Rehak Martin
Rehak Martin
Resistant AI
Dirección de correo verificada de
Citado por
Citado por
Detecting DGA malware using NetFlow
M Grill, I Nikolaev, V Valeros, M Rehak
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
Multiple instance learning for malware classification
J Stiborek, T Pevný, M Rehák
Expert Systems with Applications 93, 346-357, 2018
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing
M Grill, T Pevný, M Rehak
Journal of Computer and System Sciences 83 (1), 43-57, 2017
Adaptive multiagent system for network traffic monitoring
M Rehák, M Pechoucek, M Grill, J Stiborek, K Bartos, P Celeda
IEEE Intelligent Systems 24 (3), 16-25, 2009
Detection of malicious network connections
J Kohout, J Jusko, T Pevny, M Rehak
US Patent 9,344,441, 2016
Trust modeling with context representation and generalized identities
M Rehák, M Pěchouček
International Workshop on Cooperative Information Agents, 298-312, 2007
A-globe: Agent Development Platform with Inaccessibility and Mobility Support
D Šišlák, M Rehák, M Pěchouček, M Rollo, D Pavlíček
Software agent-based applications, platforms and development kits, 21-46, 2005
Representing context for multiagent trust modeling
M Rehak, M Gregor, M Pechoucek, JM Bradshaw
2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology …, 2006
Agent-based approach to mass-oriented production planning: Case study
M Pechoucek, M Rehák, P Charvat, T Vlcek, M Kolar
IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2007
Runtime monitoring and dynamic reconfiguration for intrusion detection systems
M Rehák, E Staab, V Fusenig, M Pěchouček, M Grill, J Stiborek, K Bartoš, ...
Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009
Trust model for open ubiquitous agent systems
M Rehák, L Foltyn, M Pechoucek, P Benda
IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 536-542, 2005
Detection of malicious domains using recurring patterns in domain names
M Sofka, M Rehák
US Patent 10,178,107, 2019
Leveraging endpoint and network environment inferences for malware traffic classification
BH Anderson, M Rehak, D McGrew, M Vejman, T Pevny, M Grill, J Kohout
US Patent 10,855,698, 2020
Malware detection using http user-agent discrepancy identification
M Grill, M Rehák
2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014
Identifying and modeling botnet C&C behaviors
S García, V Uhlíř, M Rehak
Proceedings of the 1st International Workshop on Agents and CyberSecurity, 1-8, 2014
Probabilistic analysis of dynamic malware traces
J Stiborek, T Pevný, M Rehák
Computers & Security 74, 221-239, 2018
Negotiation-based approach to unmanned aerial vehicles
D Sislak, M Rehak, M Pechoucek, D Pavlicek, M Uller
IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence …, 2006
Optimizing flow sampling for network anomaly detection
K Bartos, M Rehak, V Krmicek
2011 7th international wireless communications and mobile computing …, 2011
CAMNEP: An intrusion detection system for high-speed networks
M Rehak, M Pěchouček, K Bartoš, M Grill, P Čeleda, V Krmíček
Progress in informatics, 2008
Global clustering of incidents based on malware similarity and online trustfulness
K Bartos, M Rehak, M Sofka
US Patent 9,432,393, 2016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20