• D. Vekshin, K. Hynek, and T. Cejka, “DoH Insight: Detecting DNS over HTTPS by Machine Learning,” in Proceedings of the 15th International Conference on Availability, Reliability and Security, New York, NY, USA, 2020.
    .bib Link
    @inproceedings{vekshin2020dohidentares,
      author = {Vekshin, Dmitrii and Hynek, Karel and Cejka, Tomas},
      title = {DoH Insight: Detecting DNS over HTTPS by Machine Learning},
      year = {2020},
      isbn = {9781450388337},
      publisher = {Association for Computing Machinery},
      address = {New York, NY, USA},
      url = {https://doi.org/10.1145/3407023.3409192},
      doi = {10.1145/3407023.3409192},
      booktitle = {Proceedings of the 15th International Conference on Availability, Reliability and Security},
      articleno = {87},
      numpages = {8},
      keywords = {classification, DNS over HTTPS, DoH, detection, machine learning, datasets},
      location = {Virtual Event, Ireland},
      series = {ARES '20}
    }
    
  • K. Hynek, T. Beneš, T. Čejka, and H. Kubátová, “Refined Detection of SSH Brute-Force Attackers Using Machine Learning,” in ICT Systems Security and Privacy Protection, Cham, 2020, pp. 49–63.
    .bib Link
    @inproceedings{hynek2020sshbfsec,
      author = {Hynek, Karel and Bene{\v{s}}, Tom{\'a}{\v{s}} and {\v{C}}ejka, Tom{\'a}{\v{s}} and Kub{\'a}tov{\'a}, Hana},
      editor = {H{\"o}lbl, Marko and Rannenberg, Kai and Welzer, Tatjana},
      title = {{Refined Detection of SSH Brute-Force Attackers Using Machine Learning}},
      booktitle = {ICT Systems Security and Privacy Protection},
      year = {2020},
      publisher = {Springer International Publishing},
      address = {Cham},
      pages = {49--63},
      url = {https://doi.org/10.1007/978-3-030-58201-2_4},
      doi = {10.1007/978-3-030-58201-2_4}
    }
    
  • K. Hynek, T. Čejka, M. Žádník, and H. Kubátová, “Evaluating Bad Hosts Using Adaptive Blacklist Filter,” in 9th Mediterranean Conference on Embedded Computing (MECO), 2020, pp. 1–5.
    .bib Link
    @inproceedings{hynek2020adaptivefilter,
      author = {{Hynek}, K. and {Čejka}, T. and {Žádník}, M. and {Kubátová}, H.},
      booktitle = {9th Mediterranean Conference on Embedded Computing (MECO)},
      title = {Evaluating Bad Hosts Using Adaptive Blacklist Filter},
      year = {2020},
      url = {https://ieeexplore.ieee.org/abstract/document/9134244},
      pages = {1-5}
    }
    
  • D. Soukup, O. Hujňák, S. Štefunko, Krejčı́ Radek, and E. Grešák, “Security Framework for IoT and Fog Computing Networks,” in 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2019, pp. 87–92.
    .bib Link
    @inproceedings{soukup2019security,
      title = {Security Framework for IoT and Fog Computing Networks},
      author = {Soukup, Dominik and Huj{\v{n}}{\'a}k, Ond{\v{r}}ej and {\v{S}}tefunko, Simon and Krej{\v{c}}{\'\i}, Radek and Gre{\v{s}}{\'a}k, Erik},
      booktitle = {2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC)},
      pages = {87--92},
      year = {2019},
      url = {https://ieeexplore.ieee.org/abstract/document/9032592},
      organization = {IEEE}
    }
    
  • D. Soukup, T. Cejka, and K. Hynek, “Behavior Anomaly Detection in IoT Networks,” in International conference on Computer Networks, Big data and IoT, 2019, pp. 465–473.
    .bib Link
    @inproceedings{soukup2019behavior,
      title = {Behavior Anomaly Detection in IoT Networks},
      author = {Soukup, Dominik and Cejka, Tomas and Hynek, Karel},
      booktitle = {International conference on Computer Networks, Big data and IoT},
      pages = {465--473},
      year = {2019},
      url = {https://link.springer.com/chapter/10.1007/978-3-030-43192-1_53},
      organization = {Springer}
    }
    
  • D. Soukup, T. Čejka, and S. Štefunko, “Multi-level Anomaly Detection in IoT Networks,” in The 7th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2019.
    .bib Link
    @inproceedings{pesw2019-multilevelanomalydetIoT,
      author = {Soukup, Dominik and Čejka, Tomáš and Štefunko, Simon},
      title = {{Multi-level Anomaly Detection in IoT Networks}},
      booktitle = {{The 7th Prague Embedded Systems Workshop}},
      address = {{Roztoky u Prahy, Czech Republic}},
      year = {2019},
      url = {http://pesw.fit.cvut.cz/2019/PESW_2019.pdf}
    }
    
  • J. Havránek, T. Čejka, and P. Benáček, “L7 capable flow exporter described in P4,” in The 7th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2019.
    .bib Link
    @inproceedings{pesw2019-l7flowexporterP4,
      author = {Havránek, Jiří and Čejka, Tomáš and Benáček, Pavel},
      title = {{L7 capable flow exporter described in P4}},
      booktitle = {{The 7th Prague Embedded Systems Workshop}},
      address = {{Roztoky u Prahy, Czech Republic}},
      year = {2019},
      url = {http://pesw.fit.cvut.cz/2019/PESW_2019.pdf}
    }
    
  • K. Hynek, T. Beneš, T. Čejka, and H. Kubátová, “Future approaches to monitoring in high-speed backbone networks ,” in The 7th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2019.
    .bib Link
    @inproceedings{pesw2019-futuremonit,
      author = {Hynek, Karel and Beneš, Tomáš and Čejka, Tomáš and Kubátová, Hana},
      title = {{Future approaches to monitoring in high-speed backbone networks }},
      booktitle = {{The 7th Prague Embedded Systems Workshop}},
      address = {{Roztoky u Prahy, Czech Republic}},
      year = {2019},
      url = {http://pesw.fit.cvut.cz/2019/PESW_2019.pdf}
    }
    
  • T. Jánský, T. Čejka, Žádnı́k Martin, and V. Bartoš, “Augmented DDoS Mitigation with Reputation Scores,” in Proceedings of the 13th International Conference on Availability, Reliability and Security, New York, NY, USA, 2018, pp. 54:1–54:7.
    .bib Link
    @inproceedings{jansky2018ares,
      author = {J\'{a}nsk\'{y}, Tom\'{a}\v{s} and \v{C}ejka, Tom\'{a}\v{s} and \v{Z}\'{a}dn\'{\i}k, Martin and Barto\v{s}, V\'{a}clav},
      title = {Augmented DDoS Mitigation with Reputation Scores},
      booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security},
      series = {ARES 2018},
      year = {2018},
      isbn = {978-1-4503-6448-5},
      location = {Hamburg, Germany},
      pages = {54:1--54:7},
      articleno = {54},
      numpages = {7},
      url = {http://doi.acm.org/10.1145/3230833.3233279},
      doi = {10.1145/3230833.3233279},
      acmid = {3233279},
      publisher = {ACM},
      address = {New York, NY, USA},
      keywords = {amplification DDoS, attack mitigation, distributed denial of service, packet filtering, reputation score}
    }
    
  • T. Jánský, T. Čejka, M. Žádník, and V. Bartoš, “Informed DDoS Mitigation at 100 Gb/s,” in Proceedings of the 6th Prague Embedded Systems Workshop, 2018, pp. 41–42.
    .bib
    @inproceedings{jansky2018pesw,
      author = {Jánský, Tomáš and Čejka, Tomáš and Žádník, Martin and Bartoš, Václav},
      title = {{Informed DDoS Mitigation at 100 Gb/s}},
      booktitle = {{Proceedings of the 6th Prague Embedded Systems Workshop}},
      publisher = {{ČVUT v Praze, Fakulta informačních technologií}},
      year = {2018},
      pages = {41--42},
      isbn = {978-80-01-06456-6}
    }
    
  • F. Šuster and T. Čejka, “Stream-wise adaptive blacklist filter based on flow data,” in Proceedings of the 6th Prague Embedded Systems Workshop, 2018, pp. 38–39.
    .bib
    @inproceedings{suster2018pesw,
      author = {Šuster, Filip and Čejka, Tomáš},
      title = {{Stream-wise adaptive blacklist filter based on flow data}},
      booktitle = {{Proceedings of the 6th Prague Embedded Systems Workshop}},
      publisher = {{ČVUT v Praze, Fakulta informačních technologií}},
      year = {2018},
      pages = {38--39},
      isbn = {978-80-01-06456-6}
    }
    
  • M. Slabihoudek and T. Čejka, “Stream-wise Aggregation of Flow Data,” in Proceedings of the 6th Prague Embedded Systems Workshop, 2018, p. 37.
    .bib
    @inproceedings{slabihoudek2018pesw,
      author = {Slabihoudek, Michal and Čejka, Tomáš},
      title = {{Stream-wise Aggregation of Flow Data}},
      booktitle = {{Proceedings of the 6th Prague Embedded Systems Workshop}},
      publisher = {{ČVUT v Praze, Fakulta informačních technologií}},
      year = {2018},
      pages = {37},
      isbn = {978-80-01-06456-6}
    }
    
  • L. Stejskalová and T. Čejka, “Grouping evil IP addresses,” in Proceedings of the 6th Prague Embedded Systems Workshop, 2018, p. 30.
    .bib
    @inproceedings{stejskalova2018pesw,
      author = {Stejskalová, Lenka and Čejka, Tomáš},
      title = {{Grouping evil IP addresses}},
      booktitle = {{Proceedings of the 6th Prague Embedded Systems Workshop}},
      publisher = {{ČVUT v Praze, Fakulta informačních technologií}},
      year = {2018},
      pages = {30},
      isbn = {978-80-01-06456-6}
    }
    
  • P. Benáček, V. Puš, H. Kubátová, and T. Čejka, “P4-To-VHDL: Automatic generation of high-speed input and output network blocks,” Microprocessors and Microsystems, vol. 56, pp. 22–33, 2018.
    .bib Link
    @article{benacek2018p4_2_vhdl,
      title = {P4-To-VHDL: Automatic generation of high-speed input and output network blocks},
      journal = {Microprocessors and Microsystems},
      volume = {56},
      pages = {22--33},
      year = {2018},
      issn = {0141-9331},
      doi = {https://doi.org/10.1016/j.micpro.2017.10.012},
      url = {http://www.sciencedirect.com/science/article/pii/S0141933117304787},
      author = {Benáček, Pavel and Puš, Viktor and Kubátová, Hana and Čejka, Tomáš},
      keywords = {FPGA, High-level language, P4, 100 Gbps, Parser, Deparser}
    }
    
  • J. Havránek, P. Velan, T. Cejka, and P. Benáček, “Enhanced Flow Monitoring with P4 Generated Flexible Packet Parser,” in AIMS 2018, 2018.
    .bib
    @inproceedings{182007,
      author = {Havránek, Jiří and Velan, Petr and Cejka, Tomas and Benáček, Pavel},
      title = {Enhanced Flow Monitoring with P4 Generated Flexible Packet Parser},
      booktitle = {AIMS 2018},
      address = {},
      days = {4-7},
      month = jun,
      year = {2018},
      keywords = {High-speed or ubiquitous monitoring; Proactive and predictive security solutions}
    }
    
  • T. Jánský, T. Čejka, and V. Bartoš, “Hunting SIP Authentication Attacks Efficiently,” in Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings, D. Tuncer, R. Koch, R. Badonnel, and B. Stiller, Eds. Cham: Springer International Publishing, 2017, pp. 125–130.
    .bib Link
    @inbook{Jansky2017,
      author = {Jánský, Tomáš and Čejka, Tomáš and Bartoš, Václav},
      editor = {Tuncer, Daphne and Koch, Robert and Badonnel, Rémi and Stiller, Burkhard},
      title = {Hunting SIP Authentication Attacks Efficiently},
      booktitle = {Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings},
      year = {2017},
      publisher = {Springer International Publishing},
      address = {Cham},
      pages = {125--130},
      isbn = {978-3-319-60774-0},
      doi = {10.1007/978-3-319-60774-0_9},
      url = {http://dx.doi.org/10.1007/978-3-319-60774-0_9}
    }
    
  • T. Čejka and M. Žádník, “Preserving Relations in Parallel Flow Data Processing,” in Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings, D. Tuncer, R. Koch, R. Badonnel, and B. Stiller, Eds. Cham: Springer International Publishing, 2017, pp. 153–156.
    .bib Link
    @inbook{Cejka2017-phd,
      author = {Čejka, Tomáš and Žádník, Martin},
      editor = {Tuncer, Daphne and Koch, Robert and Badonnel, Rémi and Stiller, Burkhard},
      title = {Preserving Relations in Parallel Flow Data Processing},
      booktitle = {Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings},
      year = {2017},
      publisher = {Springer International Publishing},
      address = {Cham},
      pages = {153--156},
      isbn = {978-3-319-60774-0},
      doi = {10.1007/978-3-319-60774-0_14},
      url = {http://dx.doi.org/10.1007/978-3-319-60774-0_14}
    }
    
  • M. Švepeš and T. Čejka, “Making Flow-Based Security Detection Parallel,” in Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings, D. Tuncer, R. Koch, R. Badonnel, and B. Stiller, Eds. Cham: Springer International Publishing, 2017, pp. 3–15.
    .bib Link
    @inbook{Svepes2017,
      author = {Švepeš, Marek and Čejka, Tomáš},
      editor = {Tuncer, Daphne and Koch, Robert and Badonnel, Rémi and Stiller, Burkhard},
      title = {Making Flow-Based Security Detection Parallel},
      booktitle = {Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings},
      year = {2017},
      publisher = {Springer International Publishing},
      address = {Cham},
      pages = {3--15},
      isbn = {978-3-319-60774-0},
      doi = {10.1007/978-3-319-60774-0_1},
      url = {http://dx.doi.org/10.1007/978-3-319-60774-0_1}
    }
    
  • T. Čejka, M. Švepeš, and J. Viktorin, “Gateway for IoT security,” in The 5th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2017.
    .bib Link
    @inproceedings{pesw2017-siot,
      author = {Čejka, Tomáš and Švepeš, Marek and Viktorin, Jan},
      title = {{Gateway for IoT security}},
      booktitle = {{The 5th Prague Embedded Systems Workshop}},
      address = {{Roztoky u Prahy, Czech Republic}},
      year = {2017},
      url = {https://www.liberouter.org/wp-content/uploads/2017/07/PESW_2017_svepes.pdf}
    }
    
  • T. Jánský, T. Čejka, and V. Bartoš, “Detection of SIP Scans and Bruteforce Attacks,” in The 5th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2017.
    .bib Link
    @inproceedings{pesw2017-sip,
      author = {Jánský, Tomáš and Čejka, Tomáš and Bartoš, Václav},
      title = {{Detection of SIP Scans and Bruteforce Attacks}},
      booktitle = {{The 5th Prague Embedded Systems Workshop}},
      address = {{Roztoky u Prahy, Czech Republic}},
      year = {2017},
      url = {https://www.liberouter.org/wp-content/uploads/2017/07/PESW_2017_jansky.pdf}
    }
    
  • T. Cejka, V. Bartoš, M. Svepes, Z. Rosa, and H. Kubatova, “NEMEA: A Framework for Network Traffic Analysis,” in 12th International Conference on Network and Service Management (CNSM 2016), Montreal, Canada, 2016.
    .bib Link
    @inproceedings{Cejk1610:NEMEA,
      author = {Cejka, Tomas and Barto{\v s}, Václav and Svepes, Marek and Rosa, Zdenek and Kubatova, Hana},
      title = {{NEMEA:} A Framework for Network Traffic Analysis},
      booktitle = {12th International Conference on Network and Service Management (CNSM 2016)},
      address = {Montreal, Canada},
      days = {31},
      month = oct,
      year = {2016},
      keywords = {NEMEA;network traffic measurement;flow analysis;detection},
      doi = {10.1109/CNSM.2016.7818417},
      url = {http://dx.doi.org/10.1109/CNSM.2016.7818417}
    }
    
  • Z. Rosa, T. Cejka, M. Zadnik, and V. Puš, “Building a Feedback Loop to Capture Evidence of Network Incidents,” in 12th International Conference on Network and Service Management (CNSM 2016), Montreal, Canada, 2016.
    .bib Link
    @inproceedings{Cejk1610:Building,
      author = {Rosa, Zdenek and Cejka, Tomas and Zadnik, Martin and Pu{\v s}, Viktor},
      title = {Building a Feedback Loop to Capture Evidence of Network Incidents},
      booktitle = {12th International Conference on Network and Service Management (CNSM 2016)},
      address = {Montreal, Canada},
      days = {31},
      month = oct,
      year = {2016},
      keywords = {Software Defined Monitoring;Time-machine;traffic capture;flow;traffic
      analysis;NEMEA;network security},
      doi = {10.1109/CNSM.2016.7818435},
      url = {http://dx.doi.org/10.1109/CNSM.2016.7818435}
    }
    
  • T. Cejka and M. Svepes, “Analysis of Vertical Scans Discovered by Naive Detection,” in Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016, R. Badonnel, R. Koch, A. Pras, M. Drašar, and B. Stiller, Eds. Munich, Germany: Springer International Publishing, 2016, pp. 165–169.
    .bib Link
    @inbook{aims2016,
      author = {Cejka, Tomas and Svepes, Marek},
      editor = {Badonnel, Rémi and Koch, Robert and Pras, Aiko and Drašar, Martin and Stiller, Burkhard},
      title = {Analysis of Vertical Scans Discovered by Naive Detection},
      booktitle = {Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016},
      year = {2016},
      publisher = {Springer International Publishing},
      address = {Munich, Germany},
      pages = {165--169},
      isbn = {978-3-319-39814-3},
      doi = {10.1007/978-3-319-39814-3_19},
      url = {http://dx.doi.org/10.1007/978-3-319-39814-3_19}
    }
    
  • T. Čejka and R. Krejčí, “Configuration of open vSwitch using OF-CONFIG,” in NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, 2016, pp. 883–888.
    .bib Link
    @inproceedings{noms2016,
      author = {Čejka, Tomáš and Krejčí, Radek},
      booktitle = {NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium},
      title = {Configuration of open vSwitch using OF-CONFIG},
      year = {2016},
      month = apr,
      pages = {883-888},
      keywords = {Bridges;Control systems;Data models;Ports (Computers);Protocols;Servers;Standards},
      doi = {10.1109/NOMS.2016.7502920},
      address = {Istanbul, Turkey},
      url = {http://dx.doi.org/10.1109/NOMS.2016.7502920}
    }
    
  • T. Čejka and A. Robledo, “Detecting Spoofed Time in NTP Traffic,” in The 4th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2016.
    .bib Link
    @inproceedings{pesw2016-ntp,
      author = {Čejka, Tomáš and Robledo, Alejandro},
      title = {{Detecting Spoofed Time in NTP Traffic}},
      booktitle = {{The 4th Prague Embedded Systems Workshop}},
      address = {{Roztoky u Prahy, Czech Republic}},
      year = {2016},
      url = {https://www.liberouter.org/wp-content/uploads/2016/07/pesw2016-ntpdetection.pdf}
    }
    
  • M. Svepes and T. Cejka, “Overload-resistant Network Traffic Analysis,” in The 4th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2016.
    .bib Link
    @inproceedings{pesw2016-nemea,
      author = {Svepes, Marek and Cejka, Tomas},
      title = {{Overload-resistant Network Traffic Analysis}},
      booktitle = {{The 4th Prague Embedded Systems Workshop}},
      address = {{Roztoky u Prahy, Czech Republic}},
      year = {2016},
      url = {https://www.liberouter.org/wp-content/uploads/2016/07/pesw2016-nemea.pdf}
    }
    
  • T. Čejka, R. Bodó, and H. Kubátová, “Nemea: Searching for Botnet Footprints,” in The 3th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2015.
    .bib Link
    @inproceedings{pesw2015-botnet,
      author = {Čejka, Tomáš and Bodó, Radoslav and Kubátová, Hana},
      title = {{Nemea: Searching for Botnet Footprints}},
      booktitle = {{The 3th Prague Embedded Systems Workshop}},
      address = {{Roztoky u Prahy, Czech Republic}},
      year = {2015},
      url = {https://www.liberouter.org/wp-content/uploads/2015/07/pesw2015-nemea-botnet.pdf}
    }
    
  • D. Alexa and T. Čejka, “Easy configuration of NETCONF devices,” in The 3th Prague Embedded Systems Workshop, Roztoky u Prahy, Czech Republic, 2015.
    .bib Link
    @inproceedings{pesw2015-netopeer,
      author = {Alexa, David and Čejka, Tomáš},
      title = {{Easy configuration of NETCONF devices}},
      booktitle = {{The 3th Prague Embedded Systems Workshop}},
      address = {{Roztoky u Prahy, Czech Republic}},
      year = {2015},
      url = {https://www.liberouter.org/wp-content/uploads/2015/07/pesw2015-netopeer.pdf}
    }
    
  • T. Cejka, V. Bartos, L. Truxa, and H. Kubatova, “Using Application-Aware Flow Monitoring for SIP Fraud Detection,” in Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, S. Latré, M. Charalambides, J. François, C. Schmitt, and B. Stiller, Eds. Ghent, Belgium: Springer International Publishing, 2015, pp. 87–99.
    .bib Link
    @inbook{aims2015,
      author = {Cejka, Tomas and Bartos, Vaclav and Truxa, Lukas and Kubatova, Hana},
      editor = {Latré, Steven and Charalambides, Marinos and Fran{\c{c}}ois, Jér{\^o}me and Schmitt, Corinna and Stiller, Burkhard},
      title = {Using Application-Aware Flow Monitoring for SIP Fraud Detection},
      booktitle = {Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015},
      year = {2015},
      month = jun,
      publisher = {Springer International Publishing},
      address = {Ghent, Belgium},
      pages = {87--99},
      isbn = {978-3-319-20034-7},
      doi = {10.1007/978-3-319-20034-7_10},
      url = {http://dx.doi.org/10.1007/978-3-319-20034-7_10}
    }
    
  • T. Cejka, Z. Rosa, and H. Kubatova, “Stream-wise detection of surreptitious traffic over dns,” in 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Athens, Greece, 2014, pp. 300–304.
    .bib Link
    @inproceedings{camad2014,
      title = {Stream-wise detection of surreptitious traffic over dns},
      author = {Cejka, Tomas and Rosa, Zdenek and Kubatova, Hana},
      booktitle = {2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)},
      pages = {300--304},
      year = {2014},
      organization = {IEEE},
      address = {Athens, Greece},
      url = {http://dx.doi.org/10.1109/CAMAD.2014.7033254},
      doi = {10.1109/CAMAD.2014.7033254}
    }
    
  • P. Benáček, R. B. Blažek, T. Čejka, and H. Kubátová, “Change-point Detection Method on 100 Gb/s Ethernet Interface,” in Proceedings of the Tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, New York, NY, USA, 2014, pp. 245–246.
    .bib Link
    @inproceedings{Benacek:2014:CDM:2658260.2661773,
      author = {Benáček, Pavel and Blažek, Rudolf B. and Čejka, Tomáš and Kubátová, Hana},
      title = {Change-point Detection Method on 100 Gb/s Ethernet Interface},
      booktitle = {Proceedings of the Tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems},
      series = {ANCS '14},
      year = {2014},
      isbn = {978-1-4503-2839-5},
      location = {Los Angeles, California, USA},
      pages = {245--246},
      numpages = {2},
      url = {http://doi.acm.org/10.1145/2658260.2661773},
      doi = {10.1145/2658260.2661773},
      acmid = {2661773},
      publisher = {ACM},
      address = {New York, NY, USA},
      keywords = {change-point detection, fpga, network anomaly detection, software defined monitoring}
    }
    
  • T. Čejka, L. Kekely, P. Benáček, R. B. Blažek, and H. Kubátová, “FPGA Accelerated Change-Point Detection Method for 100 Gb/s Networks,” in 9th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2014), Telč, Czech Republic, 2014.
    .bib Link
    @inproceedings{cejka2014fpga,
      author = {Čejka, Tomáš and Kekely, Lukáš and Benáček, Pavel and Blažek, Rudolf B. and Kubátová, Hana},
      title = {FPGA Accelerated Change-Point Detection Method for 100 Gb/s Networks},
      booktitle = {9th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2014)},
      year = {2014},
      address = {Telč, Czech Republic},
      url = {http://wp.liberouter.org/wp-content/uploads/2014/11/llncs_cr.pdf}
    }
    
  • V. Bartoš, M. Žádník, and T. Čejka, “Nemea: Framework for stream-wise analysis of network traffic,” CESNET, a.l.e., 2013.
    .bib Link
    @techreport{nemea-techrep,
      author = {Bartoš, Václav and Žádník, Martin and Čejka, Tomáš},
      title = {Nemea: Framework for stream-wise analysis of network traffic},
      institution = {{CESNET, a.l.e.}},
      year = {2013},
      url = {http://www.cesnet.cz/wp-content/uploads/2014/02/trapnemea.pdf}
    }
    
  • T. Čejka, P. Benáček, Š. Friedl, and R. Krejčí, “COMET-COMBO Ethernet Tester,” CESNET, a.l.e., 2012.
    .bib Link
    @techreport{comet-techrep,
      author = {Čejka, Tomáš and Benáček, Pavel and Friedl, Štěpán and Krejčí, Radek},
      title = {{COMET-COMBO Ethernet Tester}},
      institution = {{CESNET, a.l.e.}},
      year = {2012},
      url = {https://www.cesnet.cz/wp-content/uploads/2013/03/comet.pdf}
    }