default search action
Dusan Kolár
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j11]Daniel Uhrícek, Karel Hynek, Tomás Cejka, Dusan Kolár:
BOTA: Explainable IoT Malware Detection in Large Networks. IEEE Internet Things J. 10(10): 8416-8431 (2023) - [c12]Dominika Regéciová, Dusan Kolár:
GenRex: Leveraging Regular Expressions for Dynamic Malware Detection. TrustCom 2023: 857-864 - 2021
- [j10]Dominika Regéciová, Dusan Kolár, Marek Milkovic:
Pattern Matching in YARA: Improved Aho-Corasick Algorithm. IEEE Access 9: 62857-62866 (2021) - 2020
- [c11]Radek Hranický, Lukás Zobal, Ondrej Rysavý, Dusan Kolár, Dávid Mikus:
Distributed PCFG Password Cracking. ESORICS (1) 2020: 701-719 - [c10]Lukás Zobal, Dusan Kolár, Jakub Kroustek:
Exploring Current E-mail Cyber Threats using Authenticated SMTP Honeypot. ICETE (2) 2020: 253-262
2010 – 2019
- 2019
- [j9]Radek Hranický, Lukás Zobal, Ondrej Rysavý, Dusan Kolár:
Distributed password cracking with BOINC and hashcat. Digit. Investig. 30: 161-172 (2019) - [c9]Lukás Zobal, Dusan Kolár, Radek Fujdiak:
Current State of Honeypots and Deception Strategies in Cybersecurity. ICUMT 2019: 1-9 - 2014
- [j8]Jakub Kroustek, Fridolín Pokorný, Dusan Kolár:
A new approach to instruction-idioms detection in a retargetable decompiler. Comput. Sci. Inf. Syst. 11(4): 1337-1359 (2014) - 2013
- [j7]Jakub Kroustek, Dusan Kolár:
Approaching Retargetable Static, Dynamic, and Hybrid Executable-Code Analysis. Acta Informatica Pragensia 2(1): 18-29 (2013) - [j6]Jakub Kroustek, Dusan Kolár:
Context parsing (not only) of the object-file-format description language. Comput. Sci. Inf. Syst. 10(4): 1673-1701 (2013) - 2012
- [j5]Dusan Kolár:
Drawing Programs: The Theory and Practice of Schematic Functional Programming, by Tom Addis and Jan Addis Springer, 2010, ISBN 978-1-84882-617-5, 379pp. J. Funct. Program. 22(2): 219-221 (2012) - [j4]Lukás Durfina, Dusan Kolár:
C source code obfuscator. Kybernetika 48(3): 494-501 (2012) - 2011
- [c8]Zdenek Prikryl, Jakub Kroustek, Tomas Hruska, Dusan Kolár:
Fast just-in-time translated simulator for ASIP design. DDECS 2011: 279-282 - [c7]Dusan Kolár, Sárka Kvetonová:
People Transfer in City Transport Modeled via CPN. EUROCAST (1) 2011: 192-199 - [c6]Lukás Durfina, Jakub Kroustek, Petr Zemek, Dusan Kolár, Tomás Hruska, Karel Masarík, Alexander Meduna:
Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis. ISA 2011: 72-86 - 2010
- [j3]Sárka Kvetonová, Dusan Kolár:
Project plan formalisation and modelling via timed coloured Petri nets. Int. J. Comput. Aided Eng. Technol. 2(4): 388-399 (2010) - [c5]Zdenek Prikryl, Jakub Kroustek, Tomas Hruska, Dusan Kolár:
Fast Translated Simulation of ASIPs. MEMICS 2010: 93-100
2000 – 2009
- 2009
- [c4]Ota Jirák, Dusan Kolár:
Derivation in Scattered Context Grammar via Lazy Function Evaluation. MEMICS 2009 - 2007
- [c3]Lukás Sekanina, Tomas Hruska, Tomás Vojnar, Dusan Kolár, Jan Cernocký:
On Some Directions in Security-Oriented Research. BLISS 2007: 141-144 - [e1]Alica Kelemenová, Dusan Kolár, Alexander Meduna:
Proceedings of the 2nd International Workshop on Formal Models WFM'07, Hradec nad Moravicí, Czech Republic, April 23-25, 2007. CEUR Workshop Proceedings 255, CEUR-WS.org 2007 [contents] - 2004
- [c2]Dusan Kolár, Stanislav Cerny:
Evolution of Software for Embedded Systems in Processor Expert. ECBS 2004: 419-422 - 2003
- [c1]Alexander Meduna, Dusan Kolár:
Descriptional Complexity of Multi-Parallel Grammars with Respect to the Number of Nonterminals. Grammars and Automata for String Processing 2003: 91-98 - 2002
- [j2]Alexander Meduna, Dusan Kolár:
Homogeneous grammars with a reduced number of non-context-free productions. Inf. Process. Lett. 81(5): 253-257 (2002) - 2000
- [j1]Alexander Meduna, Dusan Kolár:
Regulated Pushdown Automata. Acta Cybern. 14(4): 653-664 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint