Martin Rehák

According to our database1, Martin Rehák authored at least 64 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Guest Editors' Introduction.
ACM Trans. Internet Techn., 2018

Multiple instance learning for malware classification.
Expert Syst. Appl., 2018

Probabilistic analysis of dynamic malware traces.
Comput. Secur., 2018

2017
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing.
J. Comput. Syst. Sci., 2017

2016
Experimental system design for the integration of trapped-ion and superconducting qubit systems.
Quantum Information Processing, 2016

Intelligent Cybersecurity Agents [Guest editors' introduction].
IEEE Intelligent Systems, 2016

Using Behavioral Similarity for Botnet Command-and-Control Discovery.
IEEE Intelligent Systems, 2016

2015
IFS: Intelligent flow sampling for network security-an adaptive approach.
Int. Journal of Network Management, 2015

Detecting DGA malware using NetFlow.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
Game Theoretical Model for Adaptive Intrusion Detection System.
Trans. Computational Collective Intelligence, 2014

Identifying peer-to-peer communities in the network by connection graph analysis.
Int. Journal of Network Management, 2014

Malware detection using HTTP user-agent discrepancy identification.
Proceedings of the 2014 IEEE International Workshop on Information Forensics and Security, 2014

2012
Detecting anomalous network hosts by means of PCA.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Identifying Skype Nodes in the Network Exploiting Mutual Contacts.
Proceedings of the Traffic Monitoring and Analysis - 4th International Workshop, 2012

Towards Efficient Flow Sampling Technique for Anomaly Detection.
Proceedings of the Traffic Monitoring and Analysis - 4th International Workshop, 2012

Revealing Cooperating Hosts by Connection Graph Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2012

Self-Organized Mechanism for Distributed Setup of Multiple Heterogeneous Intrusion Detection Systems.
Proceedings of the Sixth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2012

Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2012

Game Theoretical Adaptation Model for Intrusion Detection System.
Proceedings of the Advances on Practical Applications of Agents and Multi-Agent Systems, 2012

Identifying Skype nodes by NetFlow-based graph analysis.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Trust-based Solution for Robust Self-configuration of Distributed Intrusion Detection Systems.
Proceedings of the ECAI 2012, 2012

Self-organized Collaboration of Distributed IDS Sensors.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

Distributed Self-organized Collaboration of Autonomous IDS Sensors.
Proceedings of the Dependable Networks and Services, 2012

2011
Optimizing flow sampling for network anomaly detection.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2011

Intelligence, not integration: Distributed regret minimization for IDS Control.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Game theoretical adaptation model for intrusion detection system.
Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011), 2011

2009
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes.
IJESDF, 2009

Adaptive Multiagent System for Network Traffic Monitoring.
IEEE Intelligent Systems, 2009

Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Threat-model-driven runtime adaptation and evaluation of intrusion detection system.
Proceedings of the 6th International Conference on Autonomic Computing, 2009

Dynamic information source selection for intrusion detection systems.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
Improving Anomaly Detection Error Rate by Collective Trust Modeling.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Trust-Based Classifier Combination for Network Anomaly Detection.
Proceedings of the Cooperative Information Agents XII, 12th International Workshop, 2008

Incrementally Refined Acquaintance Model for Consortia Composition.
Proceedings of the Cooperative Information Agents XII, 12th International Workshop, 2008

CAMNEP: agent-based network intrusion detection system.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Multi-agent approach to network intrusion detection.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Agent-Based Approach to Mass-Oriented Production Planning: Case Study.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2007

Network Intrusion Detection by Means of Community of Trusting Agents.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

Incrementally Refined Acquaintance Model for Distributed Planning and Resource Allocation in Semi-trusted Environments.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Agent-Based Network Intrusion Detection System.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

High-Speed Network Traffic Acquisition for Agent Systems.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

Multi-agent Reflection in Autonomic Systems.
Proceedings of the Holonic and Multi-Agent Systems for Manufacturing, 2007

Agent Methods for Network Intrusion Detection and Response.
Proceedings of the Holonic and Multi-Agent Systems for Manufacturing, 2007

Detecting Intrusions in Agent System by Means of Exception Handling.
Proceedings of the Holonic and Multi-Agent Systems for Manufacturing, 2007

High-Performance Agent System for Intrusion Detection in Backbone Networks.
Proceedings of the Cooperative Information Agents XI, 11th International Workshop, 2007

Trust Modeling with Context Representation and Generalized Identities.
Proceedings of the Cooperative Information Agents XI, 11th International Workshop, 2007

Agent-Based Network Protection Against Malicious Code.
Proceedings of the Multi-Agent Systems and Applications V, 2007

Collaborative Attack Detection in High-Speed Networks.
Proceedings of the Multi-Agent Systems and Applications V, 2007

2006
Representing Context for Multiagent Trust Modeling.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Multilevel Approach to Agent-Based Task Allocation in Transportation.
Proceedings of the Cooperative Information Agents X, 10th International Workshop, 2006

Deployment of A-globe multi-agent platform.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Towards formal model of adversarial action in multi-agent systems.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

2005
Solving inaccessibility in multi-agent systems by mobile middle-agents.
Multiagent and Grid Systems, 2005

A-globe: Multi-Agent Platform with Advanced Simulation and Visualization Support.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

Optimizing Agents Operation in Partially Inaccessible and Disruptive Environment.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

An Abstract Architecture for Computational Reflection in Multi-Agent Systems.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

Trust Model for Open Ubiquitous Agent Systems.
Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2005

Adversarial Behavior in Multi-agent Systems.
Proceedings of the Multi-Agent Systems and Applications IV, 2005

Fuzzy number approach to trust in coalition environment.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Expectations and deployment of agent technology in manufacturing and defence: case studies.
Proceedings of the 4rd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, 2005

2004
Simulating Agents' Mobility and Inaccessibility with A-globe Multi-agent System.
Proceedings of the Multiagent System Technologies, Second German Conference, 2004

Agent System Application in High-Volume Production Management.
Proceedings of the Emerging Solutions for Future Manufacturing Systems, 2004

Using Stand-in Agents in Partially Accessible Multi-agent Environment.
Proceedings of the Engineering Societies in the Agents World V, 5th InternationalWorkshop, 2004


  Loading...