default search action
BibTeX records: Dusan Kolár
@article{DBLP:journals/iotj/UhricekHCK23, author = {Daniel Uhr{\'{\i}}cek and Karel Hynek and Tom{\'{a}}s Cejka and Dusan Kol{\'{a}}r}, title = {{BOTA:} Explainable IoT Malware Detection in Large Networks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {10}, pages = {8416--8431}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3228816}, doi = {10.1109/JIOT.2022.3228816}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/UhricekHCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RegeciovaK23, author = {Dominika Reg{\'{e}}ciov{\'{a}} and Dusan Kol{\'{a}}r}, editor = {Jia Hu and Geyong Min and Guojun Wang and Nektarios Georgalas}, title = {GenRex: Leveraging Regular Expressions for Dynamic Malware Detection}, booktitle = {22nd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023}, pages = {857--864}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00123}, doi = {10.1109/TRUSTCOM60117.2023.00123}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RegeciovaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RegeciovaKM21, author = {Dominika Reg{\'{e}}ciov{\'{a}} and Dusan Kol{\'{a}}r and Marek Milkovic}, title = {Pattern Matching in {YARA:} Improved Aho-Corasick Algorithm}, journal = {{IEEE} Access}, volume = {9}, pages = {62857--62866}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3074801}, doi = {10.1109/ACCESS.2021.3074801}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RegeciovaKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HranickyZRKM20, author = {Radek Hranick{\'{y}} and Luk{\'{a}}s Zobal and Ondrej Rysav{\'{y}} and Dusan Kol{\'{a}}r and D{\'{a}}vid Mikus}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Distributed {PCFG} Password Cracking}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {701--719}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_34}, doi = {10.1007/978-3-030-58951-6\_34}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HranickyZRKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/ZobalKK20, author = {Luk{\'{a}}s Zobal and Dusan Kol{\'{a}}r and Jakub Kroustek}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Exploring Current E-mail Cyber Threats using Authenticated {SMTP} Honeypot}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {253--262}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009591002530262}, doi = {10.5220/0009591002530262}, timestamp = {Wed, 29 Jul 2020 16:57:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/ZobalKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HranickyZRK19, author = {Radek Hranick{\'{y}} and Luk{\'{a}}s Zobal and Ondrej Rysav{\'{y}} and Dusan Kol{\'{a}}r}, title = {Distributed password cracking with {BOINC} and hashcat}, journal = {Digit. Investig.}, volume = {30}, pages = {161--172}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.08.001}, doi = {10.1016/J.DIIN.2019.08.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HranickyZRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icumt/ZobalKF19, author = {Luk{\'{a}}s Zobal and Dusan Kol{\'{a}}r and Radek Fujdiak}, title = {Current State of Honeypots and Deception Strategies in Cybersecurity}, booktitle = {11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, {ICUMT} 2019, Dublin, Ireland, October 28-30, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICUMT48472.2019.8970921}, doi = {10.1109/ICUMT48472.2019.8970921}, timestamp = {Wed, 05 Feb 2020 13:06:42 +0100}, biburl = {https://dblp.org/rec/conf/icumt/ZobalKF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/KroustekPK14, author = {Jakub Kroustek and Fridol{\'{\i}}n Pokorn{\'{y}} and Dusan Kol{\'{a}}r}, title = {A new approach to instruction-idioms detection in a retargetable decompiler}, journal = {Comput. Sci. Inf. Syst.}, volume = {11}, number = {4}, pages = {1337--1359}, year = {2014}, url = {https://doi.org/10.2298/CSIS131203076K}, doi = {10.2298/CSIS131203076K}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/KroustekPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/actaip/KroustekK13, author = {Jakub Kroustek and Dusan Kol{\'{a}}r}, title = {Approaching Retargetable Static, Dynamic, and Hybrid Executable-Code Analysis}, journal = {Acta Informatica Pragensia}, volume = {2}, number = {1}, pages = {18--29}, year = {2013}, url = {https://doi.org/10.18267/j.aip.10}, doi = {10.18267/J.AIP.10}, timestamp = {Wed, 15 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/actaip/KroustekK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/KroustekK13, author = {Jakub Kroustek and Dusan Kol{\'{a}}r}, title = {Context parsing (not only) of the object-file-format description language}, journal = {Comput. Sci. Inf. Syst.}, volume = {10}, number = {4}, pages = {1673--1701}, year = {2013}, url = {https://doi.org/10.2298/CSIS130120071K}, doi = {10.2298/CSIS130120071K}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/KroustekK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/Kolar12, author = {Dusan Kol{\'{a}}r}, title = {\emph{Drawing Programs: The Theory and Practice of Schematic Functional Programming}, by Tom Addis and Jan Addis Springer, 2010, {ISBN} 978-1-84882-617-5, 379pp}, journal = {J. Funct. Program.}, volume = {22}, number = {2}, pages = {219--221}, year = {2012}, url = {https://doi.org/10.1017/S095679681200010X}, doi = {10.1017/S095679681200010X}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/Kolar12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kybernetika/DurfinaK12, author = {Luk{\'{a}}s Durfina and Dusan Kol{\'{a}}r}, title = {C source code obfuscator}, journal = {Kybernetika}, volume = {48}, number = {3}, pages = {494--501}, year = {2012}, url = {http://www.kybernetika.cz/content/2012/3/494}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kybernetika/DurfinaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ddecs/PrikrylKHK11, author = {Zdenek Prikryl and Jakub Kroustek and Tomas Hruska and Dusan Kol{\'{a}}r}, editor = {Rolf Kraemer and Adam Pawlak and Andreas Steininger and Mario Sch{\"{o}}lzel and Jaan Raik and Heinrich Theodor Vierhaus}, title = {Fast just-in-time translated simulator for {ASIP} design}, booktitle = {14th {IEEE} International Symposium on Design and Diagnostics of Electronic Circuits {\&} Systems, {DDECS} 2011, Cottbus, Germany, April 13-15, 2011}, pages = {279--282}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/DDECS.2011.5783094}, doi = {10.1109/DDECS.2011.5783094}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ddecs/PrikrylKHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocast/KolarK11, author = {Dusan Kol{\'{a}}r and S{\'{a}}rka Kvetonov{\'{a}}}, editor = {Roberto Moreno{-}D{\'{\i}}az and Franz Pichler and Alexis Quesada{-}Arencibia}, title = {People Transfer in City Transport Modeled via {CPN}}, booktitle = {Computer Aided Systems Theory - {EUROCAST} 2011 - 13th International Conference, Las Palmas de Gran Canaria, Spain, February 6-11, 2011, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6927}, pages = {192--199}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27549-4\_25}, doi = {10.1007/978-3-642-27549-4\_25}, timestamp = {Wed, 07 Dec 2022 23:13:53 +0100}, biburl = {https://dblp.org/rec/conf/eurocast/KolarK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/DurfinaKZKHMM11, author = {Luk{\'{a}}s Durfina and Jakub Kroustek and Petr Zemek and Dusan Kol{\'{a}}r and Tom{\'{a}}s Hruska and Karel Masar{\'{\i}}k and Alexander Meduna}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Rosslin John Robles and Maricel O. Balitanas}, title = {Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis}, booktitle = {Information Security and Assurance - International Conference, {ISA} 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {200}, pages = {72--86}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23141-4\_8}, doi = {10.1007/978-3-642-23141-4\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/DurfinaKZKHMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcaet/KvetonovaK10, author = {S{\'{a}}rka Kvetonov{\'{a}} and Dusan Kol{\'{a}}r}, title = {Project plan formalisation and modelling via timed coloured Petri nets}, journal = {Int. J. Comput. Aided Eng. Technol.}, volume = {2}, number = {4}, pages = {388--399}, year = {2010}, url = {https://doi.org/10.1504/IJCAET.2010.035393}, doi = {10.1504/IJCAET.2010.035393}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcaet/KvetonovaK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memics/PrikrylKHK10, author = {Zdenek Prikryl and Jakub Kroustek and Tomas Hruska and Dusan Kol{\'{a}}r}, editor = {Ludek Matyska and Michal Kozubek and Tom{\'{a}}s Vojnar and Pavel Zemc{\'{\i}}k and David Antos}, title = {Fast Translated Simulation of ASIPs}, booktitle = {Sixth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, {MEMICS} 2010, Selected Papers, October 22-24, 2010, Mikulov, Czech Republic}, series = {OASIcs}, volume = {16}, pages = {93--100}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany}, year = {2010}, url = {https://doi.org/10.4230/OASIcs.MEMICS.2010.93}, doi = {10.4230/OASICS.MEMICS.2010.93}, timestamp = {Fri, 04 Mar 2022 09:26:56 +0100}, biburl = {https://dblp.org/rec/conf/memics/PrikrylKHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memics/JirakK09, author = {Ota Jir{\'{a}}k and Dusan Kol{\'{a}}r}, editor = {Petr Hlinen{\'{y}} and V{\'{a}}clav Maty{\'{a}}s and Tom{\'{a}}s Vojnar}, title = {Derivation in Scattered Context Grammar via Lazy Function Evaluation}, booktitle = {Annual Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, {MEMICS} 2009, November 13-15, 2009, Prestige Hotel, Znojmo, Czech Republic}, series = {OASIcs}, volume = {13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/2351}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/memics/JirakK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bliss/SekaninaHVKC07, author = {Luk{\'{a}}s Sekanina and Tomas Hruska and Tom{\'{a}}s Vojnar and Dusan Kol{\'{a}}r and Jan Cernock{\'{y}}}, editor = {Adrian Stoica and Tughrul Arslan and Daniel Howard and Tai{-}Hoon Kim and Ahmed O. El{-}Rayis}, title = {On Some Directions in Security-Oriented Research}, booktitle = {2007 {ECSIS} Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, {BLISS} 2007, Edinburgh, United Kingdom, 9-10 August 2007}, pages = {141--144}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/BLISS.2007.17}, doi = {10.1109/BLISS.2007.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bliss/SekaninaHVKC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/isim/2007wfm, editor = {Alica Kelemenov{\'{a}} and Dusan Kol{\'{a}}r and Alexander Meduna}, title = {Proceedings of the 2nd International Workshop on Formal Models WFM'07, Hradec nad Moravic{\'{\i}}, Czech Republic, April 23-25, 2007}, series = {{CEUR} Workshop Proceedings}, volume = {255}, publisher = {CEUR-WS.org}, year = {2007}, url = {https://ceur-ws.org/Vol-255}, urn = {urn:nbn:de:0074-255-1}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isim/2007wfm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/KolarC04, author = {Dusan Kol{\'{a}}r and Stanislav Cerny}, title = {Evolution of Software for Embedded Systems in Processor Expert}, booktitle = {11th {IEEE} International Conference on the Engineering of Computer-Based Systems {(ECBS} 2004), 24-27 May 2004, Brno, Czech Republic}, pages = {419--422}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ECBS.2004.1316726}, doi = {10.1109/ECBS.2004.1316726}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/KolarC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/MedunaK03, author = {Alexander Meduna and Dusan Kol{\'{a}}r}, editor = {Carlos Mart{\'{\i}}n{-}Vide and Victor Mitrana}, title = {Descriptional Complexity of Multi-Parallel Grammars with Respect to the Number of Nonterminals}, booktitle = {Grammars and Automata for String Processing: From Mathematics and Computer Science to Biology, and Back: Essays in Honour of Gheorghe Paun}, series = {Topics in Computer Mathematics}, volume = {9}, pages = {91--98}, publisher = {Taylor and Francis}, year = {2003}, timestamp = {Mon, 19 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/MedunaK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MedunaK02, author = {Alexander Meduna and Dusan Kol{\'{a}}r}, title = {Homogeneous grammars with a reduced number of non-context-free productions}, journal = {Inf. Process. Lett.}, volume = {81}, number = {5}, pages = {253--257}, year = {2002}, url = {https://doi.org/10.1016/S0020-0190(01)00224-1}, doi = {10.1016/S0020-0190(01)00224-1}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/MedunaK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/actaC/MedunaK00, author = {Alexander Meduna and Dusan Kol{\'{a}}r}, title = {Regulated Pushdown Automata}, journal = {Acta Cybern.}, volume = {14}, number = {4}, pages = {653--664}, year = {2000}, url = {https://cyber.bibl.u-szeged.hu/index.php/actcybern/article/view/3557}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/actaC/MedunaK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.