default search action
Martin Zádník
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]Martin Husák, Pavol Sokol, Martin Zádník, Václav Bartos, Martin Horák:
Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform. DTRAP 4(4): 48:1-48:11 (2023) - [j5]Martin Zádník, Elena Carasec:
AI infers DoS mitigation rules. J. Intell. Inf. Syst. 60(2): 305-324 (2023) - 2022
- [j4]Martin Zádník, Jan Wrona, Karel Hynek, Tomás Cejka, Martin Husák:
Discovering Coordinated Groups of IP Addresses Through Temporal Correlation of Alerts. IEEE Access 10: 82799-82813 (2022) - [c28]Marek Pawlicki, Martin Zádník, Rafal Kozik, Michal Choras:
Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques. ICAISC (1) 2022: 82-92 - [c27]Martin Zádník:
Towards Inference of DDoS Mitigation Rules. NOMS 2022: 1-5 - [i3]Lasse Nitz, Martin Zádník, Mehdi Akbari Gurabi, Mischa Obrecht, Avikarsha Mandal:
From Collaboration to Automation: A Proof of Concept for Improved Incident Response. ERCIM News 2022(129): 0 (2022) - 2021
- [c26]Vasileios Mavroeidis, Pavel Eis, Martin Zádník, Marco Caselli, Bret Jordan:
On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence. IEEE BigData 2021: 2104-2108 - [i2]Vasileios Mavroeidis, Pavel Eis, Martin Zádník, Marco Caselli, Bret Jordan:
On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence. CoRR abs/2110.10540 (2021) - 2020
- [c25]Karel Hynek, Tomás Cejka, Martin Zádník, Hana Kubátová:
Evaluating Bad Hosts Using Adaptive Blacklist Filter. MECO 2020: 1-5
2010 – 2019
- 2019
- [j3]Vladimír Veselý, Martin Zádník:
How to detect cryptocurrency miners? By traffic forensics! Digit. Investig. 31 (2019) - [j2]Václav Bartos, Martin Zádník, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis:
Network entity characterization and attack prediction. Future Gener. Comput. Syst. 97: 674-686 (2019) - [c24]Jan Wrona, Martin Zádník:
Low Overhead Distributed IP Flow Records Collection and Analysis. IM 2019: 557-562 - [i1]Václav Bartos, Martin Zádník, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis:
Network entity characterization and attack prediction. CoRR abs/1909.07694 (2019) - 2018
- [c23]Tomás Jánský, Tomás Cejka, Martin Zádník, Václav Bartos:
Augmented DDoS Mitigation with Reputation Scores. ARES 2018: 54:1-54:7 - 2017
- [c22]Tomás Cejka, Martin Zádník:
Preserving Relations in Parallel Flow Data Processing. AIMS 2017: 153-156 - 2016
- [j1]David Grochol, Lukás Sekanina, Martin Zádník, Jan Korenek, Vlastimil Kosar:
Evolutionary circuit design for fast FPGA-based classification of network application protocols. Appl. Soft Comput. 38: 933-941 (2016) - [c21]Zdenek Rosa, Tomás Cejka, Martin Zádník, Viktor Pus:
Building a feedback loop to capture evidence of network incidents. CNSM 2016: 292-296 - 2015
- [c20]David Grochol, Lukás Sekanina, Martin Zádník, Jan Korenek:
A Fast FPGA-Based Classification of Application Protocols Optimized Using Cartesian GP. EvoApplications 2015: 67-78 - 2014
- [c19]Martin Zádník, Erik Sabik, Václav Bartos:
Detection of Network Flow Timestamp Reliability. AIMS 2014: 147-159 - [c18]Václav Bartos, Martin Zádník:
An analysis of correlations of intrusion alerts in an NREN. CAMAD 2014: 305-309 - [c17]Lukas Kekely, Martin Zádník, Jirí Matousek, Jan Korenek:
Fast lookup for dynamic packet filtering in FPGA. DDECS 2014: 219-222 - 2013
- [c16]Michal Kovácik, Michal Kajan, Martin Zádník:
Detecting IP Spoofing by Modelling History of IP Address Entry Points. AIMS 2013: 73-83 - [c15]Vlastimil Kosar, Martin Zádník, Jan Korenek:
NFA reduction for regular expressions matching using FPGA. FPT 2013: 338-341 - 2012
- [c14]Václav Bartos, Martin Zádník:
Network Anomaly Detection: Comparison and Real-Time Issues. AIMS 2012: 118-121 - [c13]Jan Korenek, Pavol Korcek, Vlastimil Kosar, Martin Zádník, Jan Viktorin:
A new embedded platform for rapid development of network applications. ANCS 2012: 81-82 - [c12]Pavol Korcek, Martin Zádník:
Lightweight benchmarking of platforms for network traffic processing. DDECS 2012: 278-283 - 2011
- [c11]Pavol Korcek, Vlastimil Kosar, Martin Zádník, Karel Koranda, Petr Kastovsky:
Hacking NetCOPE to Run on NetFPGA-10G. ANCS 2011: 217-218 - [c10]Václav Bartos, Martin Zádník:
Hardware Precomputation of Entropy for Anomaly Detection. ANCS 2011: 219-220 - [c9]Martin Zádník, Marco Canini:
Evaluation and design of cache replacement policies under flooding attacks. IWCMC 2011: 1292-1297 - [c8]Martin Zádník, Marco Canini:
Evolution of Cache Replacement Policies to Track Heavy-Hitter Flows. PAM 2011: 21-31 - 2010
- [c7]Martin Zádník, Marco Canini:
Evolution of cache replacement policies to track heavy-hitter flows. ANCS 2010: 31
2000 – 2009
- 2009
- [c6]Marco Canini, Wei Li, Martin Zádník, Andrew W. Moore:
Experience with high-speed automated application-identification for network-management. ANCS 2009: 209-218 - [c5]Martin Zádník, Marco Canini, Andrew W. Moore, David J. Miller, Wei Li:
Tracking elephant flows in internet backbone traffic with an FPGA-based cache. FPL 2009: 640-644 - 2008
- [c4]Martin Zádník, Jan Korenek, Petr Kobierský, Ondrej Lengál:
Network Probe for Flexible Flow Monitoring. DDECS 2008: 213-218 - [c3]Zdenek Vasícek, Martin Zádník, Lukás Sekanina, Jirí Tobola:
On Evolutionary Synthesis of Linear Transforms in FPGA. ICES 2008: 141-152 - 2007
- [c2]Pavel Zemcík, Martin Zádník:
AdaBoost Engine. FPL 2007: 656-660 - 2005
- [c1]Martin Zádník, Tomas Pecenka, Jan Korenek:
NetFlow Probe Intended for High-Speed Networks. FPL 2005: 695-698
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint