default search action
Martin Husák
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Sofiane Lagraa, Martin Husák, Hamida Seba, Satyanarayana Vuppala, Radu State, Moussa Ouedraogo:
A review on graph-based approaches for network security monitoring and botnet detection. Int. J. Inf. Sec. 23(1): 119-140 (2024) - [j13]Elias Bou-Harb, Edgar R. Weippl, Chadi Assi, Martin Husák, Jiangshan Yu, Katherine A. Flanigan:
Guest Editorial: IoT Security and Provisioning in Cyber-Enabled Niche Critical Infrastructure. IEEE Internet Things Mag. 7(6): 10-12 (2024) - [c36]Lukás Sadlek, Martin Husák, Pavel Celeda:
Identification of Device Dependencies Using Link Prediction. NOMS 2024: 1-10 - [i1]Lukás Sadlek, Martin Husák, Pavel Celeda:
Identification of Device Dependencies Using Link Prediction. CoRR abs/2407.03019 (2024) - 2023
- [j12]Martin Lastovicka, Martin Husák, Petr Velan, Tomás Jirsík, Pavel Celeda:
Passive operating system fingerprinting revisited: Evaluation and current challenges. Comput. Networks 229: 109782 (2023) - [j11]Martin Husák, Pavol Sokol, Martin Zádník, Václav Bartos, Martin Horák:
Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. DTRAP 4(4): 48:1-48:11 (2023) - [c35]Martin Husák, Joseph Khoury, Ðorde Klisura, Elias Bou-Harb:
On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics. CCE 2023: 167-179 - [c34]Martin Husák, Michal Javorník:
Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection. CNS 2023: 1-6 - [c33]Martin Husák, Shanchieh Jay Yang, Joseph Khoury, Dorde Klisura, Elias Bou-Harb:
Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges. ICDF2C (2) 2023: 132-151 - [c32]Vladimír Boucek, Martin Husák:
Recommending Similar Devices in Close Proximity for Network Security Management. WiMob 2023: 481-484 - 2022
- [j10]Martin Zádník, Jan Wrona, Karel Hynek, Tomás Cejka, Martin Husák:
Discovering Coordinated Groups of IP Addresses Through Temporal Correlation of Alerts. IEEE Access 10: 82799-82813 (2022) - [j9]Martin Husák, Lukás Sadlek, Stanislav Spacek, Martin Lastovicka, Michal Javorník, Jana Komárková:
CRUSOE: A toolset for cyber situational awareness and decision support in incident handling. Comput. Secur. 115: 102609 (2022) - [j8]Martin Husák, Martin Lastovicka, Tomás Plesník:
Handling Internet Activism During the Russian Invasion of Ukraine: A Campus Network Perspective. DTRAP 3(3): 17:1-17:5 (2022) - [c31]Samuel Sulan, Martin Husák:
Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. ARES 2022: 22:1-22:6 - [c30]Martin Husák, Milan Cermák:
SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. ARES 2022: 25:1-25:10 - 2021
- [j7]Martin Husák, Václav Bartos, Pavol Sokol, Andrej Gajdos:
Predictive methods in cyber defense: Current experience and research challenges. Future Gener. Comput. Syst. 115: 517-530 (2021) - [c29]Martin Husák, Martin Lastovicka, Daniel Tovarnák:
System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. ARES 2021: 112:1-112:8 - [c28]Lukás Matta, Martin Husák:
A Dashboard for Cyber Situational Awareness and Decision Support in Network Security Management. IM 2021: 716-717 - [c27]Martin Husák, Giovanni Apruzzese, Shanchieh Jay Yang, Gordon Werner:
Towards an Efficient Detection of Pivoting Activity. IM 2021: 980-985 - [c26]Martin Husák:
Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents. ISI 2021: 1-6 - 2020
- [j6]Martin Husák, Tomás Bajtos, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda:
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach. ACM Trans. Manag. Inf. Syst. 11(4): 19:1-19:16 (2020) - [c25]Martin Husák, Tomás Jirsík, Shanchieh Jay Yang:
SoK: contemporary issues and challenges to enable cyber situational awareness for network security. ARES 2020: 2:1-2:10 - [c24]Martin Husák, Pavel Celeda:
Predictions of Network Attacks in Collaborative Environment. NOMS 2020: 1-6 - [c23]Michal Javorník, Jana Komárková, Lukás Sadlek, Martin Husák:
Decision Support for Mission-Centric Network Security Management. NOMS 2020: 1-6 - [c22]Martin Lastovicka, Martin Husák, Lukás Sadlek:
Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks. NOMS 2020: 1-6
2010 – 2019
- 2019
- [j5]Martin Husák, Jana Komárková, Elias Bou-Harb, Pavel Celeda:
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Commun. Surv. Tutorials 21(1): 640-660 (2019) - [j4]Elias Bou-Harb, Martin Husák, Mourad Debbabi, Chadi Assi:
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective. IEEE Trans. Big Data 5(4): 439-453 (2019) - [c21]Michal Javorník, Jana Komárková, Martin Husák:
Decision Support for Mission-Centric Cyber Defence. ARES 2019: 34:1-34:8 - [c20]Martin Horák, Václav Stupka, Martin Husák:
GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. ARES 2019: 36:1-36:8 - [c19]Martin Husák, Jaroslav Kaspar:
AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts. ARES 2019: 81:1-81:8 - 2018
- [c18]Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda:
Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. ARES 2018: 29:1-29:6 - [c17]Jana Komárková, Martin Husák, Martin Lastovicka, Daniel Tovarnák:
CRUSOE: Data Model for Cyber Situational Awareness. ARES 2018: 36:1-36:10 - [c16]Nataliia Neshenko, Martin Husák, Elias Bou-Harb, Pavel Celeda, Sameera Al-Mulla, Claude Fachkha:
Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations. GLOBECOM Workshops 2018: 1-7 - [c15]Martin Husák, Jaroslav Kaspar:
Towards Predicting Cyber Attacks Using Information Exchange and Data Mining. IWCMC 2018: 536-541 - [c14]Petr Velan, Martin Husák, Daniel Tovarnák:
Rapid prototyping of flow-based detection methods using complex event processing. NOMS 2018: 1-3 - 2017
- [j3]Pavol Sokol, Jakub Mísek, Martin Husák:
Honeypots and honeynets: issues of privacy. EURASIP J. Inf. Secur. 2017: 4 (2017) - [c13]Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda:
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts. ARES 2017: 22:1-22:10 - [c12]Václav Stupka, Martin Horák, Martin Husák:
Protection of personal data in security alert sharing platforms. ARES 2017: 65:1-65:8 - [c11]Jana Medková, Martin Husák, Martin Drasar:
Network defence strategy evaluation: Simulation vs. live network. IM 2017: 81-88 - [c10]Martin Husák, Milan Cermák, Martin Lastovicka, Jan Vykopal:
Exchanging security events: Which and how many alerts can we aggregate? IM 2017: 604-607 - [c9]Jana Medková, Martin Husák, Martin Vizváry, Pavel Celeda:
Honeypot testbed for network defence strategy evaluation. IM 2017: 887-888 - [c8]Martin Husák, Milan Cermák:
A graph-based representation of relations in network security alert sharing platforms. IM 2017: 891-892 - 2016
- [j2]Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda:
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting. EURASIP J. Inf. Secur. 2016: 6 (2016) - 2015
- [c7]Martin Husák, Petr Velan, Jan Vykopal:
Security Monitoring of HTTP Traffic Using Extended Flows. ARES 2015: 258-265 - [c6]Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda:
Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting. ARES 2015: 389-396 - [c5]Pavol Sokol, Martin Husák, Frantiek Liptak:
Deploying Honeypots and Honeynets: Issue of Privacy. ARES 2015: 397-403 - [c4]Pavol Sokol, Lenka Kleinova, Martin Husák:
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization. EUROCON 2015: 1-6 - 2014
- [c3]Martin Husák, Jakub Cegan:
PhiGARo: Automatic Phishing Detection and Incident Response Framework. ARES 2014: 295-302 - [c2]Tomás Jirsík, Martin Husák, Pavel Celeda, Zdenek Eichler:
Cloud-based security research testbed: A DDoS use case. NOMS 2014: 1-2 - 2013
- [c1]Martin Husák, Martin Vizváry:
Reflected attacks abusing honeypots. CCS 2013: 1449-1452
2000 – 2009
- 2008
- [j1]Martin Janosov, Martin Husák, Peter Farkas, Ana García Armada:
New [47, 15, 16] Linear Binary Block Code. IEEE Trans. Inf. Theory 54(1): 423-424 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint