User profiles for author:"Pavel Čeleda"

Pavel Čeleda

Faculty of Informatics, Masaryk University
Verified email at fi.muni.cz
Cited by 3137

Flow monitoring explained: From packet capture to data analysis with netflow and ipfix

R Hofstede, P Čeleda, B Trammell… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Flow monitoring has become a prevalent method for monitoring traffic in high-speed
networks. By focusing on the analysis of flows, rather than individual packets, it is often said …

Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

What are cybersecurity education papers about? a systematic literature review of sigcse and iticse conferences

V Švábenský, J Vykopal, P Čeleda - Proceedings of the 51st ACM …, 2020 - dl.acm.org
Cybersecurity is now more important than ever, and so is education in this field. However,
the cybersecurity domain encompasses an extensive set of concepts, which can be taught in …

A survey of methods for encrypted traffic classification and analysis

P Velan, M Čermák, P Čeleda… - International Journal of …, 2015 - Wiley Online Library
With the widespread use of encrypted data transport, network traffic encryption is becoming
a standard nowadays. This presents a challenge for traffic measurement, especially for …

HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting

M Husák, M Čermák, T Jirsík, P Čeleda - EURASIP Journal on Information …, 2016 - Springer
The encryption of network traffic complicates legitimate network monitoring, traffic analysis,
and network forensics. In this paper, we present real-time lightweight identification of HTTPS …

Kypo cyber range: Design and use cases

J Vykopal, R Ošlejšek, P Čeleda, M Vizvary… - 2017 - is.muni.cz
The physical and cyber worlds are increasingly intertwined and exposed to cyber attacks.
The KYPO cyber range provides complex cyber systems and networks in a virtualized, fully …

Cybersecurity knowledge and skills taught in capture the flag challenges

V Švábenský, P Čeleda, J Vykopal, S Brišáková - Computers & Security, 2021 - Elsevier
Capture the Flag challenges are a popular form of cybersecurity education, where students
solve hands-on tasks in an informal, game-like setting. The tasks feature diverse …

Scalable learning environments for teaching cybersecurity hands-on

J Vykopal, P Čeleda, P Seda… - 2021 IEEE Frontiers …, 2021 - ieeexplore.ieee.org
This Innovative Practice full paper describes a technical innovation for scalable teaching of
cybersecurity hands-on classes using interactive learning environments. Hands-on …

[PDF][PDF] Kypo–a platform for cyber defence exercises

P Čeleda, J Čegan, J Vykopal, D Tovarňák - M&S Support to …, 2015 - is.muni.cz
Correct and timely responses to cyber attacks are crucial for the effective implementation of
cyber defence strategies and policies. The number of threats and ingenuity of attackers is …

Identification of attack paths using kill chain and attack graphs

L Sadlek, P Čeleda, D Tovarňák - NOMS 2022-2022 IEEE/IFIP …, 2022 - ieeexplore.ieee.org
The ever-evolving capabilities of cyber attackers force security administrators to focus on the
early identification of emerging threats. Targeted cyber attacks usually consist of several …