Rise of the Metaverse’s Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses M Vondráček, I Baggili, P Casey, M Mekni Computers & Security 127, 102923, 2022 | 32 | 2022 |
Automated Man-in-the-Middle Attack Against Wi‑Fi Networks M Vondráček, J Pluskal, O Ryšavý Journal of Digital Forensics, Security and Law 13 (1), 9, 2018 | 14 | 2018 |
Automation of MitM attack on Wi-Fi networks M Vondráček, J Pluskal, O Ryšavý Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017 …, 2018 | 6 | 2018 |
Network Forensics in GSE Overlay Networks J Pluskal, M Vondráček, O Ryšavý Proceedings of the 6th Conference on the Engineering of Computer Based …, 2019 | 1 | 2019 |
Network Forensic Investigations of Tunneled Traffic: A Case Study J Pluskal, M Koutenský, M Vondráček, O Ryšavý Revue Roumaine des Sciences Techniques Serie Electrotechnique et Energetique …, 2019 | | 2019 |