Showing
1 - 6
results of
6
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Bajtos, Tomás
Search Results - Bajtos, Tomás
Showing
1 - 6
results of
6
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Processing of IDS alerts in multi-step attacks
by
Bajtoš, Tomáš
,
Sokol, Pavol
,
Kurimský, František
Published in
Software impacts
Get full text
Items that this one cites
Article
Save to List
Saved in:
2
Loading…
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach
by
Husák, Martin
,
Bajtoš, Tomáš
,
Kašpar, Jaroslav
,
Bou-Harb, Elias
,
Čeleda, Pavel
Published in
ACM transactions on management information systems
Get full text
Items that this one cites
Article
Save to List
Saved in:
3
Loading…
Network Intrusion Detection with Threat Agent Profiling
by
Lučivjanská, Katarína
,
Kleinová, Lenka
,
Gajdoš, Andrej
,
Bajtoš, Tomáš
,
Sokol, Pavol
Published in
Security and communication networks
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
4
Loading…
Early-Stage Detection of Cyber Attacks
by
Pivarníková, Martina
,
Sokol, Pavol
,
Bajtoš, Tomáš
Published in
Information (Basel)
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
5
Loading…
Analysis of the Infection and the Injection Phases of the Telnet Botnets
by
Bajtos, Tomás
,
Sokol, Pavol
,
Gajdos, Andrej
,
Lucivjanská, Katarína
,
Mézesová, Terézia
Published in
J.UCS (Annual print and CD-ROM archive ed.)
Get full text
Article
Save to List
Saved in:
6
Loading…
Evaluation of Attackers’ Skill Levels in Multi-Stage Attacks
by
Mézešová, Terézia
,
Sokol, Pavol
,
Bajtoš, Tomáš
Published in
Information (Basel)
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
6 results
6
Full Text
6 results
6
Format
Articles
6 results
6
Journal Title
Information
2 results
2
Acm Transactions On Management Information Systems
1 results
1
J.ucs
1 results
1
Journal Of Universal Computer Science
1 results
1
Security And Communication Networks
1 results
1
Software Impacts
1 results
1
Subjects
Computer Science
6 results
6
Science & Technology
6 results
6
Technology
6 results
6
Computer Science, Information Systems
4 results
4
Cybersecurity
3 results
3
Intrusion Detection Systems
3 results
3
Methods
3 results
3
Algorithms
2 results
2
Clustering
2 results
2
Computer Science, Software Engineering
2 results
2
Data Collection
2 results
2
Aggregation
1 results
1
Alert
1 results
1
Alert Correlation
1 results
1
Analysis
1 results
1
Attack Evaluation
1 results
1
Attack Prediction
1 results
1
Attack Projection
1 results
1
Attacker Skill Level
1 results
1
Bayesian Analysis
1 results
1
Year of Publication
From:
To:
Source
Doaj Directory Of Open Access Journals
4 results
4
Road: Directory Of Open Access Scholarly Resources
4 results
4
Ezb Electronic Journals Library
4 results
4
Publicly Available Content Database
4 results
4
Ingentaconnect Journals
2 results
2
Wiley-Blackwell Journals
1 results
1
Wiley Online Library Open Access
1 results
1
Acm Digital Library
1 results
1
Bacon - Elsevier - Global Sciencedirect-Openaccess
1 results
1
Association For Computing Machinery:jisc Collections:acm Open Journals 2023-2025 (Reading List)
1 results
1
Sciencedirect®
1 results
1
Freely Accessible Science Journals
1 results
1