IT Security Research Group
Publications
-
2024
FIRC Anton, MALINKA Kamil and HANÁČEK Petr. Deepfake Speech Detection: A Spectrogram Analysis. In: Proceedings of the ACM Symposium on Applied Computing. Avila: Association for Computing Machinery, 2024, pp. 1312-1320. ISBN 979-8-4007-0243-3.
DetailŠALKO Milan, FIRC Anton and MALINKA Kamil. Security Implications of Deepfakes in Face Authentication. In: Proceedings of the ACM Symposium on Applied Computing. Avila: Association for Computing Machinery, 2024, pp. 1376-1384. ISBN 979-8-4007-0243-3.
DetailMALINKA Kamil, FIRC Anton, KAŠKA Petr, LAPŠANSKÝ Tomáš, ŠANDOR Oskar and HOMOLIAK Ivan. Resilience of Voice Assistants to Synthetic Speech. In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bydgoszcz: Springer Nature Switzerland AG, 2024, pp. 66-84. ISBN 978-3-031-70878-7.
DetailMALINKA Kamil, FIRC Anton, ŠALKO Milan, PRUDKÝ Daniel, RADAČOVSKÁ Karolína and HANÁČEK Petr. Comprehensive Multiparametric Analysis of Human Deepfake Speech Recognition. Eurasip Journal on Image and Video Processing, vol. 2024, no. 1, pp. 1-25. ISSN 1687-5281.
DetailMALINKA Kamil, FIRC Anton, LOUTOCKÝ Pavel, VOSTOUPAL Jakub, KRIŠTOFÍK Andrej and KASL František. Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report. In: Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE. New York, NY, USA: Association for Computing Machinery, 2024, pp. 227-233. ISBN 979-8-4007-0600-4.
Detail -
2023
LI Zengpeng, SZALACHOWSKI Pawel, VENUGOPALAN Sarad and HOMOLIAK Ivan. BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting with Fault Recovery. In: 2023, p. 15.
DetailDRGA Jozef, HOMOLIAK Ivan, VANČO Juraj, PEREŠÍNI Martin, HANÁČEK Petr and VASILAKOS Athanasios. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In: 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023, pp. 1-4. ISBN 0-06-000020-1.
DetailSTANČÍKOVÁ Ivana and HOMOLIAK Ivan. SBvote: Scalable Self-Tallying Blockchain-Based Voting. In: SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing. Tallin: Association for Computing Machinery, 2023, pp. 203-2011. ISBN 978-1-4503-9517-5.
DetailFIRC Anton, MALINKA Kamil and HANÁČEK Petr. Deepfakes as a threat to a speaker and facial recognition: an overview of tools and attack vectors. Heliyon, vol. 9, no. 4, 2023, pp. 1-33. ISSN 2405-8440.
DetailFIRC Anton, MALINKA Kamil and HANÁČEK Petr. Deepfakes: Bezpečnostní výzva pro naše uši. DSM Data Security Management, vol. 2023, no. 02, pp. 41-44. ISSN 1211-8737.
DetailHUJŇÁK Ondřej, MALINKA Kamil and HANÁČEK Petr. Indirect Bluetooth Low Energy Connection Detection. In: 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023, pp. 328-333. ISBN 978-1-6654-6268-6.
DetailZBOŘIL Jan, HUJŇÁK Ondřej and MALINKA Kamil. IoT Gateways Network Communication Analysis. In: 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023, pp. 334-339. ISBN 978-1-6654-6268-6.
DetailMALINKA Kamil, FIRC Anton, PEREŠÍNI Martin, JANUŠ Filip and HUJŇÁK Ondřej. On the educational impact of ChatGPT: Is Artificial Intelligence ready to obtain a University degree?. In: Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE. Turku: Association for Computing Machinery, 2023, pp. 47-53. ISBN 979-8-4007-0138-2.
DetailPRUDKÝ Daniel, FIRC Anton and MALINKA Kamil. Assessing the Human Ability to Recognize Synthetic Speech in Ordinary Conversation. In: 2023 International Conference of the Biometrics Special Interest Group (BIOSIG). Proceedings of the 22nd International Conference of the Biometrics Special Interest Group. Darmstadt: GI - Group for computer science, 2023, pp. 1-5. ISBN 978-3-88579-733-3.
DetailMALINKA Kamil, FIRC Anton and HANÁČEK Petr. Deepfakes a lidé: dokážeme ještě rozlišit pravou řeč od umělé?. DSM Data Security Management, vol. 2023, no. 04, pp. 22-26. ISSN 1211-8737.
Detail -
2022
BREITENBACHER Dominik, HOMOLIAK Ivan, AUNG Yan Lin, ELOVICI Yuval and TIPPENHAUER Nils Ole. HADES-IoT: A practical host-based anomaly detection system for IoT devices (Extended Version). IEEE Internet of Things Journal, vol. 9, no. 12, 2022, pp. 9640-9658. ISSN 2327-4662.
DetailFIRC Anton and MALINKA Kamil. The dawn of a text-dependent society: deepfakes as a threat to speech verification systems. In: SAC '22: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing. New York, NY: Association for Computing Machinery, 2022, pp. 1646-1655. ISBN 978-1-4503-8713-2.
DetailMALINKA Kamil, HUJŇÁK Ondřej, HANÁČEK Petr and HELLEBRANDT Lukáš. E-Banking Security Study - 10 years later. IEEE Access, vol. 2022, no. 10, pp. 16681-16699. ISSN 2169-3536.
DetailHOLÍKOVÁ Lenka, HOLÍK Lukáš, HOMOLIAK Ivan, LENGÁL Ondřej, VEANES Margus and VOJNAR Tomáš. Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. In: Proceedings of the 31st USENIX Security Symposium. Boston, MA: USENIX, 2022, pp. 4165-4182. ISBN 978-1-939133-31-1.
DetailFIRC Anton, MALINKA Kamil and HANÁČEK Petr. Creation and detection of malicious synthetic media - a preliminary survey on deepfakes. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 125-145. ISBN 978-80-86583-34-1.
DetailFIRC Anton and MALINKA Kamil. Practical lessons of (deep)faking human speech. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 161-172. ISBN 978-80-86583-34-1.
DetailHUJŇÁK Ondřej, MALINKA Kamil and HANÁČEK Petr. E-Banking Authentication - Dynamic Password Generators and Hardware Tokens. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 211-221. ISBN 978-80-86583-34-1.
DetailPEREŠÍNI Martin, MALINKA Kamil, HOMOLIAK Ivan, BENČIĆ Federico M. and HLADKÝ Tomáš. Simulations of DAG-based Blockchain Protocols and Attacks on the PHANTOM Protocol via Transaction Selection Strategies. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 173-184. ISBN 978-80-86583-34-1.
DetailFIRC Anton, MALINKA Kamil and HANÁČEK Petr. Deepfakes: A Dangerous Entertainment?. In: Recenzovaný sborník příspěvků mezinárodní vědecké konference MMK2022. Hradec Králové: Akademické sdružení MAGNANIMITAS Assn., 2022, pp. 1073-1082. ISBN 978-80-87952-37-5.
DetailHOMOLIAK Ivan. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. In: Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022, pp. 185-210. ISBN 978-80-86583-34-1.
Detail -
2021
HOMOLIAK Ivan, VENUGOPALAN Sarad, REIJSBERGEN Daniel, HUM Qingze, SCHUMI Richard and SZALACHOWSKI Pawel. The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE Communications Surveys and Tutorials, vol. 23, no. 1, 2021, pp. 341-390. ISSN 1553-877X.
Detail -
2020
HOMOLIAK Ivan, MALINKA Kamil and HANÁČEK Petr. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, vol. 8, no. 6, 2020, pp. 112427-112453. ISSN 2169-3536.
DetailBINDER Alexander, BREITENBACHER Dominik, HARTEL Pieter H., SZALACHOWSKI Pawel, HOMOLIAK Ivan and HUJŇÁK Ondřej. SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. New York City: Association for Computing Machinery, 2020, pp. 145-162. ISBN 978-1-4503-8139-0.
DetailOČENÁŠ Martin, HOMOLIAK Ivan, MALINKA Kamil and HANÁČEK Petr. Security and Encryption at Modern Databases. In: ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020, pp. 19-23. ISBN 978-1-4503-7744-7.
DetailHUM Qingze, TAN Wei Jin, TEY Shi Ying, LENUS Latasha, HOMOLIAK Ivan, LIN Yun and SUN Jun. CoinWatch: A Clone-Based Approach for Detecting Vulnerabilities in Cryptocurrencies. In: 3rd IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2020). Rhodos: Institute of Electrical and Electronics Engineers, 2020, pp. 17-25. ISBN 978-0-7381-0495-9.
Detail -
2019
HOMOLIAK Ivan, TOFFALINI Flavio, GUARNIZO Juan D., ELOVICI Yuval and OCHOA Martín. Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Computing Surveys, vol. 52, no. 2, 2019, pp. 1-40. ISSN 0360-0300.
DetailHARTEL Pieter H., HOMOLIAK Ivan and REIJSBERGEN Daniel. An Empirical Study into the Success of Listed Smart Contracts in Ethereum. IEEE Access, vol. 07, no. 12, 2019, pp. 177539-177555. ISSN 2169-3536.
DetailHELLEBRANDT Lukáš, HOMOLIAK Ivan, MALINKA Kamil and HANÁČEK Petr. Increasing Trust in Tor Node List Using Blockchain. In: 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019, pp. 29-32. ISBN 978-1-7281-1328-9.
DetailHUJŇÁK Ondřej and KREJČÍ Radek. Security Framework for IoT and Fog Computing Networks. In: 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud). Palladam: Institute of Electrical and Electronics Engineers, 2019, pp. 87-92. ISBN 978-1-7281-4365-1.
Detail -
2018
HOMOLIAK Ivan, TEKNŐS Martin, BREITENBACHER Dominik and HANÁČEK Petr. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, vol. 5, no. 17, 2018, pp. 1-15. ISSN 2032-9393.
Detail -
2017
HOMOLIAK Ivan, ŠULÁK Ladislav and HANÁČEK Petr. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In: Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10144. Jeju Island: Springer International Publishing, 2017, pp. 66-78. ISBN 978-3-319-56549-1. ISSN 0302-9743.
DetailHOMOLIAK Ivan, TEKNŐS Martin, BARABAS Maroš and HANÁČEK Petr. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In: Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017, pp. 770-773. ISBN 978-3-319-59607-5.
DetailKAČIC Matej and BARABAS Maroš. Klasifikace informací v souvislostech. In: IS2 - Other Dimensions of Security. Praha: Tate International s.r.o., 2017, pp. 133-141. ISBN 978-80-86813-30-1.
DetailHELLEBRANDT Lukáš, HUJŇÁK Ondřej, HANÁČEK Petr and HOMOLIAK Ivan. Survey of Privacy Enabling Strategies in IoT Networks. In: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017, pp. 216-221. ISBN 978-1-4503-5392-2.
DetailOČENÁŠ Martin. Bitcoin blockchain analysis. In: Mikulášská kryptobesídka. Praha: Trusted Network Solutions, a.s., 2017, pp. 67-68.
Detail -
2016
BREITENBACHER Dominik, HOMOLIAK Ivan, JAROŠ Jiří and HANÁČEK Petr. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In: Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings, vol. 1. Orlando: The International Institute of Informatics and Systemics, 2016, pp. 55-62. ISBN 978-1-941763-47-6. ISSN 1690-4524.
DetailARON Lukáš and HANÁČEK Petr. A Concept of Dynamic Permission Mechanism on Android. In: Progress in Applied Mathematics in Science and Engineering Proceedings. Bali, Indonesia: American Institute of Physics, 2016, pp. 22-30. ISBN 978-0-7354-1352-8.
DetailARON Lukáš and HANÁČEK Petr. Dynamic Permission Mechanism on Android. Journal of Software, vol. 2016, no. 12, pp. 1124-1230. ISSN 1796-217X.
DetailSMETKA Tomáš, HOMOLIAK Ivan and HANÁČEK Petr. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In: Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016, pp. 305-312. ISBN 978-1-5090-1072-1.
DetailBREITENBACHER Dominik, HOMOLIAK Ivan, JAROŠ Jiří and HANÁČEK Petr. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, vol. 14, no. 3, 2016, pp. 51-58. ISSN 1690-4524.
DetailVANČO Matúš and ARON Lukáš. Dynamic Security Policy Enforcement on Android. International Journal of Security and Its Applications, vol. 2016, no. 10, pp. 141-148. ISSN 1738-9976.
DetailHELLEBRANDT Lukáš. URI-based HBAC in FreeIPA. In: SantaCrypt, proceedings. Bílovice nad Svitavou: Trusted Network Solutions, a.s., 2016, pp. 45-46. ISBN 978-80-904257-8-1.
Detail -
2015
DRAHANSKÝ Martin, HANÁČEK Petr, ZBOŘIL František, HENZL Martin, ZBOŘIL František V., YIM Jaegeol and SHIM Kyubark. Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks. Improving Information Security Practices through Computational Intelligence. Washington: IGI Global, 2015, pp. 198-227. ISBN 978-1-4666-9426-2.
DetailSMETKA Tomáš, HOMOLIAK Ivan and HANÁČEK Petr. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. In: Santa's Crypto Get-Together 2015. Praha: TNS, 2015, pp. 43-44. ISBN 978-80-904257-7-4.
DetailIAREMKO Iaroslav, ARON Lukáš and HANÁČEK Petr. Improving IP Geolocation Using Network Measurement Characteristics. In: HKICEAS. Hong Kong: Higher Education Forum, 2015, pp. 210-220. ISBN 978-986-87417-4-4.
DetailBREITENBACHER Dominik, HOMOLIAK Ivan and HANÁČEK Petr. Parallelized Self-Initializing Quadratic Sieve using OpenMP. In: Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015, pp. 39-40. ISBN 978-80-904257-7-4.
Detail -
2014
ANTAL Lukáš, BARABAS Maroš and HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část I. DSM Data Security Management, vol. 18, no. 1, 2014, pp. 36-39. ISSN 1211-8737.
DetailHOMOLIAK Ivan, OVŠONKA Daniel, KORANDA Karel and HANÁČEK Petr. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In: International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014, pp. 188-193. ISBN 978-1-4799-3531-4.
DetailHOMOLIAK Ivan, OVŠONKA Daniel, GRÉGR Matěj and HANÁČEK Petr. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In: Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014, pp. 310-317. ISBN 978-1-908320-40-7.
DetailANTAL Lukáš, BARABAS Maroš and HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část II. DSM Data Security Management, vol. 18, no. 2, 2014, pp. 32-35. ISSN 1211-8737.
DetailHENZL Martin, BARABAS Maroš, JANČA Radim and HANÁČEK Petr. Bezpečnost bezkontaktních platebních karet. DSM Data Security Management, vol. 28, no. 2, 2014, pp. 41-43. ISSN 1211-8737.
DetailANTAL Lukáš, BARABAS Maroš and HANÁČEK Petr. Kompromitace dat pomocí SQL Injection, část III. DSM Data Security Management, vol. 18, no. 3, 2014, pp. 25-29. ISSN 1211-8737.
DetailKAČIC Matej, OVŠONKA Daniel, BARABAS Maroš and HANÁČEK Petr. Traffic generator based on behavioral pattern. In: Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for. London: IEEE Computer Society, 2014, pp. 229-233. ISBN 978-1-908320-40-7.
Detail -
2013
BARABAS Maroš, HOMOLIAK Ivan, DROZD Michal and HANÁČEK Petr. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, vol. 5, no. 2, 2013, pp. 249-253. ISSN 1793-8236.
DetailSEKANINA Lukáš, RŮŽIČKA Richard, VAŠÍČEK Zdeněk, ŠIMEK Václav and HANÁČEK Petr. Implementing a Unique Chip ID on a Reconfigurable Polymorphic Circuit. Information Technology And Control, vol. 42, no. 1, 2013, pp. 7-14. ISSN 1392-124X.
DetailHOMOLIAK Ivan, BARABAS Maroš, CHMELAŘ Petr, DROZD Michal and HANÁČEK Petr. ASNM: Advanced Security Network Metrics for Attack Vector Description. In: Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013, pp. 350-358. ISBN 1-60132-259-3.
DetailKAČIC Matej, HENZL Martin, JURNEČKA Peter and HANÁČEK Petr. Malware injection in wireless networks. In: Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Volume 1. Berlin: Institute of Electrical and Electronics Engineers, 2013, pp. 483-487. ISBN 978-1-4799-1426-5.
DetailHENZL Martin and HANÁČEK Petr. Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding. In: 2013 International Symposium on Biometrics and Security Technologies (ISBAST). Chengdu: IEEE Computer Society, 2013, pp. 141-148. ISBN 978-0-7695-5010-7.
DetailHANÁČEK Petr, JURNEČKA Peter and KAČIC Matej. Concept of parallel code generating and refactoring system for safety standards compliance. In: Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Berlin: Institute of Electrical and Electronics Engineers, 2013, pp. 630-635. ISBN 978-1-4799-1426-5.
DetailBARABAS Maroš and DROZD Michal. Pokročilé formy útoků a jejich detekce. IT System, vol. 2013, no. 1, pp. 8-10. ISSN 1212-4567.
DetailKAČIC Matej, HANÁČEK Petr, HENZL Martin and HOMOLIAK Ivan. A Concept of Behavioral Reputation System in Wireless Networks. In: The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013, pp. 86-90. ISBN 978-958-8790-65-7.
DetailBARABAS Maroš, HANÁČEK Petr, HOMOLIAK Ivan and KAČIC Matej. Detection of Network Buffer Overflow Attacks: A Case Study. In: The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013, pp. 128-131. ISBN 978-958-8790-65-7.
DetailDRAHANSKÝ Martin, HANÁČEK Petr, ZBOŘIL František V., ZBOŘIL František, BARABAS Maroš and ANTAL Lukáš. Threats in Networks using Agent and Biometric Systems. International Journal of Bio-Science and Bio-Technology, vol. 5, no. 3, 2013, pp. 119-133. ISSN 2233-7849.
DetailHOMOLIAK Ivan, BARABAS Maroš, CHMELAŘ Petr, DROZD Michal and HANÁČEK Petr. Advanced Security Network Metrics. Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013, pp. 187-202. ISBN 978-0-12-411474-6.
DetailJURNEČKA Peter, HANÁČEK Petr, BARABAS Maroš, HENZL Martin and KAČIC Matej. A method for parallel software refactoring for safety standards compliance. In: System Safety 2013 collection of papers. Cardiff: The Institution of Engineering and Technology, 2013, pp. 1-6. ISBN 978-1-84919-777-9. ISSN 0537-9989.
DetailJURNEČKA Peter, HANÁČEK Petr, BARABAS Maroš, HENZL Martin and KAČIC Matej. A method for parallel software refactoring for safety standards compliance. Resilience, Security & Risk in Transport. London: The Institution of Engineering and Technology, 2013, pp. 42-48. ISBN 978-1-84919-787-8.
Detail -
2012
BARABAS Maroš, DROZD Michal and HANÁČEK Petr. Behavioral signature generation using shadow honeypot. World Academy of Science, Engineering and Technology, vol. 2012, no. 65, pp. 829-833. ISSN 2010-376X.
DetailHENZL Martin, HANÁČEK Petr, JURNEČKA Peter and KAČIC Matej. A Concept of Automated Vulnerability Search in Contactless Communication Applications. In: Proceedings 46th Annual IEEE International Carnahan Conference on Security Technology. Boston: Institute of Electrical and Electronics Engineers, 2012, pp. 180-186. ISBN 978-1-4673-4807-2.
DetailMALINKA Kamil and HANÁČEK Petr. Computational Social Networks - Security and Privacy. Computational Social Networks - Security and Privacy. London: Springer London, 2012, pp. 311-340. ISBN 978-1-4471-4050-4.
DetailBARABAS Maroš and DROZD Michal. Jak na pokročilé útoky. SecurityWorld, vol. 2012, no. 4, pp. 20-20. ISSN 1802-4505.
DetailHOMOLIAK Ivan. Increasing Classification Accuracy in LibSVM Using String Kernel Functions. In: Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012, pp. 281-283. ISBN 978-80-214-4461-4.
DetailANTAL Lukáš. 802.1X WLAN Network Security. In: Proceedings of the 18th Conference STUDENT EEICT 2012. Student EEICT, Volume 2. Brno: Faculty of Electrical Engineering and Communication BUT, 2012, pp. 279-281. ISBN 978-80-214-4461-4.
Detail -
2011
KAČIC Matej. New Approach in Wireless Intrusion Detection System. In: Proceedings of the 17th Conference STUDENT EEICT 2011. Volume 3. Brno: Brno University of Technology, 2011, pp. 590-594. ISBN 978-80-214-4273-3.
DetailZBOŘIL František, HANÁČEK Petr, ŽÁK Jakub, HORÁČEK Jan, DRAHANSKÝ Martin, HÁJEK Josef and MARVAN Aleš. Studie využití autentizačně - bezpečnostních technologií pro automatizaci a zlepšení efektivity vybraných procesů sledování stavu a pohybu majetku a osob ve firmě nebo instituci. Brno: Siemens Industry Software, s.r.o., 2011.
DetailŽÁK Jakub, HORÁČEK Jan, ZBOŘIL František, KOČÍ Radek and GÁBOR Martin. Remote controling and monitoring tool for wireless sensor network using WSageNt platform. In: Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Department of Intelligent Systems FIT BUT, 2011, pp. 1-8. ISBN 978-80-214-4320-4.
DetailSAMEK Jan, MALAČKA Ondřej, ZBOŘIL František and HANÁČEK Petr. Multi-Agent Experimental Framework with Hierarchical Model of Trust in Contexts for Decision Making. In: Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Department of Intelligent Systems FIT BUT, 2011, pp. 128-136. ISBN 978-80-214-4320-4.
DetailHANÁČEK Petr and ŠVENDA Petr. Cryptography for (partially) Compromised Sensor Networks. In: Information Security Summit 2011. Praha: Tate International s.r.o., 2011, pp. 103-109. ISBN 978-80-86813-22-6.
DetailMALINKA Kamil, HANÁČEK Petr and TRZOS Michal. Evaluation of Biometric Authentication Based on Visual Evoked Potentials. In: Proceedings 45th International Carnahan Conference on Security Technology. Piscataway: Institute of Electrical and Electronics Engineers, 2011, pp. 13-19. ISBN 978-1-4577-0901-2.
DetailHANÁČEK Petr and JURNEČKA Peter. Využitie grafických kariet na útoky silou. DSM Data Security Management, vol. 15, no. 2, 2011, pp. 10-13. ISSN 1211-8737.
DetailDROZD Michal, BARABAS Maroš, GRÉGR Matěj and CHMELAŘ Petr. Buffer Overflow Attacks Data Acquisition. In: Proceedings of the 6th IEEE International Conference on IDAACS 2011. Volume 2. Praha: Institute of Electrical and Electronics Engineers, 2011, pp. 775-779. ISBN 978-1-4577-1423-8.
DetailHENZL Martin and HANÁČEK Petr. NFC z pohledu bezpečnosti. DSM Data Security Management, vol. 15, no. 3, 2011, p. 4. ISSN 1211-8737.
DetailHANÁČEK Petr, NAGY Jan, SCHÄFER Jiří and ZADINA Martin. Návrh zabezpečeného monitorovacího systému v oblasti e-Health. In: Proceedings of the Annual Database conference Datakon 2011. Brno: Brno University of Technology, 2011, pp. 223-226. ISBN 978-80-214-4329-7.
DetailKAČIC Matej and HANÁČEK Petr. WPA2: Útoky z vnútra siete. DSM Data Security Management, vol. 15, no. 4, 2011, pp. 30-33. ISSN 1211-8737.
DetailZADINA Martin, NAGY Jan and HANÁČEK Petr. Zabezpečení bezdrátových sítí založených na protokolu IEEE 802.11 v aplikaci rozsáhlých distribučních sítí. In: Sborník příspěvků z 39. konference EurOpen.CZ, 2.-5. října 2011. Plzeň: Czech Open Systems User's Group, 2011, pp. 37-48. ISBN 978-80-86583-22-8.
Detail -
2010
PECHO Peter, HANÁČEK Petr and NAGY Jan. Simulation and Evaluation of CTP and Secure-CTP Protocols. Radioengineering, vol. 2010, no. 1, pp. 89-98. ISSN 1210-2512.
DetailHANÁČEK Petr, DRAHANSKÝ Martin and ORSÁG Filip. Angriffe auf sichere Hardwarelösungen. Die Datenschleuder, vol. 2010, no. 94, pp. 12-14. ISSN 0930-1054.
DetailHANÁČEK Petr and DRAHANSKÝ Martin. Analyse sicherer Hardwarelösungen. DuD - Datenschutz und Datensicherheit, vol. 2010, no. 11, pp. 766-770. ISSN 1614-0702.
DetailHANÁČEK Petr and ŠVENDA Petr. Cryptographic Protocols in Wireless Sensor Networks. In: Sborník příspěvků MKB 2010. Bílovice nad Svitavou: TNS, 2010, pp. 59-76. ISBN 978-80-904257-1-2.
DetailHANÁČEK Petr, MALINKA Kamil and SCHÄFER Jiří. E-Banking Security - Comparative Study. IEEE Aerospace and Electronic Systems Magazine, vol. 25, no. 1, 2010, pp. 29-34. ISSN 0885-8985.
DetailBARABAS Maroš. Automated Processes in Computer Security. In: Proceedings of the 16th Conference STUDENT EEICT 2010. Volume 5. Brno: Brno University of Technology, 2010, pp. 246-250. ISBN 978-80-214-4079-1.
Detail -
2009
MALINKA Kamil and SCHÄFER Jiří. Development of Social Networks in Email Communication. In: The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009, p. 5. ISBN 978-0-7695-3612-5.
DetailMALINKA Kamil. Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication. In: The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009, p. 6. ISBN 978-0-7695-3612-5.
DetailSCHÄFER Jiří, SCHÄFER Jiří, MALINKA Kamil and MALINKA Kamil. Security in Peer-to-Peer Networks: Empiric model of file diffusion in BitTorrent. In: The Fourth International Conference on Internet Monitoring and Protection. Venice: IEEE Computer Society, 2009, p. 6. ISBN 978-0-7695-3612-5.
DetailSCHÄFER Jiří, MALINKA Kamil and HANÁČEK Petr. Peer-to-peer Networks: Security Analysis. International Journal On Advances in Security., vol. 2009, no. 1, pp. 53-61. ISSN 1942-2636.
DetailPECHO Peter, ZBOŘIL František, DRAHANSKÝ Martin and HANÁČEK Petr. Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. Journal of Universal Computer Science, vol. 15, no. 6, 2009, pp. 992-1006. ISSN 0948-6968.
DetailCVRČEK Daniel, MATYÁŠ Václav and ŠVENDA Petr. 4th IFIP WG 9.2, 9.6, 11.6, 11.7/FIDIS International Summer School. IFIP Advances in Information and Communication Technology, vol. 298. Berlin: Springer Verlag, 2009. ISBN 978-3-642-03314-8.
DetailCVRČEK Daniel. Security of Wireless Communication. 4th IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School, Brno, Czech Republic, September 1-7, 2008, Revised Selected Papers. Berlin: Springer Verlag, 2009, pp. 119-134. ISBN 978-3-642-03314-8.
DetailDRAHANSKÝ Martin, ORSÁG Filip and HANÁČEK Petr. Securing of Communication in GSM Networks. In: Proceedings of NGWS2009. Melbourne: Lambert Academic Publishing, 2009, pp. 30-36. ISBN 978-3-8383-5346-3.
DetailMALINKA Kamil, HANÁČEK Petr and CVRČEK Daniel. Analyses of Real Email Traffic Properties. Radioengineering, vol. 2009, no. 4, pp. 644-650. ISSN 1210-2512.
DetailHANÁČEK Petr, NAGY Jan and PECHO Peter. Power Consumption of Hardware Cryptography Platform for Wireless Sensor. In: Proceedings of International Conference on Parallel and Distributed Computing. Higashu Hiroshima: IEEE Computer Society, 2009, p. 6. ISBN 978-0-7695-3914-0.
Detail -
2008
CVRČEK Daniel, KRHOVJÁK Jan, KUMPOŠT Marek and MATYÁŠ Václav. Authorizing card payments with PINs. Computer, vol. 41, no. 2, 2008, pp. 64-68. ISSN 0018-9162.
DetailCVRČEK Daniel and DANEZIS George. Fighting the 'Good' Internet War. In: Remodelling the Attacker. Hertfodshire: University of Hertfordshire, 2008, pp. 1-6.
DetailSTAJANO Frank, CVRČEK Daniel and LEWIS Matt. Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. In: ACNS 2008. LNCS. Berlin: Springer Verlag, 2008, pp. 460-478. ISSN 0302-9743.
DetailMATYÁŠ Václav, KRHOVJÁK Jan, LORENC Václav, KUMPOŠT Marek, ŘÍHA Zdeněk, CVRČEK Daniel, STAUDEK Jan, HOLER Vlastimil, MALINKA Kamil, ŠVENDA Petr and HANÁČEK Petr. Autentizace elektronických transakcí a autorizace dat i uživatelů. Brno: Masaryk University, 2008. ISBN 978-80-210-4556-9.
DetailMALINKA Kamil and PECHO Peter. Nenechte se nechytat! (Evoluční teorie v podání spear phishingu). CONNECT!, vol. 2008, no. 6, pp. 22-23. ISSN 1211-3085.
DetailENDRYS Břetislav and HANÁČEK Petr. Trust in Security of Identification Devices - Feeling of Unity. In: Information Security Summit IS2 2008. Praha: Tate International s.r.o., 2008, pp. 43-50. ISBN 978-80-86813-15-8.
DetailSCHÄFER Jiří, MALINKA Kamil and HANÁČEK Petr. Peer-to-peer networks security. In: The Third International Conference on Internet Monitoring and Protection. Bucharest: IEEE Computer Society, 2008, pp. 13-13. ISBN 978-0-7695-3189-2.
DetailHANÁČEK Petr, MALINKA Kamil and SCHÄFER Jiří. E-Banking Security - Comparative Study. In: Proceedings ICCST 2008. Prague: IEEE Computer Society, 2008, pp. 326-330. ISBN 978-1-4244-1816-9.
DetailSCHÄFER Jiří, MALINKA Kamil and HANÁČEK Petr. Malware Spreading Models in Peer-to-peer Networks. In: Proceedings ICCST 2008. Praha: IEEE Computer Society, 2008, pp. 339-345. ISBN 978-1-4244-1816-9.
DetailCVRČEK Daniel. Security of MICA*-based wireless sensor networks. In: 25th Chaos Communication Congress. Berlin, 2008, p. 5.
DetailMALINKA Kamil and PECHO Peter. Co když vás sledují?. CONNECT!, vol. 2008, no. 12, pp. 54-55. ISSN 1211-3085.
Detail -
2007
DRAHANSKÝ Martin, ORSÁG Filip and MALINKA Kamil. Testování snímačů firmy Suprema. Brno: Digitus s.r.o., 2007.
DetailBLAHÁK Petr and CVRČEK Daniel. Alternativní zabezpečení WiFi sití. IT System, vol. 2007, no. 2, pp. 1-6. ISSN 1212-4567.
DetailHANÁČEK Petr. Vliv nových IT technologií na management bezpečnosti v organizaci. In: Security 2007. Praha, 2007, pp. 18-22.
DetailCVRČEK Daniel and MALINKA Kamil. Chování uživatelů elektronické pošty. In: Datakon 2007 - Sborník databázové konference. Brno: Faculty of Informatics MU, 2007, pp. 92-101. ISBN 978-80-7355-076-9.
DetailCVRČEK Daniel and MALINKA Kamil. Effects of Social Networks On Anonymity Systems. In: Proceedings of ISAT 2007. Wroclaw: Wroclaw University of Technology, 2007, p. 8. ISBN 978-83-7493-348-3.
DetailPECHO Peter and SCHÄFER Jiří. Bezpečnost čipových karet a detekce vykonávaných operací pomocí genetického programování. In: Datakon 2007. Brno, 2007, pp. 169-175. ISBN 978-80-7355-076-9.
DetailMATYÁŠ Václav, KRHOVJÁK Jan, LORENC Václav, KUMPOŠT Marek, ŘÍHA Zdeněk, CVRČEK Daniel, STAUDEK Jan, HOLER Vlastimil, MALINKA Kamil, ŠVENDA Petr and HANÁČEK Petr. Autentizace uživatelů a autorizace elektronických transakcí. Příručka manažera VIII. Praha: Tate International s.r.o., 2007. ISBN 978-80-86813-14-1.
DetailCVRČEK Daniel and MATYÁŠ Václav, ed. Moraviacrypt '05. Tatra Mountains Mathematical Publications, vol. 2007, no. 37. ISSN 1210-3195.
DetailCVRČEK Daniel, KRHOVJÁK Jan and MATYÁŠ Václav. PIN (and Chip) or Signature: Beating the Cheating?. In: Security Protocols - 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers. LNCS, vol. 2007. Berlin, 2007, pp. 69-75. ISSN 0302-9743.
Detail -
2006
CVRČEK Daniel, KUMPOŠT Marek and MATYÁŠ Václav. A Privacy Classification Model Based on Linkability Valuation. In: Security and Embedded Systems. NATO Security through Science Series, D: Information and Communication Security, Volume 2. NL: Kluwer Academic Publishers, 2006, pp. 91-98. ISBN 978-1-58603-580-8.
DetailCVRČEK Daniel, DANEZIS George, KUMPOŠT Marek and MATYÁŠ Václav. The Value of Location Information. In: not yet known. Berlin, 2006, pp. 1-4.
DetailCVRČEK Daniel and SEDLÁK Michal. Zabezpečení systémů VoIP. In: DATAKON 2006. Brno, 2006, pp. 1-8.
DetailBLAHÁK Petr and CVRČEK Daniel. Alternativní zabezpečení pro WiFi sítě. In: DATAKON 2006. Brno, 2006, pp. 1-8.
DetailCVRČEK Daniel and PECHO Peter. Systém prihlasovania čipovými kartami v OS Linux. In: DATAKON 2006. Brno, 2006, pp. 1-8.
DetailCVRČEK Daniel, DANEZIS George, KUMPOŠT Marek and MATYÁŠ Václav. A Study on The Value of Location Privacy. In: Workshop on Privacy in Electronic Society 2006. Washington, 2006, p. 10.
DetailCVRČEK Daniel, KOUŘIL Daniel, LORENC Václav and MATYÁŠ Václav. Autentizační hardwarový token nové generace. In: DATAKON 2006. Brno: Masaryk University, 2006, pp. 229-238. ISBN 80-210-4102-1.
Detail -
2005
CVRČEK Daniel, MATYÁŠ Václav and PATEL Ahmed. Evidence processing and privacy issues in evidence-based reputation systems. Computer Standards & Interfaces, vol. 27, no. 5, 2005, pp. 533-545. ISSN 0920-5489.
DetailCVRČEK Daniel and MOODY Ken. Combining Trust and Risk to Reduce the Cost of Attacks. In: iTrust 2005. Lecture Notes in Computer Science, vol. 3477. Berlin: Springer Verlag, 2005, pp. 372-383. ISSN 0302-9743.
DetailBOND Mike and CVRČEK Daniel. Penetration to Secure Hardware. In: SPI 2005. Brno, 2005, p. 1.
DetailCVRČEK Daniel and MATYÁŠ Václav. PIN (&Chip) or signature - beating or cheating?. In: SPW 05 Proceedings - The System Likes You and Wants To Be Your Friend. Berlin: University of Hertfordshire, 2005, p. 5.
DetailCVRČEK Daniel and LATISLAV Richard. TCP - resetovací útok. In: DATAKON 2005, Proceedings of the Annual Database Conference. Brno: Masaryk University, 2005, pp. 301-310. ISBN 8021038136.
DetailŠVENDA Petr and CVRČEK Daniel. Smart dust security - key infection revisited. In: STM 2005. ENTCS, vol. 157. Milano, 2005, pp. 11-25. ISSN 1571-0661.
DetailHANÁČEK Petr and STAUDEK Jan. Správa identity. In: Sborník konference DATAKON 2005. Brno: Masaryk University, 2005, pp. 123-146. ISBN 80-210-3813-6.
DetailCVRČEK Daniel. RFID - přeceněné ambice?. In: SmartWorld 2005 - soubor prezentací. Zlín, 2005, p. 7.
DetailCVRČEK Daniel, KUMPOŠT Marek and MATYÁŠ Václav. On Privacy Classification in Ubiquitous Computing Systems. International Scientific Journal of Computing, vol. 4, no. 2, 2005, pp. 26-35. ISSN 1727-6209.
Detail -
2004
CVRČEK Daniel. Projekt SECURE. DSM Data Security Management, vol. 2004, no. 4, pp. 1-10. ISSN 1211-8737.
DetailBOND Mike, CVRČEK Daniel and MURDOCH Steven J. Bezpečný hardware, který není zase tak bezpečný. DSM Data Security Management, vol. 2004, no. 5, pp. 44-47. ISSN 1211-8737.
Detail