Optimal Network Security Hardening Using Attack Graph Games K Durkota, V Lisy, B Bosansky, C Kiekintveld Proceedings of the Twenty-Fourth International Joint Conference on …, 2015 | 140 | 2015 |
Implementation of a discrete firefly algorithm for the QAP problem within the sage framework K Durkota BSc thesis, Czech Technical University, 2011 | 78 | 2011 |
Approximate solutions for attack graph games with imperfect information K Durkota, V Lisý, B Bošanský, C Kiekintveld Decision and Game Theory for Security: 6th International Conference, GameSec …, 2015 | 59 | 2015 |
Using Correlated Strategies for Computing Stackelberg Equilibria in Extensive-Form Games J Čermák, B Bošanský, K Durkota, V Lisý, C Kiekintveld AAAI Conference on Artificial Intelligence (AAAI-16), http://www.aaai.org, 2016 | 56 | 2016 |
Computing Optimal Policies for Attack Graphs with Action Failures and Costs K Durkota, V Lisy STAIRS 264, 101 - 110, 2014 | 48 | 2014 |
Case Studies of Network Defense with Attack Graph Games K Durkota, V Lisý, C Kiekintveld, B Bošanský, M Pěchouček IEEE Intelligent Systems 31 (5), 24-30, 2016 | 45 | 2016 |
Hardening Networks Against Strategic Attackers Using Attack Graph Games K Durkota, V Lisý, B Bošanský, C Kiekintveld, M Pěchouček Computers & Security, 2019 | 33 | 2019 |
Game-Theoretic Algorithms for Optimal Network Security Hardening Using Attack Graphs K Durkota, V Lisý, C Kiekintveld, B Bošanský International Foundation for Autonomous Agents and Multiagent Systems, 1773 …, 2015 | 32 | 2015 |
Optimal strategies for detecting data exfiltration by internal and external attackers K Durkota, V Lisý, C Kiekintveld, K Horák, B Bošanský, T Pevný Decision and Game Theory for Security: 8th International Conference, GameSec …, 2017 | 17 | 2017 |
Multiagent Planning Supported by Plan Diversity Metrics and Landmark Actions. J Tozicka, J Jakubuv, K Durkota, A Komenda, M Pechoucek ICAART (1), 178-189, 2014 | 15 | 2014 |
Deterministic multiagent planning techniques: experimental comparison (short paper) K Durkota, A Komenda Proceedings of DMAP workshop of ICAPS 13, 43-47, 2013 | 10 | 2013 |
Neuron-net: Siamese network for anomaly detection K Durkota, M Linda, M Ludvik, J Tozicka DCASE2020 Challenge, Tech. Rep, 2020 | 5 | 2020 |
Dadaed-double anomaly detector with aediff J Tozicka, B Marek, D Karel, L Michal Tech. Rep., DCASE2022 Challenge, 2022 | 3 | 2022 |
Unsupervised anomalous sound detection by Siamese network and auto-encoder J Tozicka, D Karel, L Michal DCASE2021 Challenge, 2021 | 3 | 2021 |
Multiagent planning by iterative negotiation over distributed planning graphs J Tozicka, J Jakubuv, K Durkota, A Komenda Proceedings of the Workshop on Distributed and Mutiltiagent Planning (ICAPS …, 2014 | 3 | 2014 |
Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection O Petrova, K Durkota, G Alperovich, K Horak, M Najman, B Bosansky, ... arXiv preprint arXiv:2004.10638, 2020 | 1 | 2020 |
Extensibility Based Multiagent Planner with Plan Diversity Metrics J Tožička, J Jakubův, K Durkota, A Komenda Transactions on Computational Collective Intelligence XX, 117-139, 2015 | 1 | 2015 |
Laboratory Exercises Using the Haystack VSRT Interferometer To Teach the Basics of Aperture Synthesis JM Marr, A Pere, K Durkota, AEE Rogers, V Fish, MB Arndt arXiv preprint arXiv:1109.3816, 2011 | 1 | 2011 |
Demonstrating the principles of aperture synthesis with the very small radio telescope JM Marr, K Durkota, FP Wilkin, A Pere, AEE Rogers, VL Fish, G Holodak, ... | 1 | 2011 |
Demonstrating the Principles of Aperture Synthesis with Table-Top Laboratory Exercises JM Marr, AEE Rogers, VL Fish, FP Wilkin, MB Arndt, G Holodak, ... EPJ Web of Conferences 200, 02004, 2019 | | 2019 |