Now showing items 1-2 of 2

    • Dynamic Reconfiguration of Intrusion Detection Systems 

      Author: Stiborek, Jan; Supervisor: Pevný, Tomáš; Rehák, Martin
      (2017)
      Intrusion detection systems (IDS) used in network security are complex solutions that require precise tuning prior to their deployment. Such tuning, however, is a problem. If done statically, the fixed configuration fails ...
    • Graph-based Detection of Malicious Network Communities 

      Author: Jusko, Ján; Supervisor: Rehák, Martin; Pevný, Tomáš
      (2017)
      In this thesis, we use graph based methods in conjunction with behavioral modeling to uncover hidden malicious communities and peer-to-peer tra c. The nature of malicious tra c, and its tendency to rally in order to ...