Follow
Tomas Sochor
Tomas Sochor
Prigo University, Havířov
Verified email at prigo.cz - Homepage
Title
Cited by
Cited by
Year
Study of internet threats and attack methods using honeypots and honeynets
T Sochor, M Zuzcak
International Conference on Computer Networks, 118-127, 2014
752014
Attractiveness study of honeypots and honeynets in internet threat detection
T Sochor, M Zuzcak
International Conference on Computer Networks, 69-81, 2015
362015
Behavioral Analysis of Bot Activity in Infected Systems Using Honeypots
M Zuzcak, T Sochor
International Conference on Computer Networks, 118-133, 2017
222017
Analysis of attackers against windows emulating honeypots in various types of networks and regions
T Sochor, M Zuzcak, P Bujok
2016 Eighth International Conference on Ubiquitous and Future Networks …, 2016
172016
High-interaction linux honeypot architecture in recent perspective
T Sochor, M Zuzcak
International Conference on Computer Networks, 118-131, 2016
152016
Definition of attack in the context of low-level interaction server honeypots
P Sokol, M Zuzčák, T Sochor
Computer Science and its Applications, 499-504, 2015
152015
Improving efficiency of e-mail communication via spam elimination using blacklisting
T Sochor, R Farana
2013 21st Telecommunications Forum Telfor (TELFOR), 924-927, 2013
132013
Comparison between normal and TOR-anonymized web client traffic
T Liška, T Sochor, H Sochorová
Procedia-Social and Behavioral Sciences 9, 542-546, 2010
13*2010
Greylisting method analysis in real SMTP server environment–Case-study
T Sochor
Innovations and Advances in Computer Sciences and Engineering, 423-427, 2010
122010
A contribution to the physics of a high velocity abrasive particle interaction with brittle non-homogeneous materials
LM Hlaváč, T Sochor
Proceedings of the 12th International Symposium on Jet Cutting Technology, 117, 1994
101994
Anonymization of web client traffic efficiency study
T Sochor
International Conference on Computer Networks, 237-246, 2012
92012
Overview of e-mail SPAM elimination and its efficiency
T Sochor
2014 IEEE Eighth International Conference on Research Challenges in …, 2014
82014
Dynamic Routing Protocol Convergence in Simulated and Real IPv4 and IPv6 Networks
T Sochor, H Sochorova
Computer Science On-line Conference, 117-126, 2019
62019
Pulsed water jet generated by pulse multiplication
R Dvorsky, L Sitek, T Sochor
Tehnički vjesnik 23 (4), 959-967, 2016
62016
Modelling of rock excavation by high energy water jet
LM HLAVAC, T SOCHOR
Mechanics of Jointed and Faulted Rock, 847-852, 1995
61995
Physical study of a high energy liquid jet as a milling tool
L Hlaváč, T Sochor, L Sitek, P Martinec, M Vala
Proc. 4th Pacific Rim International Conference on Water Jet Technology, 449-456, 1995
61995
Definition of attack in context of high level interaction honeypots
P Sokol, M Zuzčák, T Sochor
Software Engineering in Intelligent Systems, 155-164, 2015
52015
Soft computing-based information security
E Volná, T Sochor, C Meli, ZK Oplatkova
Multidisciplinary Perspectives in Cryptology and Information Security, 29-60, 2014
52014
Počítačové sítě I
C Klimeš, T Sochor
Ostravská univerzita, 2003
52003
Statistical analysis of attacking autonomous systems
T Sochor, M Zuzcak, P Bujok
2016 International Conference On Cyber Security And Protection Of Digital …, 2016
42016
The system can't perform the operation now. Try again later.
Articles 1–20