![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Martin Jurecek
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Olha Jurecková, Martin Jurecek
, Mark Stamp, Fabio Di Troia, Róbert Lórencz:
Classification and online clustering of zero-day malware. J. Comput. Virol. Hacking Tech. 20(4): 579-592 (2024) - [j6]Matous Kozák
, Martin Jurecek, Mark Stamp, Fabio Di Troia:
Creating valid adversarial examples of malware. J. Comput. Virol. Hacking Tech. 20(4): 607-621 (2024) - [j5]Pavla Louthánová, Matous Kozák
, Martin Jurecek, Mark Stamp, Fabio Di Troia:
A comparison of adversarial malware generators. J. Comput. Virol. Hacking Tech. 20(4): 623-639 (2024) - [j4]Anant Shukla, Martin Jurecek, Mark Stamp:
Social media bot detection using Dropout-GAN. J. Comput. Virol. Hacking Tech. 20(4): 669-680 (2024) - [j3]Jana Berusková, Martin Jurecek
, Olha Jurecková:
Reducing overdefined systems of polynomial equations derived from small scale variants of the AES via data mining methods. J. Comput. Virol. Hacking Tech. 20(4): 885-900 (2024) - [i10]Olha Jurecková, Martin Jurecek, Mark Stamp:
Online Clustering of Known and Emerging Malware Families. CoRR abs/2405.03298 (2024) - [i9]Jana Berusková, Martin Jurecek, Olha Jurecková:
Reducing Overdefined Systems of Polynomial Equations Derived from Small Scale Variants of the AES via Data Mining Methods. IACR Cryptol. ePrint Arch. 2024: 809 (2024) - 2023
- [c7]Matous Kozák, Martin Jurecek
:
Combining Generators of Adversarial Malware Examples to Increase Evasion Rate. SECRYPT 2023: 778-786 - [i8]Matous Kozák, Martin Jurecek
:
Combining Generators of Adversarial Malware Examples to Increase Evasion Rate. CoRR abs/2304.07360 (2023) - [i7]Olha Jurecková, Martin Jurecek
, Róbert Lórencz:
Classification and Online Clustering of Zero-Day Malware. CoRR abs/2305.00605 (2023) - [i6]Matous Kozák, Martin Jurecek, Mark Stamp, Fabio Di Troia:
Creating Valid Adversarial Examples of Malware. CoRR abs/2306.13587 (2023) - [i5]Atharva Sharma, Martin Jurecek, Mark Stamp:
Keystroke Dynamics for User Identification. CoRR abs/2307.05529 (2023) - [i4]Pavla Louthánová, Matous Kozák, Martin Jurecek
, Mark Stamp:
A Comparison of Adversarial Learning Techniques for Malware Detection. CoRR abs/2308.09958 (2023) - [i3]Anant Shukla, Martin Jurecek
, Mark Stamp:
Social Media Bot Detection using Dropout-GAN. CoRR abs/2311.05079 (2023) - 2022
- [c6]Martin Jurecek
, Olha Jurecková:
Parallel Instance Filtering for Malware Detection. SEAA 2022: 13-20 - [c5]Marek Bielik, Martin Jurecek
, Olha Jurecková, Róbert Lórencz:
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. SECRYPT 2022: 415-427 - [i2]Martin Jurecek
, Olha Jurecková:
Parallel Instance Filtering for Malware Detection. CoRR abs/2206.13889 (2022) - [i1]Marek Bielik, Martin Jurecek, Olha Jurecková, Róbert Lórencz:
Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. IACR Cryptol. ePrint Arch. 2022: 695 (2022) - 2021
- [j2]Martin Jurecek
, Róbert Lórencz:
Application of Distance Metric Learning to Automated Malware Detection. IEEE Access 9: 96151-96165 (2021) - [c4]Martin Jurecek
, Matous Kozák:
Representation of PE Files using LSTM Networks. ICISSP 2021: 516-525 - [c3]Martin Jurecek, Olha Jurecková, Róbert Lórencz:
Improving Classification of Malware Families using Learning a Distance Metric. ICISSP 2021: 643-652 - 2020
- [c2]Martin Jurecek
, Róbert Lórencz:
Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection. ICISSP 2020: 725-732
2010 – 2019
- 2019
- [c1]Martin Jurecek
, Jirí Bucek, Róbert Lórencz
:
Side-Channel Attack on the A5/1 Stream Cipher. DSD 2019: 633-638 - 2018
- [j1]Martin Jurecek, Róbert Lórencz:
Malware Detection Using a Heterogeneous Distance Function. Comput. Informatics 37(3): 759-780 (2018)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint