default search action
Petr Hanácek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j10]Kamil Malinka, Anton Firc, Milan Salko, Daniel Prudký, Karolína Radacovská, Petr Hanácek:
Comprehensive multiparametric analysis of human deepfake speech recognition. EURASIP J. Image Video Process. 2024(1): 24 (2024) - 2022
- [j9]Kamil Malinka, Ondrej Hujnak, Petr Hanácek, Lukás Hellebrandt:
E-Banking Security Study - 10 Years Later. IEEE Access 10: 16681-16699 (2022) - 2020
- [j8]Ivan Homoliak, Kamil Malinka, Petr Hanácek:
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access 8: 112427-112453 (2020) - 2019
- [j7]Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanácek:
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Trans. Security Safety 5(17): e4 (2019) - 2017
- [j6]Ivan Homoliak, Dominik Breitenbacher, Petr Hanácek:
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. J. Comput. 12(2): 143-155 (2017) - 2016
- [j5]Lukás Aron, Petr Hanácek:
Dynamic Permission Mechanism on Android. J. Softw. 11(12): 1124-1230 (2016) - 2014
- [j4]Peter Jurnecka, Petr Hanácek, Matej Kacic:
Code Search API, Base of Parallel Code Refactoring System For Safety Standards Compliance. J. Cyber Secur. Mobil. 3(1): 47-66 (2014) - 2013
- [j3]Lukás Sekanina, Richard Ruzicka, Zdenek Vasícek, Václav Simek, Petr Hanácek:
Implementing A Unique Chip Id On A Reconfigurable Polymorphic Circuit. Inf. Technol. Control. 42(1): 7-14 (2013) - 2010
- [j2]Petr Hanácek, Martin Drahanský:
Analyse sicherer Hardwarelösungen. Datenschutz und Datensicherheit 34(11): 766-770 (2010) - 2009
- [j1]Peter Pecho, Frantisek Zboril Jr., Martin Drahanský, Petr Hanácek:
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. J. Univers. Comput. Sci. 15(5): 992-1006 (2009)
Conference and Workshop Papers
- 2024
- [c22]Anton Firc, Kamil Malinka, Petr Hanácek:
Deepfake Speech Detection: A Spectrogram Analysis. SAC 2024: 1312-1320 - 2023
- [c21]Jozef Drga, Ivan Homoliak, Juraj Vanco, Athanasios V. Vasilakos, Martin Peresíni, Petr Hanácek:
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. ICBC 2023: 1-4 - [c20]Ondrej Hujnak, Kamil Malinka, Petr Hanácek:
Indirect Bluetooth Low Energy Connection Detection. ICOIN 2023: 328-333 - 2020
- [c19]Martin Ocenas, Ivan Homoliak, Petr Hanácek, Kamil Malinka:
Security and Encryption at Modern Databases. ICCSP 2020: 19-23 - 2019
- [c18]Lukás Hellebrandt, Ivan Homoliak, Kamil Malinka, Petr Hanácek:
Increasing Trust in Tor Node List Using Blockchain. IEEE ICBC 2019: 29-32 - 2016
- [c17]Tomas Smetka, Ivan Homoliak, Petr Hanácek:
On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm. ICCST 2016: 1-8 - [c16]Ivan Homoliak, Martin Teknos, Maros Barabas, Petr Hanácek:
Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. SecureComm 2016: 770-773 - [c15]Ivan Homoliak, Ladislav Sulak, Petr Hanácek:
Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. WISA 2016: 66-78 - 2015
- [c14]Lukás Aron, Petr Hanácek:
Introduction to Android 5 Security. SOFSEM (Student Research Forum Papers / Posters) 2015: 103-111 - 2014
- [c13]Martin Henzl, Petr Hanácek, Matej Kacic:
Preventing real-world relay attacks on contactless devices. ICCST 2014: 1-6 - [c12]Ivan Homoliak, Daniel Ovsonka, Karel Koranda, Petr Hanácek:
Characteristics of buffer overflow attacks tunneled in HTTP traffic. ICCST 2014: 1-6 - [c11]Matej Kacic, Daniel Ovsonka, Petr Hanácek, Maros Barabas:
Traffic generator based on behavioral pattern. ICITST 2014: 229-223 - [c10]Ivan Homoliak, Daniel Ovsonka, Matej Grégr, Petr Hanácek:
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic. ICITST 2014: 310-317 - 2013
- [c9]Matej Kacic, Petr Hanácek, Martin Henzl, Peter Jurnecka:
Malware injection in wireless networks. IDAACS 2013: 483-487 - [c8]Peter Jurnecka, Petr Hanácek, Matej Kacic:
Concept of parallel code refactoring system for safety standards compliance. IDAACS 2013: 630-634 - [c7]Martin Henzl, Petr Hanácek:
Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding. ISBAST 2013 - 2012
- [c6]Martin Henzl, Petr Hanácek, Peter Jurnecka, Matej Kacic:
A concept of automated vulnerability search in contactless communication applications. ICCST 2012: 180-186 - 2011
- [c5]Kamil Malinka, Petr Hanácek, Michal Trzos:
Evaluation of biometric authentication based on visual evoked potentials. ICCST 2011: 1-7 - 2009
- [c4]Peter Pecho, Jan Nagy, Petr Hanácek, Martin Drahanský:
Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors. FGIT-SecTech 2009: 217-224 - [c3]Martin Drahanský, Filip Orság, Petr Hanácek:
Accelerometer Based Digital Video Stabilization for Security Surveillance Systems. FGIT-SecTech 2009: 225-233 - [c2]Peter Pecho, Jan Nagy, Petr Hanácek:
Power Consumption of Hardware Cryptography Platform for Wireless Sensor. PDCAT 2009: 318-323 - 1998
- [c1]Petr Hanácek:
Security of Electronic Money. SOFSEM 1998: 107-121
Data and Artifacts
- 2022
- [d1]Ivan Homoliak, Petr Hanácek:
ASNM Datasets: A Collection of Network Traffic Data for Testing of Adversarial Classifiers and Network Intrusion Detectors. IEEE DataPort, 2022
Informal and Other Publications
- 2024
- [i4]Jakub Res, Ivan Homoliak, Martin Peresíni, Ales Smrcka, Kamil Malinka, Petr Hanácek:
Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering. CoRR abs/2403.12671 (2024) - 2022
- [i3]Jozef Drga, Ivan Homoliak, Juraj Vanco, Martin Peresíni, Petr Hanácek:
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. CoRR abs/2211.03490 (2022) - 2019
- [i2]Ivan Homoliak, Petr Hanácek:
ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors. CoRR abs/1910.10528 (2019) - 2018
- [i1]Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanácek:
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. CoRR abs/1805.02684 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint