default search action
Ondrej Rysavý
Person information
- affiliation: Brno University of Technology , Czech Republic
- unicode name: Ondřej Ryšavý
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Kamil Jerábek, Karel Hynek, Ondrej Rysavý:
Comparative analysis of DNS over HTTPS detectors. Comput. Networks 247: 110452 (2024) - [c51]Radek Hranický, Adam Horák, Jan Polisenský, Kamil Jerábek, Ondrej Rysavý:
Unmasking the Phishermen: Phishing Domain Detection with Machine Learning and Multi-Source Intelligence. NOMS 2024: 1-5 - 2023
- [j13]Kamil Jerábek, Karel Hynek, Ondrej Rysavý, Ivana Burgetova:
DNS Over HTTPS Detection Using Standard Flow Telemetry. IEEE Access 11: 50000-50012 (2023) - [j12]Vojtech Havlena, Petr Matousek, Ondrej Rysavý, Lukás Holík:
Accurate Automata-Based Detection of Cyber Threats in Smart Grid Communication. IEEE Trans. Smart Grid 14(3): 2352-2366 (2023) - [c50]Arbnor Imeri, Ondrej Rysavý:
Deep learning for predictive alerting and cyber-attack mitigation. CCWC 2023: 476-481 - [c49]Kamil Jerábek, Ondrej Rysavý, Ivana Burgetova:
Analysis of Well-Known DNS over HTTPS Resolvers. CCWC 2023: 516-524 - [c48]Sawsan Youssef, Ondrej Rysavý:
Toward migration to SDN: Generating SDN Forwarding Rules by Decision Tree. ICIN 2023: 16-20 - [c47]Roman Rader, Kamil Jerábek, Ondrej Rysavý:
Detecting DoH-Based Data Exfiltration: FluBot Malware Case Study. LCN 2023: 1-4 - 2022
- [d2]Petr Matousek, Ondrej Rysavý, Peter Grofcík:
ICS Dataset for Smart Grid Anomaly Detection. IEEE DataPort, 2022 - [d1]Ondrej Rysavý, Petr Matousek:
Modbus Dataset for ICS Anomaly Detection. IEEE DataPort, 2022 - [i3]Kamil Jerábek, Ondrej Rysavý, Ivana Burgetova:
Measurement and characterization of DNS over HTTPS traffic. CoRR abs/2204.03975 (2022) - 2021
- [j11]Radek Hranický, Frank Breitinger, Ondrej Rysavý, John Sheppard, Florin Schaedler, Holger Morgenstern, Simon Malik:
What do incident response practitioners need to know? A skillmap for the years ahead. Digit. Investig. 37 Supplement: 301184 (2021) - [c46]Ivana Burgetova, Petr Matousek, Ondrej Rysavý:
Anomaly Detection of ICS Communication Using Statistical Models. CNSM 2021: 166-172 - [c45]Martin Holkovic, Michal Bohus, Ondrej Rysavý:
Network Problem Diagnostics using Typographic Error Correction. CNSM 2021: 482-490 - [c44]Ondrej Rysavý, Petr Matousek:
A Network Traffic Processing Library for ICS Anomaly Detection. ECBS 2021: 22:1-22:7 - [c43]Petr Matousek, Ondrej Rysavý, Libor Polcák:
Unified SNMP Interface for IoT Monitoring. IM 2021: 938-943 - 2020
- [j10]Jan Pluskal, Frank Breitinger, Ondrej Rysavý:
Netfox detective: A novel open-source network forensics analysis tool. Digit. Investig. 35: 301019 (2020) - [j9]Petr Matousek, Ondrej Rysavý, Matej Grégr, Vojtech Havlena:
Flow based monitoring of ICS communication in the smart grid. J. Inf. Secur. Appl. 54: 102535 (2020) - [c42]Radek Hranický, Lukás Zobal, Ondrej Rysavý, Dusan Kolár, Dávid Mikus:
Distributed PCFG Password Cracking. ESORICS (1) 2020: 701-719 - [c41]Sawsan Youssef, Ondrej Rysavý:
Proposed Method for Partial Node Replacement by Software Defined Network. FedCSIS (Position Papers) 2020: 11-14 - [c40]Petr Matousek, Ivana Burgetova, Ondrej Rysavý, Malombe Victor:
On Reliability of JA3 Hashes for Fingerprinting Mobile Applications. ICDF2C 2020: 1-22 - [c39]Martin Holkovic, Michal Bohus, Ondrej Rysavý:
Pattern Detection based Network Diagnostics. ICETE (1) 2020: 35-42 - [c38]Libor Polcák, Ondrej Rysavý, Petr Matousek:
Identity Linking in Computer Networks. ICETE (1) 2020: 45-52
2010 – 2019
- 2019
- [j8]Radek Hranický, Lukás Zobal, Ondrej Rysavý, Dusan Kolár:
Distributed password cracking with BOINC and hashcat. Digit. Investig. 30: 161-172 (2019) - [j7]Marek Rychlý, Ondrej Rysavý:
Big Data Security Analysis withTARZAN Platform. J. Cyber Secur. Mobil. 8(2): 165-188 (2019) - [c37]Radek Hranický, Filip Listiak, Dávid Mikus, Ondrej Rysavý:
On Practical Aspects of PCFG Password Cracking. DBSec 2019: 43-60 - [c36]Kamil Jerábek, Ondrej Rysavý:
Big Data Network Flow Processing Using Apache Spark. ECBS 2019: 9:1-9:9 - [c35]Jan Pluskal, Martin Vondrácek, Ondrej Rysavý:
Network Forensics in GSE Overlay Networks. ECBS 2019: 12:1-12:10 - [c34]Martin Holkovic, Ondrej Rysavý, Jindrich Dudek:
Automating Network Security Analysis at Packet-level by using Rule-based Engine. ECBS 2019: 14:1-14:8 - [c33]Petr Matousek, Ondrej Rysavý, Matej Grégr:
Security Monitoring of IoT Communication Using Flows. ECBS 2019: 18:1-18:9 - [c32]Viliam Letavay, Jan Pluskal, Ondrej Rysavý:
Network Forensic Analysis for Lawful Enforcement on Steroids, Distributed and Scalable. ECBS 2019: 20:1-20:9 - [c31]Martin Holkovic, Libor Polcák, Ondrej Rysavý:
Application Error Detection in Networks by Protocol Behavior Model. ICETE (Selected Papers) 2019: 3-28 - [c30]Martin Holkovic, Ondrej Rysavý, Libor Polcák:
Using Network Traces to Generate Models for Automatic Network Application Protocols Diagnostics. ICETE (1) 2019: 43-53 - [e2]Maria-Iuliana Dascalu, Ondrej Rysavý, Constanta-Nicoleta Bodea, Moshe Goldstein, Miodrag Dukic:
Proceedings of the 6th Conference on the Engineering of Computer Based Systems, ECBS 2019, Bucharest, Romania, September 2-3, 2019. ACM 2019, ISBN 978-1-4503-7636-5 [contents] - 2018
- [j6]Martin Vondrácek, Jan Pluskal, Ondrej Rysavý:
Automated Man-in-the-Middle Attack Against Wi‑Fi Networks. J. Digit. Forensics Secur. Law 13(1): 59-80 (2018) - [j5]Hamid Asgari, Sarah Haines, Ondrej Rysavý:
Identification of Threats and Security Risk Assessments for Recursive Internet Architecture. IEEE Syst. J. 12(3): 2437-2448 (2018) - [c29]Jan Pluskal, Ondrej Lichtner, Ondrej Rysavý:
Traffic Classification and Application Identification in Network Forensics. IFIP Int. Conf. Digital Forensics 2018: 161-181 - 2017
- [c28]Marcel Marek, Ondrej Rysavý, Vladimír Veselý:
Towards analysis of IP communication in a constrained environment of tactical radio networks. ECBS 2017: 8:1-8:7 - [c27]Marek Rychlý, Ondrej Rysavý:
TARZAN: An Integrated Platform for Security Analysis. FedCSIS 2017: 561-567 - [c26]Martin Vondrácek, Jan Pluskal, Ondrej Rysavý:
Automation of MitM Attack on Wi-Fi Networks. ICDF2C 2017: 207-220 - [c25]Vladimír Veselý, Jan Holusa, Ondrej Rysavý:
First-hop Redundancy Protocols in Omnet++. SIMULTECH 2017: 331-339 - [e1]Ondrej Rysavý, Valentino Vranic, George Angelos Papadopoulos:
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, ECBS 2017, Larnaca, Cyprus, August 31 - September 01, 2017. ACM 2017, ISBN 978-1-4503-4843-0 [contents] - 2016
- [j4]Petr Matousek, Radek Hranicky, Martin Holkovic, Ondrej Rysavý:
On Efficiency of Distributed Password Recovery. J. Digit. Forensics Secur. Law 11(2): 79-96 (2016) - [c24]Eduard Grasa, Ondrej Rysavý, Ondrej Lichtner, Hamid Asgari, John Day, Lou Chitkushev:
From protecting protocols to layers: Designing, implementing and experimenting with security policies in RINA. ICC 2016: 1-7 - [c23]Radek Hranicky, Petr Matousek, Ondrej Rysavý, Vladimír Veselý:
Experimental Evaluation of Password Recovery in Encrypted Documents. ICISSP 2016: 299-306 - [i2]Vladimír Veselý, Vít Rek, Ondrej Rysavý:
Babel Routing Protocol for OMNeT++ - More than just a new simulation module for INET framework. CoRR abs/1609.05215 (2016) - 2015
- [c22]Petr Matousek, Jan Pluskal, Ondrej Rysavý, Vladimír Veselý, Martin Kmet, Filip Karpísek, Martin Vymlátil:
Advanced Techniques for Reconstruction of Incomplete Network Data. ICDF2C 2015: 69-84 - [i1]Vladimír Veselý, Marcel Marek, Tomas Hykel, Ondrej Rysavý:
Skip This Paper - RINASim: Your Recursive InterNetwork Architecture Simulator. CoRR abs/1509.03550 (2015) - 2014
- [j3]Petr Matousek, Ondrej Rysavý, Martin Kmet:
Fast RTP Detection and Codecs Classification in Internet Traffic. J. Digit. Forensics Secur. Law 9(2): 101-112 (2014) - [c21]Petr Matousek, Ondrej Rysavý, Matej Grégr, Martin Vymlátil:
Towards Identification of Operating Systems from the Internet Traffic - IPFIX Monitoring with Fingerprinting and Clustering. DCNET 2014: 21-27 - [c20]Vladimír Veselý, Jan Bloudicek, Ondrej Rysavý:
Enhanced interior gateway routing protocol for OMNeT++. SIMULTECH 2014: 50-58 - [c19]Vladimír Veselý, Vít Rek, Ondrej Rysavý:
Enhanced Interior Gateway Routing Protocol with IPv4 and IPv6 Support for OMNeT++. SIMULTECH (Selected Papers) 2014: 65-82 - 2013
- [j2]Gayan de Silva, Ondrej Rysavý, Petr Matousek, Miroslav Svéda:
On formal reachability analysis in networks with dynamic behavior. Telecommun. Syst. 52(2): 919-929 (2013) - [c18]Ondrej Rysavý, Jaroslav Ráb, Miroslav Svéda:
Improving security in SCADA systems through firewall policy analysis. FedCSIS 2013: 1423-1428 - [c17]Miroslav Svéda, Ondrej Rysavý:
Dependable Cyber-Physical Systems Networking: An Approach for Real-Time, Software Intensive Systems. PDeS 2013: 116-119 - [c16]Vladimír Veselý, Ondrej Rysavý, Miroslav Svéda:
IPv6 unicast and IPv4 multicast routing in OMNeT++. SimuTools 2013: 346-349 - 2012
- [c15]Ondrej Rysavý, Jaroslav Ráb, Patrik Halfar, Miroslav Svéda:
A Formal Authorization Framework for Networked SCADA Systems. ECBS 2012: 298-302 - 2011
- [c14]Miroslav Svéda, Ondrej Rysavý, Gayan de Silva, Petr Matousek, Jaroslav Ráb:
Reachability Analysis in Dynamically Routed Networks. ECBS 2011: 197-205 - 2010
- [c13]Miroslav Svéda, Ondrej Rysavý, Petr Matousek, Jaroslav Ráb, Rudolf Cejka:
Security Analysis of TCP/IP Networks - An Approach to Automatic Analysis of Network Security Properties. DCNET/OPTICS 2010: 5-11 - [c12]Miroslav Svéda, Ondrej Rysavý, Gayan de Silva, Petr Matousek, Jaroslav Ráb:
Static Analysis of Routing and Firewall Policy Configurations. ICETE (Selected Papers) 2010: 39-53 - [c11]Gayan de Silva, Petr Matousek, Ondrej Rysavý, Miroslav Svéda:
Formal analysis approach on networks with dynamic behaviours. ICUMT 2010: 545-551 - [c10]Petr Matousek, Ondrej Rysavý, Gayan de Silva, Martin Danko:
Combination of simulation and formal methods to analyse network survivability. SimuTools 2010: 57
2000 – 2009
- 2009
- [j1]Ondrej Rysavý, Jaroslav Ráb:
A formal model of composing components: the TLA+ approach. Innov. Syst. Softw. Eng. 5(2): 139-148 (2009) - [c9]Adam Pilat, Andrew J. Kornecki, Jean-Marc Thiriet, Wojciech Grega, Ondrej Rysavý:
Inter-university project based on LEGO NXT. CCA/ISIC 2009: 1248-1253 - [c8]Ondrej Rysavý, Miroslav Svéda, Andrew J. Kornecki, Thomas B. Hilburn, Wojciech Grega, Adam Pilat, Jean-Marc Thiriet:
Designing and Implementing International RSIC Engineering Curriculum. ECBS-EERC 2009: 71-76 - 2008
- [c7]Petr Matousek, Jaroslav Ráb, Ondrej Rysavý, Miroslav Svéda:
A Formal Model for Network-Wide Security Analysis. ECBS 2008: 171-181 - [c6]Ondrej Rysavý, Jaroslav Ráb:
A component-based approach to verification of embedded control systems using TLA+. IMCSIT 2008: 719-725 - 2007
- [c5]Miroslav Svéda, Ondrej Rysavý:
Industrial application development using case-based reasoning. ANNIIP 2007: 76-82 - [c4]Miroslav Svéda, Ondrej Rysavý, Radimir Vrba:
Pattern-driven reuse of embedded control design - behavioral and architectural specifications in embedded control system designs. ICINCO-ICSO 2007: 409-416 - 2006
- [c3]Ondrej Rysavý, Frantisek Scuglik, Miroslav Svéda:
Designing algorithm-oriented generic library on .NET framework. ECBS 2006: 159-163 - 2005
- [c2]Frantisek Bures, Ondrej Rysavý, Frantisek Scuglik, Miroslav Svéda:
A Framework for Formal Specification of Embedded Systems. ECBS 2005: 323-330 - 2004
- [c1]Ondrej Rysavý, Frantisek Bures:
Formal Abstract Architecture for Use Case Specifications. ECBS 2004: 203-210
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint