Illegitimate typosquatting detection with internet protocol information M Grill, J Kohout, M Kopp, T Pevny US Patent 10,491,614, 2019 | 289 | 2019 |
Detection of malicious network connections J Kohout, J Jusko, T Pevny, M Rehak US Patent 9,344,441, 2016 | 80 | 2016 |
Analyzing encrypted traffic behavior using contextual traffic data J Kohout, BH Anderson, M Grill, D McGrew, M Kopp, T Pevny US Patent 10,805,338, 2020 | 47 | 2020 |
k-NN Classification of Malware in HTTPS Traffic Using the Metric Space Approach J Lokoč, J Kohout, P Čech, T Skopal, T Pevný Pacific-Asia Workshop on Intelligence and Security Informatics, 131-145, 2016 | 40 | 2016 |
Tracking users over network hosts based on user behavior J Mrkos, M Grill, J Kohout US Patent 10,129,271, 2018 | 38 | 2018 |
Leveraging endpoint and network environment inferences for malware traffic classification BH Anderson, M Rehak, D McGrew, M Vejman, T Pevny, M Grill, J Kohout US Patent 10,855,698, 2020 | 37 | 2020 |
Learning communication patterns for malware discovery in HTTPs data J Kohout, T Komárek, P Čech, J Bodnár, J Lokoč Expert Systems with Applications 101, 129-142, 2018 | 35 | 2018 |
Automatic discovery of web servers hosting similar applications J Kohout, T Pevný 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 23 | 2015 |
Network traffic fingerprinting based on approximated kernel two-sample test J Kohout, T Pevný IEEE Transactions on Information Forensics and Security 13 (3), 788-801, 2017 | 22 | 2017 |
Unsupervised detection of malware in persistent web traffic J Kohout, T Pevný 2015 IEEE International Conference on Acoustics, Speech and Signal …, 2015 | 21 | 2015 |
Tracking users over network hosts based on user behavior J Mrkos, M Grill, J KOHOUT US Patent App. 10/129,271, 2018 | 19* | 2018 |
Identifying self-signed certificates using HTTP access logs for malware detection M Kopp, M Grill, J Kohout US Patent 10,375,097, 2019 | 18 | 2019 |
Classification of IoT devices based on their network traffic J Kohout, M Grill, M Kopp, L Bajer US Patent 10,749,770, 2020 | 15 | 2020 |
Ransomware detection using file replication logs M Grill, L Bajer, M Kopp, J Kohout US Patent 11,019,095, 2021 | 14 | 2021 |
Statistical fingerprinting of network traffic J Kohout, T Pevny US Patent 10,425,434, 2019 | 14 | 2019 |
Using Behavioral Similarity for Botnet Command-and-Control Discovery J Jusko, M Rehak, J Stiborek, J Kohout, T Pevny IEEE Intelligent Systems 31 (5), 16-22, 2016 | 13 | 2016 |
Framework for joint learning of network traffic representations and traffic classifiers J Kohout, T Pevny US Patent 10,079,768, 2018 | 11 | 2018 |
Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce P Čech, J Kohout, J Lokoč, T Komárek, J Maroušek, T Pevný International Conference on Similarity Search and Applications, 311-324, 2016 | 11 | 2016 |
Two-phase genetic algorithm for social network graphs clustering J Kohout, R Neruda 2013 27th International Conference on Advanced Information Networking and …, 2013 | 10 | 2013 |
Detection of malicious network connections J Kohout, J Jusko, T Pevny, M Rehak US Patent 9,531,742, 2016 | 9 | 2016 |