• Dynamic Reconfiguration of Intrusion Detection Systems 

      Autor: Stiborek, Jan; Vedoucí práce: Pevný, Tomáš; Rehák, Martin
      (2017)
      Intrusion detection systems (IDS) used in network security are complex solutions that require precise tuning prior to their deployment. Such tuning, however, is a problem. If done statically, the fixed configuration fails ...
    • Graph-based Detection of Malicious Network Communities 

      Autor: Jusko, Ján; Vedoucí práce: Rehák, Martin; Pevný, Tomáš
      (2017)
      In this thesis, we use graph based methods in conjunction with behavioral modeling to uncover hidden malicious communities and peer-to-peer tra c. The nature of malicious tra c, and its tendency to rally in order to ...