


default search action
Petr Velan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Martin Lastovicka
, Martin Husák, Petr Velan, Tomás Jirsík, Pavel Celeda
:
Passive operating system fingerprinting revisited: Evaluation and current challenges. Comput. Networks 229: 109782 (2023) - [c24]Stanislav Spacek, Petr Velan, Martin Holkovic, Tomás Plesník:
Event-Flow Correlation for Anomaly Detection in HTTP/3 Web Traffic. NOMS 2023: 1-6 - 2022
- [c23]Stanislav Spacek, Petr Velan, Pavel Celeda
, Daniel Tovarnák:
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. NOMS 2022: 1-7 - [i1]Stanislav Spacek, Petr Velan, Pavel Celeda
, Daniel Tovarnák:
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. CoRR abs/2206.11175 (2022) - 2021
- [j3]Tomás Jirsík
, Petr Velan
:
Host Behavior in Computer Network: One-Year Study. IEEE Trans. Netw. Serv. Manag. 18(1): 822-838 (2021) - [c22]Daniel Tovarnák, Matús Racek, Petr Velan:
Cloud Native Data Platform for Network Telemetry and Analytics. CNSM 2021: 394-396 - 2020
- [c21]Martin Lastovicka, Stanislav Spacek, Petr Velan, Pavel Celeda
:
Using TLS Fingerprints for OS Identification in Encrypted Traffic. NOMS 2020: 1-6 - [c20]Petr Velan, Tomás Jirsík:
On the Impact of Flow Monitoring Configuration. NOMS 2020: 1-7
2010 – 2019
- 2019
- [c19]Pavel Celeda, Petr Velan, Benjamin Kral, Ondrej Kozak:
Enabling SSH Protocol Visibility in Flow Monitoring. IM 2019: 569-574 - [c18]Petr Velan, Pavel Celeda:
Application-Aware Flow Monitoring. IM 2019: 701-706 - 2018
- [c17]Tomás Cejka, Petr Velan, Jirí Havránek, Pavel Benácek:
Enhanced Flow Monitoring with P4 Generated Flexible Packet Parser. AIMS 2018: 21-32 - [c16]Petr Velan
:
Improving network flow definition: Formalization and applicability. NOMS 2018: 1-5 - [c15]Petr Velan
, Martin Husák
, Daniel Tovarnák:
Rapid prototyping of flow-based detection methods using complex event processing. NOMS 2018: 1-3 - [c14]Milan Cermák
, Tomás Jirsík
, Petr Velan
, Jana Komárková, Stanislav Spacek, Martin Drasar, Tomas Plesnik:
Towards Provable Network Traffic Measurement and Analysis via Semi-Labeled Trace Datasets. TMA 2018: 1-8 - 2017
- [c13]Luuk Hendriks, Petr Velan
, Ricardo de Oliveira Schmidt, Pieter-Tjerk de Boer, Aiko Pras:
Flow-Based Detection of IPv6-specific Network Layer Attacks. AIMS 2017: 137-142 - [c12]Luuk Hendriks, Petr Velan
, Ricardo de Oliveira Schmidt, Pieter-Tjerk de Boer, Aiko Pras:
Threats and surprises behind IPv6 extension headers. TMA 2017: 1-9 - 2016
- [c11]Petr Velan
:
EventFlow: Network flow aggregation based on user actions. NOMS 2016: 767-771 - [c10]Petr Velan
, Jana Medková, Tomás Jirsík
, Pavel Celeda
:
Network traffic characterisation using flow-based statistics. NOMS 2016: 907-912 - 2015
- [j2]Petr Velan
, Milan Cermák
, Pavel Celeda
, Martin Drasar
:
A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25(5): 355-374 (2015) - [j1]Anna Sperotto
, Guillaume Doyen, Steven Latré, Marinos Charalambides
, Jeroen Famaey
, Petr Velan
, Pavel Celeda
:
Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014) - Monitoring and Securing Virtualized Networks and Services. J. Netw. Syst. Manag. 23(3): 794-802 (2015) - [c9]Martin Husák
, Petr Velan
, Jan Vykopal
:
Security Monitoring of HTTP Traffic Using Extended Flows. ARES 2015: 258-265 - [c8]Petr Velan
, Viktor Pus:
High-density network flow monitoring. IM 2015: 996-1001 - [c7]Viktor Pus, Petr Velan
, Lukas Kekely
, Jan Korenek, Pavel Minarík:
Hardware accelerated flow measurement of 100 Gb ethernet. IM 2015: 1147-1148 - 2014
- [c6]Petr Velan
, Pavel Celeda
:
Next Generation Application-Aware Flow Monitoring. AIMS 2014: 173-178 - 2013
- [c5]Petr Velan
, Tomás Jirsík
, Pavel Celeda
:
Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement. EUNICE 2013: 136-147 - [c4]Pavel Celeda, Petr Velan, Martin Rabek, Rick Hofstede, Aiko Pras:
Large-scale geolocation for NetFlow. IM 2013: 1015-1020 - [c3]Petr Velan:
Practical experience with IPFIX flow collectors. IM 2013: 1021-1026 - [c2]Martin Elich, Petr Velan, Tomás Jirsík
, Pavel Celeda
:
An investigation into teredo and 6to4 transition mechanisms: Traffic analysis. LCN Workshops 2013: 1018-1024 - 2012
- [c1]Petr Velan
, Radek Krejcí:
Flow Information Storage Assessment Using IPFIXcol. AIMS 2012: 155-158
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint