Tomas Sochor

Orcid: 0000-0002-1704-1883

According to our database1, Tomas Sochor authored at least 24 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A distributed malware detection model based on sandbox technology.
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023

Distributed System for Predicting Malicious Activity in Computer Networks.
Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, 2023

2022
Self-organized distributed anomaly detection system in computer systems based on the principal components method.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022

Proof of stake and Proof of work approach for malware detection technologies.
Proceedings of the 3rd International Workshop on Intelligent Information Technologies & Systems of Information Security, 2022

2021
Resilient Computer Systems Development for Cyberattacks Resistance.
Proceedings of the 2nd International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2021

K-means Clustering of Honeynet Data with Unsupervised Representation Learning.
Proceedings of the 2nd International Workshop on Intelligent Information Technologies & Systems of Information Security with CEUR-WS, 2021

2020
Detection Efficiency Improvement in Multi-component Anti-spam Systems.
Proceedings of the Computer Networks - 27th International Conference, 2020

2019
Intrusion Detection System for Home Windows based Computers.
KSII Trans. Internet Inf. Syst., 2019

2017
Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots.
Proceedings of the Computer Networks - 24th International Conference, 2017

2016
Analysis of attackers against windows emulating honeypots in various types of networks and regions.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Statistical analysis of attacking autonomous systems.
Proceedings of the 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security), 2016

Ad-Hoc Routing Protocols Comparison Using Open-Source Simulation Tool.
Proceedings of the Software Engineering Perspectives and Application in Intelligent Systems, 2016

High-Interaction Linux Honeypot Architecture in Recent Perspective.
Proceedings of the Computer Networks - 23rd International Conference, 2016

2015
Definition of Attack in Context of High Level Interaction Honeypots.
Proceedings of the Software Engineering in Intelligent Systems, 2015

Attractiveness Study of Honeypots and Honeynets in Internet Threat Detection.
Proceedings of the Computer Networks - 22nd International Conference, 2015

2014
Overview of e-mail SPAM elimination and its efficiency.
Proceedings of the IEEE 8th International Conference on Research Challenges in Information Science, 2014

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets.
Proceedings of the Computer Networks - 21st International Conference, 2014

2013
Potential of multilevel SPAM protection in the light of current SPAM trends.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013

Onion Routing Efficiency for Web Anonymization in Various Configurations.
Proceedings of the Computer Networks, 20th International Conference, 2013

2012
Anonymization of Web Client Traffic Efficiency Study.
Proceedings of the Computer Networks - 19th International Conference, 2012

2011
Efficiency comparison of greylisting at several SMTP servers.
Proceedings of the First World Conference on Information Technology, 2011

Comparison between normal and TOR-anonymized web client traffic.
Proceedings of the First World Conference on Information Technology, 2011

2009
Greylisting - long term analysis of anti-SPAM effect.
Proceedings of the CRiSIS 2009, 2009

2008
Greylisting method analysis in real SMTP server environment - Case-study.
Proceedings of the Innovations and Advances in Computer Sciences and Engineering, 2008


  Loading...