Search

Your search keyword '"Tomas Jirsik"' showing total 20 results

Search Constraints

Start Over You searched for: Author "Tomas Jirsik" Remove constraint Author: "Tomas Jirsik"
20 results on '"Tomas Jirsik"'

Search Results

1. Host Behavior in Computer Network: One-Year Study

2. Cyber Situation Awareness via IP Flow Monitoring

3. SoK: Contemporary Issues and Challenges to Enable Cyber Situational Awareness for Network Security

4. On the Impact of Flow Monitoring Configuration

5. Behavior-Aware Network Segmentation using IP Flows

6. Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets

7. Passive os fingerprinting methods in the jungle of wireless networks

8. Toward Real-time Network-wide Cyber Situational Awareness

9. Stream4Flow: Real-time IP Flow Host Monitoring using Apache Spark

10. Toward Stream-Based IP Flow Analysis

11. HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting

12. Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark

13. On Information Value of Top N Statistics

14. Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches

15. Cloud-based testbed for simulation of cyber attacks

16. Identifying Operating System Using Flow-Based Traffic Fingerprinting

17. Cloud-based Security Research Testbed: A DDoS Use Case

18. An Investigation Into Teredo and 6to4 Transition Mechanisms: Traffic Analysis

19. Enhancing Network Security: Host Trustworthiness Estimation

20. Network Traffic Characterisation Using Flow-Based Statistics

Catalog

Books, media, physical & digital resources