Download BibTeX
2025:
- M\"{u}cke, Jonas; Nawrocki, Marcin; Hiesgen, Raphael; Sattler, Patrick; Zirngibl, Johannes; Carle, Georg; Luxemburk, Jan; Schmidt, Thomas C.; W\"{a}hlisch, Matthias
Waiting for QUIC: Passive Measurements to Understand QUIC Deployments
Proc. ACM Netw..
- Hulák, Matej; Bartoš, Václav; Koumar, Josef; Čejka, Tomáš
DAF: Device Annotation Framework
2025 21st International Conference on Network and Service Management (CNSM).
- Oškera, Dominik; Koumar, Josef; Pokorná, Alžběta; Jeřábek, Kamil; Čejka, Tomáš
Botnet Detection Through Periodic Patterns in Command-and-Control Network Traffic
2025 21st International Conference on Network and Service Management (CNSM).
- Kureš, Milan; Koumar, Josef; Hynek, Karel
CESNET TS-Zoo: A Library for Reproducible Analysis of Network Traffic Time Series
2025 21st International Conference on Network and Service Management (CNSM).
- Jozsa, Richard; Hynek, Karel; Pekar, Adrian
Taming Volatility: Stable and Private QUIC Classification with Federated Learning
2025 21st International Conference on Network and Service Management (CNSM).
- Plny, Richard; Hynek, Karel
On Evaluation of Data Fusion Methods for Network Traffic Classification
2025 21st International Conference on Network and Service Management (CNSM).
- Bartoš, Václav; Novotná, Michaela; Hulák, Matej
CESNET Idle OS Traffic: A Dataset of Idle Traffic of Various Operating Systems
2025 21st International Conference on Network and Service Management (CNSM).
- Jerabek, Kamil; Luxemburk, Jan; Plny, Richard; Koumar, Josef; Pesek, Jaroslav; Hynek, Karel
When Simple Model Just Works: Is Network Traffic Classification in Crisis?
- Pesek, Jaroslav; Luxemburk, Jan; Hynek, Karel
Lightweight Traffic Classification: A Simple Baseline Matching Deep Learning Performance
2025 9th Network Traffic Measurement and Analysis Conference (TMA).
- Koumar, Josef; Pesek, Jaroslav; Jerabek, Kamil; Čejka, Tomáš
Towards Building Network Outlier Detection System for Network Traffic Monitoring
NOMS 2025-2025 IEEE Network Operations and Management Symposium.
- Pesek, Jaroslav; Fukuda, Kensuke; Cejka, Tomas
Interpretable Threat Detection with Evidential Classifier: The MQTT Case
NOMS 2025-2025 IEEE Network Operations and Management Symposium.
- Jerabek, Kamil; Koumar, Josef; Setinský, Jiří; Pesek, Jaroslav
Explainable Anomaly Detection in Network Traffic Using LLM
NOMS 2025-2025 IEEE Network Operations and Management Symposium.
- Koumar, Josef; Hynek, Karel; Čejka, T.,; Šiška, Pavel
CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting
Scientific Data.
2024:
- Plný, R.; Hynek, K.,; Šiška, P.
WIF: Efficient Library for Network Traffic Analysis
2024 20th International Conference on Network and Service Management (CNSM).
- Hynek, K.; Luxemburk, J.; Pešek, J.; Čejka, T.,; Šiška, P.
CESNET-TLS-Year22: A year-spanning TLS network traffic dataset from backbone lines
Scientific Data.
- Luxemburk, J.; Hynek, K.
Towards reusable models in traffic classification
Proceedings of the 8th Network Traffic Measurement and Analysis Conference.
- Jeřábek, K.; Hynek, K.,; Ryšavý, O.
Comparative analysis of DNS over HTTPS detectors
Computer Networks.
- Koumar, J.; Hynek, K.; Pešek, J.,; Čejka, T.
NetTiSA: Extended IP flow with time-series features for universal bandwidth-constrained high-speed network traffic classification
Computer Networks.
- Martínek, T.; Kořenek, J.,; Čejka, T.
LGBM2VHDL: Mapping of LightGBM Models to FPGA
2024 IEEE 32nd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM).
- Soukup, D.; Uhříček, D.; Vašata, D.,; Čejka, T.
Machine Learning Metrics for Network Datasets Evaluation
ICT Systems Security and Privacy Protection.
2022:
- Plný, Richard; Hynek, Karel; Cejka, Tomáš
DeCrypto: Finding Cryptocurrency Miners on ISP Networks
Secure IT Systems.
- Melcher, Lukáš; Hynek, Karel; Čejka, Tomáš
Tunneling through DNS over TLS providers
2022 18th International Conference on Network and Service Management (CNSM).
- Kamil Jeřábek; Karel Hynek; Tomáš Čejka; Ondřej Ryšavý
Collection of datasets with DNS over HTTPS traffic
Data in Brief.
- Hynek, Karel; Vekshin, Dmitrii; Luxemburk, Jan; Cejka, Tomas; Wasicek, Armin
Summary of DNS Over HTTPS Abuse
IEEE Access.
2020:
- Hynek, Karel; Cejka, Tomas
Privacy Illusion: Beware of Unpadded DoH
2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
- Bene{š
Pipelined ALU for effective external memory access in FPGA
2020 23rd Euromicro Conference on Digital System Design (DSD).
- Vekshin, Dmitrii; Hynek, Karel; Cejka, Tomas
DoH Insight: Detecting DNS over HTTPS by Machine Learning
Proceedings of the 15th International Conference on Availability, Reliability and Security.
- Hynek, Karel; Beneš, Tomáš; Cejka, Tomáš; Kubátová, Hana
Refined Detection of SSH Brute-Force Attackers Using Machine Learning
ICT Systems Security and Privacy Protection.
- K. {Hynek}; T. {Čejka}; M. {Žádník}; H. {Kubátová}
Evaluating Bad Hosts Using Adaptive Blacklist Filter
9th Mediterranean Conference on Embedded Computing (MECO).
2017:
- Jánský, Tomáš; Čejka, Tomáš; Bartoš, Václav
Hunting SIP Authentication Attacks Efficiently
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings.
- Čejka, Tomáš; Žádník, Martin
Preserving Relations in Parallel Flow Data Processing
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings.
- Švepeš, Marek; Čejka, Tomáš
Making Flow-Based Security Detection Parallel
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings.
2014:
- Cejka, Tomas; Rosa, Zdenek; Kubatova, Hana
Stream-wise detection of surreptitious traffic over dns
2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
- Benáček, Pavel; Blažek, Rudolf B.; Čejka, Tomáš; Kubátová, Hana
Change-point Detection Method on 100 Gb/s Ethernet Interface
Proceedings of the Tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems.
- Čejka, Tomáš; Kekely, Lukáš; Benček, Pavel; Blažek, Rudolf B.; Kubátová, Hana
FPGA Accelerated Change-Point Detection Method for 100 Gb/s Networks
9th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2014).