All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

9 518 (0,079s)

Result

Definition of Attack in Context of High Level Interaction Honeypots

IN - Informatika

  • 2015
  • D
Result

Threat Prevention and Intrusion Detection in VoIP Infrastructures

IN - Informatika

  • 2013
  • Jx
Result

POSTER: Dragging Attackers to Honeypots for Effective Analysis of Cybernetic Threats

IN - Informatika

  • 2014
  • A
  • Link
Result

Hardening networks against strategic attackers using attack graph games

Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

  • 2019
  • Jimp
  • Link
Result

Approximate Solutions for Attack Graph Games with Imperfect Information

IN - Informatika

  • 2015
  • D
  • Link
Result

Honeynet monitoring plugin

IN - Informatika

  • 2012
  • R
  • Link
Result

Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security

JC - Počítačový hardware a software

  • 2015
  • Jx
  • Link
Result

Honeypot as the Intruder Detection System

IN - Informatika

  • 2013
  • D
Result

Automatic analysis of attack data from distributed honeypot network

JC - Počítačový hardware a software

  • 2013
  • D
  • Link
Result

TrustPort THREAT INTELLIGENCE

IN - Informatika

  • 2013
  • R
  • Link
  • 1 - 10 out of 9 518