Follow
Hudec Ladislav
Hudec Ladislav
Associate Professor at the Faculty of Informatics and Information Technologies of Slovak University of Technology
Verified email at stuba.sk - Homepage
Title
Cited by
Cited by
Year
Feature extraction using deep learning for intrusion detection system
M Ishaque, L Hudec
2019 2nd International Conference on Computer Applications & Information …, 2019
312019
Risk analysis supported by information security metrics
J Breier, L Hudec
Proceedings of the 12th International Conference on Computer Systems and …, 2011
282011
On selecting critical security controls
J Breier, L Hudec
2013 International Conference on Availability, Reliability and Security, 582-588, 2013
182013
New approach in information system security evaluation
J Breier, L Hudec
2012 IEEE First AESS European Conference on Satellite Telecommunications …, 2012
172012
Role based network security model: a forward step towards firewall management
A Hassan, L Hudec
Workshop On Security of Information Technologies, 2003
152003
A performance study of 16-bit microcomputer-implemented FFT algorithms
PD Stigall, RE Ziemer, L Hudec
IEEE Micro 2 (4), 61-66, 1982
131982
A study of securing in-vehicle communication using IPSEC protocol
J Lastinec, L Hudec
Journal of Electrical Engineering 72 (2), 89-98, 2021
122021
Securing mobile ad hoc networks using distributed firewall with PKI
J Filipek, L Hudec
2016 IEEE 14th International Symposium on Applied Machine Intelligence and …, 2016
122016
Survey: Classification of the IoT technologies for better selection to real use
P Kaňuch, D Macko, L Hudec
2020 43rd International Conference on Telecommunications and Signal …, 2020
112020
Building public key infrastructure for MANET with help of BATMAN advanced
P Vilhan, L Hudec
2013 European Modelling Symposium, 566-571, 2013
112013
Comparative analysis of TCP/IP security protocols for use in vehicle communication
J Lastinec, L Hudec
2016 17th International Carpathian Control Conference (ICCC), 429-433, 2016
102016
A performance analysis of IPSec/AH protocol for automotive environment
J Lastinec, L Hudec
Proceedings of the 16th International Conference on Computer Systems and …, 2015
82015
On identifying proper security mechanisms
J Breier, L Hudec
Information and Communication Technology: International Conference, ICT …, 2013
72013
Towards a security evaluation model based on security metrics
J Breier, L Hudec
Proceedings of the 13th International Conference on Computer Systems and …, 2012
62012
Security architecture for the mobile ad hoc networks
J Filipek, L Hudec
Journal of Electrical Engineering 69 (3), 198-204, 2018
52018
Distributed firewall using PKI in mobile Ad Hoc networks
J Filipek, L Hudec
Proceedings of the 16th International Conference on Computer Systems and …, 2015
52015
Management and verification of firewall and router access lists
AAA Hassan, L Hudec
Computing and Informatics 23 (1), 77-100, 2004
52004
Comprehensive Analysis and Evaluation of Anomalous User Activity in Web Server Logs
L Benova, L Hudec
Sensors 24 (3), 746, 2024
32024
Distributed firewall in Mobile Ad Hoc Networks
J Filipek, L Hudec
2015 IEEE 13th International Symposium on Applied Machine Intelligence and …, 2015
32015
The Quadruple Approach in Fault-Tolerant Transputer System Design
K Jelemenska, L Hudec
Progress in Computer and OCCAM Research., 155-163, 1994
31994
The system can't perform the operation now. Try again later.
Articles 1–20