#arch. č.Kat. EPCRok vyd.Záznam (ISBD + ohlasy)Cit.

1.

181130 AFD 2017

Artificial neural network based IDS / Norbert Ádám ... [et al.] - 2017. In: SAMI 2017. - Danvers : IEEE, 2017 S. 159-164. - ISBN 978-1-5090-5654-5 Spôsob prístupu: https://www.scopus.com/record/display.uri?eid=2-s2.0-85017610827&origin=SingleRecordEmailAlert&dgcid...
[ÁDÁM, Norbert (33%) - MADOŠ, Branislav (33%) - BALÁŽ, Anton (33%) - PAVLIK, Tomáš (1%)]

0

2.

181048 ADD 2017

Securing distributed computer systems using an advanced sophisticated hybrid honeypot technology / Eva Chovancová ... [et al.] - 2017. In: Computing and Informatics. Roč. 36, č. 1 (2017), s. 113-139. - ISSN 1335-9150
[CHOVANCOVÁ, Eva (16%) - ÁDÁM, Norbert (14%) - BALÁŽ, Anton (14%) - PIETRIKOVÁ, Emília (14%) - FECIĽAK, Peter (14%) - ŠIMOŇÁK, Slavomír (14%) - CHOVANEC, Martin (14%)]

0

3.

181168 AFD 2017

The CASE tool for programming of the multi-core System-on-a-Chip with the data flow computation control / Branislav Madoš ... [et al.] - 2017. In: SAMI 2017. - Danvers : IEEE, 2017 S. 165-168. - ISBN 978-1-5090-5654-5
[MADOŠ, Branislav (33%) - ÁDÁM, Norbert (33%) - BALÁŽ, Anton (33%) - ŠINAĽOVÁ, Katarína (1%)]

0

4.

182960 ADD 2017

Comparison of filter techniques for two-step feature selection / Peter Drotár ... [et al.] - 2017. In: Computing and Informatics. Roč. 36, č. 3 (2017), s. 597-617. - ISSN 1335-9150
[DROTÁR, Peter (60%) - ŠIMOŇÁK, Slavomír (5%) - PIETRIKOVÁ, Emília (5%) - CHOVANEC, Martin (5%) - CHOVANCOVÁ, Eva (5%) - ÁDÁM, Norbert (5%) - SZABÓ, Csaba (5%) - BALÁŽ, Anton (5%) - BIŇAS, Miroslav (5%)]

0

5.

172319 AFC 2016

Security sandbox based on RBAC model / Ján Hurtuk, Anton Baláž, Norbert Ádám - 2016. In: SACI 2016. - Danvers : IEEE, 2016 P. 75-80. - ISBN 978-150902379-0 Spôsob prístupu: https://www.scopus.com/record/display.uri?eid=2-s2.0-84981312252&origin=resultslist&sort=plf-f&src=s...
[HURTUK, Ján (33%) - BALÁŽ, Anton (34%) - ÁDÁM, Norbert (33%)]

2017 [1] VOKOROKOS, L., BILANOVÁ, Z., MIHÁLYI, D. Hanoi towers in resource oriented perspective In: SAMI 2017 : IEEE 15th International Symposium on Applied Machine Intelligence and Informatics : Herľany, 26-28 January, 2017 P. 179-184 ISBN: 978-150905654-5

2017 [1] RADHAKRISHNAN, V., NARAYANAN, H., SATHYADEVAN, S. System call authorization in linux by a secure daemon In: ARPN Journal of Engineering and Applied Sciences Vol. 12, no. 12 (2017), p. 3903-3908 ISSN: 1819-6608

2

6.

171373 ADF 2016

Peer to Peer System Deployment / Anton Baláž, Norbert Ádám - 2016. In: Acta Electrotechnica et Informatica. Roč. 16, č. 1 (2016), s. 11-14. - ISSN 1335-8243 Spôsob prístupu: http://www.aei.tuke.sk/papers/2016/1/02_Balaz.pdf...
[BALÁŽ, Anton (50%) - ÁDÁM, Norbert (50%)]

2017 [1] UCHNÁR, M., HURTUK, J. Safe user authentication in a network environment In: SAMI 2017 : IEEE 15th International Symposium on Applied Machine Intelligence and Informatics : Herľany, 26-28 January, 2017 P. 451-454 ISBN: 978-150906564-5

2016 [1] PORUBAN, Jaroslav - BACIKOVA, Michaela Live IT projects at a university in large-scale In: ICETA 2016 : 14th IEEE International Conference on Emerging eLearning Technologies and Applications : Stary Smokovec, 24-25 November, 2016 ISBN: 978-1-5090-4701-7

2016 [1] CHOVANEC, M., CHOVANCOVÁ, E., BEHUN, M. Interactive creation of hash tables In: ICETA 2016 : 14th IEEE International Conference on Emerging eLearning Technologies and Applications : Stary Smokovec, November 24-25, 2016 ISBN: 978-1-5090-4701-7

2016 [1] PORUBAN, Jaroslav - BACIKOVA, Michaela - SŤASTNA, Jana Motivating students in Component-based Programming courses In: ICETA 2016 : 14th IEEE International Conference on Emerging eLearning Technologies and Applications : Stary Smokovec, November 24-25, 2016 ISBN: 978-1-5090-4701-7

2016 [1] GIRASEK, Tomas - PIETRIKOVA, Emilia Visualization of temperature fields distribution on power module within web interface In: ICETA 2016 : 14th IEEE International Conference on Emerging eLearning Technologies and Applications : Stary Smokovec, November 24-25, 2016 ISBN: 978-1-5090-4701-7

5

7.

158881 ACB 2015

Computer Systems Security / Anton Baláž - 2. dopl. vyd. - Košice : TU - 2015. - 149 s. [CD-ROM]. - ISBN 978-80-553-1948-3.
[BALÁŽ, Anton (100%)]

2016 [1] VOKOROKOS, L., MIHAĽOV, J., LEŠČIŠIN, L. Possibilities of depth cameras and ultra wide band sensor In: SAMI 2016 : IEEE 14th International Symposium on Applied Machine Intelligence and Informatics : Herľany, 21-23 January, 2016 P. 57-61 ISBN: 978-146738740-8

1

8.

157803 ADM 2015

Secure web server system resources utilization / Liberios Vokorokos, Anton Baláž, Norbert Ádám - 2015. In: Acta Polytechnica Hungarica. Vol. 12, no. 2 (2015), p. 5-19. - ISSN 1785-8860 Spôsob prístupu: http://uni-obuda.hu/journal/Vokorokos_Balaz_Adam_58.pdf...
[VOKOROKOS, Liberios (33%) - BALÁŽ, Anton (34%) - ÁDÁM, Norbert (33%)]

2015 [1] ĐORĐEVIĆ, B., MAČEK, N., TIMČENKO, V. Performance issues in cloud computing: KVM hypervisor’s cache modes evaluation In: Acta Polytechnica Hungarica Vol. 12, no. 4 (2015), p. 147-185 ISSN: 1785-8860

2016 [2] CHOVANCOVÁ, E., MIČUTA, D., CHOVANEC, M. Social network and forum hybrid In: INFORMATICS 2015 : 13th IEEE International Scientific Conference on Informatics : Poprad, 18-20 November, 2015 S. 124-127 ISBN: 978-146739868-8

2015 [1] PIETRIKOVÁ, E., CHODAREV, S. Profile-driven source code exploration In: FedCSIS 2015 : Federated Conference on Computer Science and Information Systems : Lodz, Poland, 13-16 September, 2015 P. 929-934 ISBN: 978-836081065-1

2016 [3] PERHÁČ, J., MIHÁLYI, Daniel, NOVITZKÁ, Valerie Between Syntax and Semantics of Resource Oriented Logic for Ids Behavior Description In: Journal of Applied Mathematics and Computational Mechanics Vol. 15, no. 2 (2016), p. 105-118 ISSN: 2299-9965

2016 [1] GIRASEK, Tomas - PIETRIKOVA, Emilia Visualization of temperature fields distribution on power module within web interface In: ICETA 2016 : International conference on emerging elearning technologies and applications : Starý Smokovec, 24-25 November, 2016 P. 1-4 ISBN: 978-1-5090-4701-7

2016 [1] PESIC, D., DJORDJEVIC, B., TIMCENKO, V. Competition of virtualized ext4, xfs and btrfs filesystems under type-2 hypervisor In: TELFOR 2016 : 24th Telecommunications Forum : Belgrade, 22-23 November, 2016 P. 774-777 ISBN: 978-1-5090-4086-5

6

9.

167589 ADE 2015

Android Access Control Extension / Anton Baláž, Branislav Madoš, Michal Ambróz - 2015. In: Acta Informatica Pragensia. Vol. 4, no. 3 (2015), p. 310-317. - ISSN 1805-4951 Spôsob prístupu: http://aip.vse.cz/index.php/aip/article/view/118#.Vqi-4lKmJ_E...
[BALÁŽ, Anton (50%) - MADOŠ, Branislav (49%) - AMBRÓZ, Michal (1%)]

2016 [1] BEHÚNOVÁ, A., ÁDÁM, N., PIETRIKOVÁ, E. Mobile support for learning of foreign languages In: ICETA 2016 : 14th IEEE International Conference on Emerging eLearning Technologies and Applications, Proceedings : Stary Smokovec, 24-25 November, 2016 P. 15-21 ISBN: 978-150904701-7

2017 [3] RUI, Chang et al. Towards a multilayered permission-based access control for extending Android security In: Concurrency and Computation: Practice and Experience Special no. (2017) http://onlinelibrary.wiley.com/doi/10.1002/cpe.4180/pdf ISSN: 1532-0634

2

10.

157805 ADM 2015

Application security through sandbox virtualization / Liberios Vokorokos, Anton Baláž, Branislav Madoš - 2015. In: Acta Polytechnica Hungarica. Vol. 12, no. 1 (2015), p. 83-101. - ISSN 1785-8860 Spôsob prístupu: http://uni-obuda.hu/journal/Vokorokos_Balaz_Mados_57.pdf...
[VOKOROKOS, Liberios (33%) - BALÁŽ, Anton (34%) - MADOŠ, Branislav (33%)]

2015 [1] GALBA, Tomislav, SOLIC, Kresimir, LUKIC, Ivica An information security and privacy self-assessment (ISPSA) tool for internet users In: Acta Polytechnica Hungarica Vol. 12, no. 7 (2015), p. 149-162 ISSN: 1785-8860

2015 [3] HURTUK, Ján Využitie komunikácie na báze zvuku v distribúcii škodlivého softvéru bez prístupu k sieťovým službám In: Acta Informatica Pragensia Vol. 4, no. 3 (2015), p. 288-301 ISSN: 1805-4951

2016 [1] PERHAC, Jan - MIHALYI, Daniel NOVITZKA, Valerie Between syntax and semantics of resource oriented logic for IDS behavior description In: Journal of Applied Mathematics and Computational Mechanics Vol. 15, no. 2 (2016), p. 105-118 ISSN: 2299-9965

3

11.

158882 ACB 2015

Internet Security / Anton Baláž - 1. vyd. - Košice : TU - 2015. - 145 s. [CD-ROM]. - ISBN 978-80-553-2030-4.
[BALÁŽ, Anton (100%)]

0

12.

147254 AFC 2014

Protocol Intrusion Detection Architecture / Liberios Vokorokos ... [et al.] - 2014. In: CNSCE 2014 : International Conference on Computer, Network Security and Communication Engineering : Shenzhen, China, Februar 22-23, 2014. - Lancaster : DEStech Publications, 2014 P. 246-250. - ISBN 978-1-60595-167-6
[VOKOROKOS, Liberios (20%) - BALÁŽ, Anton (20%) - TRELOVÁ, Jana (20%) - ŠESTINA, Ivan (20%) - TURINSKÁ, Alexandra (20%)]

0

13.

150214 ACB 2014

Computer System Security / Anton Baláž - 1. vyd. - Košice : TU - 2014. - 103 s.. - ISBN 978-80-553-1778-6.
[BALÁŽ, Anton (100%)]

2015 [2] VOKOROKOS, L. et al. Abusing mobile devices for Denial of Service attacks In: SAMI 2015 : 13th IEEE International Symposium on Applied Machine Intelligence and Informatics : proceedings : Herľany, January 22-24, 2015 S. 21-24 ISBN: 978-147998221-9

2016 [1] VOKOROKOS, Liberios - MIHAĽOV, Juraj - LESCISIN, Ľubor Possibilities of depth cameras and ultra wide band sensor In: SAMI 2016 : 14th International Symposium on Applied Machine Intelligence and Informatics : Herľany, January 21-23, 2016 P. 57-61 ISBN: 978-1-4673-8740-8

2

14.

137272 AFC 2013

Cloud file system / Liberios Vokorokos ... [et al.] - 2013. In: INES 2013 : IEEE 17th International Conference on Intelligent Engineering Systems : proceedings : June 19-21, 2013, Costa Rica. - Piscataway : IEEE, 2013 P. 311-315. - ISBN 978-1-4799-0828-8
[VOKOROKOS, Liberios (30%) - BALÁŽ, Anton (30%) - MADOŠ, Branislav (30%) - RADUŠOVSKÝ, Ján (10%)]

2015 [1] SANGLA, M.Y.C. et al. Cloud storage aggregator In: Frontiers in Artificial Intelligence and Applications Vol. 274 (2015), p. 2112-2122 ISSN: 0922-6389

2014 [1] ZHANG, X. et al. MLFS: A multiple layers share file system for cloud computing In: 2014 IEEE Globecom Workshops, GC Wkshps 2014 : Austin, United States, December, 8 - 12, 2014 P. 99-105 ISBN: 978-147997470-2

2014 [2] HURTUK, Ján et al. The malicious code hiding techniques, code obfuscation problem In: ICETA 2014 : 12th IEEE International Conference on Emerging eLearning Technologies and Applications : Slovakia, December 04-05, 2014 S. 181-185 ISBN: 978-1-4799-7740-6

3

15.

139186 ADM 2013

Innovative Operating Memory Architecture for Computers using the Data Driven Computation Model / Liberios Vokorokos ... [et al.] - 2013. In: Acta Polytechnica Hungarica: Special Issue on Celebration of 60th Anniversary of the Foundation of Technical University of Košice. Vol. 10, no. 5 (2013), p. 63-79. - ISSN 1785-8860 Spôsob prístupu: http://www.uni-obuda.hu/journal/Vokorokos_Mados_Adam_Balaz_43.pdf...
[VOKOROKOS, Liberios (25%) - MADOŠ, Branislav (25%) - ÁDÁM, Norbert (25%) - BALÁŽ, Anton (25%)]

2014 [4] CHOVANCOVÁ, E. et al. Multicore processor focused on voice biometrics In: ICETA 2014 : Emerging eLearning Technologies and Applications : December 4-5, 2014, Starý Smokovec, Slovakia S. 73-77 ISBN: 978-1-4799-7739-0

2014 [3] BIŇAS, Miroslav, PIETRIKOVÁ, Emília Useful recommendations for successful implementation of programming courses In: Emerging eLearning Technologies and Applications (ICETA) : December 4-5, 2015, Stary Smokovec, Slovakia P. 397-401 ISBN: 978-1-4799-7739-0

2017 [1] UCHNÁR, Matus - HURTUK, Jan Safe user authentication in a network environment In: SAMI 2017 : IEEE 15th International Symposium on Applied Machine Intelligence and Informatics : Herľany, 26-28 January, 2017 P. 451-454 ISBN: 978-1-5090-5655-2

3

16.

121936 AFD 2012

Extract - Transform - Load Data Warehouse System / Anton Baláž - 2012. - 1 elektronický optický disk (CD-ROM). In: SCYR 2012 : Proceedings from conference : 12th Scientific Conference of Young Researchers : May 15th, 2012, Herľany, Slovakia. - Košice : FEI TU, 2012 S. 129-132. - ISBN 978-80-553-0943-9
[BALÁŽ, Anton (100%)]

0

17.

125448 AFC 2012

Distributed intrusion detection system using self organizing map / L. Vokorokos, A. Baláž, J. Trelová - 2012. In: INES 2012 : IEEE 16th International Conference on Intelligent Engineering Systems : proceedings : June 13-15, 2012, Lisbon, Portugal. - Lisbon : IEEE, 2012 P. 131-134. - ISBN 978-1-4673-2695-7
[VOKOROKOS, Liberios (45%) - BALÁŽ, Anton (45%) - TRELOVÁ, Jana (10%)]

2016 [1] LANDRESS, A.D. A hybrid approach to reducing the false positive rate in unsupervised machine learning intrusion detection In: SoutheastCon 2016 : Conference Proceedings : Norfolk, 30 March-3 April, 2016 Art. no. 7506773 ISSN: 0734-7502

1

18.

124088 AFC 2012

P-double operators in the pipeline system of DF-KPI architecture / Norbert Ádám, Branislav Madoš, Anton Baláž - 2012. In: INES 2012 : IEEE 16th International Conference on Intelligent Engineering Systems : proceedings : June 13-15, 2012, Lisbon, Portugal. - Budapest : IEEE, 2012 P. 357-362. - ISBN 978-1-4673-2692-6
[ÁDÁM, Norbert (34%) - MADOŠ, Branislav (33%) - BALÁŽ, Anton (33%)]

2013 [1] VOKOROKOS, Liberios et al. A multicore architecture focused on accelerating computer vision computations In: Acta Polytechnica Hungarica Vol. 10, no. 5 (2013), p. 29-43 ISSN: 1785-8860

2015 [1] SEPEŠI, Radovan - NOSÁĽ, Milan Towards developer-friendly annotation-based code generation In: EMES 2015 : 13th International Conference Engineering of Modern Electric Systems : Oradea, Romania, June 11-12, 2015 P. 137-140 ISBN: 978-147997650-8

2016 [1] VOKOROKOS, L., UCHNAR, M., HURTUK, J. The obfuscation efficiency measuring schemes In: INES 2016 : 20th Jubilee IEEE International Conference on Intelligent Engineering Systems : Budapest, 30 June-2 July, 2016 P. 125-129 ISBN: 978-150901216-9

2017 [2] VOKOROKOS, L., DANKOVIČOVÁ, Z, LIŠČIŠIN, L. Using of the forensic analyzing tools, code obfuscation In: SAMI 2017 : IEEE 15th International Symposium on Applied Machine Intelligence and Informatics : Herľany, 26-28 January, 2017 S.l. : IEEE, 2017 ISBN: 978-15095654-5

4

19.

129161 AFD 2012

Forensic analysis of compromised systems / A. Baláž, R. Hlinka - 2012. In: ICETA 2012 : 10. ročník medzinárodnej konferencie o eLearningových technológiách a ich aplikáciách : zborník : 8. - 9.november 2012, Stará Lesná, Vysoké Tatry. - Košice : Elfa, 2012 S. 27-30. - ISBN 978-1-4673-5123-2
[BALÁŽ, Anton (90%) - HLINKA, Radoslav (10%)]

2012 [3] BASHIR, Muhammad Shamraiz, KHAN, M. N. A. Triage in Live Digital Forensic Analysis In: Forensic Computer science Vol. 8, no. 1 (2013), p. 35-44 ISSN: 1809-9807

2015 [2] VOKOROKOS, L. et al. Abusing mobile devices for Denial of Service attacks In: SAMI 2015 : 13th IEEE International Symposium on Applied Machine Intelligence and Informatics : proceedings : Herľany, January 22-24, 2015 S. 21-24 ISBN: 978-147998221-9

2014 [1] LIU, W. et al. The general digital forensics technologies based on linux In: Applied Mechanics and Materials : ICMTTME 2014 : international conference : Guillin, June 22-23, 2014 Vol. 644-650 (2014), p. 1992-1997 ISSN: 1660-9336 ISBN: 978-303835246-4

2015 [1] CHODAREV, S., PIETRÍKOVÁ, E., KOLLÁR, J. Haskell clone detection using pattern comparing algorithm In: EMES 2015 : 13th International Conference on Engineering of Modern Electric Systems : Oradea, 11-12 June, 2015 Art. no. 7158423 ISBN: 978-147997650-8

4

20.

129352 ADE 2012

Intrusion detection architecture utilizing graphics processors / Liberios Vokorokos, Anton Baláž, Branislav Madoš - 2012. In: Acta Informatica Pragensia. Vol. 1, no. 1 (2012), p. 50-59. - ISSN 1805-4951
[VOKOROKOS, Liberios (33%) - BALÁŽ, Anton (34%) - MADOŠ, Branislav (33%)]

2013 [3] PEKÁR, Adrián et al. Issues in the passive approach of network traffic monitoring In: INES 2013 : IEEE 17th International Conference on Intelligent Engineering Systems : proceedings : Costa Rica, June 19-21, 2013 P. 327-332 ISBN: 978-1-4799-0828-8

2014 [3] JEYEPALAN, D.p., KIRUBAKARAN, E. Agent based Parallelized Intrusion Detection System using Ant Colony Optimization In: International Journal of Computer Applications Vol. 105, no. 10 (2014), p. 1-6 ISSN: 0975-8887

2014 [3] JEYEPALAN, D.P., KIRUBAKARAN, E. Agent based Parallelized Intrusion Detection System using Ant Colony Optimization In: International Journal of Computer Applications Vol. 105, no. 10 (2014), p. 1-6 ISSN: 0975-8887

2015 [3] MĚSÍČEK, L. Context Sources and their Processing in Company Security In: Acta Informatica Pragensia Vol. 4, no. 1 (2015), p. 44-51 ISSN: 1805-4951

2014 [4] HURTUK, Ján et al. The malicious code hiding techniques, code obfuscation problem In: ICETA 2014 : Emerging eLearning Technologies and Applications : December 4-5, 2014, Starý Smokovec, Slovakia S. 181-185 ISBN: 978-1-4799-7739-0

2015 [3] HURTUK, Ján Využitie komunikácie na báze zvuku v distribúcii škodlivého softvéru bez prístupu k sieťovým službám In: Acta Informatica Pragensia Vol. 4, no. 3 (2015), p. 288-301 ISSN: 1805-4951

2016 [1] POTLURI, S., DIEDRICH, Ch. Accelerated deep neural networks for enhanced intrusion detection system In: ETFA 2016 : 21th IEEE International Conference on Emerging Technologies and Factory Automation : Berlin, 6-9 September, 2016 Art. no. 7733515 ISSN: 1946-0740 ISBN: 978-150901314-2

7

21.

121934 AFD 2012

Denial of Service Intrusion Detection System / Anton Baláž - 2012. - 1 elektronický optický disk (CD-ROM). In: SCYR 2012 : Proceedings from conference : 12th Scientific Conference of Young Researchers : May 15th, 2012, Herľany, Slovakia. - Košice : FEI TU, 2012 S. 113-116. - ISBN 978-80-553-0943-9
[BALÁŽ, Anton (100%)]

0

22.

129218 AFC 2012

IFS: Internet file system / Lukáš Klim, Anton Baláž, Jana Trelová - 2012. In: SmartArt 2012 : 1st Student Conference on Smart Grids and Artificial Intelligence : Prague, Czech Republic, November 20, 2012. - Praha : CVUT, 2012 P. 1-6. Spôsob prístupu: https://ekonom.feld.cvut.cz/smartart/index.shtml...
[KLIM, Lukáš (5%) - BALÁŽ, Anton (85%) - TRELOVÁ, Jana (10%)]

0

23.

122982 ADF 2012

Data acquisition in non-invasive Brain-Computer interface using emotiv EPOC neuroheadset / Liberios Vokorokos ... [et al.] - 2012. In: Acta Electrotechnica et Informatica. Roč. 12, č. 1 (2012), s. 5-8. - ISSN 1335-8243
[VOKOROKOS, Liberios (25%) - MADOŠ, Branislav (25%) - ÁDÁM, Norbert (25%) - BALÁŽ, Anton (25%)]

2014 [3] VALA, Nidhi, TRIVEDI, Kiran Cognitive and Expressive based Search A lgorithm for Goggle Search using BCI In: International Journal of Engineering Development and Research Vol. 2, no. 2 (2014), p. 2805 -2810 ISSN: 2321-9939

2014 [3] VALA, Nidhi, TRIVEDI, Kiran Data Acquisition using non-invasive EmotivEpoc Neuroheadset In: International Journal of Software & Hardware Research in Engineering Vol. 2, no. 5 (2014), p. 127-130 ISSN: 2347-4890

2014 [1] LAU, S.L., AHMED, A., RUSLAN, Z. A review for unobtrusive COTS EEG-based assistive technology In: Assistive Technologies for Physical and Cognitive Disabilities P. 262-277 ISBN: 978-146667374-8

2016 [3] KAUR, Barjinder, SINGH, Dinesh The Applicability of BCI in Different Domains In: DCRUST : Department of Computer Science and Engineering : National Conference on Recent Trends in Computing and Communication Technologies P. 82-85 ISBN: 978-93-86256-02-7

4

24.

115741 AED 2011

Intrusion detection system / Tomáš Sivý, Anton Baláž - 2011. - 1 elektronický optický disk (CD-ROM). In: Computer Science and Technology Research Survey : volume 5. - Košice : FEI TU, 2011 S. 262-269. - ISBN 978-80-553-0773-2
[SIVÝ, Tomáš (10%) - BALÁŽ, Anton (90%)]

0

25.

115739 AED 2011

Anomaly intrusion detection system / Marek Čajkovský, Anton Baláž - 2011. - 1 elektronický optický disk (CD-ROM). In: Computer Science and Technology Research Survey : volume 5. - Košice : FEI TU, 2011 S. 36-44. - ISBN 978-80-553-0773-2
[ČAJKOVSKÝ, Marek (10%) - BALÁŽ, Anton (90%)]

0

26.

115740 AED 2011

Intrusion detection system of DoS / Vladimír Kochan, Anton Baláž - 2011. - 1 elektronický optický disk (CD-ROM). In: Computer Science and Technology Research Survey : volume 5. - Košice : FEI TU, 2011 S. 102-107. - ISBN 978-80-553-0773-2
[KOCHAN, Vladimír (10%) - BALÁŽ, Anton (90%)]

0

27.

115737 AED 2011

Internet search engine / Tomáš Badida, Anton Baláž - 2011. - 1 elektronický optický disk (CD-ROM). In: Computer Science and Technology Research Survey : volume 5. - Košice : FEI TU, 2011 S. 7-17. - ISBN 978-80-553-0773-2
[BADIDA, Tomáš (10%) - BALÁŽ, Anton (90%)]

0

28.

113508 AFD 2011

Intrusion detection with early recognition of encrypted application / M. Augustín, A. Baláž - 2011. - 1 elektronický optický disk (CD-ROM). In: INES 2011 : 15th IEEE International Conference on Intelligent Engineering Systems : proceedings : June 23-25, 2011, Poprad, High Tatras, Slovakia. - Budapest : IEEE, 2011 S. 245-247. - ISBN 978-1-4244-8955-8
[AUGUSTÍN, Michal (80%) - BALÁŽ, Anton (20%)]

2011 [4] VOKOROKOS, L., ADAM, N. Double Input Operators of the DF KPI System In: Acta Electrotechnica et Informatica Roč. 11, č. 4 (2011), s. 3-8 ISSN: 1335-8243

2013 [3] BARATI, Mehdi et al. Features selection for IDS in encrypted traffic using genetic algorithm In: ICOCI 2013 : proceedings of the 4 th International Conference on Computing and Informatics : Malaysia, 28-30 August, 2013 P. 279-284 ISBN: 978-983-2078-78-4

2014 [1] BARATI, M. et al. Intrusion detection system in secure shell traffic in cloud environment In: Journal of Computer Science Vol. 10, no. 10 (2014), p. 2029-2036 ISSN: 1549-3636

2013 [1] AMOLI, P.V., HÄMÄLÄINEN, T. A real time unsupervised NIDS for detecting unknown and encrypted network attacks in high speed network In: M and N 2013 : 2nd IEEE International Workshop on Measurements and Networking : Naples, October 7-8, 2013 P. 149-154 ISBN: 978-146732873-9

4

29.

115742 AED 2011

ETL system of data warehouse / Ľubomír Tomajko, Anton Baláž - 2011. - 1 elektronický optický disk (CD-ROM). In: Computer Science and Technology Research Survey : volume 5. - Košice : FEI TU, 2011 S. 288-295. - ISBN 978-80-553-0773-2
[TOMAJKO, Ľubomír (10%) - BALÁŽ, Anton (90%)]

0

30.

112999 AFC 2011

Priority of Instructions Execution and DFG Mapping Techniques of Computer Architecture with Data Driven Computation Model / Liberios Vokorokos ... [et al.] - 2011. - 1 elektronický optický disk (CD-ROM). In: SISY 2011 : 9th IEEE International Symposium on Intelligent Systems and Informatics : proceedings : September 8-10, 2011, Subotica, Serbia. - Budapest : IEEE, 2011 P. 483-488. - ISBN 978-1-4577-1973-8
[VOKOROKOS, Liberios (25%) - MADOŠ, Branislav (25%) - ÁDÁM, Norbert (25%) - BALÁŽ, Anton (25%)]

0

31.

118972 ADF 2011

Web search engine / Liberios Vokorokos, Anton Baláž, Branislav Madoš - 2011. In: Acta Electrotechnica et Informatica. Roč. 11, č. 4 (2011), s. 41-45. - ISSN 1335-8243
[VOKOROKOS, Liberios (34%) - BALÁŽ, Anton (33%) - MADOŠ, Branislav (33%)]

2014 [3] FU-MIN, Qi, XIAO-YAO, Xie, JING, Wu Research of users' search intention recognition on web search In: Computer Engineering and Design Vol. 35, no. 4 (2014), p. 1285-1292 ISSN: 1000-7024

1

32.

115177 AFC 2011

Anomaly intrusion detection system / Liberios Vokorokos, Anton Baláž, Jana Trelová - 2011. In: AEI ´2011 : international conference on applied electrical engineering and informatics 2011 : September 3-10, 2011, s.l., Italy. - Košice : TU, 2011 P. 158-162. - ISBN 978-80-553-0740-4
[VOKOROKOS, Liberios (34%) - BALÁŽ, Anton (33%) - TRELOVÁ, Jana (33%)]

0

33.

115585 AFD 2011

Data flow graph mapping techniques of computer architecture with data driven computation model / Branislav Madoš, Anton Baláž - 2011. - 1 elektronický optický disk (CD-ROM). In: SAMI 2011 : 9th IEEE International Symposium on Applied Machine Intelligence and Informatics : proceedings : Smolenice, Slovakia, January 27-29, 2011. - Budapešť : IEEE, 2011 P. 355-359. - ISBN 978-1-4244-7428-8
[MADOŠ, Branislav (50%) - BALÁŽ, Anton (50%)]

2013 [3] VOKOROKOS, L., PEKÁR, A., ÁDÁM, N. Yet Another Attempt in User Authentication In: Acta Polytechnica Hungarica [online] Vol. 10, no. 3 (2013), p. 37-50 ISSN: 1785-8860

2013 [1] LU, Z., SHEN, Y., HE, H. Multi-core SoC architecture exploration with radar digital system based on dataflow graph method In: Proceedings of the IEEE International Conference on Electronics, Circuits, and Systems : 8-11 December 2013, Abu Dhabi P. 617-620 ISBN: 978-147992452-3

2013 [3] ÁDÁM, Norbert Mikroprogram pre riadenie procesu spájania operandov v architektúre DF KPI In: Acta Informatica Pragensia Vol. 2, no. 2 (2013), p. 77-96 ISSN: 1805-4951

2015 [1] SOARES, T.R.B.S., SILVA, I.S., FERNANDES, S.R. IPNoSys II-A new architecture for ipnosys programming model In: SBCCI 2015 : 28th Symposium on Integrated Circuits and Systems Design : Brazil, 31 August - 4 September, 2015 2015 ISBN: 978-145033763-2

4

34.

96486 AFC 2010

Host-based intrusion detection system / L. Vokorokos, A. Baláž - 2010. - 1 elektronický optický disk (CD-ROM). In: INES 2010 : 14th international conference on Intelligent Engineering Systems : proceedings : May 5-7, 2010, Las Palmas of Grand Canaria, Spain. - Budapest : IEEE, 2010 P. 43-47. - ISBN 978-1-4244-7651-0
[VOKOROKOS, Liberios (50%) - BALÁŽ, Anton (50%)]

2012 [1] TOMÁŠEK, M., ČAJKOVSKÝ, M., MADOŠ, B. Intrusion detection system based on system behavior In: SAMI 2012 : 10th IEEE Jubilee International Symposium on Applied Machine Intelligence and Informatics : Herl'any, 2012 P. 271-275 ISBN: 978-145770197-9

2012 [3] FANFARA, Peter - DANKOVÁ, Eva - DUFALA, Marek Honeypot - advanced technology for improving intrusion detection In: Poster : 16th International Student Conference on Electrical Engineering : May 17, 2012, Prague, Czech Republic P. 1-6 ISBN: 978-80-01-05043-9

2012 [4] FANFARA, Peter - PEKÁR, Adrián Usage of hybrid honeypot as an intrusion detection system mechanism In: SCYR 2012 : proceedings from conference : 12th Scientific Conference of Young Researchers : May 15th, 2012, Herľany, Slovakia S. 233-237 ISBN: 978-80-553-0943-9

2012 [3] SRINIVASA, K. G. Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems In: CCSIT 2012 : Advances in Computer Science and Information Technology. Networks and Communications : second interantional conference : proceedings : part 1 : Bangalore, India, January 2-4, 2012 P. 582-591 ISBN: 978-3-642-27298-1

2012 [3] BRADAI, Aira - AFIFI, Hossam Enforcing trust-based intrusion detection in cloud computing using algebraic methods In: CyberC 2012 : 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery : Sanya, China, 10-12 October, 2012 P. 185-190 ISBN: 978-0-7695-4810-4

2012 [3] SHONE, Nathan et al. Securing a System-of-Systems From Component Misbehaviour In: PGNet 2012 : the 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting : 25th and 26th June 2012, Novotel, Hanover Street, Liverpool b.p. ISBN: 978-1-902560-26-7

2013 [3] SHONE, Nathan et al. Detecting Behavioural Anomalies in System-of-Systems Components In: PG net 2013 : The 14th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting : Liverpool, 24th-25th June, 2013 ISBN: 978-1-902560-27-4

2014 [3] DESHPANDE, P., et al. HIDS: A host based intrusion detection system for cloud computing environment In: International Journal of System Assurance Engineering and Management Dostupné na internete: http://link.springer.com/article/10.1007/s13198-014-0277-7 ISSN: 0975-6809

2013 [1] AZMI, R., PISHGOO, B. SHADuDT: Secure hypervisor-based anomaly detection using danger theory In: Computers and Security Vol. 39 (2013), p. 268-288 ISSN: 0167-4048

2014 [3] BEIGH, Bilal Maqbool A New Classification Scheme for Intrusion Detection Systems In: I.J. Computer Network and Information Security No. 8 (2014), p. 56-70 ISSN: 2074-9104

2013 [1] SHONE, N., et al. Misbehaviour monitoring on system-of-systems components In: CRiSIS : Risks and Security of Internet and Systems 2013 : International Conference : 23-25 October 2013, La Rochelle, France P. 1-6 ISSN: 1416-1380

2014 [3] VASANTHI, S., CHANDRASEKAR, S. Heterogeneous Time Variant Activity Pattern Based Artificial Network Immune System for Intrusion Detection In: Australian Journal of Basic & Applied Sciences Vol. 8, no. 7 (2014), p. 1-6 ISSN: 1991-8178

2014 [1] KAVITHA, P., USHA, M. Traffic graph based intrusion detection approach for wireless local area networks using fuzzy rule sets In: International Journal of Applied Engineering Research Vol. 9, no. 22 (2015), p. 12715-12724 ISSN: 0973-4562

2014 [1] CUI, J.S. et al. Establishing process-level defense-in-depth framework for software defined networks In: Ruan Jian Xue Bao/Journal of Software Vol. 25, no. 10 (2014), p. 2251-2265 ISSN: 1000-9825

2015 [3] SADAMATE, S.S., NANDEDKAR, V.S. Advance Honeypot Mechanism-The Hybrid Solution for Enhancing Computer System Security with DoS In: International Journal of Science and Research Vol. 4, no. 4 (2015), p. 562-564 ISSN: 2319-7064

2016 [1] HAN, M.-R., OH, Y.-C., KIM, J.-B. A study on responding to DDoS architecture in smart phone environment In: International Journal of Security and its Applications Vol. 10, no. 6 (2016), p. 87-98 ISSN: 1738-9976

2016 [1] SELVARAJ, R., KUTHADI, V.M., MARWALA, T. Eidps: An efficient approach to protect the network and intrusion prevention In: INDIA 2016 : 3rd International Conference on Information Systems Design and Intelligent Applications : Visakhapatnam, 8-9 January, 2016 P. 35-47 ISSN: 2194-5357

2014 [1] GRACY, Theresa, W., SAKTHIVEL, S. Multi model intrusion detection system for cluster based routing protocol in battle field mobile adhoc networks In: International Journal of Applied Engineering Research Vol. 9, no. 24 (2014), p. 28365-28379 ISSN: 0973-4562

2015 [3] KANANI, Hamid, JAMALI, Shahram A Survey on Intelligence Intrusion Detection Systems In: International Journal of Research in Computer Applications and Robotics Vol. 3, no. 11 (2015), p. 1-10 ISSN: 2320-7345

2017 [1] BASKAR, M., GNANASEKARAN, T. Developing efficient intrusion tracking system using region based traffic impact measure towards the denial of service attack mitigation In: Journal of Computational and Theoretical Nanoscience Vol. 14, no. 7 (2017), p. 3576-3582 ISSN: 1546-1955

20

35.

102654 AFD 2010

Implementation of EAP protocol for mobile node authentication in mobile communication networks / Milan Vrabeľ ... [et al.] - 2010. - 1 elektronický optický disk (CD-ROM). In: CSE 2010 : proceedings of International Scientific conference on Computer Science and Engineering : September 20-22, 2010, Košice - Stará Ľubovňa, Slovakia. - Košice : TU, 2010 S. 208-215. - ISBN 978-80-8086-164-3
[VRABEĽ, Milan (25%) - JAKUBČO, Peter (25%) - ÁDÁM, Norbert (25%) - BALÁŽ, Anton (25%)]

0

36.

104688 AED 2010

Data gathering and processing / Anton Baláž, Beáta Maťašová - 2010. - 1 elektronický optický disk (CD-ROM). In: Electrical Engineering and Informatics : Proceeding of the Faculty of Electrical Engineering and Informatics of the Technical University of Košice : September, 2010, Košice, Slovak Republic. - Košice : TU, 2010 S. 295-298. - ISBN 978-80-553-0460-1
[BALÁŽ, Anton (90%) - MAŤAŠOVÁ, Beáta (10%)]

0

37.

104689 AED 2010

ETL system of data ware house / Anton Baláž, Dominik Demeter - 2010. - 1 elektronický optický disk (CD-ROM). In: Electrical Engineering and Informatics : Proceeding of the Faculty of Electrical Engineering and Informatics of the Technical University of Košice : September, 2010, Košice, Slovak Republic. - Košice : TU, 2010 S. 291-294. - ISBN 978-80-553-0460-1
[BALÁŽ, Anton (90%) - DEMETER, Dominik (10%)]

0

38.

96569 ABC 2010

Architecture of computer intrusion detection based on partially ordered events / Liberios Vokorokos, Anton Baláž - 2010. In: Petri Nets : Applications. - Vukovar : In-Tech, 2010 P. 13-28 [1,1 AH]. - ISBN 978-953-307-047-6
[VOKOROKOS, Liberios (50%) - BALÁŽ, Anton (50%)]

2012 [1] TOMÁŠEK, M., ČAJKOVSKÝ, M., MADOŠ, B. Intrusion detection system based on system behavior In: SAMI 2012 : 10th IEEE Jubilee International Symposium on Applied Machine Intelligence and Informatics : Herl'any, 2012 P. 271-275 ISBN: 978-145770197-9

2012 [3] FANFARA, Peter - DANKOVÁ, Eva - DUFALA, Marek Honeypot - advanced technology for improving intrusion detection In: Poster : 16th International Student Conference on Electrical Engineering : May 17, 2012, Prague, Czech Republic P. 1-6 ISBN: 978-80-01-05043-9

2012 [4] FANFARA, Peter - PEKÁR, Adrián Usage of hybrid honeypot as an intrusion detection system mechanism In: SCYR 2012 : proceedings from conference : 12th Scientific Conference of Young Researchers : May 15th, 2012, Herľany, Slovakia S. 233-237 ISBN: 978-80-553-0943-9

3

39.

96487 AFC 2010

Architecture of distributed intrusion detection system based on anomalies / A. Baláž, J. Trelová, M. Kostráb - 2010. - 1 elektronický optický disk (CD-ROM). In: INES 2010 : 14th international conference on Intelligent Engineering Systems : proceedings : May 5-7, 2010, Las Palmas of Grand Canaria, Spain. - Budapest : IEEE, 2010 P. 79-83. - ISBN 978-1-4244-7651-0
[BALÁŽ, Anton (85%) - TRELOVÁ, Jana (10%) - KOSTRÁB, Matej (5%)]

2011 [3] VOKOROKOS, Liberios - ÁDÁM, Norbert An introduction to the Neural DF architecture In: SAMI 2011 : 9th international symposium on Applied Machine Intelligence and Informatics : January 27-29, 2011, Smolenice, Slovakia S. 33-37 ISBN: 978-1-4244-7429-5

2012 [3] VOKOROKOS, L., PEKÁR, A., ÁDÁM, N. Data preprocessing for efficient evaluation of network traffic parameters In: INES 2012 : IEEE 16th International Conference on Intelligent Engineering Systems : proceedings : June 13-15, 2012, Lisbon, Portugal P. 363-367 ISBN: 978-1-4673-2695-7

2012 [1] GRZENDA, M. Towards the reduction of data used for the classification of network flows In: Hybrid Artificial Intelligent Systems : Lecture Notes in Computer Science Vol. 7209 (2012), p. 68-77 ISSN: 0302-9743 ISBN: 978-3-642-28930-9

2014 [1] SAIDI, A., KARTIT, A., EL MARRAKI, M. A multi-agent based distributed intrusion prevention system against ddos flooding attacks In: Journal of Theoretical and Applied Information Technology Vol. 59, no. 2 (2014), p. 327-331 ISSN: 1992-8645

4

40.

109258 ADF 2010

Anomaly and Misuse Intrusions Variability Detection / Liberios Vokorokos, Anton Baláž, Branislav Madoš - 2010. In: Acta Electrotechnica et Informatica. Roč. 2010, č. 4 (2010), s. 5-9. - ISSN 1335-8243
[VOKOROKOS, Liberios (34) - BALÁŽ, Anton (33) - MADOŠ, Branislav (33)]

0

41.

109256 ADF 2010

Architecture of Multi-Core Computer with Data Driven Computation Model / Liberios Vokorokos ...[et.al.] - 2010. In: Acta Electrotechnica et Informatica. Roč. 2010, č. 4 (2010), s. 20-23. - ISSN 1335-8243
[VOKOROKOS, Liberios (25) - MADOŠ, Branislav (25) - BALÁŽ, Anton (25) - ÁDÁM, Norbert (25)]

0

42.

87812 AFC 2009

Intrusion detection system based on partially ordered events and patterns / Anton Baláž, Liberios Vokorokos - 2009. In: INES 2009 : 13. medzinárodná konferencia : Barbados, 16.-18.4.2009. - Budapest : IEEE, 2009 P. 233-238. - ISBN 9781424441136
[BALÁŽ, Anton (50%) - VOKOROKOS, Liberios (50%)]

2011 [1] BAHAMAN, M., PRABUWONO, A.S., MAS'UD, M.Z. Implementation of IPv6 network testbed: Intrusion detection system on transition mechanism In: Journal of Applied Sciences Vol. 11, no. 1 (2011), p. 118-124 ISSN: 1812-5654

1

43.

109128 AED 2009

High-Performance Intrusion Detection System for Security Threats Identification in Computer Networks / Liberios Vokorokos ... [et al.] - 2009. In: Computer Science and Technology Research Survey : Volume 4. - Košice : FEI TU, 2009 S. 54-61. - ISBN 978-80-8086-131-5
[VOKOROKOS, Liberios (35%) - ÁDÁM, Norbert (30%) - BALÁŽ, Anton (30%) - PERHÁČ, Ján (5%)]

2012 [1] FANFARA, P., DANKOVÁ, E., DUFALA, M. Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication In: SAMI 2012 : 10th IEEE Jubilee International Symposium on Applied Machine Intelligence and Informatics : Herl'any, 2012 P. 213-217 ISBN: 978-145770197-9

2012 [3] FANFARA, Peter - DANKOVÁ, Eva - DUFALA, Marek Honeypot - advanced technology for improving intrusion detection In: Poster : 16th International Student Conference on Electrical Engineering : May 17, 2012, Prague, Czech Republic P. 1-6 ISBN: 978-80-01-05043-9

2012 [4] FANFARA, Peter - PEKÁR, Adrián Usage of hybrid honeypot as an intrusion detection system mechanism In: SCYR 2012 : proceedings from conference : 12th Scientific Conference of Young Researchers : May 15th, 2012, Herľany, Slovakia S. 233-237 ISBN: 978-80-553-0943-9

2013 [1] FANFARA, Peter - DUFALA, Marek - RADUŠOVSKÝ, Ján Autonomous Hybrid Honeypot as the Future of Distributed Computer Systems Security In: Acta Polytechnica Hungarica Vol. 10, no. 6 (2013), p. 25-42 ISSN: 1785-8860

2013 [1] FANFARA, P., DUFALA, M., CHOVANCOVÁ, E. Usage of proposed autonomous hybrid honeypot for distributed heterogeneous computer systems in education process In: ICETA 2013 : IEEE 11th International Conference on Emerging eLearning Technologies and Applications : Starý Smokovec, Slovakia P. 83-88 ISBN: 978-1-4799-2161-4

5

44.

88905 AEC 2009

Distributed detection system of security intrusions based on partially ordered events and patterns / Liberios Vokorokos, Anton Baláž, Martin Chovanec - 2009. In: Towards Intelligent Engineering and Information Technology. Volume 243, Studies in Computational Intelligence. - Heidelberg : Springer Berlin, 2009 P. 389-403. - ISBN 9783642037368
[VOKOROKOS, Liberios (34%) - BALÁŽ, Anton (33%) - CHOVANEC, Martin (33%)]

2011 [1] DONG, H. et al. Research on adaptive distributed intrusion detection system model based on Multi-Agent In: Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011 : 10. - 12. june 2011, Shanghai Vol. 1 (2011), p. 182-185 ISBN: 978-142448725-7

2012 [1] YANWEI, Z. Invasion detection algorithm research and application In: Lecture Notes in Electrical Engineering Vol. 141, no. 1 (2012), p. 297-305 ISBN: 978-364227310-0

2012 [3] FANFARA, Peter - DANKOVÁ, Eva - DUFALA, Marek Honeypot - advanced technology for improving intrusion detection In: Poster : 16th International Student Conference on Electrical Engineering : May 17, 2012, Prague, Czech Republic P. 1-6 ISBN: 978-80-01-05043-9

2012 [4] FANFARA, Peter - PEKÁR, Adrián Usage of hybrid honeypot as an intrusion detection system mechanism In: SCYR 2012 : proceedings from conference : 12th Scientific Conference of Young Researchers : May 15th, 2012, Herľany, Slovakia S. 233-237 ISBN: 978-80-553-0943-9

2012 [1] YANWEI, Z. Invasion detection algorithm research and application In: Lecture Notes in Electrical Engineering Vol. 141 LNEE, no. 1 (2012), p. 297-305 ISSN: 1876-1100 ISBN: 978-364227310-0

2012 [1] LIU, Y. et al. An new agent based distributed adaptive intrusion detection system In: Advanced Materials Research Vol. 532-533 (2012), p. 624-629 ISSN: 1022-6680

2013 [1] MIHALYI, D., NOVITZKA, V. What about Linear Logic in Computer Science ? In: Acta Polytechnica Hungarica Vol. 10, no. 4 (2013), p. 147-160 ISSN: 1785-8860

2012 [1] LIU,I. et al. An new agent based distributed adaptive intrusion detection system In: 2nd International Conference on Materials Science and Information Technology : Shaan, China P. 624-629 ISSN: 1022-6680

2012 [1] LIU, Y. et al. An new agent based distributed adaptive intrusion detection system In: Advanced Materials Research Vol. 532-533 (2012), p. 624-629 ISSN: 1022-6680

2014 [2] MIHÁLYI, Daniel, NOVITZKÁ, Valerie Towards the Knowledge in Coalgebraic Model of IDS In: Computing and Informatics Roč. 33, č. 1 (2014), s. 61-78 ISSN: 1335-9150

10

45.

78716 AED 2008

Application of intrusion detection systems in distributed computer systems and dynamic networks / Liberios Vokorokos, Norbert Ádám, Anton Baláž - 2008. In: Computer Science and Technology Research Survey. Volume 3. - Košice : Elfa, 2008 S. 19-24. - ISBN 9788080861001
[VOKOROKOS, Liberios (34%) - ÁDÁM, Norbert (33%) - BALÁŽ, Anton (33%)]

2012 [3] FANFARA, Peter - DANKOVÁ, Eva - DUFALA, Marek Honeypot - advanced technology for improving intrusion detection In: Poster : 16th International Student Conference on Electrical Engineering : May 17, 2012, Prague, Czech Republic P. 1-6 ISBN: 978-80-01-05043-9

2012 [4] FANFARA, Peter - PEKÁR, Adrián Usage of hybrid honeypot as an intrusion detection system mechanism In: SCYR 2012 : proceedings from conference : 12th Scientific Conference of Young Researchers : May 15th, 2012, Herľany, Slovakia S. 233-237 ISBN: 978-80-553-0943-9

2012 [4] PEKÁR, Adrián - DUFALA, Marek A contribution to real-time network traffic evaluation In: SCYR 2012 : proceedings from conference : 12th Scientific Conference of Young Researchers : May 15th, 2012, Herľany, Slovakia S. 103-106 ISBN: 978-80-553-0943-9

2012 [4] PEKÁR, A. et al. A new attempt in user authentication In: AEI´2012 : International Conference on Applied Electrical Engineering and Informatics 2012 : August 26-September 02, 2012, Germany S. 32-35 ISBN: 978-80-553-1030-5

2013 [1] FANFARA, Peter - DUFALA, Marek - RADUŠOVSKÝ, Ján Autonomous Hybrid Honeypot as the Future of Distributed Computer Systems Security In: Acta Polytechnica Hungarica Vol. 10, no . (2013), p. 25-42 ISSN: 1785-8860

2013 [1] PEKÁR, Adrián et al. Issues in the passive approach of network traffic monitoring In: INES 2013 : IEEE 17th International Conference on Intelligent Engineering Systems : proceedings : June 19-21, 2013, Costa Rica P. 327-332 ISBN: 978-1-4799-0828-8

2013 [3] JAKAB, František et al. Optimalizácia monitorovania sieťovej prevádzky In: Acta Informatica Pragensia Vol. 2, no. 1 (2013), p. 101-120 ISSN: 1805-4951

2013 [2] FANFARA, P., DUFALA, M., CHOVANCOVÁ, E. Usage of proposed autonomous hybrid honeypot for distributed heterogeneous computer systems in education process In: ICETA 2013 : 11th IEEE International Conference on Emerging eLearning Technologies and Applications : Starý Smokovec, Slovakia S. 83-88 ISBN: 978-1-4799-2161-4

8

46.

109100 ACB 2008

Princípy počítačového inžinierstva / Liberios Vokorokos ... [et al.] - Košice : elfa - 2008. - 319 s. - ISBN 978-80-8086-075-2.
[VOKOROKOS, Liberios (20%) - ÁDÁM, Norbert (10%) - TRELOVÁ, Jana (10%) - KLEINOVÁ, Alžbeta (10%) - CHOVANEC, Martin (10%) - LÁTKA, Ondrej (10%) - BALÁŽ, Anton (10%) - PERHÁČ, Ján (10%) - MADOŠ, Branislav (10%)]

0

47.

78809 ADE 2008

Architecture of data security with the aspect on the intelligent control systems / Liberios Vokorokos, Alžbeta Kleinová, Anton Baláž - 2008. In: Energija-ekonomija-ekologija. Vol. 10, no. 3 (2008), p. 031-035. - ISSN 0354-8651
[VOKOROKOS, Liberios (35%) - KLEINOVÁ, Alžbeta (35%) - BALÁŽ, Anton (30%)]

2010 [4] POÓR, Peter, FEDORČÁKOVÁ, Monika, ŠEBO, Dušan Vývoj aplikácie na výpočet parametrov nákladovej rovnice a stanovenie optimálnej doby obnovy In: Trends and Inovative Approaches in Business Processes : 13. medzinárodná vedecká konferecia : Košice, december 2010 S. 1-5 ISBN: 978-80-553-0570-7

2012 [1] ENNERT, M., ČAJKOVSKÝ, M., ÁDÁM, N. Optimization model of management and security of multimedia content using Drupal CMS In: SAMI 2012 : IEEE 10th Jubilee International Symposium on Applied Machine Intelligence and Informatics : proceedings : Herľany, January 26-28, 2012 P. 289-293 ISBN: 978-1-4577-0195-5

2011 [4] DANKOVÁ, E. et al. Source file copyright protection In: International Conference on Informatics : INFORMATICS' 2011: Rožňava, Slovakia S. 132-137 ISBN: 978-80-89284-94-8

3

48.

62499 AFD 2007

Host based intrusion detection system using bayesian network / Anton Baláž, Norbert Ádám - 2007. In: 7th PhD Student Conference and Scientific and Technical Competition of Students of Faculty of Electrical Engineering and Informatics Technical University of Košice : 23.5.2007, Košice. - Košice : TU, 2007 S. 103-104. - ISBN 9788080738037
[BALÁŽ, Anton (60%) - ÁDÁM, Norbert (40%)]

2012 [3] SRINISAVA, K. G. Application of Genetic Algorithms for Detecting Anomaly in Network Intrusion Detection Systems In: Advances in Computer Science and Information Technology : Networks and Communications : Part 1 P. 582-591 ISSN: 1867-8211 ISBN: 978-3-642-27298-1

1

49.

57196 AEF 2007

Parallel computing systems applied to secure architectures and computer networks / Liberios Vokorokos ... [et al.] - 2007. In: Computer Science and Technology Research Survey. - Košice : TU, 2007 S. 25-29. - ISBN 9788080860462
[VOKOROKOS, Liberios (30%) - ÁDÁM, Norbert (10%) - HAULIŠ, Milan (10%) - TRELOVÁ, Jana (10%) - BALÁŽ, Anton (10%) - CHOVANEC, Martin (10%) - KLEINOVÁ, Alžbeta (10%) - LÁTKA, Ondrej (10%)]

0

50.

116210 ADF 2007

Events planning in intrusion detection systems / Liberios Vokorokos, Anton Baláž, Norbert Ádám - 2007. In: Acta Electrotechnica et Informatica. Roč. 7, č. 4 (2007), s. 82-86. - ISSN 1335-8243
[VOKOROKOS, Liberios (34%) - BALÁŽ, Anton (33%) - ÁDÁM, Norbert (33%)]

2012 [1] GYÖRÖK, G., SÁFÁR, A. Long life oriented smart control of heating body In: SACI 2012 - 7th IEEE International Symposium on Applied Computational Intelligence and Informatics : Proceedings : Timisoara, 24-26 May 2012 P. 147-150 ISBN: 978-146731011-6

2012 [1] GYÖRÖK, G., SEEBAUER, M., OROSZ, T. et al. Multiprocessor application in embedded control system In: 2012 IEEE 10th Jubilee International Symposium on Intelligent Systems and Informatics, SISY 2012 : Subotica, 20-22 September 2012 P. 305-309 ISBN: 978-1-4673-4751-8

2

51.

66447 ADF 2007

Training set parallelism in PAHRA architecture / Liberios Vokorokos, Norbert Ádám, Anton Baláž - 2007. In: Acta Electrotechnica et Informatica. Roč. 7, č. 3 (2007), s. 13-18. - ISSN 1335-8243
[VOKOROKOS, Liberios (33%) - ÁDÁM, Norbert (33%) - BALÁŽ, Anton (33%)]

0

52.

67863 AED 2007

Architecture of intrusion detection system based on partially ordered events / Liberios Vokorokos ... [et al.] - 2007. In: Computer Science and Technology Research Survey. Vol. 2. - Košice : TU, 2007 S. 80-91. - ISBN 9788080860714
[VOKOROKOS, Liberios (15%) - BALÁŽ, Anton (15%) - ÁDÁM, Norbert (10%) - KLEINOVÁ, Alžbeta (10%) - CHOVANEC, Martin (10%) - LÁTKA, Ondrej (10%) - PERHÁČ, Ján (10%) - MADOŠ, Branislav (10%) - IVANČÍK, Peter (10%)]

0

53.

55428 AFD 2006

Measuring platform architecture based on the IPFIX standard / Alžbeta Kleinová...[et al.] - 2006. In: SAMI 2006. - Budapest : Budapest Tech, 2006 P. 497-507. - ISBN 9637154442
[KLEINOVÁ, Alžbeta (25%) - BALÁŽ, Anton (25%) - TRELOVÁ, Jana (25%) - ÁDÁM, Norbert (25%)]

0

54.

55430 AFD 2006

Intrusion detection system using multilayer perceptron / Anton Baláž, Norbert Ádám - 2006. In: 6th PhD Student Conference and Scientific and Technical Competition of Students of Faculty of Electrical Engineering and Informatics Technical University of Košice. - Košice : FEI TU, 2006 S. 13-14. - ISBN 8080860351
[BALÁŽ, Anton (50%) - ÁDÁM, Norbert (50%)]

2013 [1] VOKOROKOS, L. et al. Sophisticated Honeypot Mechanism - the Autonomous Hybrid Solution for Enhancing Computer System Security In: SAMI 2013 : IEEE 11th International Symposium on Applied Machine Intelligence and Informatics : Herlany, January 31- February 02, 2013 P. 41-46 ISBN: 978-1-4673-5929-0

1

55.

55409 ADF 2006

Intrusion detection system using self organizing map / Liberios Vokorokos, Anton Baláž, Martin Chovanec - 2006. In: Acta Electrotechnica et Informatica. Roč. 6, č. 1 (2006), s. 81-86. - ISSN 1335-8243
[VOKOROKOS, Liberios (34%) - BALÁŽ, Anton (33%) - CHOVANEC, Martin (33%)]

2007 [1] CHOU, T.S., YEN, K.K. Fuzzy belief k-nearest neighbors anomaly detection of user to root and remote to local attacks In: Proceedings of the 2007 : IEEE Workshop on Information Assurance : IAW : 20. - 22. june 2007, West Point P. 207-213 ISBN: 978-142441304-1

2008 [1] CHOU, T.S. et al. Intrusion aware system-on-a-chip design with uncertainty classification In: Proceedings of the International Conference on Embedded Software and Systems : ICESS 2008 : 29. - 31. july 2008, Chengdu P. 527-531 ISBN: 978-076953287-5

2009 [1] LANGIN, C., et al. A self-organizing map and its modeling for discovering malignant network traffic In: 2009 IEEE Symposium on Computational Intelligence in Cyber Security: CICS 2009 : Nashville, 2009 P. 527-531 ISBN: 978-142442769-7

2009 [1] KTATA, F. B., EL KADHI, N., GHEDIRA, K. Distributed agent architecture for intrusion detection based on new metrics In: NSS 2009 : 3rd International Conference on Network and System Security : Gold Coast, 19-21 October 2009 P. 321-327 ISBN: 978-076953838-9

2009 [1] KLEMENT, P., SNÁŠEL, V. Anomaly detection in emergency call data - The first step to the intelligent emergency call system management In: INCoS 2009 : International Conference on Intelligent Networking and Collaborative Systems : Barcelona, 4-6 November 2009 P. 226-232 ISBN: 978-076953858-7

2009 [1] ABDEL-AZIM, M, ABDEL-FATAH, A.I., AWAD, M. Performance analysis of artificial neural network intrusion detection systems In: ELECO 2009 : 6th International Conference on Electrical and Electronics Engineering : 5. - 8. november 2009, Bursa P. II385-II389 ISBN: 978-994489818-8

2009 [1] KLEMENT, P., SNÁŠEL, V. SOM neural network - A piece of intelligence in disaster management In: NABIC 2009 : World Congress on Nature and Biologically Inspired Computing : Proceedings : Coimbatore, 9-11 December 2009 P. 872-877 ISBN: 978-142445612-3

2009 [1] KUMAR, M., SIDDIQUE, S., NOOR, H. Feature-based alert correlation in security systems using self organizing maps In: Proceedings of SPIE : The International Society for Optical Engineering : Vol. 7344 : Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security 2009 : Orlando, 15-16 April 2009 Art. no. 734404 ISSN: 0277-786X ISBN: 978-081947610-4

2010 [1] SZKUTNIK, J. Electronic metering as a decisive factor determining the implementation of the dsm strategy in poland In: Rynek Energii Vol. 86, no. 1 (2010), p. 11-15 ISSN: 1425-5960

2011 [1] MANGANIELLO, F., MARCHETTI, M., COLAJANNI, M. Multistep attack detection and alert correlation in intrusion detection systems In: Communications in Computer and Information Science : Vol. 200 : 2011 International Conference on Information Security and Assurance, ISA 2011 : Brno, 15-17 August P. 101-110 ISSN: 1865-0929 ISBN: 978-364223140-7

2011 [1] SHAHZAD, F. et al. In-execution malware detection using task structures of Linux processes In: 2011 IEEE International Conference on Communications : ICC 2011: 5. - 9. june 2011, Kyoto ISSN: 0536-1486 ISBN: 978-161284233-2

2011 [1] KTATA, F.B., KADHI, N.E., GHEDIRA, K. Mobile agents for intrusion detection system based on a new anomaly approach In: Journal of Engineering and Applied Sciences Vol. 6, no. 1 (2011), p. 79-90 ISSN: 1816-949X

2009 [3] SZKUTNIK, J. Efektywność w sektorze dystrybucji energii elektrycznej : Aspekty ekonomiczne In: Efektywność w sektorze dystrybucji energii elektrycznej : Aspekty ekonomiczne P. 141-167 ISBN: 978-83-7208-023-3

2011 [1] FEDYNYSHYN, G., CHUAH, M.c., TAN, G. Detection and classification of different botnet C&C channels In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics Vol. 6906 LNCS (2011), p. 228-242 ISBN: 978-3-642-23495-8

2012 [1] EL KADHI, ., HADJAR, K., EL ZANT, N. A mobile agents and artificial neural networks for intrusion detection In: Journal of Software Vol. 7, no. 1 (2012), p. 156-160 ISSN: 1796-217X

2012 [1] ACAMPORA, G. Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems In: Soft Computing Vol. 16, no. 7 (2012), p. 1183-1196 ISSN: 1432-7643

2011 [1] ADEEL, M., TOKARCHUK, L. N. Analysis of mobile P2P malware detection framework through Cabir and Commwarrior families In: Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011 : Boston, 9-11 October 2011 P. 1335-1343 ISBN: 978-076954578-3

2013 [3] LAHEEB, M. I., BASHEER, T., IBRAHIM, L. A comparison study for intrusion database (KDD99, NSL-KDD) based on self organization map (SOM) artificial neural network In: Journal of Engineering Science and Technology Vol. 8, no. 1 (2013), p. 107-119 ISSN: 1823-4690

2009 [3] SINGH, S., SILAKARI, S. A survey of cyber attack detection systems In: International Journal of Computer Science and Network Security Vol. 9, no. 5 (2009) , p. 1-9 ISSN: 1738-7906

2012 [3] SONAWANE, S., PARDESHI, S., PRASAD, G. A survey on intrusion detection techniques In: World Journal of Science and Technology Vol. 2, no. 3 (2012), p. 127-133 ISSN: 2231-2587

2011 [3] ADEEL, M., TOKARCHUK, L. N. Analysis of Mobile P2P Malware Detection Framework through Cabir and Commwarrior Families In: PASSAT/SocialCom 2011 : 2011 IEEE International Conference on Privacy, security, risk and trust and IEEE International Conference on Social computing : Boston, Massachusetts, USA, 9-11 October 2011 P. 1335-1343 ISBN: 978-0-7695-4578-3

2011 [3] FEDYNYSHYN, G., CHUAH, M. C., TAN, G. Detection and classification of different botnet C&C channels In: Autonomic and Trusted Computing : Lecture Notes in Computer Science Vol. 6906 (2011), p. 228-242 ISSN: 0302-9743 ISBN: 978-3-642-23495-8

2013 [3] SHARMA, S., ASTHANA, A., PANDEY, M. C. Intrusion detection solution using anomaly detection scheme In: International Journal Of Advance Research In Science And Engineering Vol. 2, no. 5 (2013), p. 16-26 ISSN: 2319-8354

2011 [3] GULVE, A. K., VYAWAHARE, D. G. Intrusion Detection System (IDS) Using Self Organising Map (SOM) In: International Journal Of Computer Science And Applications Vol. 4, no. 2 (2011), p. 114-119 ISSN: 0974-1003

2013 [3] SHARMA, R. Need for an Intrusion Detection System: A Systematic Review In: International Journal of Emerging Science and Engineering Vol. 1, no. 6 (2013), p. 36-40 ISSN: 2319-6378

2010 [3] LANGIN, CH. et al. SOM with Vulture Fest Model Discovers Feral Malware and Visually Profiles the Security of Subnets In: International Journal of Computers and Their Applications Vol. 17, no. 4 (2010), p. 241-249 ISSN: 1076-5204

2012 [3] SONAWANE, S., KARSOLIYA, S. Self Configuring Intrusion Detection System In: Fourth International Conference on Computational Intelligence and Communication Networks : Proceedings : Mathura, Uttar Pradesh, India, 3-5 November 2012 P. 757-761 ISBN: 978-0-7685-4850-0

2010 [3] SZKUTNIK, J. Smart metering jako decydujące uwarunkowanie wdrożenia strategii DSM w Polsce In: Rynek Energii No. 1 (2010), b.s. ISSN: 1425-5960

2011 [3] GULVE, A. K., VYAWAHARE, D. G. Survey On Intrusion Detection System In: International Journal of Computer Science and Applications Vol. 4, no. 1 (2011), p. 7-13 ISSN: 0974-1003

2009 [3] LANGIN, CH. et al. Visualization of Network Security Traffic using Hexagonal Self-Organizing Maps In: ISCA 22nd International Conference on Computer Applications in Industry and Engineering (CAINE-2009) : San Francisco, CA, November 4-6, 2009 [online] P. 1-6 ISBN: 978-1-880843-73-4

2012 [3] MOHAMED, Marghny - AL-MEHDHAR, Abeer - BAMATRAF, Mohamed SOM-PAD: Novel Data Security Algorithm on Self Organizing Map In: Computer Science & Information Technology Vol. 2 (2012), p. 325-333 ISSN: 2231-5403

2012 [3] ACAMPORA, G. Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems In: Soft Computing Vol. 16, no. 7 (2012), p. 1183-1196 ISSN: 1432-7643

2009 [1] LANGIN, Chet et al. A Self-Organizing Map and its Modeling for Discovering Malignant Network Traffic In: IEEE Symposium on Computational Intelligence in Cyber Security : Nashville, Mar 30 -Apr 02, 2009 P. 122-129 ISBN: 978-1-4244-2769-7

2013 [3] LAHEEB, M., BASHEER, T., MAHMOD,S. A Comparison Study For Intrusion Database (Kdd99, Nsl-Kdd) Based On Self Organization Map (SOM) Artificial Neural Network In: Journal of Engineering Science and Technology Vol. 8, no. 1 (2013), p. 107-119 ISSN: 1823-4690

2012 [4] BAHAMAN, Nazrulazhar et al. Effectiveness of security tools to anomalies on tunneled traffic In: Information Technology Journal Vol. 11, no. 2 (2012), p. 191-199 ISSN: 1812-5638

2013 [6] SONAWANE, Sandip R. Rule learnig based self organizing intrusion detection system In: International Journal of Research in Advent Technology Vol. 1, no. 3 (2013), p. 35-42 ISSN: 2321-9637

2014 [3] BORAH Samarjeet - CHAKRABORTY, Anindita Towards the development of an efficient intrusion detection system In: International Journal of Computer Applications Vol. 90, no. 8 (2014), p. 15-20 ISSN: 0975-8887

2009 [1] KTATA, F.B., KADHI, E.N., GHEDIRA, K. Distributed agent architecture for intrusion detection based on new metrics In: NSS 2009 - Network and System Security : 3rd International Conference on Network and System Security : Gold Coast, Australia P. 321-327 ISBN: 978-076953838-9

2009 [1] ABDEL-AZIM, A., ABDEL-FATAH, A., AWAD, M. Performance analysis of artificial neural network intrusion detection systems In: ELECO 2009 - 6th International Conference on Electrical and Electronics Engineering : Bursa, Turkey 2009 P. 385-389 ISBN: 978-994489818-8

2012 [1] BAHAMAN, N. et al. Effectiveness of security tools to anomalies on tunneled traffic In: Information Technology Journal Vol. 11, no. 2 (2012), p. 191-199 ISSN: 1812-5638

2016 [2] MADOŠ, B. et al. Brain-computer interface and Arduino microcontroller family software interconnection solution In: SAMI 2016 : IEEE 14th International Symposium on Applied Machine Intelligence and Informatics : Herľany, 21-23 January, 2016 S. 217-221 ISBN: 978-1467387-8

2017 [1] MOWLA, Nishat - DOH, Inshil - CHAE, KiJoon Evolving Neural Network Intrusion Detection System for MCPS In: ICACT : 19th International Conference on Advanced Communication Technology : Pyeongchang, Februar 19-22, 2017 P. 183-187 ISBN: 978-8-9968-6509-4

42

56.

55434 AFD 2006

Algorithm mapping of neural network for Neural DF KPI architecture / Liberios Vokorokos, Norbert Ádám, Anton Baláž - 2006. In: Electronic computers and informatics - ECI 2006. - Košice : FEI-TU, 2006 6 s. - ISBN 8080735980
[VOKOROKOS, Liberios (35%) - ÁDÁM, Norbert (30%) - BALÁŽ, Anton (35%)]

0

57.

43671 AED 2005

Safety procedures modeling using behavioural animation / Liberios Vokorokos ... [et al.] - 2005. In: ICETA 05. - Košice : alfa, 2005 S. 239-242. - ISBN 8080860166
[VOKOROKOS, Liberios (25%) - ÁDÁM, Norbert (25%) - PETRÍK, Slavomír (25%) - BALÁŽ, Anton (25%)]

0

58.

50022 AFC 2005

Flexible platform for neural network based on data flow principles / Liberios Vokorokos, Norbert Ádám, Anton Baláž - 2005. In: Proceedings of the 6th International Symposium of Hungarian Researchers on Computational Intelligence. - Budapest : Budapest Tech, 2006 P. 697-708. - ISBN 963 7154 43 4
[VOKOROKOS, Liberios (33%) - ÁDÁM, Norbert (33%) - BALÁŽ, Anton (33%)]

0

59.

43649 AEC 2005

Dataflow distributed database systems / Liberios Vokorokos ... [et al.] - 2005. In: DAAAM International. - Wien : TU, 2005 P. 373-374. - ISBN 3901509461
[VOKOROKOS, Liberios (25%) - BALÁŽ, Anton (25%) - ÁDÁM, Norbert (25%) - PETRÍK, Slavomír (25%)]

0

60.

47705 AFD 2005

Parallelism in fuzzy databases / Liberios Vokorokos, Anton Baláž, Norbert Ádám - 2005. In: SAMI 2005. - Budapest : Tech, 2005 P. 175-183. - ISBN 9637154353
[VOKOROKOS, Liberios (33%) - BALÁŽ, Anton (33%) - ÁDÁM, Norbert (33%)]

2008 [1] HOQUE, A.H.M.S et al. Performance comparison of fuzzy queries on fuzzy database and classical database In: Proceedings of ICECE 2008 : 5th International Conference on Electrical and Computer Engineering: ICECE 2008 P. 654-658 ISBN: 978-142442015-5

1

61.

62340 AFD 2005

Database systems in parallel computing enviroment / Anton Baláž, Norbert Ádám - 2005. In: 5th PhD Student Conference and Scientific and Technical Competition of Students of Faculty of Electrical Engineering and Informatics Technical University of Košice. - Košice : EQUILIBRIA, 2005 S. 17-18. - ISBN 8096922440
[BALÁŽ, Anton (50%) - ÁDÁM, Norbert (50%)]

0

62.

43645 AFD 2005

Parallelization of the sequantial threads in DF computers / Liberios Vokorokos, Norbert Ádám, Anton Baláž - 2005. In: SAMI 2005. - Budapest : Tech, 2005 P. 207-215. - ISBN 9637154353
[VOKOROKOS, Liberios (33%) - ÁDÁM, Norbert (33%) - BALÁŽ, Anton (33%)]

0

63.

32422 AFE 2004

Adatfolyam-feldolgozás dataflow számítógépeken / Norbert Ádám, Anton Baláž - 2004. In: Tartalmi kivonat : 29. Tudományos Diákköri Konferencia : Budapest, 2004, november 11.; 18. - Budapest : Dr. Rudas Imre, a BMF rektora, 2004 P. 35.
[ÁDÁM, Norbert (50%) - BALÁŽ, Anton (50%)]

0

64.

30192 AFD 2004

Measurement of QoS parameters in IP networks / Marián André ... [et al.] - 2004. In: ECI 2004. - Košice : VIENALA Press, 2004 S. 326-331. - ISBN 8080731500
[ANDRÉ, Marián (10%) - BALÁŽ, Anton (10%) - BRONČEK, Michal (10%) - GENČI, Ján (10%) - GIERTL, Juraj (10%) - JAKAB, František (20%) - JAKAB, Róbert (10%) - KOŠČO, Ľuboš (10%) - SUČÍK, Juraj (10%)]

0