Martin Husák
Martin Husák
Institute of Computer Science, Masaryk University
Verified email at mail.muni.cz - Homepage
Title
Cited by
Cited by
Year
Survey of attack projection, prediction, and forecasting in cyber security
M Husák, J Komárková, E Bou-Harb, P Čeleda
IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018
692018
HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting
M Husák, M Čermák, T Jirsík, P Čeleda
EURASIP Journal on Information Security, 2016
662016
Network-based HTTPS client identification using SSL/TLS fingerprinting
M Husák, M Cermák, T Jirsík, P Celeda
2015 10th international conference on availability, reliability and security …, 2015
332015
Honeypots and honeynets: issues of privacy
P Sokol, J Míšek, M Husák
EURASIP Journal on Information Security 2017 (1), 1-9, 2017
272017
Security monitoring of http traffic using extended flows
M Husák, P Velan, J Vykopal
2015 10th International Conference on Availability, Reliability and Security …, 2015
192015
PhiGARo: Automatic phishing detection and incident response framework
M Husák, J Cegan
2014 ninth international conference on availability, reliability and …, 2014
192014
Towards predicting cyber attacks using information exchange and data mining
M Husák, J Kašpar
2018 14th International Wireless Communications & Mobile Computing …, 2018
152018
A survey on intrusion detection and prevention systems
I Ghafir, M Husak, V Prenosil
Proceedings of student conference Zvule, IEEE/UREL. Brno University of …, 2014
142014
CRUSOE: Data model for cyber situational awareness
J Komárková, M Husák, M Laštovička, D Tovarňák
Proceedings of the 13th International Conference on Availability …, 2018
122018
On the sequential pattern and rule mining in the analysis of cyber security alerts
M Husák, J Kašpar, E Bou-Harb, P Čeleda
Proceedings of the 12th International Conference on Availability …, 2017
122017
Cloud-based security research testbed: A DDoS use case
T Jirsı́k, M Husak, P Celeda, Z Eichler
2014 IEEE Network Operations and Management Symposium (NOMS), 1-2, 2014
112014
GDPR compliance in cybersecurity software: a case study of DPIA in information sharing platform
M Horák, V Stupka, M Husák
Proceedings of the 14th International Conference on Availability …, 2019
92019
Assessing internet-wide cyber situational awareness of critical sectors
M Husák, N Neshenko, MS Pour, E Bou-Harb, P Čeleda
Proceedings of the 13th International Conference on Availability …, 2018
92018
Exchanging security events: Which and how many alerts can we aggregate?
M Husák, M Čermák, M Laštovička, J Vykopal
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
82017
POSTER: Reflected attacks abusing honeypots
M Husák, M Vizváry
Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications …, 2013
82013
AIDA framework: Real-time correlation and prediction of intrusion detection alerts
M Husák, J Kašpar
Proceedings of the 14th International Conference on Availability …, 2019
72019
Protection of personal data in security alert sharing platforms
V Stupka, M Horák, M Husák
Proceedings of the 12th International Conference on Availability …, 2017
72017
Big data sanitization and cyber situational awareness: a network telescope perspective
E Bou-Harb, M Husák, M Debbabi, C Assi
IEEE transactions on big data 5 (4), 439-453, 2017
72017
Flow-based monitoring of honeypots
M Husák, M Drašar
Security and Protection of Information 2013, 63-70, 2013
72013
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization
P Sokol, L Kleinová, M Husák
IEEE EUROCON 2015-International Conference on Computer as a Tool (EUROCON), 1-6, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20