Követés
Martin ®ádník
Martin ®ádník
CESNET
E-mail megerősítve itt: cesnet.cz - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
On evolutionary synthesis of linear transforms in FPGA
Z Vaąíček, M ®ádník, L Sekanina, J Tobola
Evolvable Systems: From Biology to Hardware: 8th International Conference …, 2008
272008
Flowmon probe
P Čeleda, M Kováčik, T Koníř, V Krmíček, P ©pringl, M ®ádník
Networking Studies, 67, 2006
272006
How to detect cryptocurrency miners? By traffic forensics!
V Veselý, M ®ádník
Digital Investigation 31, 100884, 2019
242019
Nemea: Framework for stream-wise analysis of network traffic
V Bartos, M Zadnik, T Cejka
CESNET, ale, Tech. Rep, 2013
222013
Fast lookup for dynamic packet filtering in FPGA
L Kekely, M ®ádník, J Kořenek
17th International Symposium on Design and Diagnostics of Electronic …, 2014
172014
Dataset of intrusion detection alerts from a sharing platform
M Husák, M ®ádník, V Bartoą, P Sokol
Data in Brief 33, 106530, 2020
162020
NFA reduction for regular expressions matching using FPGA
V Koąař, M ®ádník, J Kořenek
2013 International Conference on Field-Programmable Technology (FPT), 338-341, 2013
162013
Detecting IP spoofing by modelling history of IP address entry points
M Kováčik, M Kajan, M ®ádník
IFIP International Conference on Autonomous Infrastructure, Management and …, 2013
82013
Is spam visible in flow-level statistic
M ®ádník, Z Michlovský
CESNET National Research and Education Network, Tech. Rep., CESNET 1, 2008
82008
Augmented ddos mitigation with reputation scores
T Jánský, T Čejka, M ®ádník, V Bartoą
Proceedings of the 13th International Conference on Availability …, 2018
62018
Preserving Relations in Parallel Flow Data Processing
T Čejka, M ®ádnik
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6 …, 2017
52017
Network monitoring based on ip data flows
M ®ádník
Best Practice Document GN3-NA3-T4-CBPD131, 2010
52010
Evaluating bad hosts using adaptive blacklist filter
K Hynek, T Čejka, M ®ádník, H Kubátová
2020 9th Mediterranean Conference on Embedded Computing (MECO), 1-5, 2020
42020
Network anomaly detection: comparison and real-time issues
V Bartoą, M ®ádník
Dependable Networks and Services: 6th IFIP WG 6.6 International Conference …, 2012
42012
Precise Timestamp Generation Module and its Applications in Flow Monitoring
MZT Martínek, M ®ádník
Universities of the Czech Republic and the Czech Academy of Sciences 12, 2009
42009
Hardware-accelerated netflow probe
M ®ádník, L Lhotka
Technical Report 32/2005, CESNET, Praha, Tech. Rep, 2005
42005
Building a feedback loop to capture evidence of network incidents
Z Rosa, T Čejka, M ®ádník, V Pus
2016 12th International Conference on Network and Service Management (CNSM …, 2016
32016
Framework for comparison of network anomaly detection algorithms
V Bartoą, M ®ádník
Technická zpráva FIT-TR-2012-02, Fakulta Informacnıch Technologiı, VUT v …, 2012
32012
COMBOv2-hardware accelerators for high-speed networking
J Novotný, M ®ádník
COMBOv2—hardware accelerators for high-speed networking, 2008
32008
Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform
M Husák, P Sokol, M ®ádník, V Bartoą, M Horák
Digital Threats: Research and Practice 4 (4), 1-11, 2023
22023
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20