Ondrej Rysavý

Orcid: 0000-0001-9652-6418

Affiliations:
  • Brno University of Technology , Czech Republic


According to our database1, Ondrej Rysavý authored at least 68 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication.
IEEE Trans. Smart Grid, May, 2023

DNS Over HTTPS Detection Using Standard Flow Telemetry.
IEEE Access, 2023

Detecting DoH-Based Data Exfiltration: FluBot Malware Case Study.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Toward migration to SDN: Generating SDN Forwarding Rules by Decision Tree.
Proceedings of the 26th Conference on Innovation in Clouds, Internet and Networks, 2023

Analysis of Well-Known DNS over HTTPS Resolvers.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

Deep learning for predictive alerting and cyber-attack mitigation.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

2022
Modbus Dataset for ICS Anomaly Detection.
Dataset, March, 2022

ICS Dataset for Smart Grid Anomaly Detection.
Dataset, March, 2022

Measurement and characterization of DNS over HTTPS traffic.
CoRR, 2022

2021
What do incident response practitioners need to know? A skillmap for the years ahead.
Digit. Investig., 2021

Unified SNMP Interface for IoT Monitoring.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

A Network Traffic Processing Library for ICS Anomaly Detection.
Proceedings of the ECBS 2021: 7th Conference on the Engineering of Computer Based Systems, 2021

Network Problem Diagnostics using Typographic Error Correction.
Proceedings of the 17th International Conference on Network and Service Management, 2021

Anomaly Detection of ICS Communication Using Statistical Models.
Proceedings of the 17th International Conference on Network and Service Management, 2021

2020
Flow based monitoring of ICS communication in the smart grid.
J. Inf. Secur. Appl., 2020

Netfox detective: A novel open-source network forensics analysis tool.
Digit. Investig., 2020

Identity Linking in Computer Networks.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Pattern Detection based Network Diagnostics.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

On Reliability of JA3 Hashes for Fingerprinting Mobile Applications.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

Proposed Method for Partial Node Replacement by Software Defined Network.
Proceedings of the Position Papers of the 2020 Federated Conference on Computer Science and Information Systems, 2020

Distributed PCFG Password Cracking.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Big Data Security Analysis withTARZAN Platform.
J. Cyber Secur. Mobil., 2019

Distributed password cracking with BOINC and hashcat.
Digit. Investig., 2019

Using Network Traces to Generate Models for Automatic Network Application Protocols Diagnostics.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Application Error Detection in Networks by Protocol Behavior Model.
Proceedings of the E-Business and Telecommunications - 16th International Conference, 2019

Network Forensics in GSE Overlay Networks.
Proceedings of the 6th Conference on the Engineering of Computer Based Systems, 2019

Security Monitoring of IoT Communication Using Flows.
Proceedings of the 6th Conference on the Engineering of Computer Based Systems, 2019

Network Forensic Analysis for Lawful Enforcement on Steroids, Distributed and Scalable.
Proceedings of the 6th Conference on the Engineering of Computer Based Systems, 2019

Big Data Network Flow Processing Using Apache Spark.
Proceedings of the 6th Conference on the Engineering of Computer Based Systems, 2019

Automating Network Security Analysis at Packet-level by using Rule-based Engine.
Proceedings of the 6th Conference on the Engineering of Computer Based Systems, 2019

On Practical Aspects of PCFG Password Cracking.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
Identification of Threats and Security Risk Assessments for Recursive Internet Architecture.
IEEE Syst. J., 2018

Automated Man-in-the-Middle Attack Against Wi‑Fi Networks.
J. Digit. Forensics Secur. Law, 2018

Traffic Classification and Application Identification in Network Forensics.
Proceedings of the Advances in Digital Forensics XIV, 2018

2017
First-hop Redundancy Protocols in Omnet++.
Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, 2017

Automation of MitM Attack on Wi-Fi Networks.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

TARZAN: An Integrated Platform for Security Analysis.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

Towards analysis of IP communication in a constrained environment of tactical radio networks.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017

2016
On Efficiency of Distributed Password Recovery.
J. Digit. Forensics Secur. Law, 2016

Babel Routing Protocol for OMNeT++ - More than just a new simulation module for INET framework.
CoRR, 2016

Experimental Evaluation of Password Recovery in Encrypted Documents.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

From protecting protocols to layers: Designing, implementing and experimenting with security policies in RINA.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Skip This Paper - RINASim: Your Recursive InterNetwork Architecture Simulator.
CoRR, 2015

Advanced Techniques for Reconstruction of Incomplete Network Data.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

2014
Fast RTP Detection and Codecs Classification in Internet Traffic.
J. Digit. Forensics Secur. Law, 2014

Enhanced Interior Gateway Routing Protocol with IPv4 and IPv6 Support for OMNeT++.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2014

Enhanced interior gateway routing protocol for OMNeT++.
Proceedings of the 4th International Conference On Simulation And Modeling Methodologies, 2014

Towards Identification of Operating Systems from the Internet Traffic - IPFIX Monitoring with Fingerprinting and Clustering.
Proceedings of the DCNET 2014, 2014

2013
On formal reachability analysis in networks with dynamic behavior.
Telecommun. Syst., 2013

IPv6 unicast and IPv4 multicast routing in OMNeT++.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

Dependable Cyber-Physical Systems Networking: An Approach for Real-Time, Software Intensive Systems.
Proceedings of the 12th IFAC Conference on Programmable Devices and Embedded Systems, 2013

Improving security in SCADA systems through firewall policy analysis.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

2012
A Formal Authorization Framework for Networked SCADA Systems.
Proceedings of the IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems, 2012

2011
Reachability Analysis in Dynamically Routed Networks.
Proceedings of the 18th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, 2011

2010
Combination of simulation and formal methods to analyse network survivability.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

Formal analysis approach on networks with dynamic behaviours.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

Static Analysis of Routing and Firewall Policy Configurations.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Security Analysis of TCP/IP Networks - An Approach to Automatic Analysis of Network Security Properties.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

2009
A formal model of composing components: the TLA<sup>+</sup> approach.
Innov. Syst. Softw. Eng., 2009

Designing and Implementing International RSIC Engineering Curriculum.
Proceedings of the First IEEE Eastern European Conference on the Engineering of Computer Based Systems, 2009

Inter-university project based on LEGO NXT.
Proceedings of the IEEE International Conference on Control Applications, 2009

2008
A component-based approach to verification of embedded control systems using TLA<sup>+</sup>.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

A Formal Model for Network-Wide Security Analysis.
Proceedings of the 15th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2008), 31 March, 2008

2007
Pattern-driven reuse of embedded control design - behavioral and architectural specifications in embedded control system designs.
Proceedings of the ICINCO 2007, 2007

Industrial application development using case-based reasoning.
Proceedings of the Artificial Neural Networks and Intelligent Information Processing, 2007

2006
Designing algorithm-oriented generic library on .NET framework.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006

2005
A Framework for Formal Specification of Embedded Systems.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005

2004
Formal Abstract Architecture for Use Case Specifications.
Proceedings of the 11th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2004), 2004


  Loading...