Pavel Čeleda
Cited by
Cited by
Flow monitoring explained: From packet capture to data analysis with netflow and ipfix
R Hofstede, P Čeleda, B Trammell, I Drago, R Sadre, A Sperotto, A Pras
IEEE Communications Surveys & Tutorials 16 (4), 2037-2064, 2014
A survey of methods for encrypted traffic classification and analysis
P Velan, M Čermák, P Čeleda, M Drašar
International Journal of Network Management 25 (5), 355-374, 2015
Survey of attack projection, prediction, and forecasting in cyber security
M Husák, J Komárková, E Bou-Harb, P Čeleda
IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
M Husák, M Čermák, T Jirsík, P Čeleda
EURASIP Journal on Information Security 2016, 1-14, 2016
Kypo cyber range: Design and use cases
J Vykopal, R Ošlejšek, P Čeleda, M Vizvary, D Tovarňák
SciTePress, 2017
Lessons learned from complex hands-on defence exercises in a cyber range
J Vykopal, M Vizvary, R Oslejsek, P Celeda, D Tovarnak
2017 IEEE Frontiers in education conference (FIE), 1-8, 2017
What are cybersecurity education papers about? a systematic literature review of sigcse and iticse conferences
V Švábenský, J Vykopal, P Čeleda
Proceedings of the 51st ACM technical symposium on computer science …, 2020
Adaptive multiagent system for network traffic monitoring
M Rehák, M Pechoucek, M Grill, J Stiborek, K Bartos, P Celeda
IEEE Intelligent Systems 24 (3), 16-25, 2009
Cybersecurity knowledge and skills taught in capture the flag challenges
V Švábenský, P Čeleda, J Vykopal, S Brišáková
Computers & Security 102, 102154, 2021
Kypo–a platform for cyber defence exercises
P Čeleda, J Čegan, J Vykopal, D Tovarňák
M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber …, 2015
Network-based HTTPS client identification using SSL/TLS fingerprinting
M Husák, M Cermák, T Jirsík, P Celeda
2015 10th international conference on availability, reliability and security …, 2015
Passive os fingerprinting methods in the jungle of wireless networks
M Lastovicka, T Jirsik, P Celeda, S Spacek, D Filakovsky
NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2018
Embedded malware-an analysis of the chuck norris botnet
P Čeleda, R Krejčí, J Vykopal, M Drašar
2010 European Conference on Computer Network Defense, 3-10, 2010
Toward stream-based IP flow analysis
T Jirsik, M Cermak, D Tovarnak, P Celeda
IEEE Communications Magazine 55 (7), 70-76, 2017
Multiparameter Multichannel Analyser System for Characterisation of Mixed Neutron–Gamma Field in the Experimental Reactor Lr-O
Z Bureš, J Cvachovec, F Cvachovec, P Čeleda, B Ošmera
Reactor Dosimetry in the 21st Century, 194-201, 2003
A performance benchmark for NetFlow data analysis on distributed stream processing systems
M Čermák, D Tovarňák, M Laštovička, P Čeleda
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 919-924, 2016
Scalable learning environments for teaching cybersecurity hands-on
J Vykopal, P Čeleda, P Seda, V Švábenský, D Tovarňák
2021 IEEE Frontiers in Education Conference (FIE), 1-9, 2021
Network traffic characterisation using flow-based statistics
P Velan, J Medková, T Jirsík, P Čeleda
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 907-912, 2016
Flow-based security issue detection in building automation and control networks
P Čeleda, R Krejčí, V Krmíček
Information and Communication Technologies: 18th EUNICE/IFIP WG 6.2, 6.6 …, 2012
Design and evaluation of http protocol parsers for ipfix measurement
P Velan, T Jirsík, P Čeleda
Advances in Communication Networking: 19th EUNICE/IFIP WG 6.6 International …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20