Seguir
Karel Durkota
Karel Durkota
Neuron Soundware
Dirección de correo verificada de neuronsw.com - Página principal
Título
Citado por
Citado por
Año
Optimal Network Security Hardening Using Attack Graph Games
K Durkota, V Lisy, B Bosansky, C Kiekintveld
Proceedings of the Twenty-Fourth International Joint Conference on …, 2015
1342015
Implementation of a discrete firefly algorithm for the QAP problem within the sage framework
K Durkota
BSc thesis, Czech Technical University, 2011
762011
Approximate solutions for attack graph games with imperfect information
K Durkota, V Lisý, B Bošanský, C Kiekintveld
Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015
562015
Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games
J Čermák, B Bošanský, K Durkota, V Lisý, C Kiekintveld
AAAI Conference on Artificial Intelligence (AAAI-16), http://www.aaai.org, 2016
542016
Case Studies of Network Defense with Attack Graph Games
K Durkota, V Lisý, C Kiekintveld, B Bošanský, M Pěchouček
IEEE Intelligent Systems 31 (5), 24-30, 2016
452016
Computing Optimal Policies for Attack Graphs with Action Failures and Costs
K Durkota, V Lisy
STAIRS 264, 101 - 110, 2014
432014
Hardening Networks Against Strategic Attackers Using Attack Graph Games
K Durkota, V Lisý, B Bošanský, C Kiekintveld, M Pěchouček
Computers & Security, 2019
332019
Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs
K Durkota, V Lisý, C Kiekintveld, B Bošanský
International Foundation for Autonomous Agents and Multiagent Systems, 1773 …, 2015
312015
Optimal strategies for detecting data exfiltration by internal and external attackers
K Durkota, V Lisý, C Kiekintveld, K Horák, B Bošanský, T Pevný
Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017
182017
Multiagent Planning Supported by Plan Diversity Metrics and Landmark Actions.
J Tozicka, J Jakubuv, K Durkota, A Komenda, M Pechoucek
ICAART (1), 178-189, 2014
152014
Deterministic multiagent planning techniques: experimental comparison (short paper)
K Durkota, A Komenda
Proceedings of DMAP workshop of ICAPS 13, 43-47, 2013
122013
Neuron-net: Siamese network for anomaly detection
K Durkota, M Linda, M Ludvik, J Tozicka
DCASE2020 Challenge, Tech. Rep, 2020
52020
Unsupervised anomalous sound detection by Siamese network and auto-encoder
J Tozicka, D Karel, L Michal
DCASE2021 Challenge, 2021
32021
Multiagent planning by iterative negotiation over distributed planning graphs
J Tozicka, J Jakubuv, K Durkota, A Komenda
Proceedings of the Workshop on Distributed and Mutiltiagent Planning (ICAPS …, 2014
32014
Dadaed-double anomaly detector with aediff
J Tozicka, B Marek, D Karel, L Michal
Tech. Rep., DCASE2022 Challenge, 2022
22022
Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection
O Petrova, K Durkota, G Alperovich, K Horak, M Najman, B Bosansky, ...
arXiv preprint arXiv:2004.10638, 2020
12020
Extensibility Based Multiagent Planner with Plan Diversity Metrics
J Tožička, J Jakubův, K Durkota, A Komenda
Transactions on Computational Collective Intelligence XX, 117-139, 2015
12015
Laboratory Exercises Using the Haystack VSRT Interferometer To Teach the Basics of Aperture Synthesis
JM Marr, A Pere, K Durkota, AEE Rogers, V Fish, MB Arndt
arXiv preprint arXiv:1109.3816, 2011
12011
Demonstrating the principles of aperture synthesis with the very small radio telescope
JM Marr, K Durkota, FP Wilkin, A Pere, AEE Rogers, VL Fish, G Holodak, ...
12011
Demonstrating the Principles of Aperture Synthesis with Table-Top Laboratory Exercises
JM Marr, AEE Rogers, VL Fish, FP Wilkin, MB Arndt, G Holodak, ...
EPJ Web of Conferences 200, 02004, 2019
2019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20