Martin Drašar
Martin Drašar
Institute of Computer Science, Masaryk University
Verified email at - Homepage
Cited by
Cited by
A survey of methods for encrypted traffic classification and analysis
P Velan, M Čermák, P Čeleda, M Drašar
International Journal of Network Management 25 (5), 355-374, 2015
Embedded malware-an analysis of the chuck norris botnet
P Čeleda, R Krejčí, J Vykopal, M Drašar
2010 European Conference on Computer Network Defense, 3-10, 2010
Cloud-based testbed for simulation of cyber attacks
D Kouril, T Rebok, T Jirsik, J Cegan, M Drasar, M Vizváry, J Vykopal
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
Autonomous intelligent cyber-defense agent (AICA) reference architecture. Release 2.0
A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ...
arXiv preprint arXiv:1803.10664, 2018
Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecture
P Theron, A Kott, M Drašar, K Rzadca, B LeBlanc, M Pihelgas, L Mancini, ...
2018 International conference on military communications and information …, 2018
Session-level adversary intent-driven cyberattack simulator
M Drašar, S Moskal, S Yang, P Zat'ko
2020 IEEE/ACM 24th International Symposium on Distributed Simulation and …, 2020
Similarity as a central approach to flow‐based anomaly detection
M Drašar, M Vizváry, J Vykopal
International Journal of Network Management 24 (4), 318-336, 2014
Towards provable network traffic measurement and analysis via semi-labeled trace datasets
M Cermak, T Jirsik, P Velan, J Komarkova, S Spacek, M Drasar, T Plesnik
2018 Network Traffic Measurement and Analysis Conference (TMA), 1-8, 2018
Flow-based brute-force attack detection
M Drašar, J Vykopal, P Winter
Fraunhofer Verlag, 2013
Reference architecture of an autonomous agent for cyber defense of complex military systems
P Theron, A Kott, M Drašar, K Rzadca, B LeBlanc, M Pihelgas, L Mancini, ...
Adaptive autonomous secure cyber systems, 1-21, 2020
Protocol-independent detection of dictionary attacks
M Drašar
Advances in Communication Networking: 19th EUNICE/IFIP WG 6.6 International …, 2013
Initial reference architecture of an intelligent autonomous agent for cyber defense
A Kott, LV Mancini, P Théron, M Drašar, E Dushku, H Günther, M Kont, ...
US Army Research Laboratory, ARL-TR-8337, 2018
Autonomous intelligent cyber-defense agent (AICA) reference architecture
A Kott, P Théron, M Drašar, E Dushku, B LeBlanc, P Losiewicz, A Guarino, ...
Release 2, 20783-1138, 2019
Toward intelligent autonomous agents for cyber defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG
A Kott, R Thomas, M Drašar, M Kont, A Poylisher, B Blakely, P Theron, ...
arXiv preprint arXiv:1804.07646, 2018
Flow-based monitoring of honeypots
M Husák, M Drašar
7th International Conference on Security and Protection of Information (SPI …, 2013
An introductory preview of Autonomous Intelligent Cyber-defense Agent reference architecture, release 2.0
A Kott, P Théron, LV Mancini, E Dushku, A Panico, M Drašar, B LeBlanc, ...
The Journal of Defense Modeling and Simulation 17 (1), 51-54, 2020
Behavioral detection of distributed dictionary attacks
M Drašar
Doctoral theses, dissertations, Masaryk University, Faculty of Informatics, Brno, 2015
Management and Security in the Age of Hyperconnectivity
R Badonnel, R Koch, A Pras, M Drašar, B Stiller
Springer International Publishing, 2016
Network defence strategy evaluation: Simulation vs. live network
J Medková, M Husák, M Drašar
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
Enhancing network intrusion detection by correlation of modularly hashed sketches
M Drašar, T Jirsík, M Vizváry
Monitoring and Securing Virtualized Networks and Services: 8th IFIP WG 6.6 …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20