People

RESEARCHERS & LECTURERS

ING. MARTIN REHÁK, PH.D.

Stiborek, J., Pevný, T., Rehák, M. 2018 Multiple instance learning for malware classification, detail

Grill, M., Pevný, T., Rehák, M. 2017 Reducing False Positives of Network Anomaly Detection by Local Adaptive Multivariate Smoothing, detail

Jusko, J., Rehák, M., Stiborek, J., Kohout, J., Pevný, T. 2016 Using Behavioral Similarity for Botnet Command-and-Control Discovery, detail

Such, J., Criado, N., Vercouter, L., Rehák, M. 2016 Intelligent Cybersecurity Agents [Guest editors' introduction], detail

Grill, M., Nikolaev, I., Velaros, V., Rehák, M. 2015 Detecting DGA malware using NetFlow, detail

Bartoš, K., Rehák, M. 2015 IFS: Intelligent flow sampling for network security–an adaptive approach, detail

Grill, M., Rehák, M. 2014 Malware detection using HTTP user-agent discrepancy identification, detail

Buryan, P. 2014 Refinement Action-Based Framework for Utilization of Softcomputing in Inductive Learning, detail

Rehák, M., Jusko, J., Pevný, T. 2014 A Memory Efficient Privacy Preserving Representation of Connection Graphs, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2014 Game Theoretical Model for Adaptive Intrusion Detection System, detail

Jusko, J., Rehák, M. 2014 Identifying peer-to-peer communities in the network by connection graph analysis, detail

Rehák, M., Grill, M. 2014 Categorisation of False Positives: Not All Network Anomalies are Born Equal, detail

García, S., Uhlíř, V., Rehák, M. 2014 Identifying and Modeling Botnet C&C Behaviors, detail

Criado, N., Rehák, M., Such, J M, Vercouter, L. 2014 Proceedings of the 1st International Workshop on Agents and CyberSecurity, detail

Rehák, M. 2014 Modern Security Analytics: Finding a Needle in the Hay Blower, detail

Bartoš, K., Rehák, M. 2013 Self-Organized Mechanism for Distributed Setup of Multiple Heterogeneous Intrusion Detection Systems, detail

Jusko, J., Rehák, M. 2013 Revealing Cooperating Hosts by Connection Graph Analysis, detail

Pevný, T., Rehák, M., Komon, Martin 2013 Attacking the IDS learning processes, detail

Bartoš, K., Rehák, M. 2013 Self-organized Collaboration of Distributed IDS Sensors, detail

Jusko, J., Rehák, M. 2012 Identifying Skype Nodes by NetFlow Based Graph Analysis, detail

Zemanová, M. 2012 Exploiting Ontologies and Higher Order Knowledge in Relational Data Mining, detail

Bartoš, K., Rehák, M. 2012 Towards Efficient Flow Sampling Technique for Anomaly Detection, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper, detail

Pevný, T., Grill, M., Rehák, M. 2012 Detecting anomalous network hosts by means of PCA, detail

Bartoš, K., Rehák, M. 2012 Distributed Self-organized Collaboration of Autonomous IDS Sensors, detail

Bartoš, K., Rehák, M. 2012 Trust-based Solution for Robust Self-configuration of Distributed Intrusion Detection Systems, detail

Jusko, J., Rehák, M. 2012 Identifying Skype Nodes in the Network Exploiting Mutual Contacts, detail

Rehák, M., Grill, M., Stiborek, J. 2011 On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System, detail

Rehák, M., Stiborek, J., Grill, M. 2011 Intelligence, not Integration:Distributed Regret Minimization for IDS Control, detail

Grill, M., Rehák, M., Stiborek, J. 2011 Strategic self-organization methods for intrusion detection systems, detail

Bartoš, K., Rehák, M., Krmíček, V. 2011 Optimizing Flow Sampling for Network Anomaly Detection, detail

Rehák, M., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K. 2011 Game Theoretical Adaptation Model for Intrusion Detection System, detail

Rehák, M., Bartoš, K., Grill, M., Stiborek, J., Svoboda, M. 2009 Monitoring sití pomocí NetFlow dat - od paketů ke strategiím, detail

Čeleda, P., Rehák, M., Krmíček, V., Bartoš, K. 2009 Flow Based Security Awareness Framework for High-Speed Networks, detail

Rehák, M., Staab, E., Pěchouček, M., Stiborek, J., Grill, M., Bartoš, K. 2009 Dynamic Information Source Selection for Intrusion Detection Systems, detail

Rehák, M., Staab, E., Fusenig, V., Stiborek, J., Grill, M., Bartoš, K., Pěchouček, M., Engel, T. 2009 Threat-model-driven runtime adaptation and evaluation of intrusion detection system, detail

Rehák, M., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K., Čeleda, P. 2009 Adaptive Multi-Agent System for Network Traffic Monitoring, detail

Rehák, M., Staab, E., Fusenig, V., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K., Engel, T. 2009 Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems, detail

Rehák, M., Pěchouček, M., Grill, M., Bartoš, K., Krmíček, V., Čeleda, P. 2009 Collaborative Approach to Network Behavior Analysis Based on Hardware-Accelerated FlowMon Probes, detail

Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Stiborek, J., Svoboda, M., Pevný, T. 2009 Cooperative Adaptive Mechanism for Network Protection, detail

Karel, F. 2009 Quantitative Association Rules Mining, detail

Rehák, M. 2009 Multiagent Trust Modeling for Open Network Environments, detail

Rehák, M., Pěchouček, M., Grill, M., Bartoš, K., Čeleda, P., Krmíček, V. 2008 Collaborative Approach to Network Behavior Analysis, detail

Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Čeleda, P., Krmíček, V. 2008 Improving Anomaly Detection Error Rate by Collective Trust Modeling, detail

Bartoš, K., Grill, M., Krmíček, V., Rehák, M., Čeleda, P. 2008 Flow Based Network Intrusion Detection System using Hardware-Accelerated NetFlow Probes, detail

Rehák, M., Pěchouček, M., Grill, M., Bartoš, K. 2008 Trust Based Classifier Combination for Network Anomaly Detection, detail

Pěchouček, M., Doubek, J., Vokřínek, J., Rehák, M. 2008 Incrementaly Refined Acquaintance Model (IRAM) for Request based Virtual Organization Formation, detail

Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Celeda, P., Krmicek, V. 2008 CAMNEP: An intrusion detection system for high speed networks, detail

Rehák, M., Pěchouček, M., Čeleda, P., Krmíček, V., Grill, M., Bartoš, K. 2008 Multi Agent Approach to Network Intrusion Detection (Demo Paper), detail

Rehák, M., Pěchouček, M., Čeleda, P., Novotný, J., Minařík, P. 2008 CAMNEP: Agent Based Network Intrusion Detection System (Short Paper), detail

Doubek, J., Vokřínek, J., Pěchouček, M., Rehák, M. 2008 Incrementally Refined Acquaintance Model for Consortia Composition, detail

Rehák, M., Tožička, J., Pěchouček, M., Prokopová, M., Foltýn, L. 2007 Autonomous Protection Mechanism for Joint Networks in Coalition Operations, detail

Celeda, P., Krmicek, V., Rehák, M., Medvigy, D. 2007 High Speed Network Traffic Acquisition for Agent Systems, detail

Tožička, J., Pěchouček, M., Rehák, M., Prokopová, M. 2007 Multi-Agent Reflection in Autonomic Systems, detail

Rehák, M., Pěchouček, M. 2007 Trust Modeling with Context Representation and Generalized Identities, detail

Pěchouček, M., Rehák, M., Mařík, V. 2007 Incrementally Refined Acquaintance Model for Distributed Planning and Resource Allocation in Semi-Trusted Environments, detail

Rehák, M., Pěchouček, M., Čeleda, P., Krmíček, V., Moninec, J., Dymáček, T., Medvigy, D. 2007 High Performance Agent System for Intrusion Detection in Backbone Networks, detail

Rehák, M., Pěchouček, M., Medvigy, D., Prokopová, M., Tožička, J., Foltýn, L. 2007 Agent Methods for Network Intrusion Detection and Response, detail

Platon, E., Rehák, M., Sabouret, N., Pěchouček, M., Honiden, S. 2007 Detecting Intrusions in Agent System by Means of Exception Handling, detail

Rehák, M., Pěchouček, M., Čeleda, P., Krmíček, V., Minařík, P., Medvigy, D. 2007 Collaborative Attack Detection in High Speed Networks, detail

Rehák, M., Pěchouček, M., Tožička, J., Prokopová, M., Medvigy, D., Novotný, J. 2007 Agent Based Network Protection Against Malicious Code, detail

Krmicek, V., Celeda, P., Rehák, M., Pěchouček, M. 2007 Agent Based Network Intrusion Detection System, detail

Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Celeda, P. 2007 Network Intrusion Detection by Means of Community of Trusting Agents, detail

Rehák, M., Pěchouček, M., Gregor, M. 2007 Trust Modeling with Context Representation and Generalized Identities, detail

Pěchouček, M., Rehák, M., Charvát, P., Vlček, T., Kolář, M. 2007 Agent Based Approach to Mass Oriented Production Planning: Case Study, detail

Šišlák, D., Pěchouček, M., Rehák, M., Tožička, J., Rollo, M., Pavlíček, D. 2006 AGLOBE multi-agent deployment environment, detail

Šišlák, D., Rehák, M., Pěchouček, M., Pavlíček, D., Uller, M. 2006 Negotiation Based Approach to Unmanned Aerial Vehicles, detail

Šišlák, D., Rehák, M., Pěchouček, M., Pavlíček, D. 2006 Deployment of A globe Multi Agent Platform, detail

Pěchouček, M., Tožička, J., Rehák, M. 2006 Towards Formal Model of Adversarial Action in Multi Agent Systems, detail

Rehák, M., Pěchouček, M., Volf, P. 2006 Distributed Planning Algorithm for Coalition Logistics in Semi trusted Environment, detail

Rehák, M., Gregor, M., Pěchouček, M. 2006 Multidimensional Context Representations for Situational Trust, detail

Rehák, M., Pěchouček, M., Volf, P. 2006 Multilevel Approach to Agent Based Task Allocation in Transportation, detail

Rehák, M. 2006 Trust Model for Embedded Cooperative Control Systems, detail

Rehák, M., Gregor, M., Pěchouček, M., Bradshaw, J.M. 2006 Representing Context for Multiagent Trust Modeling, detail

Hodík, J., Rehák, M., Bíba, J., Vokřínek, J. 2006 Trust and Reputation Management for VO Creation, detail

Šišlák, D., Rehák, M., Pěchouček, M. 2005 System Innovation Award at CIA2004, Erfurt, detail

Pěchouček, M., Rehák, M., Mařík, V. 2005 Expectations and Deployment of Agent Technology in Manufacturing and Defence: Case Studies, detail

Rehák, M., Pěchouček, M., Tožička, J., Šišlák, D. 2005 Using Stand-In Agents in Partially Accessible Multi-Agent Environment, detail

Rehák, M., Pěchouček, M., Tožička, J. 2005 Adversarial Behavior in Multi-Agent Systems, detail

Rehák, M., Tožička, J., Pěchouček, M., Železný, F., Rollo, M. 2005 An Abstract Architecture for Computational Reflection in Multi-Agent Systems, detail

Šišlák, D., Rehák, M., Pěchouček, M. 2005 A-globe: Multi-agent Platform with Advanced Simulation and Visualization Support, detail

Rehák, M., Pěchouček, M., Benda, P., Foltýn, L. 2005 Fuzzy Number Approach to Trust in Coalition Environment, detail

Šišlák, D., Rehák, M., Pěchouček, M., Rollo, M., Pavlíček, D. 2005 A-globe: Agent Development Platform with Inaccessibility and Mobility Support, detail

Rehák, M., Foltýn, L., Pěchouček, M., Benda, P. 2005 Trust Model for Open Ubiquitous Agent Systems, detail

Šišlák, D., Rehák, M., Pěchouček, M., Benda, P. 2005 Optimizing Agents Operation in Partially Inaccessible and Disruptive Environment, detail

Šišlák, D., Pěchouček, M., Rehák, M., Tožička, J., Benda, P. 2005 Solving Inaccessibility in Multi-Agent Systems By Mobile Middle-Agents, detail

Pěchouček, M., Šišlák, D., Rehák, M. 2004 Advanced Agent Methods in Adversarial and Inaccassible Environment, detail

Rehák, M., Charvát, P., Pěchouček, M. 2004 Agent System Application in High-Volume Production Management, detail

Šišlák, D., Pěchouček, M., Rollo, M., Rehák, M., Tožička, J. 2004 Simulating Agents´ Mobility and Inaccessibility with A-Globe Multi-agent System, detail

Tožička, J., Rehák, M., Šišlák, D. 2004 Metrics of Inaccessibility in MAS, detail

Pěchouček, M., Rehák, M., Rollo, M., Šišlák, D., Tožička, J. 2004 Solving Communication Inaccessibility in Coalition Operations, detail

Tožička, J., Rehák, M., Pěchouček, M., Šišlák, D. 2004 Solutions for Cooperation with Limited Communication, detail

Jiřina, M. 1998 Initial Setting of Weights in the Kohonen Maps, detail

Rozinek, J. 1996 Predikce časových řad neuronovými sítěmi, detail