Follow
Jan Kohout
Jan Kohout
TruU, Inc.
Verified email at truu.ai
Title
Cited by
Cited by
Year
Illegitimate typosquatting detection with internet protocol information
M Grill, J Kohout, M Kopp, T Pevny
US Patent 10,491,614, 2019
2822019
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,344,441, 2016
702016
Analyzing encrypted traffic behavior using contextual traffic data
J Kohout, BH Anderson, M Grill, D McGrew, M Kopp, T Pevny
US Patent 10,805,338, 2020
432020
Leveraging endpoint and network environment inferences for malware traffic classification
BH Anderson, M Rehak, D McGrew, M Vejman, T Pevny, M Grill, J Kohout
US Patent 10,855,698, 2020
372020
Tracking users over network hosts based on user behavior
J Mrkos, M Grill, J Kohout
US Patent 10,129,271, 2018
372018
k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach
J Lokoč, J Kohout, P Čech, T Skopal, T Pevný
Pacific-Asia Workshop on Intelligence and Security Informatics, 131-145, 2016
372016
Learning communication patterns for malware discovery in HTTPs data
J Kohout, T Komárek, P Čech, J Bodnár, J Lokoč
Expert Systems with Applications 101, 129-142, 2018
332018
Network traffic fingerprinting based on approximated kernel two-sample test
J Kohout, T Pevný
IEEE Transactions on Information Forensics and Security 13 (3), 788-801, 2017
222017
Automatic discovery of web servers hosting similar applications
J Kohout, T Pevný
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
222015
Unsupervised detection of malware in persistent web traffic
J Kohout, T Pevný
2015 IEEE International Conference on Acoustics, Speech and Signal …, 2015
212015
Analyzing encrypted traffic behavior using contextual traffic data
J Kohout, BH Anderson, M Grill, D McGrew, M Kopp, T Pevny
US Patent App. 17/029,156, 2021
192021
Tracking users over network hosts based on user behavior
J Mrkos, M Grill, J KOHOUT
US Patent App. 10/129,271, 2018
19*2018
Identifying self-signed certificates using HTTP access logs for malware detection
M Kopp, M Grill, J Kohout
US Patent 10,375,097, 2019
172019
Using Behavioral Similarity for Botnet Command-and-Control Discovery
J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny
IEEE Intelligent Systems 31 (5), 16-22, 2016
132016
Statistical fingerprinting of network traffic
J Kohout, T Pevny
US Patent 10,425,434, 2019
122019
Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce
P Čech, J Kohout, J Lokoč, T Komárek, J Maroušek, T Pevný
International Conference on Similarity Search and Applications, 311-324, 2016
112016
Two-phase genetic algorithm for social network graphs clustering
J Kohout, R Neruda
2013 27th International Conference on Advanced Information Networking and …, 2013
112013
Ransomware detection using file replication logs
M Grill, L Bajer, M Kopp, J Kohout
US Patent 11,019,095, 2021
102021
Classification of IoT devices based on their network traffic
J Kohout, M Grill, M Kopp, L Bajer
US Patent 10,749,770, 2020
102020
Framework for joint learning of network traffic representations and traffic classifiers
J Kohout, T Pevny
US Patent 10,079,768, 2018
92018
The system can't perform the operation now. Try again later.
Articles 1–20