关注
Filip Holik
Filip Holik
在 glasgow.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Effective penetration testing with Metasploit framework and methodologies
F Holik, J Horalek, O Marik, S Neradova, S Zitta
2014 IEEE 15th International Symposium on Computational Intelligence and …, 2014
1062014
Vulnerabilities of Modern Web Applications
F Holik, S Neradova
Information and Communication Technology, Electronics and Microelectronics …, 2017
292017
The deployment of security information and event management in cloud infrastructure
F Holik, J Horalek, S Neradova, S Zitta, O Marik
2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 399-404, 2015
232015
Analysis of the use of Rainbow Tables to break hash
J Horalek, F Holík, O Horák, L Petr, V Sobeslav
Journal of Intelligent & Fuzzy Systems 32 (2), 1523-1534, 2017
202017
Threat modeling of a smart grid secondary substation
F Holik, LH Flå, MG Jaatun, SY Yayilgan, J Foros
Electronics 11 (6), 850, 2022
152022
Optimization of a depiction procedure for an artificial intelligence-based network protection system using a genetic algorithm
P Dolezel, F Holik, J Merta, D Stursa
Applied Sciences 11 (5), 2012, 2021
152021
Industrial network protection by SDN-based IPS with AI
F Holik, P Dolezel
Asian Conference on Intelligent Information and Database Systems, 192-203, 2020
82020
Meeting Smart City Latency Demands with SDN
F Holik
Asian Conference on Intelligent Information and Database Systems, 43-54, 2019
82019
LoRa-SDN: Providing Wireless IoT Edge Network Functions via SDN
F Holik, U Roedig, N Race
2020 43rd International Convention on Information, Communication and …, 2020
72020
Analysis of the wireless communication latency and its dependency on a data size
J Horalek, T Svoboda, F Holik
2016 IEEE 17th International symposium on computational intelligence and …, 2016
62016
An approach for analyzing cyber security threats and attacks: a case study of digital substations in Norway
S Yildirim Yayilgan, F Holik, M Abomhara, D Abraham, A Gebremedhin
Electronics 11 (23), 4006, 2022
52022
Vulnerabilities of modern web applications. In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)(pp. 1256 …
F Holik, S Neradova
IEEE, 2017
52017
Methods of deploying security standards in a business environment
F Holik, J Horalek, S Neradova, S Zitta, M Novak
2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 411-414, 2015
52015
Measuring information quality of geosocial networks
J Kysela, J Horálek, F Holík
New Trends in Intelligent Information and Database Systems, 171-180, 2015
52015
Implementation and Testing of Cisco IP SLA in Smart Grid Environments
J Horalek, F Holik, V Hurtova
Information and Communication Technology, Electronics and Microelectronics …, 2017
42017
Development of artificial intelligence based module to industrial network protection system
F Holik, P Dolezel, J Merta, D Stursa
Intelligent Systems and Applications: Proceedings of the 2020 Intelligent …, 2021
32021
Development environment for software-defined smart city networks
F Holik
International Conference on Intelligent Technologies and Applications, 93-104, 2021
22021
Safe and secure software-defined networks for smart electricity substations
F Holik, M Broadbent, M Findrik, P Smith, N Race
Intelligent Information and Database Systems: 12th Asian Conference, ACIIDS …, 2020
22020
Implementing SDN into computer network lessons
F Holik, J Horalek
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
22017
Communication technology for smart heat metering
F Holik, J Horalek, S Neradova, M Novak, O Marik
2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 405-410, 2015
22015
系统目前无法执行此操作,请稍后再试。
文章 1–20