default search action
Tomás Cejka
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Josef Koumar, Karel Hynek, Jaroslav Pesek, Tomás Cejka:
NetTiSA: Extended IP flow with time-series features for universal bandwidth-constrained high-speed network traffic classification. Comput. Networks 240: 110147 (2024) - [c34]Tomás Martínek, Jan Korenek, Tomás Cejka:
LGBM2VHDL: Mapping of LightGBM Models to FPGA. FCCM 2024: 97-103 - [c33]Lukás Jancicka, Josef Koumar, Dominik Soukup, Tomás Cejka:
Analysis of Statistical Distribution Changes of Input Features in Network Traffic Classification Domain. NOMS 2024: 1-4 - [c32]Dominik Soukup, Jaroslav Pesek, Lukás Hejcman, David Benes, Tomás Cejka:
TCI: A system for distributed network monitoring, troubleshooting and dataset creation. NOMS 2024: 1-6 - [i6]Josef Koumar, Karel Hynek, Tomás Cejka, Pavel Siska:
CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting. CoRR abs/2409.18874 (2024) - 2023
- [j5]Jan Luxemburk, Tomás Cejka:
Fine-grained TLS services classification with reject option. Comput. Networks 220: 109467 (2023) - [j4]Daniel Uhrícek, Karel Hynek, Tomás Cejka, Dusan Kolár:
BOTA: Explainable IoT Malware Detection in Large Networks. IEEE Internet Things J. 10(10): 8416-8431 (2023) - [c31]Jaroslav Pesek, Dominik Soukup, Tomás Cejka:
Active Learning Framework For Long-term Network Traffic Classification. CCWC 2023: 893-899 - [c30]Tomás Benes, Jaroslav Pesek, Tomás Cejka:
Look at my Network: An Insight into the ISP Backbone Traffic. CNSM 2023: 1-7 - [c29]Josef Koumar, Karel Hynek, Tomás Cejka:
Network Traffic Classification Based on Single Flow Time Series Analysis. CNSM 2023: 1-7 - [c28]Josef Koumar, Richard Plný, Tomás Cejka:
Enhancing DeCrypto: Finding Cryptocurrency Miners Based on Periodic Behavior. CNSM 2023: 1-7 - [c27]Dominik Soukup, Daniel Uhrícek, Daniel Vasata, Tomás Cejka:
Machine Learning Metrics for Network Datasets Evaluation. SEC 2023: 307-320 - [c26]Josef Koumar, Tomás Cejka:
Unevenly Spaced Time Series from Network Traffic. TMA 2023: 1-4 - [c25]Jan Luxemburk, Karel Hynek, Tomás Cejka:
Encrypted traffic classification: the QUIC case. TMA 2023: 1-10 - [i5]Josef Koumar, Karel Hynek, Tomás Cejka:
Network Traffic Classification based on Single Flow Time Series Analysis. CoRR abs/2307.13434 (2023) - [i4]Josef Koumar, Karel Hynek, Jaroslav Pesek, Tomás Cejka:
NetTiSA: Extended IP Flow with Time-series Features for Universal Bandwidth-constrained High-speed Network Traffic Classification. CoRR abs/2310.05530 (2023) - 2022
- [j3]Karel Hynek, Dmitrii Vekshin, Jan Luxemburk, Tomás Cejka, Armin Wasicek:
Summary of DNS Over HTTPS Abuse. IEEE Access 10: 54668-54680 (2022) - [j2]Martin Zádník, Jan Wrona, Karel Hynek, Tomás Cejka, Martin Husák:
Discovering Coordinated Groups of IP Addresses Through Temporal Correlation of Alerts. IEEE Access 10: 82799-82813 (2022) - [c24]Josef Koumar, Tomás Cejka:
Network traffic classification based on periodic behavior detection. CNSM 2022: 359-363 - [c23]Lukás Melcher, Karel Hynek, Tomás Cejka:
Tunneling through DNS over TLS providers. CNSM 2022: 359-363 - [c22]Sebastián García, Joaquín Bogado, Karel Hynek, Dmitrii Vekshin, Tomás Cejka, Armin Wasicek:
Large Scale Analysis of DoH Deployment on the Internet. ESORICS (3) 2022: 145-165 - [c21]Richard Plný, Karel Hynek, Tomás Cejka:
DeCrypto: Finding Cryptocurrency Miners on ISP Networks. NordSec 2022: 139-158 - [c20]Katarzyna Wasielewska, Dominik Soukup, Tomás Cejka, José Camacho:
Evaluation of the Limit of Detection in Network Dataset Quality Assessment with PerQoDA. PKDD/ECML Workshops (2) 2022: 170-185 - [i3]Jan Luxemburk, Tomás Cejka:
Fine-grained TLS Services Classification with Reject Option. CoRR abs/2202.11984 (2022) - [i2]Jaroslav Pesek, Dominik Soukup, Tomás Cejka:
Active Learning Framework to Automate NetworkTraffic Classification. CoRR abs/2211.08399 (2022) - 2021
- [c19]Jan Luxemburk, Karel Hynek, Tomás Cejka:
Detection of HTTPS Brute-Force Attacks with Packet-Level Feature Set. CCWC 2021: 114-122 - [c18]Dominik Soukup, Peter Tisovcík, Karel Hynek, Tomás Cejka:
Towards Evaluating Quality of Datasets for Network Traffic Domain. CNSM 2021: 264-268 - [c17]Zdena Tropková, Karel Hynek, Tomás Cejka:
Novel HTTPS classifier driven by packet bursts, flows, and machine learning. CNSM 2021: 345-349 - [i1]Sebastián García, Karel Hynek, Dmitrii Vekshin, Tomás Cejka, Armin Wasicek:
Large Scale Measurement on the Adoption of Encrypted DNS. CoRR abs/2107.04436 (2021) - 2020
- [c16]Dmitrii Vekshin, Karel Hynek, Tomás Cejka:
DoH Insight: detecting DNS over HTTPS by machine learning. ARES 2020: 87:1-87:8 - [c15]Tomás Benes, Michal Kekely, Karel Hynek, Tomás Cejka:
Pipelined ALU for effective external memory access in FPGA. DSD 2020: 97-100 - [c14]Karel Hynek, Tomás Cejka, Martin Zádník, Hana Kubátová:
Evaluating Bad Hosts Using Adaptive Blacklist Filter. MECO 2020: 1-5 - [c13]Karel Hynek, Tomás Benes, Tomás Cejka, Hana Kubátová:
Refined Detection of SSH Brute-Force Attackers Using Machine Learning. SEC 2020: 49-63
2010 – 2019
- 2018
- [j1]Pavel Benácek, Viktor Pus, Hana Kubátová, Tomás Cejka:
P4-To-VHDL: Automatic generation of high-speed input and output network blocks. Microprocess. Microsystems 56: 22-33 (2018) - [c12]Tomás Jánský, Tomás Cejka, Martin Zádník, Václav Bartos:
Augmented DDoS Mitigation with Reputation Scores. ARES 2018: 54:1-54:7 - [c11]Tomás Cejka, Petr Velan, Jirí Havránek, Pavel Benácek:
Enhanced Flow Monitoring with P4 Generated Flexible Packet Parser. AIMS 2018: 21-32 - 2017
- [c10]Marek Svepes, Tomás Cejka:
Making Flow-Based Security Detection Parallel. AIMS 2017: 3-15 - [c9]Tomás Jánský, Tomás Cejka, Václav Bartos:
Hunting SIP Authentication Attacks Efficiently. AIMS 2017: 125-130 - [c8]Tomás Cejka, Martin Zádník:
Preserving Relations in Parallel Flow Data Processing. AIMS 2017: 153-156 - 2016
- [c7]Tomás Cejka, Marek Svepes:
Analysis of Vertical Scans Discovered by Naive Detection. AIMS 2016: 165-169 - [c6]Tomás Cejka, Václav Bartos, Marek Svepes, Zdenek Rosa, Hana Kubátová:
NEMEA: A framework for network traffic analysis. CNSM 2016: 195-201 - [c5]Zdenek Rosa, Tomás Cejka, Martin Zádník, Viktor Pus:
Building a feedback loop to capture evidence of network incidents. CNSM 2016: 292-296 - [c4]Tomás Cejka, Radek Krejcí:
Configuration of open vSwitch using OF-CONFIG. NOMS 2016: 883-888 - 2015
- [c3]Tomás Cejka, Václav Bartos, Lukas Truxa, Hana Kubátová:
Using Application-Aware Flow Monitoring for SIP Fraud Detection. AIMS 2015: 87-99 - 2014
- [c2]Pavel Benácek, Rudolf B. Blazek, Tomás Cejka, Hana Kubátová:
Change-point detection method on 100 Gb/s ethernet interface. ANCS 2014: 245-246 - [c1]Tomás Cejka, Zdenek Rosa, Hana Kubátová:
Stream-wise detection of surreptitious traffic over DNS. CAMAD 2014: 300-304
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint