Feature extraction using deep learning for intrusion detection system M Ishaque, L Hudec 2019 2nd International Conference on Computer Applications & Information …, 2019 | 31 | 2019 |
Risk analysis supported by information security metrics J Breier, L Hudec Proceedings of the 12th International Conference on Computer Systems and …, 2011 | 28 | 2011 |
On selecting critical security controls J Breier, L Hudec 2013 International Conference on Availability, Reliability and Security, 582-588, 2013 | 18 | 2013 |
New approach in information system security evaluation J Breier, L Hudec 2012 IEEE First AESS European Conference on Satellite Telecommunications …, 2012 | 17 | 2012 |
Role based network security model: a forward step towards firewall management A Hassan, L Hudec Workshop On Security of Information Technologies, 2003 | 15 | 2003 |
A performance study of 16-bit microcomputer-implemented FFT algorithms PD Stigall, RE Ziemer, L Hudec IEEE Micro 2 (4), 61-66, 1982 | 13 | 1982 |
A study of securing in-vehicle communication using IPSEC protocol J Lastinec, L Hudec Journal of Electrical Engineering 72 (2), 89-98, 2021 | 12 | 2021 |
Securing mobile ad hoc networks using distributed firewall with PKI J Filipek, L Hudec 2016 IEEE 14th International Symposium on Applied Machine Intelligence and …, 2016 | 12 | 2016 |
Survey: Classification of the IoT technologies for better selection to real use P Kaňuch, D Macko, L Hudec 2020 43rd International Conference on Telecommunications and Signal …, 2020 | 11 | 2020 |
Building public key infrastructure for MANET with help of BATMAN advanced P Vilhan, L Hudec 2013 European Modelling Symposium, 566-571, 2013 | 11 | 2013 |
Comparative analysis of TCP/IP security protocols for use in vehicle communication J Lastinec, L Hudec 2016 17th International Carpathian Control Conference (ICCC), 429-433, 2016 | 10 | 2016 |
A performance analysis of IPSec/AH protocol for automotive environment J Lastinec, L Hudec Proceedings of the 16th International Conference on Computer Systems and …, 2015 | 8 | 2015 |
On identifying proper security mechanisms J Breier, L Hudec Information and Communication Technology: International Conference, ICT …, 2013 | 7 | 2013 |
Towards a security evaluation model based on security metrics J Breier, L Hudec Proceedings of the 13th International Conference on Computer Systems and …, 2012 | 6 | 2012 |
Security architecture for the mobile ad hoc networks J Filipek, L Hudec Journal of Electrical Engineering 69 (3), 198-204, 2018 | 5 | 2018 |
Distributed firewall using PKI in mobile Ad Hoc networks J Filipek, L Hudec Proceedings of the 16th International Conference on Computer Systems and …, 2015 | 5 | 2015 |
Management and verification of firewall and router access lists AAA Hassan, L Hudec Computing and Informatics 23 (1), 77-100, 2004 | 5 | 2004 |
Comprehensive Analysis and Evaluation of Anomalous User Activity in Web Server Logs L Benova, L Hudec Sensors 24 (3), 746, 2024 | 3 | 2024 |
Distributed firewall in Mobile Ad Hoc Networks J Filipek, L Hudec 2015 IEEE 13th International Symposium on Applied Machine Intelligence and …, 2015 | 3 | 2015 |
The Quadruple Approach in Fault-Tolerant Transputer System Design K Jelemenska, L Hudec Progress in Computer and OCCAM Research., 155-163, 1994 | 3 | 1994 |