Rehak
2012 8th International Wireless Communications and Mobile Computing …, 2012
12012
Automated creation of lightweight behavioral indicators of compromise (iocs)
J Jusko, D Khikhlukha, H Nayyar
US Patent App. 16/131,146, 2020
2020
Structural command and control detection of polymorphic malware
J Jusko, M Rehak, D Khikhlukha, H Nayyar
US Patent App. 16/120,580, 2020
2020
Network security classification
J Jusko, M Sofka
US Patent 10,382,462, 2019
2019
Correlating endpoint and network views to identify evasive applications
BH Anderson, D McGrew, VE Parla, J Jusko, M Grill, M Vejman
US Patent App. 15/848,150, 2019
2019
Active prioritization of investigation targets in network security
J Jusko, J Stiborek, T Pevny
US Patent App. 15/789,022, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20