Přístupnostní navigace
E-application
Search Search Close
doc. Dr. Ing.
FIT – Dean
+420 54114 1150, +420 54114 1216dean@fit.vut.cz
Send BUT message
2024
FIRC, A.; MALINKA, K.; HANÁČEK, P. Diffuse or Confuse: A Diffusion Deepfake Speech Dataset. Darmstadt: GI - Group for computer science, 2024. p. 0-0. Detail | WWW
2023
FIRC, A.; MALINKA, K.; HANÁČEK, P. Deepfakes as a threat to a speaker and facial recognition: an overview of tools and attack vectors. Heliyon, 2023, vol. 9, no. 4, p. 1-33. ISSN: 2405-8440.Detail | WWW
MALINKA, K.; FIRC, A.; HANÁČEK, P. Deepfakes a lidé: dokážeme ještě rozlišit pravou řeč od umělé?. DSM Data Security Management, 2023, vol. 2023, no. 04, p. 22-26. ISSN: 1211-8737.Detail | WWW
FIRC, A.; MALINKA, K.; HANÁČEK, P. Deepfakes: Bezpečnostní výzva pro naše uši. DSM Data Security Management, 2023, vol. 2023, no. 02, p. 41-44. ISSN: 1211-8737.Detail | WWW
HUJŇÁK, O.; MALINKA, K.; HANÁČEK, P. Indirect Bluetooth Low Energy Connection Detection. In 2023 International Conference on Information Networking (ICOIN). Bangkok: Institute of Electrical and Electronics Engineers, 2023. p. 328-333. ISBN: 978-1-6654-6268-6.Detail | WWW
DRGA, J.; HOMOLIAK, I.; VANČO, J.; PEREŠÍNI, M.; HANÁČEK, P.; VASILAKOS, A. Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. In 2023 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Dubai: Institute of Electrical and Electronics Engineers, 2023. p. 1-4. ISBN: 979-8-3503-1019-1.Detail
2022
HUJŇÁK, O.; MALINKA, K.; HANÁČEK, P. E-Banking Authentication - Dynamic Password Generators and Hardware Tokens. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. p. 211-221. ISBN: 978-80-86583-34-1.Detail | WWW
FIRC, A.; MALINKA, K.; HANÁČEK, P. Deepfakes: A Dangerous Entertainment?. Recenzovaný sborník příspěvků mezinárodní vědecké konference MMK2022. Hradec Králové: Akademické sdružení MAGNANIMITAS Assn., 2022. p. 1073-1082. ISBN: 978-80-87952-37-5.Detail
FIRC, A.; MALINKA, K.; HANÁČEK, P. Creation and detection of malicious synthetic media - a preliminary survey on deepfakes. Sborník příspevků z 54. konference EurOpen.CZ, 28.5.-1.6.2022. Radešín: Czech Open Systems User's Group, 2022. p. 125-145. ISBN: 978-80-86583-34-1.Detail | WWW
MALINKA, K.; HUJŇÁK, O.; HANÁČEK, P.; HELLEBRANDT, L. E-Banking Security Study - 10 years later. IEEE Access, 2022, vol. 2022, no. 10, p. 16681-16699. ISSN: 2169-3536.Detail | WWW
2020
OČENÁŠ, M.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Security and Encryption at Modern Databases. In ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy. Nanjing: Association for Computing Machinery, 2020. p. 19-23. ISBN: 978-1-4503-7744-7.Detail | WWW
HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access, 2020, vol. 8, no. 6, p. 112427-112453. ISSN: 2169-3536.Detail | WWW
2019
HELLEBRANDT, L.; HOMOLIAK, I.; MALINKA, K.; HANÁČEK, P. Increasing Trust in Tor Node List Using Blockchain. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). Soul: Institute of Electrical and Electronics Engineers, 2019. p. 29-32. ISBN: 978-1-7281-1328-9.Detail
2018
HOMOLIAK, I.; TEKNŐS, M.; BREITENBACHER, D.; HANÁČEK, P. Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Transactions on Security and Safety, 2018, vol. 5, no. 17, p. 1-15. ISSN: 2032-9393.Detail | WWW
2017
HOMOLIAK, I.; TEKNŐS, M.; BARABAS, M.; HANÁČEK, P. Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. In Proceedings of 12th International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Guangzhou: Springer International Publishing, 2017. p. 770-773. ISBN: 978-3-319-59607-5.Detail | WWW
HOMOLIAK, I.; BREITENBACHER, D.; HANÁČEK, P. Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. Journal of Computers, 2017, vol. 12, no. 2, p. 143-155. ISSN: 1796-203X.Detail | WWW
HELLEBRANDT, L.; HUJŇÁK, O.; HANÁČEK, P.; HOMOLIAK, I. Survey of Privacy Enabling Strategies in IoT Networks. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence. Jakarta: Association for Computing Machinery, 2017. p. 216-221. ISBN: 978-1-4503-5392-2.Detail | WWW
HOMOLIAK, I.; ŠULÁK, L.; HANÁČEK, P. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Jeju Island: Springer International Publishing, 2017. p. 66-78. ISBN: 978-3-319-56549-1. ISSN: 0302-9743.Detail | WWW
2016
BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, 2016, vol. 14, no. 3, p. 51-58. ISSN: 1690-4524.Detail | WWW
ARON, L.; HANÁČEK, P. Mobile Security for Banking on Android Platform. Proceedings of the International Conference on Computing Technology, Information Security and Risk Management. Dubai: The Society of Digital Information and Wireless Communications, 2016. p. 7-14. ISBN: 978-1-941968-31-4.Detail | WWW
BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. Journal on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. Orlando: The International Institute of Informatics and Systemics, 2016. p. 55-62. ISBN: 978-1-941763-47-6. ISSN: 1690-4524.Detail | WWW
SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016. p. 305-312. ISBN: 978-1-5090-1072-1.Detail | WWW
ARON, L.; HANÁČEK, P. A Concept of Dynamic Permission Mechanism on Android. In Progress in Applied Mathematics in Science and Engineering Proceedings. Bali, Indonesia: American Institute of Physics, 2016. p. 22-30. ISBN: 978-0-7354-1352-8.Detail | WWW
HENZL, M.; HANÁČEK, P. A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards. Radioengineering, 2016, vol. 2016, no. 1, p. 132-139. ISSN: 1210-2512.Detail
ARON, L.; HANÁČEK, P. Dynamic Permission Mechanism on Android. Journal of Software, 2016, vol. 2016, no. 12, p. 1124-1230. ISSN: 1796-217X.Detail | WWW
2015
IAREMKO, I.; ARON, L.; HANÁČEK, P. Improving IP Geolocation Using Network Measurement Characteristics. HKICEAS. Hong Kong: Higher Education Forum, 2015. p. 210-220. ISBN: 978-986-87417-4-4.Detail | WWW
ARON, L.; HANÁČEK, P. Introduction to Android 5 Security. In Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015. The 41st International Conference on Current Trends in Theory and Practice of Computer Science. Pec pod Snezkou: CEUR-WS.org, 2015. p. 103-111. ISBN: 978-80-87136-20-1.Detail | WWW
DRAHANSKÝ, M.; HANÁČEK, P.; ZBOŘIL, F.; HENZL, M.; ZBOŘIL, F.; YIM, J.; SHIM, K. Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks. In Improving Information Security Practices through Computational Intelligence. Washington: IGI Global, 2015. p. 198-227. ISBN: 978-1-4666-9426-2.Detail | WWW
BREITENBACHER, D.; HOMOLIAK, I.; HANÁČEK, P. Parallelized Self-Initializing Quadratic Sieve using OpenMP. Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015. p. 39-40. ISBN: 978-80-904257-7-4.Detail
ARON, L.; HANÁČEK, P. Overview of security on mobile devices. In The 2nd IEEE World Symposium on Web Application and Networking (WSWAN'2015). Sousse: N&N Global Technology, 2015. p. 2-16. ISBN: 978-9938-9563-3-7.Detail | WWW
SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. Santa's Crypto Get-Together 2015. Praha: TNS, 2015. p. 43-44. ISBN: 978-80-904257-7-4.Detail
2014
HOMOLIAK, I.; OVŠONKA, D.; KORANDA, K.; HANÁČEK, P. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014. p. 188-193. ISBN: 978-1-4799-3531-4.Detail | WWW
ANTAL, L.; BARABAS, M.; HANÁČEK, P. Kompromitace dat pomocí SQL Injection, část I. DSM Data Security Management, 2014, vol. 18, no. 1, p. 36-39. ISSN: 1211-8737.Detail | WWW
HOMOLIAK, I.; OVŠONKA, D.; GRÉGR, M.; HANÁČEK, P. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014. p. 310-317. ISBN: 978-1-908320-40-7.Detail | WWW
ANTAL, L.; BARABAS, M.; HANÁČEK, P. Kompromitace dat pomocí SQL Injection, část II. DSM Data Security Management, 2014, vol. 18, no. 2, p. 32-35. ISSN: 1211-8737.Detail | WWW
ANTAL, L.; BARABAS, M.; HANÁČEK, P. Kompromitace dat pomocí SQL Injection, část III. DSM Data Security Management, 2014, vol. 18, no. 3, p. 25-29. ISSN: 1211-8737.Detail | WWW
KAČIC, M.; OVŠONKA, D.; BARABAS, M.; HANÁČEK, P. Traffic generator based on behavioral pattern. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for. London: IEEE Computer Society, 2014. p. 229-233. ISBN: 978-1-908320-40-7.Detail | WWW
HENZL, M.; HANÁČEK, P.; KAČIC, M. Preventing Real-world Relay Attacks on Contactless Devices. In International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Rome: IEEE Computer Society, 2014. p. 376-381. ISBN: 978-1-4799-3531-4.Detail
HENZL, M.; BARABAS, M.; JANČA, R.; HANÁČEK, P. Bezpečnost bezkontaktních platebních karet. DSM Data Security Management, 2014, vol. 28, no. 2, p. 41-43. ISSN: 1211-8737.Detail
2013
HENZL, M.; HANÁČEK, P. Modeling of Contactless Smart Card Protocols and Automated Vulnerability Finding. 2013 International Symposium on Biometrics and Security Technologies (ISBAST). Chengdu: IEEE Computer Society, 2013. p. 141-148. ISBN: 978-0-7695-5010-7.Detail
BARABAS, M.; HOMOLIAK, I.; DROZD, M.; HANÁČEK, P. Automated Malware Detection Based on Novel Network Behavioral Signatures. International Journal of Engineering and Technology, 2013, vol. 5, no. 2, p. 249-253. ISSN: 1793-8236.Detail | WWW
SEKANINA, L.; RŮŽIČKA, R.; VAŠÍČEK, Z.; ŠIMEK, V.; HANÁČEK, P. Implementing a Unique Chip ID on a Reconfigurable Polymorphic Circuit. Information Technology and Control, 2013, vol. 42, no. 1, p. 7-14. ISSN: 1392-124X.Detail | WWW
HOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. ASNM: Advanced Security Network Metrics for Attack Vector Description. Proceedings of the 2013 International Conference on Security & Management. Las Vegas: Computer Science Research, Education, and Applications Press, 2013. p. 350-358. ISBN: 1-60132-259-3.Detail | WWW
JURNEČKA, P.; HANÁČEK, P.; KAČIC, M. Concept of parallel code generating and refactoring system for safety standards compliance. Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Berlin: Institute of Electrical and Electronics Engineers, 2013. p. 630-635. ISBN: 978-1-4799-1426-5.Detail
KAČIC, M.; HANÁČEK, P.; HENZL, M.; HOMOLIAK, I. A Concept of Behavioral Reputation System in Wireless Networks. The 47th Annual International Carnahan Conference on Security Technology. Medellín: Institute of Electrical and Electronics Engineers, 2013. p. 86-90. ISBN: 978-958-8790-65-7.Detail | WWW
BARABAS, M.; HOMOLIAK, I.; HANÁČEK, P.; KAČIC, M. Detection of Network Buffer Overflow Attacks: A Case Study. The 47th Annual International Carnahan Conference on Security Technology. Mendellin: Institute of Electrical and Electronics Engineers, 2013. p. 128-131. ISBN: 978-958-8790-65-7.Detail | WWW
DRAHANSKÝ, M.; HANÁČEK, P.; ZBOŘIL, F.; ZBOŘIL, F.; BARABAS, M.; ANTAL, L. Threats in Networks using Agent and Biometric Systems. International Journal of Bio-Science and Bio-Technology, 2013, vol. 5, no. 3, p. 119-133. ISSN: 2233-7849.Detail | WWW
HOMOLIAK, I.; BARABAS, M.; CHMELAŘ, P.; DROZD, M.; HANÁČEK, P. Advanced Security Network Metrics. In Emerging Trends in ICT Security. Waltham: Elsevier Science, 2013. p. 187-202. ISBN: 978-0-12-411474-6.Detail | WWW
JURNEČKA, P.; HANÁČEK, P.; BARABAS, M.; HENZL, M.; KAČIC, M. A method for parallel software refactoring for safety standards compliance. In Resilience, Security & Risk in Transport. London: The Institution of Engineering and Technology, 2013. p. 42-48. ISBN: 978-1-84919-787-8.Detail
KAČIC, M.; HENZL, M.; JURNEČKA, P.; HANÁČEK, P. Malware injection in wireless networks. Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). Volume 1. Berlin: Institute of Electrical and Electronics Engineers, 2013. p. 483-487. ISBN: 978-1-4799-1426-5.Detail | WWW
JURNEČKA, P.; HANÁČEK, P.; BARABAS, M.; HENZL, M.; KAČIC, M. A method for parallel software refactoring for safety standards compliance. System Safety 2013 collection of papers. INT. CONF. ON SIMULATORS, (BRIGHTON, U.K.: SEP. 26-30, 1983), LONDON, U.K., INST. ELECTR. ENGRS., 1983, P.267-273. (CONF. Cardiff: The Institution of Engineering and Technology, 2013. p. 1-6. ISBN: 978-1-84919-777-9. ISSN: 0537-9989.Detail
2012
PROCHÁZKA, B.; DRAHANSKÝ, M.; HANÁČEK, P. Únos výpočetního toku v obsluze systémových volání na operačním systému Linux. IMEA 2012 Sborník příspěvků 12.ročníku doktorandské konference. Hradec Králové: Univerzita Hradec Králové, 2012. p. 19-24. ISBN: 978-80-7435-185-3.Detail
HORÁČEK, J.; ZBOŘIL, F.; HANÁČEK, P. Agent Aided Routing in Wireless Sensor Networks. Proceedings of CSE 2012 International Scientific Conference on Computer Science and Engineering. Košice: The University of Technology Košice, 2012. p. 119-126. ISBN: 978-80-8143-049-7.Detail
HENZL, M.; HANÁČEK, P.; JURNEČKA, P.; KAČIC, M. A Concept of Automated Vulnerability Search in Contactless Communication Applications. Proceedings 46th Annual IEEE International Carnahan Conference on Security Technology. Boston: Institute of Electrical and Electronics Engineers, 2012. p. 180-186. ISBN: 978-1-4673-4807-2.Detail
ŽÁK, J.; ZBOŘIL, F.; HANÁČEK, P. Jade Agents to Wireless Sensors: Case study. Proceedings of CSE 2012 International Scientific Conference on Computer Science and Engineering. Košice: The University of Technology Košice, 2012. p. 95-102. ISBN: 978-80-8143-049-7.Detail
ZBOŘIL, F.; DRAHANSKÝ, M.; HANÁČEK, P.; HORÁČEK, J. Security in Wireless Sensor Networks with Mobile Codes. In Threats, Countermeasures, and Advances in Applied Information Security. Hershey: IGI Global, 2012. p. 411-425. ISBN: 978-1-4666-0978-5.Detail | WWW
BARABAS, M.; DROZD, M.; HANÁČEK, P. Behavioral signature generation using shadow honeypot. World Academy of Science, Engineering and Technology, 2012, vol. 2012, no. 65, p. 829-833. ISSN: 2010-376X.Detail | WWW
MALINKA, K.; HANÁČEK, P. Computational Social Networks - Security and Privacy. In Computational Social Networks - Security and Privacy. London: Springer London, 2012. p. 311-340. ISBN: 978-1-4471-4050-4.Detail | WWW
2011
NAGY, J.; SCHÄFER, J.; ZADINA, M.; HANÁČEK, P. Návrh zabezpečeného monitorovacího systému v oblasti e-Health. Proceedings of the Annual Database conference Datakon 2011. Brno: Vysoké učení technické v Brně, 2011. p. 223-226. ISBN: 978-80-214-4329-7.Detail
KAČIC, M.; HANÁČEK, P. WPA2: Útoky z vnútra siete. DSM Data Security Management, 2011, vol. 15, no. 4, p. 30-33. ISSN: 1211-8737.Detail
HENZL, M.; HANÁČEK, P. NFC z pohledu bezpečnosti. DSM Data Security Management, 2011, vol. 15, no. 3, p. 0-0. ISSN: 1211-8737.Detail
MALINKA, K.; HANÁČEK, P.; TRZOS, M. Evaluation of Biometric Authentication Based on Visual Evoked Potentials. Proceedings 45th International Carnahan Conference on Security Technology. Piscataway: Institute of Electrical and Electronics Engineers, 2011. p. 13-19. ISBN: 978-1-4577-0901-2.Detail
DRAHANSKÝ, M.; ORSÁG, F.; DVOŘÁK, R.; HÁJEK, J.; VÁŇA, J.; HERMAN, D.; KNĚŽÍK, J.; MARVAN, A.; LODROVÁ, D.; DOLEŽEL, M.; HANÁČEK, P.; MRÁČEK, Š.; STRUŽKA, J. Biometrie. Brno: Computer Press, s.r.o, 2011. 294 p. ISBN: 978-80-254-8979-6.Detail
HANÁČEK, P.; HRUBÝ, M.; KOČÍ, R.; ZBOŘIL, F. Audiovizuální technika ve výuce. Sborník informatika 2011. Brno: Mendelova univerzita v Brně, 2011. p. 31-32. ISBN: 978-80-7375-520-1.Detail
HANÁČEK, P.; JURNEČKA, P. Využitie grafických kariet na útoky silou. DSM Data Security Management, 2011, vol. 15, no. 2, p. 10-13. ISSN: 1211-8737.Detail
ZADINA, M.; NAGY, J.; HANÁČEK, P. Zabezpečení bezdrátových sítí založených na protokolu IEEE 802.11 v aplikaci rozsáhlých distribučních sítí. Sborník příspěvků z 39. konference EurOpen.CZ, 2.-5. října 2011. Plzeň: Česká společnost uživatelů otevřených systémů EurOpen.CZ, 2011. p. 37-48. ISBN: 978-80-86583-22-8.Detail
SAMEK, J.; MALAČKA, O.; ZBOŘIL, F.; HANÁČEK, P. Multi-Agent Experimental Framework with Hierarchical Model of Trust in Contexts for Decision Making. Proceeding of the 2nd International Conference on Computer Modelling and Simulation. Brno: Department of Intelligent Systems FIT BUT, 2011. p. 128-136. ISBN: 978-80-214-4320-4.Detail
HANÁČEK, P.; ŠVENDA, P. Cryptography for (partially) Compromised Sensor Networks. Information Security Summit 2011. Praha: Tate International s.r.o., 2011. p. 103-109. ISBN: 978-80-86813-22-6.Detail
2010
HANÁČEK, P.; MALINKA, K.; SCHÄFER, J. E-Banking Security - Comparative Study. IEEE Aerospace and Electronic Systems Magazine, 2010, vol. 25, no. 1, p. 29-34. ISSN: 0885-8985.Detail | WWW
HANÁČEK, P.; DRAHANSKÝ, M.; ORSÁG, F. Angriffe auf sichere Hardwarelösungen. Die Datenschleuder, 2010, vol. 2010, no. 94, p. 12-14. ISSN: 0930-1054.Detail
HANÁČEK, P.; DRAHANSKÝ, M. Analyse sicherer Hardwarelösungen. DuD - Datenschutz und Datensicherheit, 2010, vol. 2010, no. 11, p. 766-770. ISSN: 1614-0702.Detail
PECHO, P.; HANÁČEK, P.; NAGY, J. Simulation and Evaluation of CTP and Secure-CTP Protocols. Radioengineering, 2010, vol. 2010, no. 1, p. 89-98. ISSN: 1210-2512.Detail
ZBOŘIL, F.; HANÁČEK, P.; HRUBÝ, M.; KOČÍ, R. Zapojení studentů do výzkumu. Informatika 2010. Brno: Mendelova univerzita v Brně, 2010. p. 139-140. ISBN: 978-80-7375-394-8.Detail
HANÁČEK, P.; ŠVENDA, P. Cryptographic Protocols in Wireless Sensor Networks. Sborník příspěvků MKB 2010. Bílovice nad Svitavou: TNS, 2010. p. 59-76. ISBN: 978-80-904257-1-2.Detail
DRAHANSKÝ, M.; ORSÁG, F.; HANÁČEK, P. Accelerometer Based Digital Video Stabilization for General Security Surveillance Systems. International Journal of Security and Its Applications, 2010, vol. 2010, no. 1, p. 1-10. ISSN: 1738-9976.Detail
2009
PECHO, P.; NAGY, J.; HANÁČEK, P.; DRAHANSKÝ, M. Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors. In Proceedings of International Conference SecTech 2009. Communications in Computer and Information Science 58. Berlin: Springer Verlag, 2009. p. 217-224. ISBN: 978-3-642-10846-4.Detail
SCHÄFER, J.; MALINKA, K.; HANÁČEK, P. Peer-to-peer Networks: Security Analysis. International Journal On Advances in Security., 2009, vol. 2009, no. 1, p. 53-61. ISSN: 1942-2636.Detail
PECHO, P.; ZBOŘIL, F.; DRAHANSKÝ, M.; HANÁČEK, P. Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols. Journal of Universal Computer Science, 2009, vol. 15, no. 6, p. 992-1006. ISSN: 0948-6968.Detail | WWW
DRAHANSKÝ, M.; ORSÁG, F.; HANÁČEK, P. Securing of Communication in GSM Networks. Proceedings of NGWS2009. Melbourne: Lambert Academic Publishing, 2009. p. 30-36. ISBN: 978-3-8383-5346-3.Detail
HRUBÝ, M.; HANÁČEK, P.; ZBOŘIL, F. Nové obory v magisterském studijním programu na FIT VUT v Brně. Informatika 2009. Brno: Konvoj, 2009. p. 128-129. ISBN: 978-80-7302-152-8.Detail
PECHO, P.; HANÁČEK, P.; NAGY, J. Power Consumption of Hardware Cryptography Platform for Wireless Sensor. Proceedings of International Conference on Parallel and Distributed Computing. Higashu Hiroshima: IEEE Computer Society, 2009. p. 79-84. ISBN: 978-0-7695-3914-0.Detail | WWW
DRAHANSKÝ, M.; ORSÁG, F.; HANÁČEK, P. Accelerometer Based Digital Video Stabilization for Security Surveillance Systems. In Proceedings of International Conference SecTech 2009. Communications in Computer and Information Science 58. Berlin: Springer Verlag, 2009. p. 225-233. ISBN: 978-3-642-10846-4.Detail
2008
MATYÁŠ, V.; KRHOVJÁK, J.; LORENC, V.; KUMPOŠT, M.; ŘÍHA, Z.; CVRČEK, D.; STAUDEK, J.; HOLER, V.; MALINKA, K.; ŠVENDA, P.; HANÁČEK, P. Autentizace elektronických transakcí a autorizace dat i uživatelů. Brno: Masarykova universita, 2008. p. 0-0. ISBN: 978-80-210-4556-9.Detail
ENDRYS, B.; HANÁČEK, P. Trust in Security of Identification Devices - Feeling of Unity. Information Security Summit IS2 2008. Praha: Tate International s.r.o., 2008. p. 43-50. ISBN: 978-80-86813-15-8.Detail | WWW
SCHÄFER, J.; MALINKA, K.; HANÁČEK, P. Peer-to-peer networks security. The Third International Conference on Internet Monitoring and Protection. Bucharest: IEEE Computer Society, 2008. p. 13-13. ISBN: 978-0-7695-3189-2.Detail | WWW
HANÁČEK, P.; MALINKA, K.; SCHÄFER, J. E-Banking Security - Comparative Study. Proceedings ICCST 2008. Prague: IEEE Computer Society, 2008. p. 326-330. ISBN: 978-1-4244-1816-9.Detail
SCHÄFER, J.; MALINKA, K.; HANÁČEK, P. Malware Spreading Models in Peer-to-peer Networks. Proceedings ICCST 2008. Praha: IEEE Computer Society, 2008. p. 339-345. ISBN: 978-1-4244-1816-9.Detail
2007
HANÁČEK, P. In Security 2007. Praha: 2007. p. 18-22. Detail
MATYÁŠ, V.; KRHOVJÁK, J.; LORENC, V.; KUMPOŠT, M.; ŘÍHA, Z.; CVRČEK, D.; STAUDEK, J.; HOLER, V.; MALINKA, K.; ŠVENDA, P.; HANÁČEK, P. Autentizace uživatelů a autorizace elektronických transakcí. Příručka manažera VIII. Příručka manažera VIII. Praha: Tate International s.r.o., 2007. 318 p. ISBN: 978-80-86813-14-1.Detail
2006
RÁBOVÁ, Z.; HANÁČEK, P.; HRUBÝ, M. Prostředí pro modelování bezpečných systémů. In Proceedings of NETSS06. Ostrava: MARQ, 2006. p. 39-42. ISBN: 80-86840-06- 9.Detail
HANÁČEK, P. Bezpečnost informačních systémů a chyby při návrhu - jsme schopni jim zabránit?. In Sborník příspěvků MKB06. Brno: TNS, a.s., 2006. p. 89-94. ISBN: 978-80-903083-7- 4.Detail
2005
HANÁČEK, P. Problems of Security in Ad Hoc Sensor Network. In Proceedings of MOSIS' 05. Ostrava: 2005. p. 79-84. ISBN: 80-86840-10- 7.Detail
RÁBOVÁ, Z., HANÁČEK, P., HRUBÝ, M. Heterogeneous Modelling Applied in System Security. In Proceedings of the International Workshop MOSMIC' 2005. Žilina: Faculty of management science and Informatics of Zilina University, 2005. p. 30-36. ISBN: 80-8070-139- 3.Detail
HANÁČEK, P., STAUDEK, J. Správa identity. In Sborník konference DATAKON 2005. Brno: Masarykova universita, 2005. p. 123-146. ISBN: 80-210-3813- 6.Detail
HANÁČEK, P., PERINGER, P., RÁBOVÁ, Z. Získávání vstupních dat pro modely bezpečnosti. In Proceedings of ASIS 2005. Ostrava: MARQ, 2005. p. 68-73. ISBN: 80-86840-16- 6.Detail
2004
FLORIÁN, V.; HANÁČEK, P.; SLAVÍČEK, P. Analysing methods for modelling attacks on security devices. Proceedings of 38th International Conference MOSIS'04. Ostrava: 2004. p. 261-265. ISBN: 80-85988-98-4.Detail
PERINGER, P., HANÁČEK, P., RÁBOVÁ, Z. Analýza simulačních dat získaných z kryptografického modulu. In Proceedings of ASIS 2004. Ostrava: MARQ, 2004. p. 66 ( p.)ISBN: 80-86840- 03.Detail
HANÁČEK, P. Testování čipových karet a standardy bezpečnosti. In Sborník konference SmartWorld 2004. Zlín: 2004.Detail
HANÁČEK, P.; ZBOŘIL, F.; ZBOŘIL, F. Bezpečná komunikace autonomních agentů-robotů v nepřátelském prostředí. NETSS2004. Ostrava: MARQ, 2004. p. 91-95. ISBN: 80-85988-92-5.Detail
HANÁČEK, P. Informační systémy podle norem ISO. e-biz, 2004, vol. 2004, no. 2, p. 57-58. ISSN: 1213-063X.Detail
HANÁČEK, P.; LASOŇ, M. Securing Web Services. Proceedings of ISIM04 - Tutorial. Ostrava: 2004. p. 1-20. ISBN: 80-86840-01-8.Detail
RÁBOVÁ, Z.; HANÁČEK, P.; PERINGER, P. Využití modelů při analýze bezpečnosti kryptografických modulů. NETSS2004. Ostrava: MARQ, 2004. p. 115-120. ISBN: 80-85988-92-5.Detail
2003
HANÁČEK, P.; MATYÁŠ, V. Čipové karty v informačních systémech. Sborník konference Datakon 2003. Brno: Masarykova universita, 2003. p. 15-22. ISBN: 80-210-3215-4.Detail | WWW
HANÁČEK, P. Kritéria hodnocení bezpečnosti informačních systémů, habilitační práce. Brno: Fakulta informačních technologií VUT v Brně, 2003. p. 0-0. Detail | WWW
HANÁČEK, P.; RÁBOVÁ, Z.; ZBOŘIL, F. Model okolního prostředí mobilního robota. MOSMIC'2003. Žilina: Vydavatelství Žilinské univerzity, 2003. p. 25-30. ISBN: 80-8070-139-3.Detail
HANÁČEK, P.; RÁBOVÁ, Z. Systémy IDS a mobilní inteligentní agenti. Proceedings of ASIS 2003. Ostrava: MARQ, 2003. p. 9-13. ISBN: 80-85988-88-7.Detail
2002
HANÁČEK, P.; RÁBOVÁ, Z. Využití modelů při analýze rizik. Proceedings of ASIS 2002. Ostrava: MARQ, 2002. p. 9-16. ISBN: 80-85988-77-1.Detail
HANÁČEK, P. Bezpečnost mobilních zařízení ve světle nových aplikací. In Sborník konference Security 2002. Praha: 2002. p. 39-46. Detail
HANÁČEK, P. Hodnocení bezpečnosti IT podle normy ISO/IEC 15408. Sborník konference Informační bezpečnost - teorie a praxe. Brno: 2002. p. 0-0. Detail
HANÁČEK, P. Elektronický podpis a PKI v platebních systémech. Sborník konference Bezpečnosť informácií vo finančnom sektore. Žilina: NMC, 2002. p. 21-26. ISBN: 80-85655-20-9.Detail
HANÁČEK, P. Bezpečnost čipových karet proti útokům. Sborník konference SmartWorld 2002. Zlín: 2002. p. 0-0. Detail
HANÁČEK, P. Zabezpečení elektronických transakcí v prostředí internetu. Sborník konference Trendy IT Security. Praha: 2002. p. 0-0. Detail
2001
HANÁČEK, P.; RÁBOVÁ, Z. Využití modelování v analýze rizik. Proceedings of the 23rd International Autumn Colloquium ASIS 2001. Ostrava: MARQ, 2001. p. 9-16. ISBN: 80-85988-61-5.Detail
HANÁČEK, P.; ZBOŘIL, F. Risk Management in the Process of Risk Analysis. Proceedings of the 35th Spring International Conference MOSIS'01. Ostrava: 2001. p. 351-356. ISBN: 80-85988-57-7.Detail
HANÁČEK, P. Bezpečnost transakcí na internetu. Moderní databáze. Praha: KOMIX s.r.o., 2001. p. 76-83. ISBN: 80-238-7046-7.Detail
HANÁČEK, P.; STAUDEK, J. Certifikační infrastruktury veřejných klíčů. Proceedings of DATAKON 2001. Brno: Fakulta elektrotechniky a informatiky Slovenskej technickej univerzity v Bratislave, 2001. p. 1-44. ISBN: 80-227-1597-2.Detail
1996
AUBRECHT, V., GROSS, B., HANÁČEK, P., PEŠKA, L. Digital image processing in high power engineering. In Proc. of Int. Conf. on Digital Image Processing - DIPS 96. University of South Bohemia, České Budějovice, Czech Republic: 1996. p. 59 ( p.)ISBN: 80-7040-155- 9.Detail
*) Publications are generated once a 24 hours.