Name
Affiliation
Papers
MARTIN REHAK
Czech Technical University in Prague, Czech Republic
55
Collaborators
Citations 
PageRank 
47
251
28.57
Referers 
Referees 
References 
516
719
497
Search Limit
100719
Title
Citations
PageRank
Year
Multiple Instance Learning for Malware Classification.40.462018
Probabilistic analysis of dynamic malware traces.00.342018
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing.60.402017
Using Behavioral Similarity for Botnet Command-and-Control Discovery.20.362016
Intelligent Cybersecurity Agents [Guest editors' introduction].40.402016
Detecting DGA malware using NetFlow140.692015
Game Theoretical Model for Adaptive Intrusion Detection System.00.342014
Malware detection using HTTP user-agent discrepancy identification20.512014
Game Theoretical Adaptation Model for Intrusion Detection System.00.342012
Self-organized collaboration of distributed IDS sensors00.342012
Identifying skype nodes in the network exploiting mutual contacts00.342012
Self-Organized Mechanism for Distributed Setup of Multiple Heterogeneous Intrusion Detection Systems10.372012
Trust-based Solution for Robust Self-configuration of Distributed Intrusion Detection Systems.20.382012
Revealing Cooperating Hosts by Connection Graph Analysis.10.362012
Distributed self-organized collaboration of autonomous IDS sensors10.362012
Identifying Skype nodes by NetFlow-based graph analysis00.342012
Game Theoretical Adaptation Model for Intrusion Detection System - Demo Paper.00.342012
Towards efficient flow sampling technique for anomaly detection40.432012
On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System10.372011
Intelligence, not integration: Distributed regret minimization for IDS Control00.342011
Optimizing flow sampling for network anomaly detection70.562011
Game theoretical adaptation model for intrusion detection system30.432011
Dynamic information source selection for intrusion detection systems110.802009
Collaborative approach to network behaviour analysis based on hardware-accelerated FlowMon probes00.342009
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems131.112009
Adaptive Multiagent System for Network Traffic Monitoring251.372009
Threat-model-driven runtime adaptation and evaluation of intrusion detection system20.362009
Multi-agent approach to network intrusion detection30.362008
Trust-Based Classifier Combination for Network Anomaly Detection100.892008
Incrementally Refined Acquaintance Model for Consortia Composition00.342008
Improving Anomaly Detection Error Rate by Collective Trust Modeling20.422008
CAMNEP: agent-based network intrusion detection system60.482008
High-Performance Agent System for Intrusion Detection in Backbone Networks30.552007
Incrementally Refined Acquaintance Model for Distributed Planning and Resource Allocation in Semi-trusted Environments00.342007
Collaborative Attack Detection in High-Speed Networks20.372007
Trust Modeling with Context Representation and Generalized Identities391.902007
Agent-Based Network Intrusion Detection System60.502007
Agent-Based Network Protection Against Malicious Code00.342007
Multi-agent Reflection in Autonomic Systems00.342007
Detecting Intrusions in Agent System by Means of Exception Handling00.342007
Network Intrusion Detection by Means of Community of Trusting Agents60.672007
High-Speed Network Traffic Acquisition for Agent Systems50.432007
Multilevel approach to agent-based task allocation in transportation00.342006
Representing Context for Multiagent Trust Modeling241.052006
Deployment of A-globe multi-agent platform50.722006
Towards formal model of adversarial action in multi-agent systems00.342006
Fuzzy number approach to trust in coalition environment10.382005
Solving inaccessibility in multi-agent systems by mobile middle-agents30.442005
Adversarial behavior in multi-agent systems00.342005
Expectations and deployment of agent technology in manufacturing and defence: case studies90.872005
  • 1
  • 2