Kypo cyber range: Design and use cases J Vykopal, R Ošlejšek, P Čeleda, M Vizvary, D Tovarňák SciTePress, 2017 | 124 | 2017 |
Lessons learned from complex hands-on defence exercises in a cyber range J Vykopal, M Vizvary, R Oslejsek, P Celeda, D Tovarnak 2017 IEEE Frontiers in education conference (FIE), 1-8, 2017 | 118 | 2017 |
Hybrid approach to sonification of color images I Kopecek, R Oslejsek Convergence and Hybrid Information Technology, 2008. ICCIT'08. Third …, 2008 | 31 | 2008 |
Gate to accessibility of computer graphics I Kopeček, R Ošlejšek International Conference on Computers for Handicapped Persons, 295-302, 2008 | 25 | 2008 |
Conceptual model of visual analytics for hands-on cybersecurity training R Ošlejšek, V Rusňák, K Burská, V Švábenský, J Vykopal, J Čegan IEEE transactions on visualization and computer graphics 27 (8), 3425-3437, 2020 | 23 | 2020 |
Timely feedback in unstructured cybersecurity exercises J Vykopal, R Ošlejšek, K Burská, K Zákopčanová Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018 | 19 | 2018 |
Visual feedback for players of multi-level capture the flag games: Field usability study R Ošlejšek, V Rusňák, K Burská, V Švábenský, J Vykopal 2019 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-11, 2019 | 15 | 2019 |
Annotation of pictures by means of graphical ontologies R Ošlejšek CSREA Press, 2009 | 15 | 2009 |
Evaluation of cyber defense exercises using visual analytics process R Ošlejšek, J Vykopal, K Burská, V Rusňák 2018 IEEE Frontiers in Education Conference (FIE), 1-9, 2018 | 12 | 2018 |
Creating pictures by dialogue I Kopeček, R Ošlejšek Computers Helping People with Special Needs: 10th International Conference …, 2006 | 12 | 2006 |
Kypo: A tool for collaborative study of cyberattacks in safe cloud environment Z Eichler, R Ošlejšek, D Toth Human Aspects of Information Security, Privacy, and Trust: Third …, 2015 | 11 | 2015 |
Process mining analysis of puzzle-based cybersecurity training M Macák, R Oslejsek, B Buhnova Proceedings of the 27th ACM Conference on on Innovation and Technology in …, 2022 | 10 | 2022 |
Exploratory analysis of file system metadata for rapid investigation of security incidents M Beran, F Hrdina, D Kouřil, R Ošlejšek, K Zákopčanová 2020 IEEE Symposium on Visualization for Cyber Security (VizSec), 11-20, 2020 | 10 | 2020 |
Reliability analysis in component-based development via probabilistic model checking N Benes, B Buhnova, I Cerna, R Oslejsek Proceedings of the 15th ACM SIGSOFT symposium on Component Based Software …, 2012 | 10 | 2012 |
Communicative images I Kopecek, R Oslejsek Smart Graphics: 11th International Symposium, SG 2011, Bremen, Germany, July …, 2011 | 10 | 2011 |
The prisoner’s dilemma in the workplace: how cooperative behavior of managers influence organizational performance and stress J Spurný, I Kopeček, R Ošlejšek, J Plhák, F Caputo Kybernetes 51 (1), 52-76, 2022 | 8 | 2022 |
A flexible, low-level scene graph traversal with explorers R Ošlejšek, J Sochor Proceedings of the 21st spring conference on Computer graphics, 203-210, 2005 | 8 | 2005 |
Applying process discovery to cybersecurity training: an experience report M Macák, R Oslejsek, B Buhnova 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022 | 7 | 2022 |
Data-driven insight into the puzzle-based cybersecurity training KD Burská, V Rusňák, R Ošlejšek Computers & Graphics 102, 441-451, 2022 | 7 | 2022 |
VRECKO: Virtual Reality Framework. J Flasar, L Pokluda, R Oslejsek, P Kolcárek, J Sochor TPCG, 203-208, 2005 | 7 | 2005 |