Download BibTeX

2025:

  • Jerabek, Kamil; Luxemburk, Jan; Plny, Richard; Koumar, Josef; Pesek, Jaroslav; Hynek, Karel When Simple Model Just Works: Is Network Traffic Classification in Crisis? arXiv preprint arXiv:2506.08655
  • Pesek, Jaroslav; Luxemburk, Jan; Hynek, Karel Lightweight Traffic Classification: A Simple Baseline Matching Deep Learning Performance 2025 9th Network Traffic Measurement and Analysis Conference (TMA)
  • Koumar, Josef; Pesek, Jaroslav; Jerabek, Kamil; Čejka, Tomáš Towards building network outlier detection system for network traffic monitoring NOMS 2025-2025 IEEE Network Operations and Management Symposium
  • Pesek, Jaroslav; Fukuda, Kensuke; Cejka, Tomas Interpretable Threat Detection with Evidential Classifier: The MQTT Case NOMS 2025-2025 IEEE Network Operations and Management Symposium
  • Jerabek, Kamil; Koumar, Josef; Setinsk{\`y Explainable anomaly detection in network traffic using llm NOMS 2025-2025 IEEE Network Operations and Management Symposium
  • Koumar, Josef; Hynek, Karel; Čejka, T.,; Šiška, Pavel CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting Scientific Data Link

2024:

  • Plný, R.; Hynek, K.,; Šiška, P. WIF: Efficient Library for Network Traffic Analysis 2024 20th International Conference on Network and Service Management (CNSM) Link
  • Hynek, K.; Luxemburk, J.; Pešek, J.; Čejka, T.,; Šiška, P. CESNET-TLS-Year22: A year-spanning TLS network traffic dataset from backbone lines Scientific Data Link
  • Luxemburk, J.; Hynek, K. Towards reusable models in traffic classification Proceedings of the 8th Network Traffic Measurement and Analysis Conference Link
  • Jeřábek, K.; Hynek, K.,; Ryšavý, O. Comparative analysis of DNS over HTTPS detectors Computer Networks Link
  • Koumar, J.; Hynek, K.; Pešek, J.,; Čejka, T. NetTiSA: Extended IP flow with time-series features for universal bandwidth-constrained high-speed network traffic classification Computer Networks
  • Martínek, T.; Kořenek, J.,; Čejka, T. LGBM2VHDL: Mapping of LightGBM Models to FPGA 2024 IEEE 32nd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM) Link
  • Soukup, D.; Uhříček, D.; Vašata, D.,; Čejka, T. Machine Learning Metrics for Network Datasets Evaluation ICT Systems Security and Privacy Protection Link

2023:

  • Jan Luxemburk; Karel Hynek; Tomáš Čejka; Andrej Lukačovič; Pavel Šiška CESNET-QUIC22: A large one-month QUIC network traffic dataset from backbone lines 2023 7th Network Traffic Measurement and Analysis Conference (TMA) Link
  • Jan Luxemburk; Tomáš Čejka Fine-grained TLS services classification with reject option 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC) Link
  • Wasielewska, Katarzyna; Soukup, Dominik; Čejka, Tomáš; Camacho, José Evaluation of the Limit of Detection in Network Dataset Quality Assessment with PerQoDA Machine Learning and Principles and Practice of Knowledge Discovery in Databases Link

2022:

  • Pln{\'y}, Richard; Hynek, Karel; Čejka, Tomáš DeCrypto: Finding Cryptocurrency Miners on ISP Networks Secure IT Systems Link
  • Melcher, Lukáš; Hynek, Karel; Čejka, Tomáš Tunneling through DNS over TLS providers 2022 18th International Conference on Network and Service Management (CNSM) Link
  • Kamil Jeřábek; Karel Hynek; Tomáš Čejka; Ondřej Ryšavý Collection of datasets with DNS over HTTPS traffic Data in Brief Link
  • Hynek, Karel; Vekshin, Dmitrii; Luxemburk, Jan; Cejka, Tomas; Wasicek, Armin Summary of DNS Over HTTPS Abuse IEEE Access Link

2021:

  • Orsak, M.; Benes, T. High-speed stateful packet classifier based on TSS algorithm optimized for off-chip memories 2021 17th International Conference on Network and Service Management (CNSM) Link

2020:

  • Hynek, Karel; Cejka, Tomas Privacy Illusion: Beware of Unpadded DoH 2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) Link
  • Bene{\v{s} Pipelined ALU for effective external memory access in FPGA 2020 23rd Euromicro Conference on Digital System Design (DSD)
  • Vekshin, Dmitrii; Hynek, Karel; Cejka, Tomas DoH Insight: Detecting DNS over HTTPS by Machine Learning Proceedings of the 15th International Conference on Availability, Reliability and Security Link
  • Hynek, Karel; Beneš, Tomáš; Čejka, Tomáš; Kubátová, Hana Refined Detection of SSH Brute-Force Attackers Using Machine Learning ICT Systems Security and Privacy Protection Link
  • K. {Hynek}; T. {Čejka}; M. {Žádník}; H. {Kubátová} Evaluating Bad Hosts Using Adaptive Blacklist Filter 9th Mediterranean Conference on Embedded Computing (MECO) Link
  • Hulák, Matej; Cejka, Tomas Classifihulakcation of Network Traffic using Traffic Features 8th Prague Embedded Systems Workshop Link
  • Hynek, Karel; Cejka, Tomas; Vekshin, Dmitrii DoH detection: Discovering hidden DNS 8th Prague Embedded Systems Workshop Link
  • Soukup, Dominik; Hynek, Karel; Cejka, Tomas QoD: Ideas about Evaluating Quality of Datasets 8th Prague Embedded Systems Workshop Link
  • Beneš, Tomáš; Cejka, Tomas; Kubátová, Hana The next step of P4 FPGA architectures: External Memories 8th Prague Embedded Systems Workshop Link

2019:

  • Soukup, Dominik; Huj{\v{n}}ák, Ond{\v{r}}ej; Štefunko, Simon; Krejč{\'\i Security Framework for IoT and Fog Computing Networks 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) Link
  • Soukup, Dominik; Cejka, Tomas; Hynek, Karel Behavior Anomaly Detection in IoT Networks International conference on Computer Networks, Big data and IoT Link
  • Soukup, Dominik; Čejka, Tomáš; Štefunko, Simon Multi-level Anomaly Detection in IoT Networks The 7th Prague Embedded Systems Workshop Link
  • Havránek, Jiří; Čejka, Tomáš; Benáček, Pavel L7 capable flow exporter described in P4 The 7th Prague Embedded Systems Workshop Link
  • Hynek, Karel; Beneš, Tomáš; Čejka, Tomáš; Kubátová, Hana Future approaches to monitoring in high-speed backbone networks The 7th Prague Embedded Systems Workshop Link

2018:

  • J\'{a}nsk\'{y Augmented DDoS Mitigation with Reputation Scores Proceedings of the 13th International Conference on Availability, Reliability and Security Link
  • Jánský, Tomáš; Čejka, Tomáš; Žádník, Martin; Bartoš, Václav Informed DDoS Mitigation at 100 Gb/s Proceedings of the 6th Prague Embedded Systems Workshop
  • Šuster, Filip; Čejka, Tomáš Stream-wise adaptive blacklist filter based on flow data Proceedings of the 6th Prague Embedded Systems Workshop
  • Slabihoudek, Michal; Čejka, Tomáš Stream-wise Aggregation of Flow Data Proceedings of the 6th Prague Embedded Systems Workshop
  • Stejskalová, Lenka; Čejka, Tomáš Grouping evil IP addresses Proceedings of the 6th Prague Embedded Systems Workshop
  • Pavel Benáček; Viktor Puš; Hana Kubátová; Tomáš Čejka P4-To-VHDL: Automatic generation of high-speed input and output network blocks Microprocessors and Microsystems Link
  • Jiří Havránek; Petr Velan; Tomas Cejka; Pavel Benáček Enhanced Flow Monitoring with P4 Generated Flexible Packet Parser AIMS 2018

2017:

  • Jánský, Tomáš; Čejka, Tomáš; Bartoš, Václav Hunting SIP Authentication Attacks Efficiently Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings Link
  • Čejka, Tomáš; Žádník, Martin Preserving Relations in Parallel Flow Data Processing Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings Link
  • Švepeš, Marek; Čejka, Tomáš Making Flow-Based Security Detection Parallel Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings Link
  • Čejka, Tomáš; Švepeš, Marek,; Viktorin, Jan Gateway for IoT security The 5th Prague Embedded Systems Workshop Link
  • Jánský, Tomáš; Čejka, Tomáš; Bartoš, Václav Detection of SIP Scans and Bruteforce Attacks The 5th Prague Embedded Systems Workshop Link

2016:

  • Tomas Cejka; Václav Barto{\v s}; Marek Svepes; Zdenek Rosa; Hana Kubatova {NEMEA:} A Framework for Network Traffic Analysis 12th International Conference on Network and Service Management (CNSM 2016) Link
  • Zdenek Rosa; Tomas Cejka; Martin Zadnik; Viktor Pu{\v s} Building a Feedback Loop to Capture Evidence of Network Incidents 12th International Conference on Network and Service Management (CNSM 2016) Link
  • Cejka, Tomas; Svepes, Marek Analysis of Vertical Scans Discovered by Naive Detection Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016 Link
  • Čejka, Tomáš; Krejčí, Radek Configuration of open vSwitch using OF-CONFIG NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium Link
  • Čejka, Tomáš; Robledo, Alejandro Detecting Spoofed Time in NTP Traffic The 4th Prague Embedded Systems Workshop Link
  • Svepes, Marek; Cejka, Tomas Overload-resistant Network Traffic Analysis The 4th Prague Embedded Systems Workshop Link

2015:

  • Čejka, Tomáš; Bodó, Radoslav; Kubátová, Hana Nemea: Searching for Botnet Footprints The 3th Prague Embedded Systems Workshop Link
  • Alexa, David; Čejka, Tomáš Easy configuration of NETCONF devices The 3th Prague Embedded Systems Workshop Link
  • Cejka, Tomas; Bartos, Vaclav; Truxa, Lukas; Kubatova, Hana Using Application-Aware Flow Monitoring for SIP Fraud Detection Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015 Link

2014:

  • Cejka, Tomas; Rosa, Zdenek; Kubatova, Hana Stream-wise detection of surreptitious traffic over dns 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) Link
  • Benáček, Pavel; Blažek, Rudolf B.; Čejka, Tomáš; Kubátová, Hana Change-point Detection Method on 100 Gb/s Ethernet Interface Proceedings of the Tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems Link
  • Čejka, Tomáš; Kekely, Lukáš; Benček, Pavel; Blažek, Rudolf B.; Kubátová, Hana FPGA Accelerated Change-Point Detection Method for 100 Gb/s Networks 9th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2014) Link

2013:

  • Bartoš, Václav; Žádník, Martin; Čejka, Tomáš Nemea: Framework for stream-wise analysis of network traffic Link

2012:

  • Čejka, Tomáš; Benáček, Pavel; Friedl, Štěpán; Krejčí, Radek COMET-COMBO Ethernet Tester Link