Petr Hanácek

Orcid: 0000-0001-5507-0768

According to our database1, Petr Hanácek authored at least 34 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering.
CoRR, 2024

2023
Indirect Bluetooth Low Energy Connection Detection.
Proceedings of the International Conference on Information Networking, 2023

Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023

2022
ASNM Datasets: A Collection of Network Traffic Data for Testing of Adversarial Classifiers and Network Intrusion Detectors.
Dataset, May, 2022

Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management.
CoRR, 2022

E-Banking Security Study - 10 Years Later.
IEEE Access, 2022

2020
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors.
IEEE Access, 2020

Security and Encryption at Modern Databases.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach.
EAI Endorsed Trans. Security Safety, 2019

ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors.
CoRR, 2019

Increasing Trust in Tor Node List Using Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2017
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset.
J. Comput., 2017

2016
Dynamic Permission Mechanism on Android.
J. Softw., 2016

Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection.
Proceedings of the Security and Privacy in Communication Networks, 2016

On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

2015
Introduction to Android 5 Security.
Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015, 2015

2014
Code Search API, Base of Parallel Code Refactoring System For Safety Standards Compliance.
J. Cyber Secur. Mobil., 2014

Traffic generator based on behavioral pattern.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Characteristics of buffer overflow attacks tunneled in HTTP traffic.
Proceedings of the International Carnahan Conference on Security Technology, 2014

Preventing real-world relay attacks on contactless devices.
Proceedings of the International Carnahan Conference on Security Technology, 2014

2013
Implementing A Unique Chip Id On A Reconfigurable Polymorphic Circuit.
Inf. Technol. Control., 2013

Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Malware injection in wireless networks.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Concept of parallel code refactoring system for safety standards compliance.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

2012
A concept of automated vulnerability search in contactless communication applications.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2012

2011
Evaluation of biometric authentication based on visual evoked potentials.
Proceedings of the International Carnahan Conference on Security Technology, 2011

2010
Analyse sicherer Hardwarelösungen.
Datenschutz und Datensicherheit, 2010

2009
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols.
J. Univers. Comput. Sci., 2009

Power Consumption of Hardware Cryptography Platform for Wireless Sensor.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.
Proceedings of the Security Technology, 2009

Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.
Proceedings of the Security Technology, 2009

1998
Security of Electronic Money.
Proceedings of the SOFSEM '98: Theory and Practice of Informatics, 1998


  Loading...