People

ING. JAN STIBOREK

Jusko, J., Rehák, M., Stiborek, J., Kohout, J., Pevný, T. 2016 Using Behavioral Similarity for Botnet Command-and-Control Discovery, detail

Stiborek, J., Rehák, M., Pevný, T. 2015 Towards Scalable Network Host Simulation, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2014 Game Theoretical Model for Adaptive Intrusion Detection System, detail

Buryan, P. 2014 Refinement Action-Based Framework for Utilization of Softcomputing in Inductive Learning, detail

García, S., Grill, M., Stiborek, J., Zunino, A. 2014 An empirical comparison of botnet detection methods, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System, detail

Stiborek, J., Grill, M., Rehák, M., Bartoš, K., Jusko, J. 2012 Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper, detail

Lisý, V., Píbil, R., Stiborek, J., Bošanský, B., Pěchouček, M. 2012 Game-theoretic Approach to Adversarial Plan Recognition, detail

Zemanová, M. 2012 Exploiting Ontologies and Higher Order Knowledge in Relational Data Mining, detail

Rehák, M., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K. 2011 Game Theoretical Adaptation Model for Intrusion Detection System, detail

Rehák, M., Grill, M., Stiborek, J. 2011 On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System, detail

Rehák, M., Stiborek, J., Grill, M. 2011 Intelligence, not Integration:Distributed Regret Minimization for IDS Control, detail

Grill, M., Rehák, M., Stiborek, J. 2011 Strategic self-organization methods for intrusion detection systems, detail

Rehák, M., Staab, E., Fusenig, V., Stiborek, J., Grill, M., Bartoš, K., Pěchouček, M., Engel, T. 2009 Threat-model-driven runtime adaptation and evaluation of intrusion detection system, detail

Rehák, M., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K., Čeleda, P. 2009 Adaptive Multi-Agent System for Network Traffic Monitoring, detail

Rehák, M., Staab, E., Fusenig, V., Pěchouček, M., Grill, M., Stiborek, J., Bartoš, K., Engel, T. 2009 Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems, detail

Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Stiborek, J., Svoboda, M., Pevný, T. 2009 Cooperative Adaptive Mechanism for Network Protection, detail

Rehák, M., Bartoš, K., Grill, M., Stiborek, J., Svoboda, M. 2009 Monitoring sití pomocí NetFlow dat - od paketů ke strategiím, detail

Karel, F. 2009 Quantitative Association Rules Mining, detail

Rehák, M., Staab, E., Pěchouček, M., Stiborek, J., Grill, M., Bartoš, K. 2009 Dynamic Information Source Selection for Intrusion Detection Systems, detail

Jiřina, M. 1998 Initial Setting of Weights in the Kohonen Maps, detail

Rozinek, J. 1996 Predikce časových řad neuronovými sítěmi, detail