Karel Bartos

According to our database1, Karel Bartos authored at least 26 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Learning data discretization via convex optimization.
Mach. Learn., 2018

2017
Learning detectors of malicious web requests for intrusion detection in network traffic.
CoRR, 2017

2016
Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants.
Proceedings of the 25th USENIX Security Symposium, 2016

Learning Invariant Representation for Malicious Network Traffic Detection.
Proceedings of the ECAI 2016 - 22nd European Conference on Artificial Intelligence, 29 August-2 September 2016, The Hague, The Netherlands, 2016

2015
IFS: Intelligent flow sampling for network security-an adaptive approach.
Int. J. Netw. Manag., 2015

Learning Detector of Malicious Network Traffic from Weak Labels.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2015

Robust Representation for Domain Adaptation in Network Security.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2015

2014
Game Theoretical Model for Adaptive Intrusion Detection System.
Trans. Comput. Collect. Intell., 2014

2012
Towards Efficient Flow Sampling Technique for Anomaly Detection.
Proceedings of the Traffic Monitoring and Analysis - 4th International Workshop, 2012

Self-Organized Mechanism for Distributed Setup of Multiple Heterogeneous Intrusion Detection Systems.
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012

Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2012

Game Theoretical Adaptation Model for Intrusion Detection System.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2012

Trust-based Solution for Robust Self-configuration of Distributed Intrusion Detection Systems.
Proceedings of the ECAI 2012, 2012

Self-organized Collaboration of Distributed IDS Sensors.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Distributed Self-organized Collaboration of Autonomous IDS Sensors.
Proceedings of the Dependable Networks and Services, 2012

2011
Optimizing flow sampling for network anomaly detection.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Game theoretical adaptation model for intrusion detection system.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

2009
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes.
Int. J. Electron. Secur. Digit. Forensics, 2009

Adaptive Multiagent System for Network Traffic Monitoring.
IEEE Intell. Syst., 2009

Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Threat-model-driven runtime adaptation and evaluation of intrusion detection system.
Proceedings of the 6th International Conference on Autonomic Computing, 2009

Dynamic information source selection for intrusion detection systems.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
Improving Anomaly Detection Error Rate by Collective Trust Modeling.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Trust-Based Classifier Combination for Network Anomaly Detection.
Proceedings of the Cooperative Information Agents XII, 12th International Workshop, 2008

Multi-agent approach to network intrusion detection.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Network Intrusion Detection by Means of Community of Trusting Agents.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007


  Loading...