Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Tomas Sochor"'
Autor:
Antonina Kashtalian, Sergii Lysenko, Oleg Savenko, Andrii Nicheporuk, Tomáš Sochor, Volodymyr Avsiyevych
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 1, Pp 152-175 (2024)
The need to develop new systems for detecting and counteracting malware remains relevant. In addition to malware detection methods, the need to develop new systems for detecting and counteracting malware has become increasingly important. The use of
Externí odkaz:
https://doaj.org/article/6db034abd9294fb6b6f1f63283f88ffc
Autor:
Nadezda Chalupova, Tomas Sochor
Publikováno v:
Recent Advances in Soft Computing and Cybernetics ISBN: 9783030616588
Even in the forthcoming Industry 4.0 era, interpersonal messaging will be more and more important. The prevailing messaging service in the internet has always been the electronic mail. Despite multiple potential competitors have emerged since it star
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::980668eea6f50491a949f464da04d829
https://doi.org/10.1007/978-3-030-61659-5_24
https://doi.org/10.1007/978-3-030-61659-5_24
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 0, Iss 4, Pp 112-151 (2023)
The number of different types and the actual number of malware and computer attacks is constantly increasing. Therefore, detecting and counteracting malware and computer attacks remains a pressing issue. Users of corporate networks suffer the greates
Externí odkaz:
https://doaj.org/article/f4e6ca3d56a64c8996af2dcbac63f5c8
Autor:
Tomas Sochor
Publikováno v:
Computer Networks ISBN: 9783030507183
CN
CN
Multi–layer spam detection systems frequently used in many SMTP servers often suffer from a lack of mutual communication between individual layers. The paper presents the construction of a feedback interconnection between two significant layers, na
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9ed9d83e6361917cdfe498fe85cee06f
https://doi.org/10.1007/978-3-030-50719-0_8
https://doi.org/10.1007/978-3-030-50719-0_8
Autor:
Matej Zuzčák, Tomas Sochor
Publikováno v:
KSII Transactions on Internet and Information Systems. 13
Autor:
Hana Sochorová, Tomas Sochor
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030198121
The paper focuses primarily on the research of IGP routing protocols, namely RIP, EIGRP and OSPF from the point of view of the convergence time in small and medium-sized networks. Experiments using GNS3 and in real routed networks are shown for both
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ec577632117997d83ee7658c6b99033a
https://doi.org/10.1007/978-3-030-19813-8_13
https://doi.org/10.1007/978-3-030-19813-8_13
Autor:
Tomas Sochor, Nadezda Chalupova
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030198121
The prevailing messaging service in the internet has always been the electronic mail. Despite multiple potential competitors have emerged since it started in early 1970’s, e-mail still has the highest share among users. The properties of e-mail and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e2cb1742a52f13314ec1bd22647b7f72
https://doi.org/10.1007/978-3-030-19813-8_14
https://doi.org/10.1007/978-3-030-19813-8_14
Publikováno v:
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2019 (ICCMSE-2019).
As the importance of public cloud services for sharing various files including copyrighted contents increases, a poll was organized among Czech university students focusing on their usage of such services so that to reveal their habit in usage of suc
Autor:
Tomas Sochor, Matej Zuzcak
Publikováno v:
Computer Networks ISBN: 9783319597669
CN
CN
New Internet threats emerge on daily basis and honeypots have become widely used for capturing them in order to investigate their activities. The paper focuses on a detailed analysis of the behavior of various attacks agains 7 Linux–based honeypots
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::93e0cc1e7bae442ccc0bd69abc10a7ab
https://doi.org/10.1007/978-3-319-59767-6_10
https://doi.org/10.1007/978-3-319-59767-6_10
Autor:
Tomas Sochor
Publikováno v:
AIP Conference Proceedings.
The analysis of TOR, JonDo and CyberGhost efficiency (measured the as latency increase and transmission speed decrease) is presented in the paper. Results showed that all tools have relatively favorable latency increase (no more than 60% RTT increase