| 12160429 |
Learning of malicious behavior vocabulary and threat detection through behavior matching |
Martin Kopp, Jan Kohout, Jan Brabec, Marc Dupont, Cenek Skarda +2 more |
2024-12-03 |
| 11750621 |
Learning of malicious behavior vocabulary and threat detection through behavior matching |
Martin Kopp, Jan Kohout, Jan Brabec, Marc Dupont, Cenek Skarda +2 more |
2023-09-05 |
| 11374944 |
Instant network threat detection system |
Tomas Komarek |
2022-06-28 |
| 11271954 |
Generating a vector representative of user behavior in a network |
Tomá{hacek over (s)} Komárek |
2022-03-08 |
| 11271833 |
Training a network traffic classifier using training data enriched with contextual bag information |
Tomas Komarek, Martin Vejman |
2022-03-08 |
| 11113397 |
Detection of malicious executable files using hierarchical models |
Tomas Pevny, Jan Franco̊ |
2021-09-07 |
| 10867036 |
Multiple pairwise feature histograms for representing network traffic |
Tomas Komarek |
2020-12-15 |
| 10708284 |
Private-learned IDS |
Martin Kopp, Tomas Pevny, David McGrew |
2020-07-07 |
| 10375143 |
Learning indicators of compromise with hierarchical models |
Tomas Pevny |
2019-08-06 |
| 10320823 |
Discovering yet unknown malicious entities using relational data |
Vojt{hacek over (e)}ch Létal, Tomá{hacek over (s)} Pevný |
2019-06-11 |
| 9992216 |
Identifying malicious executables by analyzing proxy logs |
Tomas Pevny |
2018-06-05 |
| 9374383 |
Events from network flows |
Gustav Sourek, Karel Bartos, Filip Zelezny, Tomas Pevny |
2016-06-21 |