Tomás Cejka

Orcid: 0000-0001-7794-9511

According to our database1, Tomás Cejka authored at least 38 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
BOTA: Explainable IoT Malware Detection in Large Networks.
IEEE Internet Things J., May, 2023

NetTiSA: Extended IP Flow with Time-series Features for Universal Bandwidth-constrained High-speed Network Traffic Classification.
CoRR, 2023

Fine-grained TLS services classification with reject option.
Comput. Networks, 2023

Encrypted traffic classification: the QUIC case.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Unevenly Spaced Time Series from Network Traffic.
Proceedings of the 7th Network Traffic Measurement and Analysis Conference, 2023

Enhancing DeCrypto: Finding Cryptocurrency Miners Based on Periodic Behavior.
Proceedings of the 19th International Conference on Network and Service Management, 2023

Network Traffic Classification Based on Single Flow Time Series Analysis.
Proceedings of the 19th International Conference on Network and Service Management, 2023

Look at my Network: An Insight into the ISP Backbone Traffic.
Proceedings of the 19th International Conference on Network and Service Management, 2023

Active Learning Framework For Long-term Network Traffic Classification.
Proceedings of the 13th IEEE Annual Computing and Communication Workshop and Conference, 2023

2022
Active Learning Framework to Automate NetworkTraffic Classification.
CoRR, 2022

Discovering Coordinated Groups of IP Addresses Through Temporal Correlation of Alerts.
IEEE Access, 2022

Summary of DNS Over HTTPS Abuse.
IEEE Access, 2022

Evaluation of the Limit of Detection in Network Dataset Quality Assessment with PerQoDA.
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2022

DeCrypto: Finding Cryptocurrency Miners on ISP Networks.
Proceedings of the Secure IT Systems, 2022

Large Scale Analysis of DoH Deployment on the Internet.
Proceedings of the Computer Security - ESORICS 2022, 2022

Tunneling through DNS over TLS providers.
Proceedings of the 18th International Conference on Network and Service Management, 2022

Network traffic classification based on periodic behavior detection.
Proceedings of the 18th International Conference on Network and Service Management, 2022

2021
Large Scale Measurement on the Adoption of Encrypted DNS.
CoRR, 2021

Novel HTTPS classifier driven by packet bursts, flows, and machine learning.
Proceedings of the 17th International Conference on Network and Service Management, 2021

Towards Evaluating Quality of Datasets for Network Traffic Domain.
Proceedings of the 17th International Conference on Network and Service Management, 2021

Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Refined Detection of SSH Brute-Force Attackers Using Machine Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Evaluating Bad Hosts Using Adaptive Blacklist Filter.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Pipelined ALU for effective external memory access in FPGA.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

DoH Insight: detecting DNS over HTTPS by machine learning.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2018
P4-To-VHDL: Automatic generation of high-speed input and output network blocks.
Microprocess. Microsystems, 2018

Enhanced Flow Monitoring with P4 Generated Flexible Packet Parser.
Proceedings of the 12th International Conference on Autonomous Infrastructure, 2018

Augmented DDoS Mitigation with Reputation Scores.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Making Flow-Based Security Detection Parallel.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

Hunting SIP Authentication Attacks Efficiently.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

Preserving Relations in Parallel Flow Data Processing.
Proceedings of the Security of Networks and Services in an All-Connected World, 2017

2016
Configuration of open vSwitch using OF-CONFIG.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Building a feedback loop to capture evidence of network incidents.
Proceedings of the 12th International Conference on Network and Service Management, 2016

NEMEA: A framework for network traffic analysis.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Analysis of Vertical Scans Discovered by Naive Detection.
Proceedings of the Management and Security in the Age of Hyperconnectivity, 2016

2015
Using Application-Aware Flow Monitoring for SIP Fraud Detection.
Proceedings of the Intelligent Mechanisms for Network Configuration and Security, 2015

2014
Stream-wise detection of surreptitious traffic over DNS.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

Change-point detection method on 100 Gb/s ethernet interface.
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, 2014


  Loading...