BibTeX records: Jan Stiborek

download as .bib file

@article{DBLP:journals/compsec/StiborekPR18,
  author       = {Jan Stiborek and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Martin Reh{\'{a}}k},
  title        = {Probabilistic analysis of dynamic malware traces},
  journal      = {Comput. Secur.},
  volume       = {74},
  pages        = {221--239},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.01.012},
  doi          = {10.1016/J.COSE.2018.01.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StiborekPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/StiborekPR18,
  author       = {Jan Stiborek and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Martin Reh{\'{a}}k},
  title        = {Multiple instance learning for malware classification},
  journal      = {Expert Syst. Appl.},
  volume       = {93},
  pages        = {346--357},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.eswa.2017.10.036},
  doi          = {10.1016/J.ESWA.2017.10.036},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/StiborekPR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/StiborekPR17,
  author       = {Jan Stiborek and
                  Tom{\'{a}}s Pevn{\'{y}} and
                  Martin Reh{\'{a}}k},
  title        = {Multiple Instance Learning for Malware Classification},
  journal      = {CoRR},
  volume       = {abs/1705.02268},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.02268},
  eprinttype    = {arXiv},
  eprint       = {1705.02268},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/StiborekPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/JuskoRSKP16,
  author       = {Jan Jusko and
                  Martin Reh{\'{a}}k and
                  Jan Stiborek and
                  Jan Kohout and
                  Tom{\'{a}}s Pevn{\'{y}}},
  title        = {Using Behavioral Similarity for Botnet Command-and-Control Discovery},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {31},
  number       = {5},
  pages        = {16--22},
  year         = {2016},
  url          = {https://doi.org/10.1109/MIS.2016.88},
  doi          = {10.1109/MIS.2016.88},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/expert/JuskoRSKP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GarciaGSZ14,
  author       = {Sebasti{\'{a}}n Garc{\'{\i}}a and
                  Martin Grill and
                  Jan Stiborek and
                  Alejandro Zunino},
  title        = {An empirical comparison of botnet detection methods},
  journal      = {Comput. Secur.},
  volume       = {45},
  pages        = {100--123},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.05.011},
  doi          = {10.1016/J.COSE.2014.05.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GarciaGSZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcci/StiborekGRBJ14,
  author       = {Jan Stiborek and
                  Martin Grill and
                  Martin Reh{\'{a}}k and
                  Karel Bartos and
                  Jan Jusko},
  title        = {Game Theoretical Model for Adaptive Intrusion Detection System},
  journal      = {Trans. Comput. Collect. Intell.},
  volume       = {15},
  pages        = {133--163},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44750-5\_7},
  doi          = {10.1007/978-3-662-44750-5\_7},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcci/StiborekGRBJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/LisyPSBP12,
  author       = {Viliam Lis{\'{y}} and
                  Radek P{\'{\i}}bil and
                  Jan Stiborek and
                  Branislav Bosansk{\'{y}} and
                  Michal Pechoucek},
  editor       = {Luc De Raedt and
                  Christian Bessiere and
                  Didier Dubois and
                  Patrick Doherty and
                  Paolo Frasconi and
                  Fredrik Heintz and
                  Peter J. F. Lucas},
  title        = {Game-theoretic Approach to Adversarial Plan Recognition},
  booktitle    = {{ECAI} 2012 - 20th European Conference on Artificial Intelligence.
                  Including Prestigious Applications of Artificial Intelligence {(PAIS-2012)}
                  System Demonstrations Track, Montpellier, France, August 27-31 , 2012},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {242},
  pages        = {546--551},
  publisher    = {{IOS} Press},
  year         = {2012},
  url          = {https://doi.org/10.3233/978-1-61499-098-7-546},
  doi          = {10.3233/978-1-61499-098-7-546},
  timestamp    = {Mon, 19 Jun 2023 16:36:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ecai/LisyPSBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paams/StiborekGRBJ12,
  author       = {Jan Stiborek and
                  Martin Grill and
                  Martin Reh{\'{a}}k and
                  Karel Bartos and
                  Jan Jusko},
  editor       = {Yves Demazeau and
                  J{\"{o}}rg P. M{\"{u}}ller and
                  Juan M. Corchado Rodr{\'{\i}}guez and
                  Javier Bajo P{\'{e}}rez},
  title        = {Game Theoretical Adaptation Model for Intrusion Detection System},
  booktitle    = {Advances on Practical Applications of Agents and Multi-Agent Systems
                  - 10th International Conference on Practical Applications of Agents
                  and Multi-Agent Systems, {PAAMS} 2012, Salamanca, Spain, 28-30 March,
                  2012},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {155},
  pages        = {201--210},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28786-2\_22},
  doi          = {10.1007/978-3-642-28786-2\_22},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paams/StiborekGRBJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paams/StiborekGRBJ12a,
  author       = {Jan Stiborek and
                  Martin Grill and
                  Martin Reh{\'{a}}k and
                  Karel Bartos and
                  Jan Jusko},
  editor       = {Yves Demazeau and
                  J{\"{o}}rg P. M{\"{u}}ller and
                  Juan M. Corchado Rodr{\'{\i}}guez and
                  Javier Bajo P{\'{e}}rez},
  title        = {Game Theoretical Adaptation Model for Intrusion Detection System -
                  Demo Paper},
  booktitle    = {Advances on Practical Applications of Agents and Multi-Agent Systems
                  - 10th International Conference on Practical Applications of Agents
                  and Multi-Agent Systems, {PAAMS} 2012, Salamanca, Spain, 28-30 March,
                  2012},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {155},
  pages        = {291--294},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28786-2\_40},
  doi          = {10.1007/978-3-642-28786-2\_40},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paams/StiborekGRBJ12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/RehakPGSB11,
  author       = {Martin Reh{\'{a}}k and
                  Michal Pechoucek and
                  Martin Grill and
                  Jan Stiborek and
                  Karel Bartos},
  editor       = {Liz Sonenberg and
                  Peter Stone and
                  Kagan Tumer and
                  Pinar Yolum},
  title        = {Game theoretical adaptation model for intrusion detection system},
  booktitle    = {10th International Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3},
  pages        = {1123--1124},
  publisher    = {{IFAAMAS}},
  year         = {2011},
  url          = {http://portal.acm.org/citation.cfm?id=2034449\&\#38;CFID=69154334\&\#38;CFTOKEN=45298625},
  timestamp    = {Fri, 18 Nov 2011 09:09:28 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/RehakPGSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cics/RehakSG11,
  author       = {Martin Reh{\'{a}}k and
                  Jan Stiborek and
                  Martin Grill},
  title        = {Intelligence, not integration: Distributed regret minimization for
                  {IDS} Control},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence in Cyber Security,
                  {CICS} 2011, Paris, France, April 12-13, 2011},
  pages        = {217--224},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CICYBS.2011.5949406},
  doi          = {10.1109/CICYBS.2011.5949406},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cics/RehakSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/RehakGS11,
  author       = {Martin Reh{\'{a}}k and
                  Martin Grill and
                  Jan Stiborek},
  editor       = {Olivier Boissier and
                  Jeffrey Bradshaw and
                  Longbing Cao and
                  Klaus Fischer and
                  Mohand{-}Said Hacid},
  title        = {On the Value of Coordination in Distributed Self-Adaptation of Intrusion
                  Detection System},
  booktitle    = {Proceedings of the 2011 {IEEE/WIC/ACM} International Conference on
                  Intelligent Agent Technology, {IAT} 2011, Campus Scientifique de la
                  Doua, Lyon, France, August 22-27, 2011},
  pages        = {196--203},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WI-IAT.2011.172},
  doi          = {10.1109/WI-IAT.2011.172},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/RehakGS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/RehakPGSBC09,
  author       = {Martin Reh{\'{a}}k and
                  Michal Pechoucek and
                  Martin Grill and
                  Jan Stiborek and
                  Karel Bartos and
                  Pavel Celeda},
  title        = {Adaptive Multiagent System for Network Traffic Monitoring},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {24},
  number       = {3},
  pages        = {16--25},
  year         = {2009},
  url          = {https://doi.org/10.1109/MIS.2009.42},
  doi          = {10.1109/MIS.2009.42},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/expert/RehakPGSBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/RehakSPSGB09,
  author       = {Martin Reh{\'{a}}k and
                  Eugen Staab and
                  Michal Pechoucek and
                  Jan Stiborek and
                  Martin Grill and
                  Karel Bartos},
  editor       = {Carles Sierra and
                  Cristiano Castelfranchi and
                  Keith S. Decker and
                  Jaime Sim{\~{a}}o Sichman},
  title        = {Dynamic information source selection for intrusion detection systems},
  booktitle    = {8th International Joint Conference on Autonomous Agents and Multiagent
                  Systems {(AAMAS} 2009), Budapest, Hungary, May 10-15, 2009, Volume
                  2},
  pages        = {1009--1016},
  publisher    = {{IFAAMAS}},
  year         = {2009},
  url          = {https://dl.acm.org/citation.cfm?id=1558153},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/RehakSPSGB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icac/RehakSFSGBPE09,
  author       = {Martin Reh{\'{a}}k and
                  Eugen Staab and
                  Volker Fusenig and
                  Jan Stiborek and
                  Martin Grill and
                  Karel Bartos and
                  Michal Pechoucek and
                  Thomas Engel},
  editor       = {Simon A. Dobson and
                  John Strassner and
                  Manish Parashar and
                  Onn Shehory},
  title        = {Threat-model-driven runtime adaptation and evaluation of intrusion
                  detection system},
  booktitle    = {Proceedings of the 6th International Conference on Autonomic Computing,
                  {ICAC} 2009, June 15-19, 2009, Barcelona, Spain},
  pages        = {65--66},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1555228.1555248},
  doi          = {10.1145/1555228.1555248},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icac/RehakSFSGBPE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RehakSFPGSBE09,
  author       = {Martin Reh{\'{a}}k and
                  Eugen Staab and
                  Volker Fusenig and
                  Michal Pechoucek and
                  Martin Grill and
                  Jan Stiborek and
                  Karel Bartos and
                  Thomas Engel},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection
                  Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_4},
  doi          = {10.1007/978-3-642-04342-0\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RehakSFPGSBE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics