Detecting DGA malware using NetFlow M Grill, I Nikolaev, V Valeros, M Rehak 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 92 | 2015 |
Multiple instance learning for malware classification J Stiborek, T Pevný, M Rehák Expert Systems with Applications 93, 346-357, 2018 | 86 | 2018 |
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing M Grill, T Pevný, M Rehak Journal of Computer and System Sciences 83 (1), 43-57, 2017 | 84 | 2017 |
Adaptive multiagent system for network traffic monitoring M Rehák, M Pechoucek, M Grill, J Stiborek, K Bartos, P Celeda IEEE Intelligent Systems 24 (3), 16-25, 2009 | 81 | 2009 |
A-globe: Agent Development Platform with Inaccessibility and Mobility Support D Šišlák, M Rehák, M Pěchouček, M Rollo, D Pavlíček Software agent-based applications, platforms and development kits, 21-46, 2005 | 69 | 2005 |
Trust modeling with context representation and generalized identities M Rehák, M Pěchouček International Workshop on Cooperative Information Agents, 298-312, 2007 | 67 | 2007 |
Detection of malicious network connections J Kohout, J Jusko, T Pevny, M Rehak US Patent 9,344,441, 2016 | 63 | 2016 |
Representing context for multiagent trust modeling M Rehak, M Gregor, M Pechoucek, JM Bradshaw 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology …, 2006 | 46 | 2006 |
Agent-based approach to mass-oriented production planning: Case study M Pechoucek, M Rehák, P Charvat, T Vlcek, M Kolar IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007 | 44 | 2007 |
Runtime monitoring and dynamic reconfiguration for intrusion detection systems M Rehák, E Staab, V Fusenig, M Pěchouček, M Grill, J Stiborek, K Bartoš, ... Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009 | 42 | 2009 |
Trust model for open ubiquitous agent systems M Rehák, L Foltyn, M Pechoucek, P Benda IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 536-542, 2005 | 38 | 2005 |
Leveraging endpoint and network environment inferences for malware traffic classification BH Anderson, M Rehak, D McGrew, M Vejman, T Pevny, M Grill, J Kohout US Patent 10,855,698, 2020 | 37 | 2020 |
Detection of malicious domains using recurring patterns in domain names M Sofka, M Rehák US Patent 10,178,107, 2019 | 37 | 2019 |
Malware detection using http user-agent discrepancy identification M Grill, M Rehák 2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014 | 36 | 2014 |
Identifying and modeling botnet C&C behaviors S García, V Uhlíř, M Rehak Proceedings of the 1st International Workshop on Agents and CyberSecurity, 1-8, 2014 | 34 | 2014 |
Probabilistic analysis of dynamic malware traces J Stiborek, T Pevný, M Rehák Computers & Security 74, 221-239, 2018 | 32 | 2018 |
Negotiation-based approach to unmanned aerial vehicles D Sislak, M Rehak, M Pechoucek, D Pavlicek, M Uller IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence …, 2006 | 31 | 2006 |
Optimizing flow sampling for network anomaly detection K Bartos, M Rehak, V Krmicek 2011 7th international wireless communications and mobile computing …, 2011 | 28 | 2011 |
CAMNEP: An intrusion detection system for high-speed networks M Rehak, M Pěchouček, K Bartoš, M Grill, P Čeleda, V Krmíček Progress in informatics, 2008 | 28 | 2008 |
Global clustering of incidents based on malware similarity and online trustfulness K Bartos, M Rehak, M Sofka US Patent 9,432,393, 2016 | 25 | 2016 |