default search action
Karel Hynek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Josef Koumar, Karel Hynek, Jaroslav Pesek, Tomás Cejka:
NetTiSA: Extended IP flow with time-series features for universal bandwidth-constrained high-speed network traffic classification. Comput. Networks 240: 110147 (2024) - [j5]Kamil Jerábek, Karel Hynek, Ondrej Rysavý:
Comparative analysis of DNS over HTTPS detectors. Comput. Networks 247: 110452 (2024) - [c16]Jan Luxemburk, Karel Hynek:
Towards Reusable Models in Traffic Classification. TMA 2024: 1-4 - [i5]Josef Koumar, Karel Hynek, Tomás Cejka, Pavel Siska:
CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting. CoRR abs/2409.18874 (2024) - 2023
- [j4]Kamil Jerábek, Karel Hynek, Ondrej Rysavý, Ivana Burgetova:
DNS Over HTTPS Detection Using Standard Flow Telemetry. IEEE Access 11: 50000-50012 (2023) - [j3]Daniel Uhrícek, Karel Hynek, Tomás Cejka, Dusan Kolár:
BOTA: Explainable IoT Malware Detection in Large Networks. IEEE Internet Things J. 10(10): 8416-8431 (2023) - [c15]Josef Koumar, Karel Hynek, Tomás Cejka:
Network Traffic Classification Based on Single Flow Time Series Analysis. CNSM 2023: 1-7 - [c14]Jan Luxemburk, Karel Hynek:
DataZoo: Streamlining Traffic Classification Experiments. SAFE@CoNEXT 2023: 3-7 - [c13]Jan Luxemburk, Karel Hynek, Tomás Cejka:
Encrypted traffic classification: the QUIC case. TMA 2023: 1-10 - [i4]Josef Koumar, Karel Hynek, Tomás Cejka:
Network Traffic Classification based on Single Flow Time Series Analysis. CoRR abs/2307.13434 (2023) - [i3]Josef Koumar, Karel Hynek, Jaroslav Pesek, Tomás Cejka:
NetTiSA: Extended IP Flow with Time-series Features for Universal Bandwidth-constrained High-speed Network Traffic Classification. CoRR abs/2310.05530 (2023) - [i2]Jan Luxemburk, Karel Hynek:
DataZoo: Streamlining Traffic Classification Experiments. CoRR abs/2310.19568 (2023) - 2022
- [j2]Karel Hynek, Dmitrii Vekshin, Jan Luxemburk, Tomás Cejka, Armin Wasicek:
Summary of DNS Over HTTPS Abuse. IEEE Access 10: 54668-54680 (2022) - [j1]Martin Zádník, Jan Wrona, Karel Hynek, Tomás Cejka, Martin Husák:
Discovering Coordinated Groups of IP Addresses Through Temporal Correlation of Alerts. IEEE Access 10: 82799-82813 (2022) - [c12]Lukás Melcher, Karel Hynek, Tomás Cejka:
Tunneling through DNS over TLS providers. CNSM 2022: 359-363 - [c11]Sebastián García, Joaquín Bogado, Karel Hynek, Dmitrii Vekshin, Tomás Cejka, Armin Wasicek:
Large Scale Analysis of DoH Deployment on the Internet. ESORICS (3) 2022: 145-165 - [c10]Richard Plný, Karel Hynek, Tomás Cejka:
DeCrypto: Finding Cryptocurrency Miners on ISP Networks. NordSec 2022: 139-158 - 2021
- [c9]Jan Luxemburk, Karel Hynek, Tomás Cejka:
Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set. CCWC 2021: 114-122 - [c8]Dominik Soukup, Peter Tisovcík, Karel Hynek, Tomás Cejka:
Towards Evaluating Quality of Datasets for Network Traffic Domain. CNSM 2021: 264-268 - [c7]Zdena Tropková, Karel Hynek, Tomás Cejka:
Novel HTTPS classifier driven by packet bursts, flows, and machine learning. CNSM 2021: 345-349 - [i1]Sebastián García, Karel Hynek, Dmitrii Vekshin, Tomás Cejka, Armin Wasicek:
Large Scale Measurement on the Adoption of Encrypted DNS. CoRR abs/2107.04436 (2021) - 2020
- [c6]Dmitrii Vekshin, Karel Hynek, Tomás Cejka:
DoH Insight: detecting DNS over HTTPS by machine learning. ARES 2020: 87:1-87:8 - [c5]Tomás Benes, Michal Kekely, Karel Hynek, Tomás Cejka:
Pipelined ALU for effective external memory access in FPGA. DSD 2020: 97-100 - [c4]Karel Hynek, Tomás Cejka, Martin Zádník, Hana Kubátová:
Evaluating Bad Hosts Using Adaptive Blacklist Filter. MECO 2020: 1-5 - [c3]Karel Hynek, Tomás Benes, Tomás Cejka, Hana Kubátová:
Refined Detection of SSH Brute-Force Attackers Using Machine Learning. SEC 2020: 49-63
2010 – 2019
- 2019
- [c2]Karel Hynek, Tomás Benes, Matej Bartik, Pavel Kubalík:
Ultra High Resolution Jitter Measurement Method for Ethernet Based Networks. CCWC 2019: 847-851 - [c1]Sven Ubik, Karel Hynek, Jiri Melnikov:
FPGA Packet Reflector for Network Path Testing. IWSSIP 2019: 39-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint