Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Ondrej Rysavy"'
Publikováno v:
IEEE Access, Vol 11, Pp 50000-50012 (2023)
The aim of DNS over HTTPS (DoH) is to enhance users’ privacy by encrypting DNS. However, it also enables adversaries to bypass security mechanisms that rely on inspecting unencrypted DNS. Therefore in some networks, it is crucial to detect and bloc
Externí odkaz:
https://doaj.org/article/eb27b8eb74df419689c7c6f94e203369
Publikováno v:
Journal of Digital Forensics, Security and Law, Vol 9, Iss 2, Pp 101-112 (2014)
This paper presents a fast multi-stage method for on-line detection of RTP streams and codec identification of transmitted voice or video traffic. The method includes an RTP detector that filters packets based on specific values from UDP and RTP head
Externí odkaz:
https://doaj.org/article/b355d4b6962e4c9a959a4e332c12df46
Publikováno v:
2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC).
Autor:
Arbnor Imeri, Ondrej Rysavy
Publikováno v:
2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC).
Autor:
Sawsan Youssef, Ondrej Rysavy
Publikováno v:
2023 26th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).
Publikováno v:
2021 17th International Conference on Network and Service Management (CNSM).
Autor:
Ondrej Rysavy, Petr Matousek
Publikováno v:
2021 30th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE).
Demonstration of real industrial equipment, manufacturing processes, and control communication is essential for students of technical universities and colleges to improve their technical competencies and knowledge. To build an industrial control syst
Autor:
Ondrej Rysavy, Sawsan Youssef
Publikováno v:
FedCSIS (Position Papers)
Publikováno v:
IEEE Systems Journal. 12:2437-2448
There are several types of attacks on communication networks such as disrupting or blocking communication, intercepting, injecting fabricated packets, accessing and modifying the information. Here, for the first time the SecRAM, a recent security ris
Publikováno v:
2019 29th Annual Conference of the European Association for Education in Electrical and Information Engineering (EAEEIE).
Artificial Intelligence (AI) and related technologies like Data Mining, Machine Learning or Neural Networks became very popular in recent years. Many IT companies today require graduated students to understand and be able to apply these technologies.