Martin Drašar
Martin Drašar
Institute of Computer Science, Masaryk University
Verified email at - Homepage
Cited by
Cited by
A survey of methods for encrypted traffic classification and analysis
P Velan, M Čermák, P Čeleda, M Drašar
International Journal of Network Management 25 (5), 355-374, 2015
Embedded malware-an analysis of the chuck norris botnet
P Čeleda, R Krejčí, J Vykopal, M Drašar
2010 European Conference on Computer Network Defense, 3-10, 2010
Cloud-based testbed for simulation of cyber attacks
D Kouril, T Rebok, T Jirsik, J Cegan, M Drasar, M Vizváry, J Vykopal
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
Similarity as a central approach to flow‐based anomaly detection
M Drašar, M Vizváry, J Vykopal
International Journal of Network Management 24 (4), 318-336, 2014
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture
P Theron, A Kott, M Drašar, K Rzadca, B LeBlanc, M Pihelgas, L Mancini, ...
2018 International conference on military communications and information …, 2018
Towards provable network traffic measurement and analysis via semi-labeled trace datasets
M Cermak, T Jirsik, P Velan, J Komarkova, S Spacek, M Drasar, T Plesnik
2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018
Protocol-independent detection of dictionary attacks
M Drašar
Meeting of the European Network of Universities and Companies in Information …, 2013
Flow-based brute-force attack detection
J Vykopal, M Drašar, P Winter
Fraunhofer Verlag, 2013
Initial reference architecture of an intelligent autonomous agent for cyber defense
A Kott, LV Mancini, P Théron, M Drasar, E Dushku, H Günther, M Kont, ...
US Army Research Laboratory Army Research Laboratory United States, 2018
Autonomous intelligent cyber-defense agent (aica) reference architecture. release 2.0
A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ...
arXiv preprint arXiv:1803.10664, 2018
Session-level adversary intent-driven cyberattack simulator
M Drašar, S Moskal, S Yang, P Zat'ko
2020 IEEE/ACM 24th International Symposium on Distributed Simulation and …, 2020
Reference architecture of an autonomous agent for cyber defense of complex military systems
P Theron, A Kott, M Drašar, K Rzadca, B LeBlanc, M Pihelgas, L Mancini, ...
Adaptive Autonomous Secure Cyber Systems, 1-21, 2020
Flow-based monitoring of honeypots
M Husák, M Drašar
Security and Protection of Information 2013, 63-70, 2013
Behavioral detection of distributed dictionary attacks
M Drašar
Doctoral theses, dissertations, Masaryk University, Faculty of Informatics, Brno, 2015
Management and Security in the Age of Hyperconnectivity
R Badonnel, R Koch, A Pras, M Drašar, B Stiller
Springer International Publishing, 2016
An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0
A Kott, P Théron, LV Mancini, E Dushku, A Panico, M Drašar, B LeBlanc, ...
The Journal of Defense Modeling and Simulation 17 (1), 51-54, 2020
Network defence strategy evaluation: Simulation vs. live network
J Medková, M Husák, M Drašar
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
Enhancing network intrusion detection by correlation of modularly hashed sketches
M Drašar, T Jirsík, M Vizváry
IFIP International Conference on Autonomous Infrastructure, Management and …, 2014
Flow-based Brute-force Attack Detection
M Drašar, J Vykopal, P Winter
Fraunhofer Verlag, 2013
Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0
A Kott, L Mancini, P Théron, M Drašar, E Dushku, H Günther, M Kont, ...
The system can't perform the operation now. Try again later.
Articles 1–20