Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jan Stiborek
@article{DBLP:journals/compsec/StiborekPR18, author = {Jan Stiborek and Tom{\'{a}}s Pevn{\'{y}} and Martin Reh{\'{a}}k}, title = {Probabilistic analysis of dynamic malware traces}, journal = {Comput. Secur.}, volume = {74}, pages = {221--239}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.01.012}, doi = {10.1016/J.COSE.2018.01.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StiborekPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/StiborekPR18, author = {Jan Stiborek and Tom{\'{a}}s Pevn{\'{y}} and Martin Reh{\'{a}}k}, title = {Multiple instance learning for malware classification}, journal = {Expert Syst. Appl.}, volume = {93}, pages = {346--357}, year = {2018}, url = {https://doi.org/10.1016/j.eswa.2017.10.036}, doi = {10.1016/J.ESWA.2017.10.036}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/StiborekPR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/StiborekPR17, author = {Jan Stiborek and Tom{\'{a}}s Pevn{\'{y}} and Martin Reh{\'{a}}k}, title = {Multiple Instance Learning for Malware Classification}, journal = {CoRR}, volume = {abs/1705.02268}, year = {2017}, url = {http://arxiv.org/abs/1705.02268}, eprinttype = {arXiv}, eprint = {1705.02268}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/StiborekPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/JuskoRSKP16, author = {Jan Jusko and Martin Reh{\'{a}}k and Jan Stiborek and Jan Kohout and Tom{\'{a}}s Pevn{\'{y}}}, title = {Using Behavioral Similarity for Botnet Command-and-Control Discovery}, journal = {{IEEE} Intell. Syst.}, volume = {31}, number = {5}, pages = {16--22}, year = {2016}, url = {https://doi.org/10.1109/MIS.2016.88}, doi = {10.1109/MIS.2016.88}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/expert/JuskoRSKP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GarciaGSZ14, author = {Sebasti{\'{a}}n Garc{\'{\i}}a and Martin Grill and Jan Stiborek and Alejandro Zunino}, title = {An empirical comparison of botnet detection methods}, journal = {Comput. Secur.}, volume = {45}, pages = {100--123}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.05.011}, doi = {10.1016/J.COSE.2014.05.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GarciaGSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcci/StiborekGRBJ14, author = {Jan Stiborek and Martin Grill and Martin Reh{\'{a}}k and Karel Bartos and Jan Jusko}, title = {Game Theoretical Model for Adaptive Intrusion Detection System}, journal = {Trans. Comput. Collect. Intell.}, volume = {15}, pages = {133--163}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44750-5\_7}, doi = {10.1007/978-3-662-44750-5\_7}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcci/StiborekGRBJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/LisyPSBP12, author = {Viliam Lis{\'{y}} and Radek P{\'{\i}}bil and Jan Stiborek and Branislav Bosansk{\'{y}} and Michal Pechoucek}, editor = {Luc De Raedt and Christian Bessiere and Didier Dubois and Patrick Doherty and Paolo Frasconi and Fredrik Heintz and Peter J. F. Lucas}, title = {Game-theoretic Approach to Adversarial Plan Recognition}, booktitle = {{ECAI} 2012 - 20th European Conference on Artificial Intelligence. Including Prestigious Applications of Artificial Intelligence {(PAIS-2012)} System Demonstrations Track, Montpellier, France, August 27-31 , 2012}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {242}, pages = {546--551}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-61499-098-7-546}, doi = {10.3233/978-1-61499-098-7-546}, timestamp = {Mon, 19 Jun 2023 16:36:09 +0200}, biburl = {https://dblp.org/rec/conf/ecai/LisyPSBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paams/StiborekGRBJ12, author = {Jan Stiborek and Martin Grill and Martin Reh{\'{a}}k and Karel Bartos and Jan Jusko}, editor = {Yves Demazeau and J{\"{o}}rg P. M{\"{u}}ller and Juan M. Corchado Rodr{\'{\i}}guez and Javier Bajo P{\'{e}}rez}, title = {Game Theoretical Adaptation Model for Intrusion Detection System}, booktitle = {Advances on Practical Applications of Agents and Multi-Agent Systems - 10th International Conference on Practical Applications of Agents and Multi-Agent Systems, {PAAMS} 2012, Salamanca, Spain, 28-30 March, 2012}, series = {Advances in Intelligent and Soft Computing}, volume = {155}, pages = {201--210}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28786-2\_22}, doi = {10.1007/978-3-642-28786-2\_22}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paams/StiborekGRBJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paams/StiborekGRBJ12a, author = {Jan Stiborek and Martin Grill and Martin Reh{\'{a}}k and Karel Bartos and Jan Jusko}, editor = {Yves Demazeau and J{\"{o}}rg P. M{\"{u}}ller and Juan M. Corchado Rodr{\'{\i}}guez and Javier Bajo P{\'{e}}rez}, title = {Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper}, booktitle = {Advances on Practical Applications of Agents and Multi-Agent Systems - 10th International Conference on Practical Applications of Agents and Multi-Agent Systems, {PAAMS} 2012, Salamanca, Spain, 28-30 March, 2012}, series = {Advances in Intelligent and Soft Computing}, volume = {155}, pages = {291--294}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28786-2\_40}, doi = {10.1007/978-3-642-28786-2\_40}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paams/StiborekGRBJ12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/RehakPGSB11, author = {Martin Reh{\'{a}}k and Michal Pechoucek and Martin Grill and Jan Stiborek and Karel Bartos}, editor = {Liz Sonenberg and Peter Stone and Kagan Tumer and Pinar Yolum}, title = {Game theoretical adaptation model for intrusion detection system}, booktitle = {10th International Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2011), Taipei, Taiwan, May 2-6, 2011, Volume 1-3}, pages = {1123--1124}, publisher = {{IFAAMAS}}, year = {2011}, url = {http://portal.acm.org/citation.cfm?id=2034449\&\#38;CFID=69154334\&\#38;CFTOKEN=45298625}, timestamp = {Fri, 18 Nov 2011 09:09:28 +0100}, biburl = {https://dblp.org/rec/conf/atal/RehakPGSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cics/RehakSG11, author = {Martin Reh{\'{a}}k and Jan Stiborek and Martin Grill}, title = {Intelligence, not integration: Distributed regret minimization for {IDS} Control}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence in Cyber Security, {CICS} 2011, Paris, France, April 12-13, 2011}, pages = {217--224}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CICYBS.2011.5949406}, doi = {10.1109/CICYBS.2011.5949406}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/cics/RehakSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/RehakGS11, author = {Martin Reh{\'{a}}k and Martin Grill and Jan Stiborek}, editor = {Olivier Boissier and Jeffrey Bradshaw and Longbing Cao and Klaus Fischer and Mohand{-}Said Hacid}, title = {On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System}, booktitle = {Proceedings of the 2011 {IEEE/WIC/ACM} International Conference on Intelligent Agent Technology, {IAT} 2011, Campus Scientifique de la Doua, Lyon, France, August 22-27, 2011}, pages = {196--203}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WI-IAT.2011.172}, doi = {10.1109/WI-IAT.2011.172}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/RehakGS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/RehakPGSBC09, author = {Martin Reh{\'{a}}k and Michal Pechoucek and Martin Grill and Jan Stiborek and Karel Bartos and Pavel Celeda}, title = {Adaptive Multiagent System for Network Traffic Monitoring}, journal = {{IEEE} Intell. Syst.}, volume = {24}, number = {3}, pages = {16--25}, year = {2009}, url = {https://doi.org/10.1109/MIS.2009.42}, doi = {10.1109/MIS.2009.42}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/expert/RehakPGSBC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/RehakSPSGB09, author = {Martin Reh{\'{a}}k and Eugen Staab and Michal Pechoucek and Jan Stiborek and Martin Grill and Karel Bartos}, editor = {Carles Sierra and Cristiano Castelfranchi and Keith S. Decker and Jaime Sim{\~{a}}o Sichman}, title = {Dynamic information source selection for intrusion detection systems}, booktitle = {8th International Joint Conference on Autonomous Agents and Multiagent Systems {(AAMAS} 2009), Budapest, Hungary, May 10-15, 2009, Volume 2}, pages = {1009--1016}, publisher = {{IFAAMAS}}, year = {2009}, url = {https://dl.acm.org/citation.cfm?id=1558153}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/RehakSPSGB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icac/RehakSFSGBPE09, author = {Martin Reh{\'{a}}k and Eugen Staab and Volker Fusenig and Jan Stiborek and Martin Grill and Karel Bartos and Michal Pechoucek and Thomas Engel}, editor = {Simon A. Dobson and John Strassner and Manish Parashar and Onn Shehory}, title = {Threat-model-driven runtime adaptation and evaluation of intrusion detection system}, booktitle = {Proceedings of the 6th International Conference on Autonomic Computing, {ICAC} 2009, June 15-19, 2009, Barcelona, Spain}, pages = {65--66}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1555228.1555248}, doi = {10.1145/1555228.1555248}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icac/RehakSFSGBPE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RehakSFPGSBE09, author = {Martin Reh{\'{a}}k and Eugen Staab and Volker Fusenig and Michal Pechoucek and Martin Grill and Jan Stiborek and Karel Bartos and Thomas Engel}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {61--80}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_4}, doi = {10.1007/978-3-642-04342-0\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RehakSFPGSBE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.