Download BibTeX
2025:
- Jerabek, Kamil; Luxemburk, Jan; Plny, Richard; Koumar, Josef; Pesek, Jaroslav; Hynek, Karel
When Simple Model Just Works: Is Network Traffic Classification in Crisis?
arXiv preprint arXiv:2506.08655
- Pesek, Jaroslav; Luxemburk, Jan; Hynek, Karel
Lightweight Traffic Classification: A Simple Baseline Matching Deep Learning Performance
2025 9th Network Traffic Measurement and Analysis Conference (TMA)
- Koumar, Josef; Pesek, Jaroslav; Jerabek, Kamil; Čejka, Tomáš
Towards building network outlier detection system for network traffic monitoring
NOMS 2025-2025 IEEE Network Operations and Management Symposium
- Pesek, Jaroslav; Fukuda, Kensuke; Cejka, Tomas
Interpretable Threat Detection with Evidential Classifier: The MQTT Case
NOMS 2025-2025 IEEE Network Operations and Management Symposium
- Jerabek, Kamil; Koumar, Josef; Setinsk{\`y
Explainable anomaly detection in network traffic using llm
NOMS 2025-2025 IEEE Network Operations and Management Symposium
- Koumar, Josef; Hynek, Karel; Čejka, T.,; Šiška, Pavel
CESNET-TimeSeries24: Time Series Dataset for Network Traffic Anomaly Detection and Forecasting
Scientific Data
Link
2024:
- Plný, R.; Hynek, K.,; Šiška, P.
WIF: Efficient Library for Network Traffic Analysis
2024 20th International Conference on Network and Service Management (CNSM)
Link
- Hynek, K.; Luxemburk, J.; Pešek, J.; Čejka, T.,; Šiška, P.
CESNET-TLS-Year22: A year-spanning TLS network traffic dataset from backbone lines
Scientific Data
Link
- Luxemburk, J.; Hynek, K.
Towards reusable models in traffic classification
Proceedings of the 8th Network Traffic Measurement and Analysis Conference
Link
- Jeřábek, K.; Hynek, K.,; Ryšavý, O.
Comparative analysis of DNS over HTTPS detectors
Computer Networks
Link
- Koumar, J.; Hynek, K.; Pešek, J.,; Čejka, T.
NetTiSA: Extended IP flow with time-series features for universal bandwidth-constrained high-speed network traffic classification
Computer Networks
- Martínek, T.; Kořenek, J.,; Čejka, T.
LGBM2VHDL: Mapping of LightGBM Models to FPGA
2024 IEEE 32nd Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM)
Link
- Soukup, D.; Uhříček, D.; Vašata, D.,; Čejka, T.
Machine Learning Metrics for Network Datasets Evaluation
ICT Systems Security and Privacy Protection
Link
2023:
- Jan Luxemburk; Karel Hynek; Tomáš Čejka; Andrej Lukačovič; Pavel Šiška
CESNET-QUIC22: A large one-month QUIC network traffic dataset from backbone lines
2023 7th Network Traffic Measurement and Analysis Conference (TMA)
Link
- Jan Luxemburk; Tomáš Čejka
Fine-grained TLS services classification with reject option
2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)
Link
- Wasielewska, Katarzyna; Soukup, Dominik; Čejka, Tomáš; Camacho, José
Evaluation of the Limit of Detection in Network Dataset Quality Assessment with PerQoDA
Machine Learning and Principles and Practice of Knowledge Discovery in Databases
Link
2022:
- Pln{\'y}, Richard; Hynek, Karel; Čejka, Tomáš
DeCrypto: Finding Cryptocurrency Miners on ISP Networks
Secure IT Systems
Link
- Melcher, Lukáš; Hynek, Karel; Čejka, Tomáš
Tunneling through DNS over TLS providers
2022 18th International Conference on Network and Service Management (CNSM)
Link
- Kamil Jeřábek; Karel Hynek; Tomáš Čejka; Ondřej Ryšavý
Collection of datasets with DNS over HTTPS traffic
Data in Brief
Link
- Hynek, Karel; Vekshin, Dmitrii; Luxemburk, Jan; Cejka, Tomas; Wasicek, Armin
Summary of DNS Over HTTPS Abuse
IEEE Access
Link
2021:
- Orsak, M.; Benes, T.
High-speed stateful packet classifier based on TSS algorithm optimized for off-chip memories
2021 17th International Conference on Network and Service Management (CNSM)
Link
2020:
- Hynek, Karel; Cejka, Tomas
Privacy Illusion: Beware of Unpadded DoH
2020 11th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
Link
- Bene{\v{s}
Pipelined ALU for effective external memory access in FPGA
2020 23rd Euromicro Conference on Digital System Design (DSD)
- Vekshin, Dmitrii; Hynek, Karel; Cejka, Tomas
DoH Insight: Detecting DNS over HTTPS by Machine Learning
Proceedings of the 15th International Conference on Availability, Reliability and Security
Link
- Hynek, Karel; Beneš, Tomáš; Čejka, Tomáš; Kubátová, Hana
Refined Detection of SSH Brute-Force Attackers Using Machine Learning
ICT Systems Security and Privacy Protection
Link
- K. {Hynek}; T. {Čejka}; M. {Žádník}; H. {Kubátová}
Evaluating Bad Hosts Using Adaptive Blacklist Filter
9th Mediterranean Conference on Embedded Computing (MECO)
Link
- Hulák, Matej; Cejka, Tomas
Classifihulakcation of Network Traffic using Traffic Features
8th Prague Embedded Systems Workshop
Link
- Hynek, Karel; Cejka, Tomas; Vekshin, Dmitrii
DoH detection: Discovering hidden DNS
8th Prague Embedded Systems Workshop
Link
- Soukup, Dominik; Hynek, Karel; Cejka, Tomas
QoD: Ideas about Evaluating Quality of Datasets
8th Prague Embedded Systems Workshop
Link
- Beneš, Tomáš; Cejka, Tomas; Kubátová, Hana
The next step of P4 FPGA architectures: External Memories
8th Prague Embedded Systems Workshop
Link
2019:
- Soukup, Dominik; Huj{\v{n}}ák, Ond{\v{r}}ej; Štefunko, Simon; Krejč{\'\i
Security Framework for IoT and Fog Computing Networks
2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC)
Link
- Soukup, Dominik; Cejka, Tomas; Hynek, Karel
Behavior Anomaly Detection in IoT Networks
International conference on Computer Networks, Big data and IoT
Link
- Soukup, Dominik; Čejka, Tomáš; Štefunko, Simon
Multi-level Anomaly Detection in IoT Networks
The 7th Prague Embedded Systems Workshop
Link
- Havránek, Jiří; Čejka, Tomáš; Benáček, Pavel
L7 capable flow exporter described in P4
The 7th Prague Embedded Systems Workshop
Link
- Hynek, Karel; Beneš, Tomáš; Čejka, Tomáš; Kubátová, Hana
Future approaches to monitoring in high-speed backbone networks The 7th Prague Embedded Systems Workshop
Link
2018:
- J\'{a}nsk\'{y
Augmented DDoS Mitigation with Reputation Scores
Proceedings of the 13th International Conference on Availability, Reliability and Security
Link
- Jánský, Tomáš; Čejka, Tomáš; Žádník, Martin; Bartoš, Václav
Informed DDoS Mitigation at 100 Gb/s
Proceedings of the 6th Prague Embedded Systems Workshop
- Šuster, Filip; Čejka, Tomáš
Stream-wise adaptive blacklist filter based on flow data
Proceedings of the 6th Prague Embedded Systems Workshop
- Slabihoudek, Michal; Čejka, Tomáš
Stream-wise Aggregation of Flow Data
Proceedings of the 6th Prague Embedded Systems Workshop
- Stejskalová, Lenka; Čejka, Tomáš
Grouping evil IP addresses
Proceedings of the 6th Prague Embedded Systems Workshop
- Pavel Benáček; Viktor Puš; Hana Kubátová; Tomáš Čejka
P4-To-VHDL: Automatic generation of high-speed input and output network blocks
Microprocessors and Microsystems
Link
- Jiří Havránek; Petr Velan; Tomas Cejka; Pavel Benáček
Enhanced Flow Monitoring with P4 Generated Flexible Packet Parser
AIMS 2018
2017:
- Jánský, Tomáš; Čejka, Tomáš; Bartoš, Václav
Hunting SIP Authentication Attacks Efficiently
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
Link
- Čejka, Tomáš; Žádník, Martin
Preserving Relations in Parallel Flow Data Processing
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
Link
- Švepeš, Marek; Čejka, Tomáš
Making Flow-Based Security Detection Parallel
Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
Link
- Čejka, Tomáš; Švepeš, Marek,; Viktorin, Jan
Gateway for IoT security
The 5th Prague Embedded Systems Workshop
Link
- Jánský, Tomáš; Čejka, Tomáš; Bartoš, Václav
Detection of SIP Scans and Bruteforce Attacks
The 5th Prague Embedded Systems Workshop
Link
2016:
- Tomas Cejka; Václav Barto{\v s}; Marek Svepes; Zdenek Rosa; Hana Kubatova
{NEMEA:} A Framework for Network Traffic Analysis
12th International Conference on Network and Service Management (CNSM 2016)
Link
- Zdenek Rosa; Tomas Cejka; Martin Zadnik; Viktor Pu{\v s}
Building a Feedback Loop to Capture Evidence of Network Incidents
12th International Conference on Network and Service Management (CNSM 2016)
Link
- Cejka, Tomas; Svepes, Marek
Analysis of Vertical Scans Discovered by Naive Detection
Management and Security in the Age of Hyperconnectivity: 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016
Link
- Čejka, Tomáš; Krejčí, Radek
Configuration of open vSwitch using OF-CONFIG
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium
Link
- Čejka, Tomáš; Robledo, Alejandro
Detecting Spoofed Time in NTP Traffic
The 4th Prague Embedded Systems Workshop
Link
- Svepes, Marek; Cejka, Tomas
Overload-resistant Network Traffic Analysis
The 4th Prague Embedded Systems Workshop
Link
2015:
- Čejka, Tomáš; Bodó, Radoslav; Kubátová, Hana
Nemea: Searching for Botnet Footprints
The 3th Prague Embedded Systems Workshop
Link
- Alexa, David; Čejka, Tomáš
Easy configuration of NETCONF devices
The 3th Prague Embedded Systems Workshop
Link
- Cejka, Tomas; Bartos, Vaclav; Truxa, Lukas; Kubatova, Hana
Using Application-Aware Flow Monitoring for SIP Fraud Detection
Intelligent Mechanisms for Network Configuration and Security: 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015
Link
2014:
- Cejka, Tomas; Rosa, Zdenek; Kubatova, Hana
Stream-wise detection of surreptitious traffic over dns
2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
Link
- Benáček, Pavel; Blažek, Rudolf B.; Čejka, Tomáš; Kubátová, Hana
Change-point Detection Method on 100 Gb/s Ethernet Interface
Proceedings of the Tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Link
- Čejka, Tomáš; Kekely, Lukáš; Benček, Pavel; Blažek, Rudolf B.; Kubátová, Hana
FPGA Accelerated Change-Point Detection Method for 100 Gb/s Networks
9th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2014)
Link
2013:
- Bartoš, Václav; Žádník, Martin; Čejka, Tomáš
Nemea: Framework for stream-wise analysis of network traffic
Link
2012:
- Čejka, Tomáš; Benáček, Pavel; Friedl, Štěpán; Krejčí, Radek
COMET-COMBO Ethernet Tester
Link