Martin Husák

Orcid: 0000-0001-7249-9881

According to our database1, Martin Husák authored at least 46 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A review on graph-based approaches for network security monitoring and botnet detection.
Int. J. Inf. Sec., February, 2024

2023
Passive operating system fingerprinting revisited: Evaluation and current challenges.
Comput. Networks, June, 2023

Recommending Similar Devices in Close Proximity for Network Security Management.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

Unraveling Network-Based Pivoting Maneuvers: Empirical Insights and Challenges.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Lightweight Impact Assessment and Projection of Lateral Movement and Malware Infection.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

On the Provision of Network-Wide Cyber Situational Awareness via Graph-Based Analytics.
Proceedings of the Complex Computational Ecosystems - First International Conference, 2023

2022
CRUSOE: A toolset for cyber situational awareness and decision support in incident handling.
Comput. Secur., 2022

Discovering Coordinated Groups of IP Addresses Through Temporal Correlation of Alerts.
IEEE Access, 2022

Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Predictive methods in cyber defense: Current experience and research challenges.
Future Gener. Comput. Syst., 2021

Towards a Data-Driven Recommender System for Handling Ransomware and Similar Incidents.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

A Dashboard for Cyber Situational Awareness and Decision Support in Network Security Management.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Towards an Efficient Detection of Pivoting Activity.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach.
ACM Trans. Manag. Inf. Syst., 2020

Network Monitoring and Enumerating Vulnerabilities in Large Heterogeneous Networks.
Proceedings of the NOMS 2020, 2020

Decision Support for Mission-Centric Network Security Management.
Proceedings of the NOMS 2020, 2020

Predictions of Network Attacks in Collaborative Environment.
Proceedings of the NOMS 2020, 2020

SoK: contemporary issues and challenges to enable cyber situational awareness for network security.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Big Data Sanitization and Cyber Situational Awareness: A Network Telescope Perspective.
IEEE Trans. Big Data, 2019

Survey of Attack Projection, Prediction, and Forecasting in Cyber Security.
IEEE Commun. Surv. Tutorials, 2019

Decision Support for Mission-Centric Cyber Defence.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Rapid prototyping of flow-based detection methods using complex event processing.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Towards Predicting Cyber Attacks Using Information Exchange and Data Mining.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations.
Proceedings of the IEEE Globecom Workshops, 2018

CRUSOE: Data Model for Cyber Situational Awareness.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Assessing Internet-wide Cyber Situational Awareness of Critical Sectors.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Honeypots and honeynets: issues of privacy.
EURASIP J. Inf. Secur., 2017

Honeypot testbed for network defence strategy evaluation.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Network defence strategy evaluation: Simulation vs. live network.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Exchanging security events: Which and how many alerts can we aggregate?
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

A graph-based representation of relations in network security alert sharing platforms.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Protection of personal data in security alert sharing platforms.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting.
EURASIP J. Inf. Secur., 2016

2015
Study of attack using honeypots and honeynets lessons learned from time-oriented visualization.
Proceedings of the IEEE EUROCON 2015, 2015

Deploying Honeypots and Honeynets: Issue of Privacy.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Security Monitoring of HTTP Traffic Using Extended Flows.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Cloud-based security research testbed: A DDoS use case.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

PhiGARo: Automatic Phishing Detection and Incident Response Framework.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Reflected attacks abusing honeypots.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2008
New [47, 15, 16] Linear Binary Block Code.
IEEE Trans. Inf. Theory, 2008


  Loading...