Zobrazeno 1 - 10
of 46
pro vyhledávání: '"Petr Hanacek"'
Publikováno v:
IEEE Access, Vol 10, Pp 16681-16699 (2022)
ICT security in the banking area is going through rapid changes. It is ten years since we covered the state of e-banking security, and both authentication schemes and legislation has evolved. With the Payment Services Directive (PSD2) for European Un
Externí odkaz:
https://doaj.org/article/89b0eaafe25149fead60a8205ebfe5c2
Publikováno v:
IEEE Access, Vol 8, Pp 112427-112453 (2020)
In this paper, we present three datasets that have been built from network traffic traces using ASNM (Advanced Security Network Metrics) features, designed in our previous work. The first dataset was built using a state-of-the-art dataset CDX 2009 th
Externí odkaz:
https://doaj.org/article/2274cb16882d4c4bb057de7c5d70870d
Publikováno v:
Journal of Systemics, Cybernetics and Informatics, Vol 14, Iss 3, Pp 51-58 (2016)
This paper examines optimization possibilities of Self-Initialization Quadratic Sieve (SIQS), which is enhanced version of Quadratic Sieve factorization method. SIQS is considered the second fastest factorization method at all and the fastest one for
Externí odkaz:
https://doaj.org/article/3c3025155fb84d3897a1b692a2f7d313
Publikováno v:
EURASIP Journal on Image and Video Processing, Vol 2024, Iss 1, Pp 1-25 (2024)
Abstract In this paper, we undertake a novel two-pronged investigation into the human recognition of deepfake speech, addressing critical gaps in existing research. First, we pioneer an evaluation of the impact of prior information on deepfake recogn
Externí odkaz:
https://doaj.org/article/a3afdb0ac65f447bb3429767907a6bed
Publikováno v:
ICCSP
Data is a most valuable part of most of nowadays system. A lot of hackers and criminals are trying to steal this data all the time. Due to that data should also be the best protected part of every company's systems. We would like our systems to be im
Publikováno v:
Journal of Computers. :143-155
Publikováno v:
IEEE ICBC
Tor is a low-latency free anonymization network based on onion routing. In Tor, directory servers maintain a list of all nodes. It is, however, possible for a powerful adversary (e.g., law enforcement agencies) to seize or compromise enough directory
Autor:
Martin Henzl, Petr Hanacek
Publikováno v:
Radioengineering, Vol 25, Iss 1, Pp 132-139 (2016)
Radioengineering. 2016 vol. 25, č. 1, s. 132-139. ISSN 1210-2512
Radioengineering. 2016 vol. 25, č. 1, s. 132-139. ISSN 1210-2512
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking. Smart cards are used in applications that require high level of security, such as payment applications, therefore it should be
Autor:
Ivan Homoliak, Saeid Hosseini, Martín Ochoa, Petr Hanacek, Dominik Breitenbacher, Martin Teknos
Machine-learning based intrusion detection classifiers are able to detect unknown attacks, but at the same time, they may be susceptible to evasion by obfuscation techniques. An adversary intruder which possesses a crucial knowledge about a protectio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3da0b791e550565d6685daf96d3c727e
Publikováno v:
Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence.
In this paper, we discuss privacy issues in modern networks for Internet of Things. We focus on anonymization of both devices and users in the context of both IP and non-IP networks.We take a closer look on two current non-IP technologies -- LoRaWan