Detection of advanced persistent threat using machine-learning correlation analysis I Ghafir, M Hammoudeh, V Prenosil, L Han, R Hegarty, K Rabie, ... Future Generation Computer Systems 89, 349-359, 2018 | 278 | 2018 |
Security threats to critical infrastructure: the human factor I Ghafir, J Saleem, M Hammoudeh, H Faour, V Prenosil, S Jaf, S Jabbar, ... The Journal of Supercomputing 74, 4986-5002, 2018 | 241 | 2018 |
A survey on network security monitoring systems I Ghafir, V Prenosil, J Svoboda, M Hammoudeh 2016 IEEE 4th International Conference on Future Internet of Things and …, 2016 | 123 | 2016 |
Social engineering attack strategies and defence approaches I Ghafir, V Prenosil, A Alhejailan, M Hammoudeh 2016 IEEE 4th international conference on future internet of things and …, 2016 | 121 | 2016 |
Advanced persistent threat attack detection: an overview I Ghafir, V Prenosil Int J Adv Comput Netw Secur 4 (4), 5054, 2014 | 101 | 2014 |
Botdet: A system for real time botnet command and control traffic detection I Ghafir, V Prenosil, M Hammoudeh, T Baker, S Jabbar, S Khalid, S Jaf IEEE Access 6, 38947-38958, 2018 | 84 | 2018 |
Network monitoring approaches: An overview J Svoboda, I Ghafir, V Prenosil Int J Adv Comput Netw Secur 5 (2), 88-93, 2015 | 82 | 2015 |
Malicious ssl certificate detection: A step towards advanced persistent threat defence I Ghafir, V Prenosil, M Hammoudeh, L Han, U Raza Proceedings of the international conference on future networks and …, 2017 | 57 | 2017 |
Blacklist-based malicious ip traffic detection I Ghafir, V Prenosil 2015 Global Conference on Communication Technologies (GCCT), 229-233, 2015 | 56 | 2015 |
Proposed approach for targeted attacks detection I Ghafir, V Prenosil Advanced Computer and Communication Engineering Technology: Proceedings of …, 2016 | 55 | 2016 |
Tor-based malware and Tor connection detection I Ghafir, J Svoboda, V Prenosil International Conference on Frontiers of Communications, Networks and …, 2014 | 48 | 2014 |
A survey on botnet command and control traffic detection I Ghafir, J Svoboda, V Prenosil International Journal of Advances in Computer Networks and Its Security …, 2015 | 46 | 2015 |
Disguised executable files in spear-phishing emails: Detecting the point of entry in advanced persistent threat I Ghafir, V Prenosil, M Hammoudeh, FJ Aparicio-Navarro, K Rabie, ... Proceedings of the 2nd International Conference on Future Networks and …, 2018 | 43 | 2018 |
DNS traffic analysis for malicious domains detection I Ghafir, V Prenosil 2015 2nd International Conference on Signal Processing and Integrated …, 2015 | 41 | 2015 |
Digitalized two parametric system for gamma/neutron spectrometry M Veškrna, Z Matěj, F Mravec, V Přenosil, F Cvachovec, M Košťál 18th Topical Meeting of the Radiation Protection & Shielding Division of ANS …, 2014 | 41 | 2014 |
Malicious file hash detection and drive-by download attacks I Ghafir, V Prenosil Proceedings of the Second International Conference on Computer and …, 2016 | 40 | 2016 |
Botnet command and control traffic detection challenges: a correlation-based solution I Ghafir, V Prenosil, M Hammoudeh Int J Adv Comput Netw Secur 7 (2), 2731, 2015 | 40 | 2015 |
Advanced persistent threat and spear phishing emails I Ghafir, V Prenosil International Conference Distance Learning, Simulation and Communication …, 2015 | 36 | 2015 |
A survey on intrusion detection and prevention systems I Ghafir, M Husak, V Prenosil Proceedings of student conference Zvule, IEEE/UREL. Brno University of …, 2014 | 32 | 2014 |
DNS query failure and algorithmically generated domain-flux detection I Ghafir, V Prenosil IET Digital Library, 2014 | 31 | 2014 |