Martin Husák
Martin Husák
Institute of Computer Science, Masaryk University
Verified email at - Homepage
Cited by
Cited by
Survey of attack projection, prediction, and forecasting in cyber security
M Husák, J Komárková, E Bou-Harb, P Čeleda
IEEE Communications Surveys & Tutorials 21 (1), 640-660, 2018
HTTPS Traffic Analysis and Client Identification Using Passive SSL/TLS Fingerprinting
M Husák, M Čermák, T Jirsík, P Čeleda
EURASIP Journal on Information Security, 2016
Honeypots and honeynets: issues of privacy
P Sokol, J Míšek, M Husák
EURASIP Journal on Information Security 2017 (1), 1-9, 2017
Network-based HTTPS client identification using SSL/TLS fingerprinting
M Husák, M Cermák, T Jirsík, P Celeda
2015 10th international conference on availability, reliability and security …, 2015
GDPR compliance in cybersecurity software: a case study of DPIA in information sharing platform
M Horák, V Stupka, M Husák
Proceedings of the 14th international conference on availability …, 2019
Security monitoring of http traffic using extended flows
M Husák, P Velan, J Vykopal
2015 10th International Conference on Availability, Reliability and Security …, 2015
A survey on intrusion detection and prevention systems
I Ghafir, M Husak, V Prenosil
Proceedings of student conference Zvule, IEEE/UREL. Brno University of …, 2014
Crusoe: Data model for cyber situational awareness
J Komárková, M Husák, M Laštovička, D Tovarňák
Proceedings of the 13th International Conference on Availability …, 2018
PhiGARo: Automatic phishing detection and incident response framework
M Husák, J Cegan
2014 ninth international conference on availability, reliability and …, 2014
Assessing internet-wide cyber situational awareness of critical sectors
M Husák, N Neshenko, MS Pour, E Bou-Harb, P Čeleda
Proceedings of the 13th International Conference on Availability …, 2018
Towards predicting cyber attacks using information exchange and data mining
M Husák, J Kašpar
2018 14th International Wireless Communications & Mobile Computing …, 2018
On the sequential pattern and rule mining in the analysis of cyber security alerts
M Husák, J Kašpar, E Bou-Harb, P Čeleda
Proceedings of the 12th International Conference on Availability …, 2017
Exchanging security events: Which and how many alerts can we aggregate?
M Husák, M Čermák, M Laštovička, J Vykopal
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
Predictive methods in cyber defense: Current experience and research challenges
M Husák, V Bartoš, P Sokol, A Gajdoš
Future Generation Computer Systems 115, 517-530, 2021
SoK: contemporary issues and challenges to enable cyber situational awareness for network security
M Husák, T Jirsík, SJ Yang
Proceedings of the 15th International Conference on Availability …, 2020
AIDA framework: real-time correlation and prediction of intrusion detection alerts
M Husák, J Kašpar
Proceedings of the 14th international conference on availability …, 2019
Cloud-based security research testbed: A DDoS use case
T Jirsı́k, M Husak, P Celeda, Z Eichler
2014 IEEE Network Operations and Management Symposium (NOMS), 1-2, 2014
Big data sanitization and cyber situational awareness: a network telescope perspective
E Bou-Harb, M Husák, M Debbabi, C Assi
IEEE transactions on big data 5 (4), 439-453, 2017
Predictive cyber situational awareness and personalized blacklisting: A sequential rule mining approach
M Husák, T Bajtoš, J Kašpar, E Bou-Harb, P Čeleda
ACM Transactions on Management Information Systems (TMIS) 11 (4), 1-16, 2020
Dataset of intrusion detection alerts from a sharing platform
M Husák, M Žádník, V Bartoš, P Sokol
Data in Brief 33, 106530, 2020
The system can't perform the operation now. Try again later.
Articles 1–20