Stiborek, J., Pevný, T., Rehák, M. 2018 Multiple instance learning for malware classification, detail
Pevný, T., Kohout, J. 2018 Network traffic fingerprinting based on approximated kernel two-sample test, detail
Stiborek, J., Pevný, T., Rehák, M. 2018 Multiple instance learning for malware classification, detail
Stiborek, J., Pevný, T., Rehák, M. 2018 Probabilistic analysis of dynamic malware traces, detail
Pevný, T., Ker, A.D. 2018 Exploring Non-Additive Distortion in Steganography, detail
Durkota, K., Lisý, V., Kiekintveld, C., Horák, K., Bošanský, B., Pevný, T. 2017 Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers, detail
Pevný, T., Somol, P. 2017 Using Neural Network Formalism to Solve Multiple-Instance Problems, detail
Prasse, P., Machlica, L., Pevný, T., Havelka, J., Scheffer, T. 2017 Malware Detection by Analysing Encrypted Network Traffic with Neural Networks, detail
Janisch, J., Pevný, T., Lisý, V. 2017 Classification with Costly Features using Deep Reinforcement Learning, detail
Grill, M., Pevný, T., Rehák, M. 2017 Reducing False Positives of Network Anomaly Detection by Local Adaptive Multivariate Smoothing, detail
Grill, M., Pevný, T. 2016 Learning Combination of Anomaly Detectors for Security Domain, detail
Pevný, T., Cech, P., Kohout, J., Lokoc, J., Komárek, T., Marousek, J. 2016 Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce, detail
Jusko, J., Rehák, M., Stiborek, J., Kohout, J., Pevný, T. 2016 Using Behavioral Similarity for Botnet Command-and-Control Discovery, detail
Durkota, K., Lisý, V., Horák, K., Kiekintveld, Ch., Bošanský, B., Pevný, T. 2016 Game-theoretic Analysis of Detecting Data Exfiltration, detail
Kungurtsev, V., Pevný, T. 2016 Algorithms for Solving Optimization Problems Arsing from Deep Neural Net Models: Smooth Problems, detail
Pevný, T. 2016 Loda: Lightweight on-line detector of anomalies, detail
Pevný, T., Kopp, M., Křoustek, J, Ker, A.D 2016 Malicons: Detecting Payload in Favicons, detail
Čech, Přemysl, Kohout, J., Lokoč, Jakub, Komárek, T., Maroušek, Jakub, Pevný, T. 2016 Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce, detail
Komárek, T., Grill, M., Pevný, T. 2016 Passive NAT Detection Using HTTP Access Logs, detail
Pevný, T., Somol, Petr 2016 Discriminative Models for Multi-instance Problems with Tree Structure, detail
Pevný, T., Ker, Andrew D., Bas, Patrick 2016 Rethinking Optimal Embedding, detail
Pevný, T., Kopp, M., Kroustek, J., Ker, A.D. 2016 Malicons: Detecting Payload in Favicons, detail
Stiborek, J., Rehák, M., Pevný, T. 2015 Towards Scalable Network Host Simulation, detail
Kohout, J., Pevný, T. 2015 Unsupervised Detection of Malware in Persistent Web Traffic, detail
Kohout, J., Pevný, T. 2015 Automatic Discovery of Web Servers Hosting Similar Applications, detail
Pevný, T., Ker, Andrew D. 2015 Towards dependable steganalysis, detail
Cogranne, Remi, Sedighi, Vahid, Fridrich, Jessica, Pevný, T. 2015 Is Ensemble Classifier Needed for Steganalysis in High-Dimensional Feature Spaces?, detail
Pevný, T., Nikolaev, I. 2015 Optimizing pooling function for pooled steganalysis, detail
Létal, V., Pevný, T., Somol, Petr, Smidl, Vasek 2015 Finding New Malicious Domains Using Variational Bayes on Large-Scale Computer Network Data, detail
Šourek, G., Železný, F., Kuželka, O., Pevný, T. 2015 Learning to create and exploit aggregative and relational properties of flow-sets, detail
Ker, Andrew D., Pevný, T. 2014 The Steganographer is the Outlier: Realistic Large-Scale Steganalysis, detail
Kopp, M., Pevný, T., Holeňa, M. 2014 Interpreting and clustering outliers with sapling random forests, detail
Kopp, M., Pevný, T., Holeňa, M. 2014 Interpreting and clustering outliers with sapling random forests, detail
Pevný, T., Kopp, M. 2014 Explaining Anomalies with Sapling Random Forests, detail
Lisý, V., Kessl, R., Pevný, T. 2014 Randomized Operating Point Selection in Adversarial Classification, detail
Rehák, M., Jusko, J., Pevný, T. 2014 A Memory Efficient Privacy Preserving Representation of Connection Graphs, detail
Ker, Andrew D., Pevný, T. 2014 A mishmash of methods for mitigating the model mismatch mess, detail
Pevný, T., Ker, Andrew D. 2014 Steganographic key leakage through payload metadata, detail
Pevný, T., Kopp, M. 2014 Explaining Anomalies with Sampling Random Forests, detail
Pevný, T., Rehák, M., Komon, Martin 2013 Attacking the IDS learning processes, detail
Ker, Andrew, Bas, Patrick, Bohme, Rainer, Cogranne, Remi, Craver, Scott, Filler, Tomas, Fridrich, Jessica, Pevný, T. 2013 Moving Steganography and Steganalysis from the Laboratory into the Real World, detail
Pevný, T., Ker, Andrew D. 2013 The Challenges of Rich Features in Universal Steganalysis, detail
Pevný, T. 2013 Anomaly detection by bagging, detail
Kohout, J., Pevný, T. 2013 Modeling behavior twitter users, detail
Ker, Andrew, Pevný, T. 2012 Identifying a steganographer in realistic and heterogeneous data sets, detail
Pevný, T., Fridrich, Jessica, Ker, Andrew 2012 From Blind to Quantitative Steganalysis, detail
Ker, Andrew, Pevný, T. 2012 Batch steganography in the real world, detail
Pevný, T., Grill, M., Rehák, M. 2012 Detecting anomalous network hosts by means of PCA, detail
Pevný, T. 2012 Co-occurrence steganalysis in high dimensions, detail
Pevný, T. 2011 13th Information Hiding Conference, detail
Bas, P., Filler, T., Pevný, T. 2011 "Break Our Steganographic System" --- the ins and outs of organizing BOSS, detail
Filler, T., Pevný, T., Craver, S., Ker, A.D. 2011 Proceedings of the 13th international conference on Information hiding, detail
Ker, A.D., Pevný, T. 2011 A New Paradigm for Steganalysis via Clustering, detail
Pevný, T. 2011 Detecting messages of unknown length, detail
Kodovský, J., Pevný, T., Fridrich, J. 2010 Modern Steganalysis Can Detect YASS, detail
Pevný, T., Filler, T., Bas, P. 2010 Using High-Dimensional Image Models to Perform Highly Undetectable Steganography, detail
Pevný, T., Bas, T., Fridrich, J. 2010 Steganalysis by Subtractive Pixel Adjacency Matrix, detail
Pevný, T. 2010 Coordination of Malware by Means of Steganography, detail
Rehák, M., Pěchouček, M., Bartoš, K., Grill, M., Stiborek, J., Svoboda, M., Pevný, T. 2009 Cooperative Adaptive Mechanism for Network Protection, detail
Pevný, T., Fridrich, J., Bas, P. 2009 Steganalysis by Subtractive Pixel Adjacency Matrix, detail
Pevný, T., Fridrich, J., Ker, A. D. 2009 From Blind to Quantitative Steganalysis, detail
Pevný, T., Fridrich, J. 2008 Novelty detection in blind steganalysis, detail
Pevný, T., Ker, A.D., Kodovsky, J., Fridrich, J. 2008 The Square Root Law of Steganographic Capacity, detail
Pevný, T., Fridrich, J. 2008 Benchmarking for Steganography, detail
Pevný, T., Fridrich, J. 2008 Detection of double-compression in JPEG images for applications in steganography, detail
Pevný, T. 2008 Kernel methods in steganalysis, detail
Pevný, T., Fridrich, J. 2008 Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images, detail
Pevný, T., Fridrich, J. 2008 Multiclass Detector of Current Steganographic Methods for JPEG Format, detail
Fridrich, J., Pevný, T., Kodovsky, J. 2007 Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities, detail
Pevný, T., Fridrich, J. 2007 Merging Markov and DCT features for multi-class JPEG steganalysis, detail
Pevný, T., Firdrich, J. 2006 Determining the stego algorithm for JPEG images, detail
Pevný, T., Fridrich, J. 2006 Multi-class blind steganalysis for JPEG images, detail
Pevný, T., Fridrich, J. 2005 Towards Multi-class Blind Steganalyzer for JPEG Images, detail
Lecturer (3):