Ivan Homoliak
Ivan Homoliak
Postdoctoral Research Fellow, Singapore University of Technology and Design
Verified email at fit.vutbr.cz - Homepage
Title
Cited by
Cited by
Year
Insight into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures
I Homoliak, F Toffalini, J Guarnizo, Y Elovici, M Ochoa
ACM Computing Surveys (CSUR) 52 (2), 1-40, 2019
532019
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition
A Harilal, F Toffalini, J Castellanos, J Guarnizo, I Homoliak, M Ochoa
Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017
24*2017
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach
PH Ivan Homoliak, Martin Teknös, Martín Ochoa, Dominik Breitenbacher, Saeid ...
EAI Endorsed Transactions on Security and Safety 5 (17), https://eudl.eu/pdf …, 2018
14*2018
ASNM: Advanced security network metrics for attack vector description
I Homoliak, M Barabas, P Chmelar, M Drozd, P Hanacek
Proceedings of the International Conference on Security and Management (SAM), 1, 2013
142013
Strongchain: Transparent and collaborative proof-of-work consensus
P Szalachowski, D Reijsbergen, I Homoliak, S Sun
28th {USENIX} Security Symposium ({USENIX} Security 19), 819-836, 2019
122019
HADES-IoT: A practical host-based anomaly detection system for IoT devices
D Breitenbacher, I Homoliak, YL Aung, NO Tippenhauer, Y Elovici
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
11*2019
A security reference architecture for blockchains
I Homoliak, S Venugopalan, Q Hum, P Szalachowski
2019 IEEE International Conference on Blockchain (Blockchain), 390-397, 2019
92019
Intrusion Detection in Network Traffic
I Homoliak
https://www.researchgate.net/profile/Ivan_Homoliak/publication …, 2016
82016
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic
I Homoliak, D Ovsonka, M Gregr, P Hanacek
The 9th International Conference for Internet Technology and Secured …, 2014
82014
Characteristics of buffer overflow attacks tunneled in http traffic
I Homoliak, D Ovsonka, K Koranda, P Hanacek
2014 International Carnahan Conference on Security Technology (ICCST), 1-6, 2014
82014
Automated malware detection based on novel network behavioral signatures
M Barabas, I Homoliak, M Drozd, P Hanacek
International Journal of Engineering and Technology 5 (2), 249, 2013
82013
Detection of masqueraders based on graph partitioning of file system access events
F Toffalini, I Homoliak, A Harilal, A Binder, M Ochoa
2018 IEEE Security and Privacy Workshops (SPW), 217-227, 2018
72018
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset.
I Homoliak, D Breitenbacher, P Hanacek
JCP 12 (2), 143-155, 2017
72017
Metrics for intrusion detection in network traffic
I Homoliak
Master's thesis, University of Technology Brno, Faculty of Information …, 2011
72011
Detection of network buffer overflow attacks: A case study
B Maroš, I Homoliak, M Kacic, H Petr
2013 47th International Carnahan Conference on Security Technology (ICCST), 1-4, 2013
62013
SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets
I Homoliak, D Breitenbacher, A Binder, P Szalachowski
6*
Exploitation of netem utility for non-payload-based obfuscation techniques improving network anomaly detection
I Homoliak, M Teknos, M Barabas, P Hanacek
International Conference on Security and Privacy in Communication Systems …, 2016
52016
On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm
T Smetka, I Homoliak, P Hanacek
2016 IEEE International Carnahan Conference on Security Technology (ICCST), 1-8, 2016
42016
Features for behavioral anomaly detection of connectionless network buffer overflow attacks
I Homoliak, L Sulak, P Hanacek
International Workshop on Information Security Applications, 66-78, 2016
32016
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors
I Homoliak, K Malinka, P Hanacek
IEEE Access 8, 112427-112453, 2020
2*2020
The system can't perform the operation now. Try again later.
Articles 1–20