Effective penetration testing with Metasploit framework and methodologies F Holik, J Horalek, O Marik, S Neradova, S Zitta 2014 IEEE 15th International Symposium on Computational Intelligence and …, 2014 | 106 | 2014 |
Vulnerabilities of Modern Web Applications F Holik, S Neradova Information and Communication Technology, Electronics and Microelectronics …, 2017 | 29 | 2017 |
The deployment of security information and event management in cloud infrastructure F Holik, J Horalek, S Neradova, S Zitta, O Marik 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 399-404, 2015 | 23 | 2015 |
Analysis of the use of Rainbow Tables to break hash J Horalek, F Holík, O Horák, L Petr, V Sobeslav Journal of Intelligent & Fuzzy Systems 32 (2), 1523-1534, 2017 | 20 | 2017 |
Threat modeling of a smart grid secondary substation F Holik, LH Flå, MG Jaatun, SY Yayilgan, J Foros Electronics 11 (6), 850, 2022 | 15 | 2022 |
Optimization of a depiction procedure for an artificial intelligence-based network protection system using a genetic algorithm P Dolezel, F Holik, J Merta, D Stursa Applied Sciences 11 (5), 2012, 2021 | 15 | 2021 |
Industrial network protection by SDN-based IPS with AI F Holik, P Dolezel Asian Conference on Intelligent Information and Database Systems, 192-203, 2020 | 8 | 2020 |
Meeting Smart City Latency Demands with SDN F Holik Asian Conference on Intelligent Information and Database Systems, 43-54, 2019 | 8 | 2019 |
LoRa-SDN: Providing Wireless IoT Edge Network Functions via SDN F Holik, U Roedig, N Race 2020 43rd International Convention on Information, Communication and …, 2020 | 7 | 2020 |
Analysis of the wireless communication latency and its dependency on a data size J Horalek, T Svoboda, F Holik 2016 IEEE 17th International symposium on computational intelligence and …, 2016 | 6 | 2016 |
An approach for analyzing cyber security threats and attacks: a case study of digital substations in Norway S Yildirim Yayilgan, F Holik, M Abomhara, D Abraham, A Gebremedhin Electronics 11 (23), 4006, 2022 | 5 | 2022 |
Vulnerabilities of modern web applications. In 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)(pp. 1256 … F Holik, S Neradova IEEE, 2017 | 5 | 2017 |
Methods of deploying security standards in a business environment F Holik, J Horalek, S Neradova, S Zitta, M Novak 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 411-414, 2015 | 5 | 2015 |
Measuring information quality of geosocial networks J Kysela, J Horálek, F Holík New Trends in Intelligent Information and Database Systems, 171-180, 2015 | 5 | 2015 |
Implementation and Testing of Cisco IP SLA in Smart Grid Environments J Horalek, F Holik, V Hurtova Information and Communication Technology, Electronics and Microelectronics …, 2017 | 4 | 2017 |
Development of artificial intelligence based module to industrial network protection system F Holik, P Dolezel, J Merta, D Stursa Intelligent Systems and Applications: Proceedings of the 2020 Intelligent …, 2021 | 3 | 2021 |
Development environment for software-defined smart city networks F Holik International Conference on Intelligent Technologies and Applications, 93-104, 2021 | 2 | 2021 |
Safe and secure software-defined networks for smart electricity substations F Holik, M Broadbent, M Findrik, P Smith, N Race Intelligent Information and Database Systems: 12th Asian Conference, ACIIDS …, 2020 | 2 | 2020 |
Implementing SDN into computer network lessons F Holik, J Horalek Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 2 | 2017 |
Communication technology for smart heat metering F Holik, J Horalek, S Neradova, M Novak, O Marik 2015 25th International Conference Radioelektronika (RADIOELEKTRONIKA), 405-410, 2015 | 2 | 2015 |