Performance evaluations of IPTables firewall solutions under DDoS attacks M Šimon, L Huraj, M Čerňanský Journal of Applied Mathematics, Statistics and Informatics 11 (2), 35-45, 2015 | 42 | 2015 |
Resistance of IoT sensors against DDoS attack in smart home environment L Huraj, M Šimon, T Horák Sensors 20 (18), 5298, 2020 | 39 | 2020 |
Preparing and managing the remote experiment in education T Kozík, M Šimon 2012 15th International Conference on Interactive Collaborative Learning …, 2012 | 34 | 2012 |
Heuristics for spreading alarm throughout a network M Šimon, L Huraj, I Dirgová Luptáková, J Pospíchal Applied Sciences 9 (16), 3269, 2019 | 33 | 2019 |
IoT measuring of UDP-based distributed reflective DoS attack L Huraj, M Simon, T Horák 2018 IEEE 16th international symposium on intelligent systems and …, 2018 | 22 | 2018 |
DDoS reflection attack based on IoT: A case study M Šimon, L Huraj, T Horák Cybernetics and Algorithms in Intelligent Systems: Proceedings of 7th …, 2019 | 18 | 2019 |
A study of DDoS reflection attack on Internet of Things in IPv4/IPv6 networks M Šimon, L Huraj Software Engineering Methods in Intelligent Algorithms: Proceedings of 8th …, 2019 | 17 | 2019 |
Combined heuristic attack strategy on complex networks M Šimon, I Dirgová Luptáková, L Huraj, M Hosťovecký, J Pospíchal Mathematical Problems in Engineering 2017 (1), 6108563, 2017 | 15 | 2017 |
Analysis of performance bottleneck of P2P grid applications M Šimon, L Huraj, V Siládi Journal of Applied Mathematics, Statistics and Informatics 9 (2), 5-11, 2013 | 14 | 2013 |
Virtuálna kolaborácia a e-learning T KOZÍK, G Bánesz, D Lukáčová, M Šebo, V Tomková, I Handlovská, ... Nitra: UKF, 2006 | 14 | 2006 |
How to burn a network or spread alarm M Simon, L Huraj, ID Luptáková, J Pospichal MENDEL 25 (2), 11-18, 2019 | 11 | 2019 |
Neural gas clustering adapted for given size of clusters I Dirgová Luptáková, M Šimon, L Huraj, J Pospíchal Mathematical Problems in Engineering 2016 (1), 9324793, 2016 | 11 | 2016 |
IPv6 network DDoS attack with P2P grid M Šimon, L Huraj, M Hosťovecký Creativity in Intelligent, Technologies and Data Science, 407-415, 2015 | 11 | 2015 |
Vulnerability of Smart IoT-Based automation and control devices to cyber attacks T Horák, M Šimon, L Huraj, R Budjač Applied Informatics and Cybernetics in Intelligent Systems: Proceedings of …, 2020 | 9 | 2020 |
Remotely controlled experiments T Kozík, M Simon, P Arras, M Olvecky, P Kuna Univerzita Konštantína filozofa v Nitre, Nitra, 2016 | 9 | 2016 |
A Comparative Analysis of High Availability for Linux Container Infrastructures M Šimon, L Huraj, N Búčik Future Internet 15 (8), 253, 2023 | 8 | 2023 |
Internet security of remote experiments T Kozik, S Marek, P Kuna, P Arras, G Tabuscik Elektronnaya Kazan-2015, 277-284, 2015 | 8 | 2015 |
Remote experiment at universities T Kozík, M Šimon, P Arras, P Kuna, G Tabunshchyk 2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015 | 7 | 2015 |
Remote experiment in terms of view of didactics of education T Kozík, M Šimon, P Kuna Dydaktyka informatyki, 200-211, 2014 | 6 | 2014 |
A mobile botnet model based on P2P grid M Šimon, L Huraj, M Hosťovecký Creativity in Intelligent Technologies and Data Science: Second Conference …, 2017 | 5 | 2017 |