User profiles for author:"Pavel Čeleda"
Pavel ČeledaFaculty of Informatics, Masaryk University Verified email at fi.muni.cz Cited by 3137 |
Flow monitoring explained: From packet capture to data analysis with netflow and ipfix
Flow monitoring has become a prevalent method for monitoring traffic in high-speed
networks. By focusing on the analysis of flows, rather than individual packets, it is often said …
networks. By focusing on the analysis of flows, rather than individual packets, it is often said …
Survey of attack projection, prediction, and forecasting in cyber security
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …
Four main tasks are discussed first, attack projection and intention recognition, in which …
What are cybersecurity education papers about? a systematic literature review of sigcse and iticse conferences
Cybersecurity is now more important than ever, and so is education in this field. However,
the cybersecurity domain encompasses an extensive set of concepts, which can be taught in …
the cybersecurity domain encompasses an extensive set of concepts, which can be taught in …
A survey of methods for encrypted traffic classification and analysis
With the widespread use of encrypted data transport, network traffic encryption is becoming
a standard nowadays. This presents a challenge for traffic measurement, especially for …
a standard nowadays. This presents a challenge for traffic measurement, especially for …
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
The encryption of network traffic complicates legitimate network monitoring, traffic analysis,
and network forensics. In this paper, we present real-time lightweight identification of HTTPS …
and network forensics. In this paper, we present real-time lightweight identification of HTTPS …
Kypo cyber range: Design and use cases
The physical and cyber worlds are increasingly intertwined and exposed to cyber attacks.
The KYPO cyber range provides complex cyber systems and networks in a virtualized, fully …
The KYPO cyber range provides complex cyber systems and networks in a virtualized, fully …
Cybersecurity knowledge and skills taught in capture the flag challenges
Capture the Flag challenges are a popular form of cybersecurity education, where students
solve hands-on tasks in an informal, game-like setting. The tasks feature diverse …
solve hands-on tasks in an informal, game-like setting. The tasks feature diverse …
Scalable learning environments for teaching cybersecurity hands-on
This Innovative Practice full paper describes a technical innovation for scalable teaching of
cybersecurity hands-on classes using interactive learning environments. Hands-on …
cybersecurity hands-on classes using interactive learning environments. Hands-on …
[PDF][PDF] Kypo–a platform for cyber defence exercises
Correct and timely responses to cyber attacks are crucial for the effective implementation of
cyber defence strategies and policies. The number of threats and ingenuity of attackers is …
cyber defence strategies and policies. The number of threats and ingenuity of attackers is …
Identification of attack paths using kill chain and attack graphs
The ever-evolving capabilities of cyber attackers force security administrators to focus on the
early identification of emerging threats. Targeted cyber attacks usually consist of several …
early identification of emerging threats. Targeted cyber attacks usually consist of several …