Managing the secure software development R Fujdiak, P Mlynek, P Mrnustik, M Barabas, P Blazek, F Borcik, J Misurec 2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019 | 42 | 2019 |
Seeking the relation between performance and security in modern systems: metrics and measures R Fujdiak, P Mlynek, P Blazek, M Barabas, P Mrnustik 2018 41st International Conference on Telecommunications and Signal …, 2018 | 36 | 2018 |
ASNM: Advanced security network metrics for attack vector description I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek Proceedings of the International Conference on Security and Management (SAM), 1, 2013 | 27 | 2013 |
Behavioral signature generation using shadow honeypot M Barabas, M Drozd, P Hanacek World Academy of Science, Engineering and Technology, ser, 829-833, 2012 | 14 | 2012 |
Exploitation of netem utility for non-payload-based obfuscation techniques improving network anomaly detection I Homoliak, M Teknos, M Barabas, P Hanacek Security and Privacy in Communication Networks: 12th International …, 2017 | 9 | 2017 |
Automated malware detection based on novel network behavioral signatures M Barabas, I Homoliak, M Drozd, P Hanacek International Journal of Engineering and Technology 5 (2), 249-253, 2013 | 9 | 2013 |
Modeling the trade-off between security and performance to support the product life cycle R Fujdiak, P Blazek, L Apvrille, Z Martinasek, P Mlynek, R Pacalet, ... 2019 8th Mediterranean Conference on Embedded Computing (MECO), 1-6, 2019 | 6 | 2019 |
Detection of network buffer overflow attacks: A case study B Maroš, I Homoliak, M Kacic, H Petr 2013 47th International Carnahan Conference on Security Technology (ICCST), 1-4, 2013 | 6 | 2013 |
Traffic generator based on behavioral pattern M Kacic, D Ovsonka, P Hanacek, M Barabas The 9th International Conference for Internet Technology and Secured …, 2014 | 5 | 2014 |
A method for parallel software refactoring for safety standards compliance P Jurnečka, P Hanáček, M Barabas, M Henzl, M Kačic IET Digital Library, 2013 | 4 | 2013 |
Buffer overflow attacks data acquisition M Drozd, M Barabas, M Gregr, P Chmelar Proceedings of the 6th IEEE International Conference on Intelligent Data …, 2011 | 4 | 2011 |
Automated Processes in Computer Security M Barabas Proceedings of the 16th Conference STUDENT EEICT, 246-250, 2010 | 1 | 2010 |
Modeling the trade-off between security and performance to support the product life cycle R Pacalet, R Fujdiak, P Blažek, L Apvrille, P Mlynek, Z Martinasek, ... | | 2019 |
Advanced Security Network Metrics I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek Emerging Trends in ICT Security, 187-202, 2014 | | 2014 |
Emerging Trends in ICT Security: Chapter 12. Advanced Security Network Metrics I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek Elsevier Inc. Chapters, 2013 | | 2013 |
A method for parallel software refactoring for safety standards compliance P Hana, M Barabas, M Henzl IET Conference Proceedings, 2013 | | 2013 |
Threats in Networks using Agent and Biometric Systems D Martin, H Petr, Z František sr, Z František jr, M Barabas, L Antal International Journal of Bio-Science and Bio-Technology 5 (3), 119-134, 2013 | | 2013 |
Bezpečnostná analýza sieťového toku pomocou behaviorálnych signatúr M Barabas | | |
SYSTÉM PRO ROZPOZNÁVÁNÍ APT ÚTOKŮ PBO HUJŇÁK, M BARABAS | | |
Session 7: Information security A Almutairi, D Parish, M Kacic, D Ovsonka, P Hanacek, M Barabas, ... | | |