Follow
Maroš Barabas
Maroš Barabas
Researcher
Verified email at vutbr.cz - Homepage
Title
Cited by
Cited by
Year
Managing the secure software development
R Fujdiak, P Mlynek, P Mrnustik, M Barabas, P Blazek, F Borcik, J Misurec
2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019
372019
Seeking the relation between performance and security in modern systems: metrics and measures
R Fujdiak, P Mlynek, P Blazek, M Barabas, P Mrnustik
2018 41st International Conference on Telecommunications and Signal …, 2018
342018
ASNM: Advanced security network metrics for attack vector description
I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek
Proceedings of the International Conference on Security and Management (SAM), 1, 2013
242013
Behavioral signature generation using shadow honeypot
M Barabas, M Drozd, P Hanacek
World Academy of Science, Engineering and Technology, ser, 829-833, 2012
142012
Exploitation of netem utility for non-payload-based obfuscation techniques improving network anomaly detection
I Homoliak, M Teknos, M Barabas, P Hanacek
Security and Privacy in Communication Networks: 12th International …, 2017
92017
Automated malware detection based on novel network behavioral signatures
M Barabas, I Homoliak, M Drozd, P Hanacek
International Journal of Engineering and Technology 5 (2), 249-253, 2013
92013
Modeling the trade-off between security and performance to support the product life cycle
R Fujdiak, P Blazek, L Apvrille, Z Martinasek, P Mlynek, R Pacalet, ...
2019 8th Mediterranean Conference on Embedded Computing (MECO), 1-6, 2019
62019
Detection of network buffer overflow attacks: A case study
B Maroš, I Homoliak, M Kacic, H Petr
2013 47th International Carnahan Conference on Security Technology (ICCST), 1-4, 2013
62013
Traffic generator based on behavioral pattern
M Kacic, D Ovsonka, P Hanacek, M Barabas
The 9th International Conference for Internet Technology and Secured …, 2014
52014
A method for parallel software refactoring for safety standards compliance
P Jurnečka, P Hanáček, M Barabas, M Henzl, M Kačic
IET Digital Library, 2013
42013
Buffer overflow attacks data acquisition
M Drozd, M Barabas, M Gregr, P Chmelar
Proceedings of the 6th IEEE International Conference on Intelligent Data …, 2011
42011
Automated Processes in Computer Security
M Barabas
Proceedings of the 16th Conference STUDENT EEICT, 246-250, 2010
12010
Modeling the trade-off between security and performance to support the product life cycle
R Pacalet, R Fujdiak, P Blažek, L Apvrille, P Mlynek, Z Martinasek, ...
2019
Advanced Security Network Metrics
I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek
Emerging Trends in ICT Security, 187-202, 2014
2014
Emerging Trends in ICT Security: Chapter 12. Advanced Security Network Metrics
I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek
Elsevier Inc. Chapters, 2013
2013
A method for parallel software refactoring for safety standards compliance
P Hana, M Barabas, M Henzl
IET Conference Proceedings, 2013
2013
Threats in Networks using Agent and Biometric Systems
D Martin, H Petr, Z František sr, Z František jr, M Barabas, L Antal
International Journal of Bio-Science and Bio-Technology 5 (3), 119-134, 2013
2013
Bezpečnostná analýza sieťového toku pomocou behaviorálnych signatúr
M Barabas
SYSTÉM PRO ROZPOZNÁVÁNÍ APT ÚTOKŮ
PBO HUJŇÁK, M BARABAS
Session 7: Information security
A Almutairi, D Parish, M Kacic, D Ovsonka, P Hanacek, M Barabas, ...
The system can't perform the operation now. Try again later.
Articles 1–20