Study of internet threats and attack methods using honeypots and honeynets T Sochor, M Zuzcak International Conference on Computer Networks, 118-127, 2014 | 75 | 2014 |
Attractiveness study of honeypots and honeynets in internet threat detection T Sochor, M Zuzcak International Conference on Computer Networks, 69-81, 2015 | 36 | 2015 |
Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots M Zuzcak, T Sochor International Conference on Computer Networks, 118-133, 2017 | 22 | 2017 |
Analysis of attackers against windows emulating honeypots in various types of networks and regions T Sochor, M Zuzcak, P Bujok 2016 Eighth International Conference on Ubiquitous and Future Networks …, 2016 | 17 | 2016 |
High-interaction linux honeypot architecture in recent perspective T Sochor, M Zuzcak International Conference on Computer Networks, 118-131, 2016 | 15 | 2016 |
Definition of attack in the context of low-level interaction server honeypots P Sokol, M Zuzčák, T Sochor Computer Science and its Applications, 499-504, 2015 | 15 | 2015 |
Improving efficiency of e-mail communication via spam elimination using blacklisting T Sochor, R Farana 2013 21st Telecommunications Forum Telfor (TELFOR), 924-927, 2013 | 13 | 2013 |
Comparison between normal and TOR-anonymized web client traffic T Liška, T Sochor, H Sochorová Procedia-Social and Behavioral Sciences 9, 542-546, 2010 | 13* | 2010 |
Greylisting method analysis in real SMTP server environment–Case-study T Sochor Innovations and Advances in Computer Sciences and Engineering, 423-427, 2010 | 12 | 2010 |
A contribution to the physics of a high velocity abrasive particle interaction with brittle non-homogeneous materials LM Hlaváč, T Sochor Proceedings of the 12th International Symposium on Jet Cutting Technology, 117, 1994 | 10 | 1994 |
Anonymization of web client traffic efficiency study T Sochor International Conference on Computer Networks, 237-246, 2012 | 9 | 2012 |
Overview of e-mail SPAM elimination and its efficiency T Sochor 2014 IEEE Eighth International Conference on Research Challenges in …, 2014 | 8 | 2014 |
Dynamic Routing Protocol Convergence in Simulated and Real IPv4 and IPv6 Networks T Sochor, H Sochorova Computer Science On-line Conference, 117-126, 2019 | 6 | 2019 |
Pulsed water jet generated by pulse multiplication R Dvorsky, L Sitek, T Sochor Tehnički vjesnik 23 (4), 959-967, 2016 | 6 | 2016 |
Modelling of rock excavation by high energy water jet LM HLAVAC, T SOCHOR Mechanics of Jointed and Faulted Rock, 847-852, 1995 | 6 | 1995 |
Physical study of a high energy liquid jet as a milling tool L Hlaváč, T Sochor, L Sitek, P Martinec, M Vala Proc. 4th Pacific Rim International Conference on Water Jet Technology, 449-456, 1995 | 6 | 1995 |
Definition of attack in context of high level interaction honeypots P Sokol, M Zuzčák, T Sochor Software Engineering in Intelligent Systems, 155-164, 2015 | 5 | 2015 |
Soft computing-based information security E Volná, T Sochor, C Meli, ZK Oplatkova Multidisciplinary Perspectives in Cryptology and Information Security, 29-60, 2014 | 5 | 2014 |
Počítačové sítě I C Klimeš, T Sochor Ostravská univerzita, 2003 | 5 | 2003 |
Statistical analysis of attacking autonomous systems T Sochor, M Zuzcak, P Bujok 2016 International Conference On Cyber Security And Protection Of Digital …, 2016 | 4 | 2016 |