Jan Vykopal
Citée par
Citée par
KYPO Cyber Range: Design and Use Cases
J Vykopal, R Oslejsek, P Celeda, M Vizvary, D Tovarnak
Proceedings of the 12th International Conference on Software Technologies …, 2017
Network-based dictionary attack detection
J Vykopal, T Plesnik, P Minarik
2009 international conference on future networks, 23-27, 2009
Lessons learned from complex hands-on defence exercises in a cyber range
J Vykopal, M Vizváry, R Oslejsek, P Celeda, D Tovarnak
2017 IEEE Frontiers in Education Conference (FIE), 1-8, 2017
Netflow based system for NAT detection
V Krmicek, J Vykopal, R Krejci
Proceedings of the 5th international student workshop on Emerging networking …, 2009
Future of ddos attacks mitigation in software defined networks
M Vizváry, J Vykopal
IFIP International Conference on Autonomous Infrastructure, Management and …, 2014
Cloud-based testbed for simulation of cyber attacks
D Kouril, T Rebok, T Jirsík, J Cegan, M Drasar, M Vizváry, J Vykopal
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
Kypo–a platform for cyber defence exercises
P Čeleda, J Čegan, J Vykopal, D Tovarňák
M&S Support to Operational Tasks Including War Gaming, Logistics, Cyber …, 2015
Embedded malware-an analysis of the Chuck Norris botnet
P Celeda, R Krejcí, J Vykopal, M Drasar
2010 European Conference on Computer Network Defense, 3-10, 2010
Enhancing cybersecurity skills by creating serious games
V Švábenský, J Vykopal, M Cermak, M Laštovička
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology …, 2018
A flow-level taxonomy and prevalence of brute force attacks
J Vykopal
International Conference on Advances in Computing and Communications, 666-675, 2011
On the design of security games: From frustrating to engaging learning
J Vykopal, M Barták
2016 {USENIX} Workshop on Advances in Security Education ({ASE} 16), 2016
Improving host profiling with bidirectional flows
P Minarik, J Vykopal, V Krmicek
2009 International Conference on Computational Science and Engineering 3 …, 2009
Security monitoring of http traffic using extended flows
M Husák, P Velan, J Vykopal
2015 10th International Conference on Availability, Reliability and Security …, 2015
Similarity as a central approach to flow‐based anomaly detection
M Drašar, M Vizváry, J Vykopal
International Journal of Network Management 24 (4), 318-336, 2014
Flow-based brute-force attack detection in large and high-speed networks
J Vykopal
Dissertations, Masaryk University, 2013
Flow-based detection of RDP brute-force attacks
M Vizváry, J Vykopal
Proceedings of 7th International Conference on Security and Protection of …, 2013
Timely feedback in unstructured cybersecurity exercises
J Vykopal, R Ošlejšek, K Burská, K Zákopčanová
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
Exchanging security events: Which and how many alerts can we aggregate?
M Husák, M Čermák, M Laštovička, J Vykopal
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
Detection of dns traffic anomalies in large networks
M Čermák, P Čeleda, J Vykopal
Meeting of the European Network of Universities and Companies in Information …, 2014
Validation of the Network-based Dictionary Attack Detection
J Vykopal, T Plesník, P Minařík
Security and Protection of Information, Proceeding of the Conference, 2009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20