Ladislav Hudec

Orcid: 0000-0002-1443-6118

According to our database1, Ladislav Hudec authored at least 17 papers between 1982 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comprehensive Analysis and Evaluation of Anomalous User Activity in Web Server Logs.
Sensors, February, 2024

2023
Using Web Server Logs to Identify and Comprehend Anomalous User Activity.
Proceedings of the 17th International Conference on Telecommunications, 2023

2022
S-HIP: Simplified HIP Protocol for IoT Networks.
Proceedings of the 45th International Conference on Telecommunications and Signal Processing, 2022

2020
Survey: Classification of the IoT Technologies for Better Selection to Real Use.
Proceedings of the 43rd International Conference on Telecommunications and Signal Processing, 2020

2019
Detection of Intrusions to Web System Using Computational Intelligence.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology - ISAT 2019, 2019

2016
Advances In Distributed Security For Mobile Ad Hoc Networks.
Proceedings of the 17th International Conference on Computer Systems and Technologies, 2016

2015
A performance analysis of IPSec/AH protocol for automotive environment.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

Distributed firewall using PKI in mobile Ad Hoc networks.
Proceedings of the 16th International Conference on Computer Systems and Technologies, 2015

2014
Cluster Glue - Improving Service Reachability in PKI Enabled MANET.
Proceedings of the UKSim-AMSS 16th International Conference on Computer Modelling and Simulation, 2014

2013
On Identifying Proper Security Mechanisms.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Building Public Key Infrastructure for MANET with Help of B.A.T.M.A.N. Advanced.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013

Identification of vulnerable parts of web applications based on anomaly detection in HTTP.
Proceedings of the Computer Systems and Technologies, 2013

On Selecting Critical Security Controls.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Towards a security evaluation model based on security metrics.
Proceedings of the 2012 Conference on Computer Systems and Technologies, 2012

2011
Risk analysis supported by information security metrics.
Proceedings of the 12th International Conference on Computer Systems and Technologies, 2011

2004
Management and Verification of Firewall and Router Access Lists.
Comput. Artif. Intell., 2004

1982
A Performance Study of 16-bit Microcomputer-Implemented FFT Algorithms.
IEEE Micro, 1982


  Loading...