Seguir
Kamil Malinka
Kamil Malinka
Email confirmado em fit.vutbr.cz - Página inicial
Título
Citado por
Citado por
Ano
On the educational impact of chatgpt: Is artificial intelligence ready to obtain a university degree?
K Malinka, M Peresíni, A Firc, O Hujnák, F Janus
Proceedings of the 2023 Conference on Innovation and Technology in Computer …, 2023
1212023
E-banking security-comparative study
P Hanaek, K Malinka, J Schafer
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
422008
Peer-to-peer networks security
J Schäfer, K Malinka, P Hanácek
2008 The Third International Conference on Internet Monitoring and …, 2008
172008
ASNM Datasets: A collection of network attacks for testing of adversarial classifiers and intrusion detectors
I Homoliak, K Malinka, P Hanacek
IEEE Access 8, 112427-112453, 2020
152020
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
152008
Security in peer-to-peer networks: Empiric model of file diffusion in bittorrent
J Schäfer, K Malinka
2009 Fourth International Conference on Internet Monitoring and Protection …, 2009
132009
Increasing trust in tor node list using blockchain
L Hellebrandt, I Homoliak, K Malinka, P Hanáček
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019
102019
E-Banking Security Study—10 Years Later
K Malinka, O Hujňák, P Hanáček, LUK Hellebrandt
IEEE Access 10, 16681-16699, 2022
82022
Peer-to-peer networks: Security analysis
J Schäfer, K Malinka, P Hanáček
International Journal On Advances in Security Volume 2, Number 1, 2009, 2009
82009
Autentizace uživatelů a autorizace elektronických transakcí
V Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, D Cvrček, J Staudek, ...
TATE International, sro, 2007
82007
Deepfakes as a threat to a speaker and facial recognition: An overview of tools and attack vectors
A Firc, K Malinka, P Hanáček
Heliyon, 2023
72023
Usability of visual evoked potentials as behavioral characteristics for biometric authentication
K Malinka
2009 Fourth International Conference on Internet Monitoring and Protection …, 2009
72009
The dawn of a text-dependent society: Deepfakes as a threat to speech verification systems
A Firc, K Malinka
Proceedings of the 37th ACM/SIGAPP symposium on applied computing, 1646-1655, 2022
62022
DAG-oriented protocols PHANTOM and GHOSTDAG under incentive attack via transaction selection strategy
M Perešíni, FM Benčić, K Malinka, I Homoliak
arXiv preprint arXiv:2109.01102, 2021
62021
Security and encryption at modern databases
M Ocenas, I Homoliak, P Hanacek, K Malinka
Proceedings of the 2020 4th International Conference on Cryptography …, 2020
62020
Development of social networks in email communication
K Malinka, J Schäfer
2009 Fourth International Conference on Internet Monitoring and Protection …, 2009
62009
Evaluation of biometric authentication based on visual evoked potentials
K Malinka, P Hanáček, M Trzos
2011 Carnahan Conference on Security Technology, 1-7, 2011
42011
Analyses of real email traffic properties
K Malinka, P Hanácek, D Cvrcek
Radioengineering 18 (4), 7, 2009
42009
Integrace technologie 3D tisku do výuky na základních a středních školách
M Dosedla, Z Hodis, M Jančová, J Ledvinka, L Lvovská, K Malinka, ...
Masarykova univerzita, 2022
32022
Malware spreading models in peer-to-peer networks
J Schafer, K Malinka, P Hanacek
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
32008
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20