Follow
Martin Žádník
Title
Cited by
Cited by
Year
On evolutionary synthesis of linear transforms in FPGA
Z Vašíček, M Žádník, L Sekanina, J Tobola
Evolvable Systems: From Biology to Hardware: 8th International Conference …, 2008
272008
Flowmon probe
P Čeleda, M Kováčik, T Koníř, V Krmíček, P Špringl, M Žádník
Networking Studies, 67, 2006
272006
How to detect cryptocurrency miners? By traffic forensics!
V Veselý, M Žádník
Digital Investigation 31, 100884, 2019
242019
Nemea: Framework for stream-wise analysis of network traffic
V Bartos, M Zadnik, T Cejka
CESNET, ale, Tech. Rep, 2013
222013
Fast lookup for dynamic packet filtering in FPGA
L Kekely, M Žádník, J Kořenek
17th International Symposium on Design and Diagnostics of Electronic …, 2014
172014
Dataset of intrusion detection alerts from a sharing platform
M Husák, M Žádník, V Bartoš, P Sokol
Data in Brief 33, 106530, 2020
162020
NFA reduction for regular expressions matching using FPGA
V Košař, M Žádník, J Kořenek
2013 International Conference on Field-Programmable Technology (FPT), 338-341, 2013
162013
Detecting IP spoofing by modelling history of IP address entry points
M Kováčik, M Kajan, M Žádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2013
82013
Is spam visible in flow-level statistic
M Žádník, Z Michlovský
CESNET National Research and Education Network, Tech. Rep., CESNET 1, 2008
82008
Augmented ddos mitigation with reputation scores
T Jánský, T Čejka, M Žádník, V Bartoš
Proceedings of the 13th International Conference on Availability …, 2018
62018
Preserving Relations in Parallel Flow Data Processing
T Čejka, M Žádnik
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6 …, 2017
52017
Network monitoring based on ip data flows
M Žádník
Best Practice Document GN3-NA3-T4-CBPD131, 2010
52010
Evaluating bad hosts using adaptive blacklist filter
K Hynek, T Čejka, M Žádník, H Kubátová
2020 9th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2020
42020
Network anomaly detection: comparison and real-time issues
V Bartoš, M Žádník
Dependable Networks and Services: 6th IFIP WG 6.6 International Conference …, 2012
42012
Precise Timestamp Generation Module and its Applications in Flow Monitoring
MZT Martínek, M Žádník
Universities of the Czech Republic and the Czech Academy of Sciences 12, 2009
42009
Hardware-accelerated netflow probe
M Žádník, L Lhotka
Technical Report 32/2005, CESNET, Praha, Tech. Rep, 2005
42005
Building a feedback loop to capture evidence of network incidents
Z Rosa, T Čejka, M Žádník, V Pus
2016 12th International Conference on Network and Service Management (CNSM …, 2016
32016
Framework for comparison of network anomaly detection algorithms
V Bartoš, M Žádník
Technická zpráva FIT-TR-2012-02, Fakulta Informacnıch Technologiı, VUT v …, 2012
32012
COMBOv2-hardware accelerators for high-speed networking
J Novotný, M Žádník
COMBOv2—hardware accelerators for high-speed networking, 2008
32008
Detection of network flow timestamp reliability
M Žádnik, E Šabik, V Bartoš
Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014
22014
The system can't perform the operation now. Try again later.
Articles 1–20