My publications
2020:
- D. Vekshin, K. Hynek, and T. Cejka, “DoH Insight: Detecting DNS over HTTPS by Machine Learning,” in Proceedings of the 15th International Conference on Availability, Reliability and Security, New York, NY, USA, 2020.
- K. Hynek, T. Beneš, T. Čejka, and H. Kubátová, “Refined Detection of SSH Brute-Force Attackers Using Machine Learning,” in ICT Systems Security and Privacy Protection, Cham, 2020, pp. 49–63.
- K. Hynek, T. Čejka, M. Žádník, and H. Kubátová, “Evaluating Bad Hosts Using Adaptive Blacklist Filter,” in 9th Mediterranean Conference on Embedded Computing (MECO), 2020, pp. 1–5.
2019:
- D. Soukup, O. Hujňák, S. Štefunko, Krejčı́ Radek, and E. Grešák, “Security Framework for IoT and Fog Computing Networks,” in 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2019, pp. 87–92.
- D. Soukup, T. Cejka, and K. Hynek, “Behavior Anomaly Detection in IoT Networks,” in International conference on Computer Networks, Big data and IoT, 2019, pp. 465–473.
- D. Soukup, T. Čejka, and S. Štefunko, “Multi-level Anomaly Detection in IoT Networks,” in The 7th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2019.
- J. Havránek, T. Čejka, and P. Benáček, “L7 capable flow exporter described in P4,” in The 7th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2019.
- K. Hynek, T. Beneš, T. Čejka, and H. Kubátová, “Future approaches to monitoring in high-speed backbone networks ,” in The 7th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2019.
2018:
- T. Jánský, T. Čejka, Žádnı́k Martin, and V. Bartoš, “Augmented DDoS Mitigation with Reputation Scores,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, New York, NY, USA, 2018, pp. 54:1–54:7.
- T. Jánský, T. Čejka, M. Žádník, and V. Bartoš, “Informed DDoS Mitigation at 100 Gb/s,” in Proceedings of the 6th Prague Embedded Systems Workshop, 2018, pp. 41–42.
- F. Šuster and T. Čejka, “Stream-wise adaptive blacklist filter based on flow data,” in Proceedings of the 6th Prague Embedded Systems Workshop, 2018, pp. 38–39.
- M. Slabihoudek and T. Čejka, “Stream-wise Aggregation of Flow Data,” in Proceedings of the 6th Prague Embedded Systems Workshop, 2018, p. 37.
- L. Stejskalová and T. Čejka, “Grouping evil IP addresses,” in Proceedings of the 6th Prague Embedded Systems Workshop, 2018, p. 30.
- P. Benáček, V. Puš, H. Kubátová, and T. Čejka, “P4-To-VHDL: Automatic generation of high-speed input and output network blocks,” Microprocessors and Microsystems, vol. 56, pp. 22–33, 2018.
- J. Havránek, P. Velan, T. Cejka, and P. Benáček, “Enhanced Flow Monitoring with P4 Generated Flexible Packet Parser,” in AIMS 2018, 2018.
2017:
- T. Jánský, T. Čejka, and V. Bartoš, “Hunting SIP Authentication Attacks Efficiently,” in Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings, D. Tuncer, R. Koch, R. Badonnel, and B. Stiller, Eds. Cham: Springer International Publishing, 2017, pp. 125–130.
- T. Čejka and M. Žádník, “Preserving Relations in Parallel Flow Data Processing,” in Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings, D. Tuncer, R. Koch, R. Badonnel, and B. Stiller, Eds. Cham: Springer International Publishing, 2017, pp. 153–156.
- M. Švepeš and T. Čejka, “Making Flow-Based Security Detection Parallel,” in Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings, D. Tuncer, R. Koch, R. Badonnel, and B. Stiller, Eds. Cham: Springer International Publishing, 2017, pp. 3–15.
- T. Čejka, M. Švepeš, and J. Viktorin, “Gateway for IoT security,” in The 5th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2017.
- T. Jánský, T. Čejka, and V. Bartoš, “Detection of SIP Scans and Bruteforce Attacks,” in The 5th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2017.
2016:
- T. Cejka, V. Bartoš, M. Svepes, Z. Rosa, and H. Kubatova, “NEMEA: A Framework for Network Traffic Analysis,” in 12th International Conference on Network and Service Management (CNSM 2016), Montreal, Canada, 2016.
- Z. Rosa, T. Cejka, M. Zadnik, and V. Puš, “Building a Feedback Loop to Capture Evidence of Network Incidents,” in 12th International Conference on Network and Service Management (CNSM 2016), Montreal, Canada, 2016.
- T. Cejka and M. Svepes, “Analysis of Vertical Scans Discovered by Naive Detection,” in Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, R. Badonnel, R. Koch, A. Pras, M. Drašar, and B. Stiller, Eds. Munich, Germany: Springer International Publishing, 2016, pp. 165–169.
- T. Čejka and R. Krejčí, “Configuration of open vSwitch using OF-CONFIG,” in NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, 2016, pp. 883–888.
- T. Čejka and A. Robledo, “Detecting Spoofed Time in NTP Traffic,” in The 4th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2016.
- M. Svepes and T. Cejka, “Overload-resistant Network Traffic Analysis,” in The 4th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2016.
2015:
- T. Čejka, R. Bodó, and H. Kubátová, “Nemea: Searching for Botnet Footprints,” in The 3th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2015.
- D. Alexa and T. Čejka, “Easy configuration of NETCONF devices,” in The 3th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2015.
- T. Cejka, V. Bartos, L. Truxa, and H. Kubatova, “Using Application-Aware Flow Monitoring for SIP Fraud Detection,” in Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, S. Latré, M. Charalambides, J. François, C. Schmitt, and B. Stiller, Eds. Ghent, Belgium: Springer International Publishing, 2015, pp. 87–99.
2014:
- T. Cejka, Z. Rosa, and H. Kubatova, “Stream-wise detection of surreptitious traffic over dns,” in 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Athens, Greece, 2014, pp. 300–304.
- P. Benáček, R. B. Blažek, T. Čejka, and H. Kubátová, “Change-point Detection Method on 100 Gb/s Ethernet Interface,” in Proceedings of the Tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, New York, NY, USA, 2014, pp. 245–246.
- T. Čejka, L. Kekely, P. Benáček, R. B. Blažek, and H. Kubátová, “FPGA Accelerated Change-Point Detection Method for 100 Gb/s Networks,” in 9th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2014), Telč, Czech Republic, 2014.
2013:
- V. Bartoš, M. Žádník, and T. Čejka, “Nemea: Framework for stream-wise analysis of network traffic,” CESNET, a.l.e., 2013.
2012:
- T. Čejka, P. Benáček, Š. Friedl, and R. Krejčí, “COMET-COMBO Ethernet Tester,” CESNET, a.l.e., 2012.
Contacts:
Newest Posts