An empirical comparison of botnet detection methods S Garcia, M Grill, J Stiborek, A Zunino computers & security 45, 100-123, 2014 | 882 | 2014 |
Illegitimate typosquatting detection with internet protocol information M Grill, J Kohout, M Kopp, T Pevny US Patent 10,491,614, 2019 | 284 | 2019 |
Detecting DGA malware using NetFlow M Grill, I Nikolaev, V Valeros, M Rehak 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 92 | 2015 |
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing M Grill, T Pevný, M Rehak Journal of Computer and System Sciences 83 (1), 43-57, 2017 | 85 | 2017 |
Adaptive multiagent system for network traffic monitoring M Rehak, M Pechoucek, M Grill, J Stiborek, K Bartos, P Celeda Intelligent Systems, IEEE 24 (3), 16-25, 2009 | 81 | 2009 |
Analyzing encrypted traffic behavior using contextual traffic data J Kohout, BH Anderson, M Grill, D McGrew, M Kopp, T Pevny US Patent 10,805,338, 2020 | 43 | 2020 |
Runtime monitoring and dynamic reconfiguration for intrusion detection systems M Rehák, E Staab, V Fusenig, M Pěchouček, M Grill, J Stiborek, K Bartoš, ... Recent Advances in Intrusion Detection, 61-80, 2009 | 42 | 2009 |
Learning combination of anomaly detectors for security domain M Grill, T Pevný Computer Networks 107, 55-63, 2016 | 40 | 2016 |
Leveraging endpoint and network environment inferences for malware traffic classification BH Anderson, M Rehak, D McGrew, M Vejman, T Pevny, M Grill, J Kohout US Patent 10,855,698, 2020 | 37 | 2020 |
Tracking users over network hosts based on user behavior J Mrkos, M Grill, J Kohout US Patent 10,129,271, 2018 | 37 | 2018 |
Malware detection using http user-agent discrepancy identification M Grill, M Rehák 2014 IEEE International Workshop on Information Forensics and Security (WIFS …, 2014 | 36 | 2014 |
Detecting DGA-based malicious software using network flow information M Grill, I Nikolaev US Patent 9,654,484, 2017 | 31 | 2017 |
CAMNEP: An intrusion detection system for high-speed networks M Rehak, M Pechoucek, K Bartos, M Grill, P Celeda, V Krmicek Progress in informatics 5, 65-74, 2008 | 28 | 2008 |
Malware classification and attribution through server fingerprinting using server certificate data BH Anderson, D McGrew, S Paul, I Nikolaev, M Grill US Patent 10,686,831, 2020 | 25 | 2020 |
Dynamic information source selection for intrusion detection systems M Rehak, E Staab, M Pechoucek, J Stiborek, M Grill, K Bartos Proceedings of The 8th International Conference on Autonomous Agents and …, 2009 | 24 | 2009 |
Detecting network services based on network flow data I Nikolaev, M Grill, J Jusko US Patent 10,027,562, 2018 | 23 | 2018 |
Trust-based classifier combination for network anomaly detection M Rehák, M Pěchouček, M Grill, K Bartos Cooperative Information Agents XII, 116-130, 2008 | 21 | 2008 |
Analyzing encrypted traffic behavior using contextual traffic data J Kohout, BH Anderson, M Grill, D McGrew, M Kopp, T Pevny US Patent 11,451,578, 2022 | 19 | 2022 |
Multi-agent approach to network intrusion detection M Rehak, M Pechoucek, P Celeda, V Krmicek, M Grill, K Bartos Proceedings of the 7th international joint conference on Autonomous agents …, 2008 | 19 | 2008 |
Identifying self-signed certificates using HTTP access logs for malware detection M Kopp, M Grill, J Kohout US Patent 10,375,097, 2019 | 17 | 2019 |