


default search action
Daniel Tovarnák
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Daniel Tovarnák, Michal Cech, Vojtech Dohnal, Martin Hamerník, Matús Racek, Dusan Tichý:
The True Cost of Network Security Automation: Demo Playbook for Posture Assessment. NOMS 2024: 1-3 - 2022
- [c23]Lukás Sadlek, Pavel Celeda
, Daniel Tovarnák:
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. ARES 2022: 91:1-91:8 - [c22]Lukás Sadlek, Pavel Celeda
, Daniel Tovarnák:
Identification of Attack Paths Using Kill Chain and Attack Graphs. NOMS 2022: 1-6 - [c21]Stanislav Spacek, Petr Velan, Pavel Celeda
, Daniel Tovarnák:
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. NOMS 2022: 1-7 - [c20]Daniel Tovarnák, Michal Cech, Dusan Tichý, Vojtech Dohnal:
ObservableDB: An Inverted Index for Graph-Based Traversal of Cyber Threat Intelligence. NOMS 2022: 1-4 - [i5]Lukás Sadlek, Pavel Celeda
, Daniel Tovarnák:
Identification of Attack Paths Using Kill Chain and Attack Graphs. CoRR abs/2206.10272 (2022) - [i4]Stanislav Spacek, Petr Velan, Pavel Celeda
, Daniel Tovarnák:
HTTPS Event-Flow Correlation: Improving Situational Awareness in Encrypted Web Traffic. CoRR abs/2206.11175 (2022) - [i3]Lukás Sadlek, Pavel Celeda
, Daniel Tovarnák:
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. CoRR abs/2206.14539 (2022) - 2021
- [c19]Martin Husák, Martin Lastovicka, Daniel Tovarnák:
System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. ARES 2021: 112:1-112:8 - [c18]Daniel Tovarnák, Matús Racek, Petr Velan:
Cloud Native Data Platform for Network Telemetry and Analytics. CNSM 2021: 394-396 - [c17]Valdemar Svábenský
, Jan Vykopal, Daniel Tovarnák, Pavel Celeda
:
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. FIE 2021: 1-9 - [c16]Jan Vykopal, Pavel Celeda, Pavel Seda, Valdemar Svábenský
, Daniel Tovarnák:
Scalable Learning Environments for Teaching Cybersecurity Hands-on. FIE 2021: 1-9 - [c15]Daniel Tovarnák, Lukás Sadlek, Pavel Celeda:
Graph-Based CPE Matching for Identification of Vulnerable Asset Configurations. IM 2021: 986-991 - [c14]Stanislav Spacek, Daniel Tovarnák, Pavel Celeda
:
Enriching DNS Flows with Host-Based Events to Bypass Future Protocol Encryption. SEC 2021: 302-316 - [i2]Jan Vykopal, Pavel Celeda, Pavel Seda, Valdemar Svábenský, Daniel Tovarnák:
Scalable Learning Environments for Teaching Cybersecurity Hands-on. CoRR abs/2110.10004 (2021) - [i1]Valdemar Svábenský, Jan Vykopal, Daniel Tovarnák, Pavel Celeda:
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. CoRR abs/2112.11118 (2021)
2010 – 2019
- 2019
- [c13]Daniel Tovarnák:
An Algorithm for Message Type Discovery in Unstructured Log Data. ICSOFT 2019: 665-676 - [c12]Daniel Tovarnák, Tomás Pitner:
Normalization of Unstructured Log Data into Streams of Structured Event Objects. IM 2019: 671-676 - 2018
- [c11]Jana Komárková, Martin Husák
, Martin Lastovicka
, Daniel Tovarnák:
CRUSOE: Data Model for Cyber Situational Awareness. ARES 2018: 36:1-36:10 - [c10]Petr Velan
, Martin Husák
, Daniel Tovarnák:
Rapid prototyping of flow-based detection methods using complex event processing. NOMS 2018: 1-3 - 2017
- [j1]Tomás Jirsík
, Milan Cermák
, Daniel Tovarnák, Pavel Celeda
:
Toward Stream-Based IP Flow Analysis. IEEE Commun. Mag. 55(7): 70-76 (2017) - [c9]Jan Vykopal
, Martin Vizváry, Radek Oslejsek
, Pavel Celeda
, Daniel Tovarnák:
Lessons learned from complex hands-on defence exercises in a cyber range. FIE 2017: 1-8 - [c8]Jan Vykopal, Radek Oslejsek, Pavel Celeda, Martin Vizváry, Daniel Tovarnák:
KYPO Cyber Range: Design and Use Cases. ICSOFT 2017: 310-321 - 2016
- [c7]Daniel Tovarnák:
Practical Multi-pattern Matching Approach for Fast and Scalable Log Abstraction. ICSOFT-EA 2016: 319-329 - [c6]Milan Cermák
, Daniel Tovarnák
, Martin Lastovicka
, Pavel Celeda
:
A performance benchmark for NetFlow data analysis on distributed stream processing systems. NOMS 2016: 919-924 - 2014
- [c5]Daniel Tovarnák, Tomás Pitner:
Continuous Queries over Distributed Streams of Heterogeneous Monitoring Data in Cloud Datacenters. ICSOFT EA 2014: 470-481 - 2013
- [c4]Filip Nguyen, Daniel Tovarnák
, Tomás Pitner
:
Semantically Partitioned Peer to Peer Complex Event Processing. IDC 2013: 55-65 - [c3]Daniel Tovarnák
, Filip Nguyen, Tomás Pitner
:
Distributed Event-Driven Model for Intelligent Monitoring of Cloud Datacenters. IDC 2013: 87-92 - [c2]Daniel Tovarnák
, Andrea Vaekova, Svatopluk Novak, Tomás Pitner
:
Structured and Interoperable Logging for the Cloud Computing Era: The Pitfalls and Benefits. UCC 2013: 91-98 - 2012
- [c1]Daniel Tovarnák, Tomás Pitner
:
Towards Multi-tenant and Interoperable Monitoring of Virtual Machines in Cloud. SYNASC 2012: 436-442
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint