NES@FIT - Networked and embedded systems research group


2018MATOUŠEK Petr and SCHMIEDECKER Martin. Digital Forensics and Cyber Crime. Cham: Springer International Publishing, 2018. ISBN 978-3-319-73697-6.
 MATOUŠEK Petr. Description of IEC 61850 Communication. FIT-TR-2018-01, Brno: Faculty of Information Technology BUT, 2018.
 PLUSKAL Jan and VESELÝ Vladimír. TLS/SSL Decryption Workshop. Praha, 2018.
 PLUSKAL Jan, LICHTNER Ondrej and RYŠAVÝ Ondřej. Traffic Classification and Application Identification in Network Forensics. In: Fourteenth Annual IFIP WG 11.9 International Conference on Digital Forensics. New Delhi: Springer International Publishing, 2018, pp. 161-181. ISBN 978-3-319-99277-8.
 POLČÁK Libor. Co skrývá síť BitTorrent?. FIT-TR-2018-05, Brno, 2018.
 RYCHLÝ Marek and RYŠAVÝ Ondřej. Big Data Security Analysis with TARZAN Platform. Journal of Cyber Security and Mobility. Gistrup: River Publishers, 2018, vol. 8, no. 2, pp. 165-188. ISSN 2245-4578.
 VESELÝ Vladimír and PLUSKAL Jan. SSL/TLS Interception Workshop. Kuala Lumpur, 2018.
 VESELÝ Vladimír. Cryptocurrency Forensics Utilizing a Multi-currency Blockchain Explorer. Praha, 2018.
 VESELÝ Vladimír. Hunting Down Cryptocurrency Users. Kuala Lumpur, 2018.
 VESELÝ Vladimír. Towards Fully Automated Infinitely Scalable and Maximally Effective Password Cracking of Encrypted Documents. Kuala Lumpur, 2018.
2017BAGGILI Ibrahim, BREITINGER Frank and KARPÍŠEK Filip. Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digital Investigation. 2017, vol. 2017, no. 22, pp. 26-38. ISSN 1742-2876.
 GRÉGR Matěj. Souhrná zpráva k projektu DDoS ochrana člena sdružení CESNET. Brno: CESNET National Research and Education Network, 2017.
 HRANICKÝ Radek, ZOBAL Lukáš, VEČEŘA Vojtěch and MATOUŠEK Petr. Distributed Password Cracking in a Hybrid Environment. In: Proceedings of SPI 2017. Brno: University of defence in Brno, 2017, pp. 75-90. ISBN 978-80-7231-414-0.
 MAREK Marcel, RYŠAVÝ Ondřej and VESELÝ Vladimír. Towards analysis of IP communication in a constrained environment of tactical radio networks. In: Proceedings of European Conference on the Engineering of Computer Based Systems. Larnaca: Association for Computing Machinery, 2017, pp. 50-57. ISBN 978-1-4503-4843-0.
 MATOUŠEK Petr, ONYANGO Collins Oduor, RYŠAVÝ Ondřej and SEVILLA Joseph. Delivering ICT Security Courses over 5.944 km. In: Proceedings of the 27th EAEEIE Annual Conference. Grenoble: Grenoble Institute of Technology, 2017, pp. 1-7. ISBN 2-9516740-8-2.
 MATOUŠEK Petr. Analysis of DLMS Protocol. FIT-TR-2017-13, Brno, 2017.
 MATOUŠEK Petr. Description and analysis of IEC 104 Protocol. FIT-TR-2017-12, Brno: Faculty of Information Technology BUT, 2017.
 PLUSKAL Jan and RYŠAVÝ Ondřej. Detection, and Analysis of SIP Fraud Attack on 100Gb Ethernet with NEMEA System. Pristina, 2017.
 PLUSKAL Jan, LICHTNER Ondrej and RYŠAVÝ Ondřej. Netfox Detective - Identifikace aplikačních protokolů pomocí algoritmů strojového učení. FIT-TR-2017-05, 2017.
 PLUSKAL Jan. Netfox Detective 2.0 - Nástroj pro síťovou forenzní analýzu. FIT-TR-2017-06, 2017.
 POLČÁK Libor. Základní informace o síti Tor. FIT-TR-2017-01, Brno, 2017.
 RYCHLÝ Marek and RYŠAVÝ Ondřej. TARZAN: An Integrated Platform for Security Analysis. In: Proceedings of the 2017 Federated Conference on Computer Science and Information Systems. Praha: IEEE Computer Society, 2017, pp. 561-567. ISBN 978-83-946253-7-5.
 RYŠAVÝ Ondřej. Analysis of Constrained Application Protocol. FIT-TR-2017-15, Brno: Faculty of Information Technology BUT, 2017.
 RYŠAVÝ Ondřej. Security Monitoring of LwM2M communication. FIT-TR-2017-16, Brno: Faculty of Information Technology BUT, 2017.
 VONDRÁČEK Martin, PLUSKAL Jan and RYŠAVÝ Ondřej. Automation of MitM Attack on Wi-Fi Networks. In: 9th International Conference on Digital Forensics & Cyber Crime. Prague: Springer International Publishing, 2017, pp. 207-220. ISBN 978-3-319-73696-9. ISSN 1867-8211.
2016GRASA Eduard, RYŠAVÝ Ondřej, LICHTNER Ondrej, ASGARI Hamid, DAY John and CHITKUSHEV Lou. From protecting protocols to layers: designing, implementing and experimenting with security policies in RINA. In: 2016 IEEE International Conference on Communications (ICC). Kuala-Lumpur: Institute of Electrical and Electronics Engineers, 2016, pp. 1-7. ISBN 978-1-4799-6665-3.
 HRANICKÝ Radek, HOLKOVIČ Martin, MATOUŠEK Petr and RYŠAVÝ Ondřej. On Efficiency of Distributed Password Recovery. The Journal of Digital Forensics, Security and Law. 2016, vol. 11, no. 2, pp. 79-96. ISSN 1558-7215.
 KARMAZÍN Jaromír and OČENÁŠEK Pavel. The state of Near-Field Communication (NFC) on the Android platform. In: Human Aspects of Information Security, Privacy, and Trust. Toronto: Springer Verlag, 2016, pp. 247-254. ISBN 978-3-319-39380-3.
 PLUSKAL Jan and RYŠAVÝ Ondřej. Network Forensic Tool Netfox Detective. Pristina, 2016.
 PLUSKAL Jan, RYŠAVÝ Ondřej and MATOUŠEK Petr. On the Identification of Applications from Captured Network Traffic. New York, 2016.
 PLUSKAL Jan, VESELÝ Vladimír, GRÉGR Matěj and RYŠAVÝ Ondřej. TLS/SSL Decryption Workshop. Praha, 2016.
 POLČÁK Libor, CALDAROLA Leo, CUDA Davide, DONDERO Marco, FICARA Domenico, FRANKOVÁ Barbora, HOLKOVIČ Martin, CHOUKIR Amine, MUCCIFORA Roberto and TRIFILO Antonio. High Level Policies in SDN. In: E-Business and Telecommunications. Berlin: Springer International Publishing, 2016, pp. 39-57. ISBN 978-3-642-35754-1. ISSN 1865-0929.
 VESELÝ Vladimír, REK Vít and RYŠAVÝ Ondřej. Babel Routing Protocol for OMNeT++ - More than just a new simulation module for INET framework. In: Proceedings of 3rd OMNeT++ Community Summit. Ithaca, NY: Cornell University Library, 2016, pp. 1-5. ISSN 2331-8422.
 VESELÝ Vladimír, REK Vít and RYŠAVÝ Ondřej. Enhanced Interior Gateway Routing Protocol with IPv4 and IPv6 Support for OMNeT++. Advances in Intelligent Systems and Computing. 2016, vol. 2015, no. 1, pp. 65-85. ISSN 2194-5357.

Show all publications

Your IPv4 address:
Switch to IPv6 connection

DNSSEC [dnssec]