Petr Hanácek
Orcid: 0000-0001-5507-0768
According to our database1,
Petr Hanácek
authored at least 37 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
2
2
1
2
1
1
1
1
1
1
2
2
1
1
3
1
4
3
1
1
3
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
EURASIP J. Image Video Process., December, 2024
Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering.
CoRR, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the International Conference of the Biometrics Special Interest Group, 2024
2023
Proceedings of the International Conference on Information Networking, 2023
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
2022
ASNM Datasets: A Collection of Network Traffic Data for Testing of Adversarial Classifiers and Network Intrusion Detectors.
Dataset, May, 2022
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management.
CoRR, 2022
2020
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors.
IEEE Access, 2020
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020
2019
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach.
EAI Endorsed Trans. Security Safety, 2019
ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors.
CoRR, 2019
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019
2017
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset.
J. Comput., 2017
2016
Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection.
Proceedings of the Security and Privacy in Communication Networks, 2016
On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016
2015
Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015, 2015
2014
Code Search API, Base of Parallel Code Refactoring System For Safety Standards Compliance.
J. Cyber Secur. Mobil., 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014
Proceedings of the International Carnahan Conference on Security Technology, 2014
2013
Inf. Technol. Control., 2013
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013
2012
A concept of automated vulnerability search in contactless communication applications.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2012
2011
Proceedings of the International Carnahan Conference on Security Technology, 2011
2010
2009
J. Univers. Comput. Sci., 2009
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009
Proceedings of the Security Technology, 2009
Proceedings of the Security Technology, 2009
1998
Proceedings of the SOFSEM '98: Theory and Practice of Informatics, 1998