Petr Matousek

Orcid: 0000-0003-4589-2041

According to our database1, Petr Matousek authored at least 35 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication.
IEEE Trans. Smart Grid, May, 2023

Arrival times by Recurrent Neural Network for induced seismic events from a permanent network.
Frontiers Big Data, January, 2023

2022
Modbus Dataset for ICS Anomaly Detection.
Dataset, March, 2022

ICS Dataset for Smart Grid Anomaly Detection.
Dataset, March, 2022

Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict?
Proceedings of the 19th International Conference on Security and Cryptography, 2022

2021
Outlier Detection in Smart Grid Communication.
CoRR, 2021

Unified SNMP Interface for IoT Monitoring.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Efficient Modelling of ICS Communication For Anomaly Detection Using Probabilistic Automata.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

A Network Traffic Processing Library for ICS Anomaly Detection.
Proceedings of the ECBS 2021: 7th Conference on the Engineering of Computer Based Systems, 2021

Anomaly Detection of ICS Communication Using Statistical Models.
Proceedings of the 17th International Conference on Network and Service Management, 2021

2020
Flow based monitoring of ICS communication in the smart grid.
J. Inf. Secur. Appl., 2020

Identity Linking in Computer Networks.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

On Reliability of JA3 Hashes for Fingerprinting Mobile Applications.
Proceedings of the Digital Forensics and Cyber Crime - 11th EAI International Conference, 2020

2019
Security Monitoring of IoT Communication Using Flows.
Proceedings of the 6th Conference on the Engineering of Computer Based Systems, 2019

2016
On Efficiency of Distributed Password Recovery.
J. Digit. Forensics Secur. Law, 2016

Experimental Evaluation of Password Recovery in Encrypted Documents.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2015
Advanced Techniques for Reconstruction of Incomplete Network Data.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

2014
Comment on "Remote Physical Device Fingerprinting".
IEEE Trans. Dependable Secur. Comput., 2014

Fast RTP Detection and Codecs Classification in Internet Traffic.
J. Digit. Forensics Secur. Law, 2014

Towards Identification of Operating Systems from the Internet Traffic - IPFIX Monitoring with Fingerprinting and Clustering.
Proceedings of the DCNET 2014, 2014

2013
On formal reachability analysis in networks with dynamic behavior.
Telecommun. Syst., 2013

Multicast simulation and modeling in OMNeT++.
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques, 2013

Host Identity Detection in IPv6 Networks.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

A New Approach for Detection of Host Identity in IPv6 Networks.
Proceedings of the DCNET, ICE-B and OPTICS 2013 - Proceedings of the 4th International Conference on Data Communication Networking, 10th International Conference on e-Business and 4th International Conference on Optical Communication Systems, Reykjavík, Iceland, 29, 2013

2011
Practical IPv6 monitoring-challenges and techniques.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Reachability Analysis in Dynamically Routed Networks.
Proceedings of the 18th IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, 2011

2010
Combination of simulation and formal methods to analyse network survivability.
Proceedings of the 3rd International Conference on Simulation Tools and Techniques, 2010

Formal analysis approach on networks with dynamic behaviours.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

Static Analysis of Routing and Firewall Policy Configurations.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Security Analysis of TCP/IP Networks - An Approach to Automatic Analysis of Network Security Properties.
Proceedings of the DCNET 2010 & OPTICS 2010 - Proceedings of the International Conference on Data Communication Networking and International Conference on Optical Communication Systems, Athens, Greece, July 26, 2010

2008
A Formal Model for Network-Wide Security Analysis.
Proceedings of the 15th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2008), 31 March, 2008

2006
Verifying VHDL Designs with Multiple Clocks in SMV.
Proceedings of the Formal Methods: Applications and Technology, 2006

2005
High-Level Modelling, Analysis, and Verification on FPGA-Based Hardware Design.
Proceedings of the Correct Hardware Design and Verification Methods, 2005

2004
Tools for Parametric Verification. A Comparison on a Case Study.
J. Univers. Comput. Sci., 2004

2003
Verification of Workflow Specification Standards.
Proceedings of the Doctoral Consortium, 2003


  Loading...