Rehak Martin
Rehak Martin
Czech Technical University in Prague, Resistant AI
Verified email at
Cited by
Cited by
Adaptive multiagent system for network traffic monitoring
M Rehák, M Pechoucek, M Grill, J Stiborek, K Bartos, P Celeda
IEEE Intelligent Systems 24 (3), 16-25, 2009
Trust modeling with context representation and generalized identities
M Rehák, M Pěchouček
International Workshop on Cooperative Information Agents, 298-312, 2007
A-globe: Agent development platform with inaccessibility and mobility support
D Šišlák, M Rehák, M Pěchouček, M Rollo, D Pavlíček
Software agent-based applications, platforms and development kits, 21-46, 2005
Detecting DGA malware using NetFlow
M Grill, I Nikolaev, V Valeros, M Rehak
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
Multiple instance learning for malware classification
J Stiborek, T Pevný, M Rehák
Expert Systems with Applications 93, 346-357, 2018
Representing context for multiagent trust modeling
M Rehak, M Gregor, M Pechoucek, JM Bradshaw
2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology …, 2006
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing
M Grill, T Pevný, M Rehak
Journal of Computer and System Sciences 83 (1), 43-57, 2017
Agent-based approach to mass-oriented production planning: Case study
M Pechoucek, M Rehák, P Charvat, T Vlcek, M Kolar
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007
Runtime monitoring and dynamic reconfiguration for intrusion detection systems
M Rehák, E Staab, V Fusenig, M Pěchouček, M Grill, J Stiborek, K Bartoš, ...
International Workshop on Recent Advances in Intrusion Detection, 61-80, 2009
Trust model for open ubiquitous agent systems
M Rehák, L Foltyn, M Pechoucek, P Benda
IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 536-542, 2005
Negotiation-based approach to unmanned aerial vehicles
D Sislak, M Rehak, M Pechoucek, D Pavlicek, M Uller
IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence …, 2006
Malware detection using http user-agent discrepancy identification
M Grill, M Rehák
2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014
Identifying and modeling botnet C&C behaviors
S García, V Uhlíř, M Rehak
Proceedings of the 1st International Workshop on Agents and CyberSecurity, 1-8, 2014
CAMNEP: An intrusion detection system for high-speed networks
M Rehak, M Pěchouček, K Bartoš, M Grill, P Čeleda, V Krmíček
Progress in informatics, 2008
CAMNEP: agent-based network intrusion detection system
M Rehak, M Pechoucek, P Celeda, J Novotny, P Minarik
Proceedings of the 7th international joint conference on Autonomous agents …, 2008
Multidimensional context representations for situational trust
M Rehak, M Gregor, M Pechoucek
IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence …, 2006
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,344,441, 2016
Dynamic information source selection for intrusion detection systems
M Rehak, E Staab, M Pechoucek, J Stiborek, M Grill, K Bartos
Proceedings of The 8th International Conference on Autonomous Agents and …, 2009
A-globe: Multi-agent platform with advanced simulation and visualization support
D Sislak, M Rehak, M Pechoucek
The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05 …, 2005
Expectations and deployment of agent technology in manufacturing and defence: case studies
M Pěchouček, M Rehak, V Marik
Proceedings of the fourth international joint conference on Autonomous …, 2005
The system can't perform the operation now. Try again later.
Articles 1–20