Pavel Celeda

Orcid: 0000-0002-3338-2856

According to our database1, Pavel Celeda authored at least 79 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Smart Environment for Adaptive Learning of Cybersecurity Skills.
IEEE Trans. Learn. Technol., June, 2023

Passive operating system fingerprinting revisited: Evaluation and current challenges.
Comput. Networks, June, 2023

Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms.
Comput. Secur., May, 2023

Cyber Key Terrain Identification Using Adjusted PageRank Centrality.
CoRR, 2023

Want to Raise Cybersecurity Awareness? Start with Future IT Professionals.
Proceedings of the 2023 Conference on Innovation and Technology in Computer Science Education V. 1, 2023

The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation Environments.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

2022
Student assessment in cybersecurity training automated by pattern mining and clustering.
Educ. Inf. Technol., 2022

Applications of educational data mining and learning analytics on data from cybersecurity training.
Educ. Inf. Technol., 2022

Preventing Cheating in Hands-on Lab Assignments.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Identification of Attack Paths Using Kill Chain and Attack Graphs.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Designing Adaptive Cybersecurity Hands-on Training.
Proceedings of the IEEE Frontiers in Education Conference, 2022

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Cybersecurity knowledge and skills taught in capture the flag challenges.
Comput. Secur., 2021

Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption.
Proceedings of the ICT Systems Security and Privacy Protection, 2021

Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Stream-Based IP Flow Analysis.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Scalable Learning Environments for Teaching Cybersecurity Hands-on.
Proceedings of the IEEE Frontiers in Education Conference, 2021

Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training.
Proceedings of the IEEE Frontiers in Education Conference, 2021

Reinforcing Cybersecurity Hands-on Training With Adaptive Learning.
Proceedings of the IEEE Frontiers in Education Conference, 2021

2020
Predictive Cyber Situational Awareness and Personalized Blacklisting: A Sequential Rule Mining Approach.
ACM Trans. Manag. Inf. Syst., 2020

What Are Cybersecurity Education Papers About?: A Systematic Literature Review of SIGCSE and ITiCSE Conferences.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems.
Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 2020

Using TLS Fingerprints for OS Identification in Encrypted Traffic.
Proceedings of the NOMS 2020, 2020

Cyber Situation Awareness via IP Flow Monitoring.
Proceedings of the NOMS 2020, 2020

Predictions of Network Attacks in Collaborative Environment.
Proceedings of the NOMS 2020, 2020

2019
Survey of Attack Projection, Prediction, and Forecasting in Cyber Security.
IEEE Commun. Surv. Tutorials, 2019

Towards Learning Analytics in Cybersecurity Capture the Flag Games.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Application-Aware Flow Monitoring.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Quality of Service Forecasting with LSTM Neural Networks.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

Enabling SSH Protocol Visibility in Flow Monitoring.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

2018
Passive os fingerprinting methods in the jungle of wireless networks.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Toward real-time network-wide cyber situational awareness.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Data-Driven Intelligence for Characterizing Internet-Scale IoT Exploitations.
Proceedings of the IEEE Globecom Workshops, 2018

Threat Detection Through Correlation ofNetwork Flows and Logs.
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018

Assessing Internet-wide Cyber Situational Awareness of Critical Sectors.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Toward Stream-Based IP Flow Analysis.
IEEE Commun. Mag., 2017

Honeypot testbed for network defence strategy evaluation.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

KYPO Cyber Range: Design and Use Cases.
Proceedings of the 12th International Conference on Software Technologies, 2017

Lessons learned from complex hands-on defence exercises in a cyber range.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

Situational Awareness: Detecting Critical Dependencies and Devices in a Network.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting.
EURASIP J. Inf. Secur., 2016

Network traffic characterisation using flow-based statistics.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

A performance benchmark for NetFlow data analysis on distributed stream processing systems.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

On Information Value of Top N Statistics.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Convergent and reliable hybrid home networks.
Proceedings of the 12th International Conference on the Design of Reliable Communication Networks, 2016

Network Defence Using Attacker-Defender Interaction Modelling.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

Detecting Advanced Network Threats Using a Similarity Search.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

2015
Report on the 8th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2014) - Monitoring and Securing Virtualized Networks and Services.
J. Netw. Syst. Manag., 2015

A survey of methods for encrypted traffic classification and analysis.
Int. J. Netw. Manag., 2015

Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Report on the 7th International Conference on Autonomous Infrastructure, Management, and Security (AIMS 2013): Emerging Management Mechanisms for the Future Internet.
J. Netw. Syst. Manag., 2014

Flow Monitoring Explained: From Packet Capture to Data Analysis With NetFlow and IPFIX.
IEEE Commun. Surv. Tutorials, 2014

Cloud-based security research testbed: A DDoS use case.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

ACEMIND: The Smart Integrated Home Network.
Proceedings of the 2014 International Conference on Intelligent Environments, Shanghai, China, June 30, 2014

Identifying Operating System Using Flow-Based Traffic Fingerprinting.
Proceedings of the Advances in Communication Networking, 2014

Detection of DNS Traffic Anomalies in Large Networks.
Proceedings of the Advances in Communication Networking, 2014

Next Generation Application-Aware Flow Monitoring.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

Enhancing Network Security: Host Trustworthiness Estimation.
Proceedings of the Monitoring and Securing Virtualized Networks and Services, 2014

2013
An investigation into teredo and 6to4 transition mechanisms: Traffic analysis.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Large-scale geolocation for NetFlow.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

Design and Evaluation of HTTP Protocol Parsers for IPFIX Measurement.
Proceedings of the Advances in Communication Networking, 2013

2012
Flow-Based Security Issue Detection in Building Automation and Control Networks.
Proceedings of the Information and Communication Technologies, 2012

Revealing and analysing modem malware.
Proceedings of IEEE International Conference on Communications, 2012

Traffic Measurement and Analysis of Building Automation and Control Networks.
Proceedings of the Dependable Networks and Services, 2012

2011
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX (Short Paper).
Proceedings of the Traffic Monitoring and Analysis - Third International Workshop, 2011

2010
Aspect-Based Attack Detection in Large-Scale Networks.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes.
Int. J. Electron. Secur. Digit. Forensics, 2009

Adaptive Multiagent System for Network Traffic Monitoring.
IEEE Intell. Syst., 2009

2008
Improving Anomaly Detection Error Rate by Collective Trust Modeling.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

CAMNEP: agent-based network intrusion detection system.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

Multi-agent approach to network intrusion detection.
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2008), 2008

2007
Network Intrusion Detection by Means of Community of Trusting Agents.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

Agent-Based Network Intrusion Detection System.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

High-Speed Network Traffic Acquisition for Agent Systems.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

High-Performance Agent System for Intrusion Detection in Backbone Networks.
Proceedings of the Cooperative Information Agents XI, 11th International Workshop, 2007

Collaborative Attack Detection in High-Speed Networks.
Proceedings of the Multi-Agent Systems and Applications V, 2007


  Loading...