E-banking security-comparative study P Hanaek, K Malinka, J Schafer 2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008 | 42 | 2008 |
Peer-to-peer networks security J Schäfer, K Malinka, P Hanácek 2008 The Third International Conference on Internet Monitoring and …, 2008 | 16 | 2008 |
Autorizace elektronických transakcí a autentizace dat i uživatelů VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ... Masarykova univerzita, 2008 | 14 | 2008 |
Security in peer-to-peer networks: Empiric model of file diffusion in bittorrent J Schäfer, K Malinka 2009 Fourth International Conference on Internet Monitoring and Protection …, 2009 | 13 | 2009 |
ASNM Datasets: A collection of network attacks for testing of adversarial classifiers and intrusion detectors I Homoliak, K Malinka, P Hanacek IEEE Access 8, 112427-112453, 2020 | 10 | 2020 |
Peer-to-peer networks: Security analysis J Schäfer, K Malinka, P Hanáček International Journal On Advances in Security Volume 2, Number 1, 2009, 2009 | 8 | 2009 |
Development of social networks in email communication K Malinka, J Schäfer 2009 Fourth International Conference on Internet Monitoring and Protection …, 2009 | 6 | 2009 |
Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication K Malinka 2009 Fourth International Conference on Internet Monitoring and Protection …, 2009 | 6 | 2009 |
Increasing trust in tor node list using blockchain L Hellebrandt, I Homoliak, K Malinka, P Hanáček 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019 | 5 | 2019 |
Analyses of real email traffic properties K Malinka, P Hanáček, D Cvrček Radioengineering 18 (4), 7, 2009 | 4 | 2009 |
Evaluation of biometric authentication based on visual evoked potentials K Malinka, P Hanáček, M Trzos 2011 Carnahan Conference on Security Technology, 1-7, 2011 | 3 | 2011 |
Malware spreading models in peer-to-peer networks J Schafer, K Malinka, P Hanacek 2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008 | 3 | 2008 |
Autentizace uživatelů a autorizace elektronických transakcí V Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, D Cvrček, J Staudek, ... TATE International, sro, 2007 | 3 | 2007 |
DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy M Perešíni, FM Benčić, K Malinka, I Homoliak arXiv preprint arXiv:2109.01102, 2021 | 2 | 2021 |
Security and encryption at modern databases M Ocenas, I Homoliak, P Hanacek, K Malinka Proceedings of the 2020 4th International Conference on Cryptography …, 2020 | 2 | 2020 |
Current Challenges in the Educational Usage of 3D Printing in Primary and Secondary Schools K Malinka, V Schindler EdMedia+ Innovate Learning, 88-96, 2021 | 1 | 2021 |
The challenge of increasing safe response of antivirus software users V Stavova, V Matyas, K Malinka International Doctoral Workshop on Mathematical and Engineering Methods in …, 2015 | 1 | 2015 |
Visual Evoked Potentials in Biometric Authentication K Malinka Proceedings of the 16th Conference Student EEICT 5, 251-255, 2010 | 1 | 2010 |
Effective Teaching through Multidisciplinary Lessons Adopting 3D Print–Preliminary Study K Malinka, L Vodová, M Jancová, L Sobková, V Schindler EdMedia+ Innovate Learning, 286-291, 2022 | | 2022 |
The dawn of a text-dependent society: deepfakes as a threat to speech verification systems A Firc, K Malinka Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, 1646-1655, 2022 | | 2022 |