Přístupnostní navigace
E-application
Search Search Close
Project detail
Duration: 01.01.2014 — 31.12.2016
Funding resources
Brno University of Technology - Vnitřní projekty VUT
- whole funder (2014-01-01 - 2015-12-31)
On the project
Podstatou projektu je výzkum v oblasti spolehlivosti a bezpečnosti v informačních technologiích (IT). Projekt přitom zahrnuje jak vývoj nových technik vedoucích na spolehlivější a bezpečnější IT, tak i vývoj technik, které využívají IT k lepšímu zabezpečení současné společnosti před nejrůznějšími hrozbami, jimž musí čelit. Za tímto účelem projekt integruje zaměstnance a doktorandy z Ústavu inteligentních systémů FIT VUT v Brně, kteří svým výzkumem pokrývají oba klíčové směry projektu.
Mark
FIT-S-14-2486
Default language
Czech
People responsible
Antal Lukáš, Ing. - fellow researcherAron Lukáš, Ing., Ph.D. - fellow researcherBarabas Maroš, Ing., Ph.D. - fellow researcherČeška Milan, prof. RNDr., CSc. - fellow researcherDoležel Michal, Ing. - fellow researcherDrahanský Martin, prof. Ing., Ph.D. - fellow researcherDrozd Michal, Ing. - fellow researcherDrozdová Martina, Ing. - fellow researcherDudka Kamil, Ing. - fellow researcherDudka Vendula, Ing. - fellow researcherDvořák Radim, Ing., Ph.D. - fellow researcherFajkus Jan, Ing. - fellow researcherFiedor Jan, Ing., Ph.D. - fellow researcherHájek Josef, Ing., Ph.D. - fellow researcherHanáček Petr, doc. Dr. Ing. - fellow researcherHenzl Martin, Ing. Mgr., Ph.D. - fellow researcherHolík Lukáš, doc. Mgr., Ph.D. - fellow researcherHomoliak Ivan, doc. Ing., Ph.D. - fellow researcherHoráček Jan, Ing. - fellow researcherHrubý Martin, Ing., Ph.D. - fellow researcherHumená Patrícia, Ing. - fellow researcherChaloupka Jan, Ing. - fellow researcherCharvát Lukáš, Ing., Ph.D. - fellow researcherJanča Radim, Mgr. - fellow researcherJanoušek Vladimír, doc. Ing., Ph.D. - fellow researcherJurnečka Peter, Ing., Ph.D. - fellow researcherKačic Matej, Ing., Ph.D. - fellow researcherKalmár Róbert, Ing. - fellow researcherKlubal Ondřej, Ing. - fellow researcherKocina Filip, Ing., Ph.D. - fellow researcherKočí Radek, Ing., Ph.D. - fellow researcherKopřiva Jan, Ing. et Ing., Ph.D. - fellow researcherKoranda Karel, Ing. - fellow researcherKošík Michal, Ing. - fellow researcherKrál Jiří, Ing. - fellow researcherKřena Bohuslav, Ing., Ph.D. - fellow researcherKunovský Jiří, doc. Ing., CSc. - fellow researcherKupková Karolína, Ing. - fellow researcherLengál Ondřej, Ing., Ph.D. - fellow researcherLetko Zdeněk, Ing., Ph.D. - fellow researcherLuža Radim, Ing. - fellow researcherMalčík Dominik, Ing., Ph.D. - fellow researcherMalinka Kamil, Mgr., Ph.D. - fellow researcherMartinkovičová Alžbeta, Mgr. - fellow researcherMarvan Aleš, Ing. - fellow researcherMelo Jakub, Ing. - fellow researcherMráček Štěpán, Ing., Ph.D. - fellow researcherMüller Petr, Ing. - fellow researcherNagy Jan, Ing. - fellow researcherNahhas Ibrahim, Ing. - fellow researcherNovosad Petr, Ing. - fellow researcherNovotný Tomáš, Ing. - fellow researcherOrság Filip, Ing., Ph.D. - fellow researcherOvšonka Daniel, Ing. - fellow researcherPeringer Petr, Dr. Ing. - fellow researcherPolášek Petr, Ing., Ph.D. - fellow researcherProcházka Boris, Ing. - fellow researcherRichta Tomáš, Ing., Ph.D. - fellow researcherRogalewicz Adam, doc. Mgr., Ph.D. - fellow researcherRozman Jaroslav, Ing., Ph.D. - fellow researcherSamek Jan, Ing., Ph.D. - fellow researcherSmolík Jakub, Ing. - fellow researcherSmrčka Aleš, Ing., Ph.D. - fellow researcherSnášelová Petra, Ing. - fellow researcherŠátek Václav, Ing., Ph.D. - fellow researcherŠimková Hana, Mgr. Bc., Ph.D. - fellow researcherValenta Václav, Ing., Ph.D. - fellow researcherVáňa Jan, Ing. - fellow researcherWinklerová Zdenka, Ing., Ph.D. - fellow researcherZbořil František, doc. Ing., CSc. - fellow researcherZbořil František, doc. Ing., Ph.D. - fellow researcherŽák Jakub, Ing. - fellow researcherVojnar Tomáš, prof. Ing., Ph.D. - principal person responsible
Units
Department of Intelligent Systems- internal (2014-01-01 - 2016-12-31)Faculty of Information Technology- beneficiary (2014-01-01 - 2016-12-31)
Results
HOMOLIAK, I.; OVŠONKA, D.; KORANDA, K.; HANÁČEK, P. Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic. In International Carnahan Conference on Security Technology. 48th Annual International Carnahan Conference on Security Technology. Řím: IEEE Computer Society, 2014. p. 188-193. ISBN: 978-1-4799-3531-4.Detail
LUŽA, R.; ZBOŘIL, F. Detection of mechanical play of revolute robot joint. In ICINCO 2014 Proceedings of the 11th International Conference on Informatics in Control, Automation and Robotics Volume 2. Vídeň: Department of Intelligent Systems FIT BUT, 2014. p. 327-332. ISBN: 978-989-758-040-6.Detail
KUNOVSKÝ, J.; ŠÁTEK, V.; KOCINA, F.; NEČASOVÁ, G.; MAREK, M.; SCHIRRER, A. New Trends in Taylor Series Based Computations. In 12th International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2015. p. 1-4. ISBN: 978-0-7354-1287-3. ISSN: 0094-243X.Detail
KRÁL, J.; ZBOŘIL, F.; ZBOŘIL, F. Handling Multiple Intentions Using Action Heuristics. In Proceedings of the 2014 International Conference on Intelligent Systems Design and Applications. Okinawa: Institute of Electrical and Electronics Engineers, 2014. p. 56-61. ISBN: 978-1-4799-7938-7.Detail
DUDKA, K.; PERINGER, P.; VOJNAR, T. Predator: A Shape Analyzer Based on Symbolic Memory Graphs (Competition Contribution). In Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2014. p. 412-414. ISBN: 978-3-642-54861-1.Detail
MARHEFKA, M.; MÜLLER, P. Dfuzzer: A D-Bus Service Fuzzing Tool. In Proceedings of IEEE Seventh International Conference on Software Testing, Verification and Validation Workshopsn. Cleveland: IEEE Computer Society, 2014. p. 383-389. ISBN: 978-0-7695-5194-4.Detail
KUNOVSKÝ, J.; ŠÁTEK, V.; VALDMAN, J.; VALENTA, V. Construction of P1 Gradient from P0 Gradient by Averaging. In 12th International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2015. p. 1-4. ISBN: 978-0-7354-1287-3. ISSN: 0094-243X.Detail
CHALOUPKA, J.; KUNOVSKÝ, J.; MARTINKOVIČOVÁ, A.; ŠÁTEK, V.; THONHOFER, E. Multiple Integral Computations Using Taylor Series. In 12th International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2015. p. 1-4. ISBN: 978-0-7354-1287-3. ISSN: 0094-243X.Detail
POLÁŠEK, P.; JANOUŠEK, V.; ČEŠKA, M. Petri Net Simulation as a Service. In CEUR Workshop Proceedings. CEUR Workshop Proceedings. Tunisia: CEUR-WS.org, 2014. p. 353-362. ISSN: 1613-0073.Detail
KOČÍ, R.; JANOUŠEK, V. Formal Models in Software Development and Deployment: A Case Study. International Journal on Advances in Software, 2014, vol. 7, no. 1, p. 266-276. ISSN: 1942-2628.Detail
EASTWOOD, S.; SHMERKO, V.; YANUSHKEVICH, S.; DRAHANSKÝ, M. Biometric Intelligence in Automated Border Control Applications: From Talking Faces to Talking Robots. In Proceedings of IIAI 3rd International Conference on Advanced Applied Informatics. Kitakyushu: IEEE Computer Society, 2014. p. 763-768. ISBN: 978-1-4799-4174-2.Detail
KOČÍ, R.; JANOUŠEK, V. System Composition Using Petri Nets and DEVS Formalisms. The Ninth International Conference on Software Engineering Advances. Nice: Xpert Publishing Services, 2014. p. 309-315. ISBN: 978-1-61208-367-4.Detail
ENEA, C.; LENGÁL, O.; SIGHIREANU, M.; VOJNAR, T. Compositional Entailment Checking for a Fragment of Separation Logic. In Proceedings of APLAS'14. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2014. p. 314-333. ISBN: 978-3-319-12735-4.Detail
HOMOLIAK, I.; OVŠONKA, D.; GRÉGR, M.; HANÁČEK, P. NBA of Obfuscated Network Vulnerabilities' Exploitation Hidden into HTTPS Traffic. In Proceedings of International Conference for Internet Technology and Secured Transactions (ICITST-2014). London: IEEE Computer Society, 2014. p. 310-317. ISBN: 978-1-908320-40-7.Detail
DUDKA, V.; KŘENA, B.; LETKO, Z.; ŠIMKOVÁ, H.; VOJNAR, T. Multi-objective Genetic Optimization for Noise-Based Testing of Concurrent Software. In SSBSE'14. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2014. p. 107-122. ISBN: 978-3-319-09939-2.Detail
MRÁČEK, Š.; DRAHANSKÝ, M.; DVOŘÁK, R.; PROVAZNÍK, V.; VÁŇA, J. 3D Face Recognition on Low-Cost Depth Sensors. In Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG 2014). GI-Edition Lecture Notes in Informatics (LNI). Darmstadt: GI - Group for computer science, 2014. p. 195-202. ISBN: 978-3-88579-624-4. ISSN: 1617-5468.Detail
ŠIMKOVÁ, H.; LETKO, Z.; KŘENA, B.; VOJNAR, T.; DUDKA, V.; AVROS, R.; UR, S.; VOLKOVICH, Z. Boosted Decision Trees for Behaviour Mining of Concurrent Programs. Proceedings of MEMICS'14. Brno: NOVPRESS s.r.o., 2014. p. 15-27. ISBN: 978-80-214-5022-6.Detail
ROGALEWICZ, A.; VOJNAR, T.; IOSIF, R. Deciding Entailments in Inductive Separation Logic with Tree Automata. In Proceedings of ATVA'14. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2014. p. 201-218. ISBN: 978-3-319-11935-9.Detail
SAMEK, J.; MALAČKA, O.; ZBOŘIL, F.; ZBOŘIL, F. Decision Making and Partner Selection Based on Trust in Multi-context Environment. In Proceedings of the 2014 International Conference on Intelligent Systems Design and Applications (ISDA 2014). Okinawa: Institute of Electrical and Electronics Engineers, 2014. p. 19-24. ISBN: 978-1-4799-7938-7.Detail
ABDULLA, P.; HAZIZA, F.; HOLÍK, L. Block Me If You Can! Context-Sensitive Parameterized Verification. In 21st International Static Analysis Symposium. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2014. p. 1-17. ISBN: 978-3-319-10935-0. ISSN: 0302-9743.Detail
HOLÍK, L.; ABDULLA, P.; ATIG, M.; CHEN, Y.; RUMMER, P.; STENMAN, J. String Constraints for Verification. In 26th International Conference on Computer Aided Verification. Lecture Notes in Computer Science, Volume 8559. Berlin: Springer Verlag, 2014. p. 150-166. ISBN: 978-3-319-08866-2.Detail
LUŽA, R.; ROZMAN, J.; ZBOŘIL, F. ROS-based Remote Controlled Robotic Arm Workcell. In International Conference on Intelligent Systems Design and Applications, ISDA. Okinawa: Institute of Electrical and Electronics Engineers, 2015. p. 101-106. ISBN: 978-1-4799-7938-7.Detail
ŽÁK, J.; ZBOŘIL, F. JESTER Methodology: A Wood of Fire Case Study. In Proceedings of ISDA 2014. Okinawa: Institute of Electrical and Electronics Engineers, 2014. p. 1-6. ISBN: 978-1-4799-7938-7.Detail
HOLÍK, L.; VOJNAR, T.; ABDULLA, P.; CHEN, Y. Mediating for reduction (on minimizing alternating Buchi automata). Theoretical Computer Science, 2014, vol. 2014, no. 552, p. 26-43. ISSN: 0304-3975.Detail
DRAHANSKÝ, M. Biometrické systémy v praxi. Dolní Morava: 2014. s. 0-0.Detail
KAČIC, M.; OVŠONKA, D.; BARABAS, M.; HANÁČEK, P. Traffic generator based on behavioral pattern. In Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for. London: IEEE Computer Society, 2014. p. 229-233. ISBN: 978-1-908320-40-7.Detail
FIEDOR, T. A Decision Procedure For The WSkS Logic. Saarbrücken: Lambert Academic Publishing, 2014. 60 p. ISBN: 978-3-659-63583-0.Detail
KANICH, O. Fingerprint Damage Simulation. Saarbrücken: Lambert Academic Publishing, 2014. 68 p. ISBN: 978-3-659-63942-5.Detail
FIEDOR, J.; DUDKA, V.; KŘENA, B.; LETKO, Z.; UR, S.; VOJNAR, T. Advances in Noise-based Testing of Concurrent Programs. Software Testing Verification and Reliability, 2015, vol. 25, no. 3, p. 272-309. ISSN: 1099-1689.Detail
ARON, L.; HANÁČEK, P. A Concept of Dynamic Permission Mechanism on Android. In Progress in Applied Mathematics in Science and Engineering Proceedings. Bali, Indonesia: American Institute of Physics, 2016. p. 22-30. ISBN: 978-0-7354-1352-8.Detail
FIEDOR, J.; LETKO, Z.; LOURENCO, J.; VOJNAR, T. On Monitoring C/C++ Transactional Memory Programs. In Proceedings of MEMICS'14. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2015. p. 73-87. ISBN: 978-3-319-14895-3.Detail
ARON, L. Security Threats on Mobile Devices. In Handbook of Research on New Threats and Countermeasures in Digital Crime and Cyber Terrorism. St. Louis: IGI Global, 2015. p. 30-53. ISBN: 978-1-4666-8345-7.Detail
CHARVÁT, L.; SMRČKA, A.; VOJNAR, T. Using Formal Verification of Parameterized Systems in RAW Hazard Analysis in Microprocessors. In Proceedings of 15th International Workshop on Microprocessor Test and Verification (MTV 2014). Austin, TX: IEEE Computer Society, 2014. p. 83-89. ISBN: 978-1-4673-6858-2.Detail
NEČASOVÁ, G.; KUNOVSKÝ, J.; ŠÁTEK, V.; CHALOUPKA, J.; VEIGEND, P. Taylor Series Based Differential Formulas. In MATHMOD VIENNA 2015 - 8th Vienna Conference on Mathematical Modelling. ARGESIM REPORT No. 44. Vienna: ARGE Simulation News, 2015. p. 705-706. ISBN: 978-3-901608-46-9.Detail
CHARVÁT, L.; SMRČKA, A.; VOJNAR, T. Microprocessor Hazard Analysis via Formal Verification of Parameterized Systems. Proceedings of the 15th International Conference on Computer Aided Systems Theory (EUROCAST 2015). Las Palmas de Grand Canaria: The Universidad de Las Palmas de Gran Canaria, 2015. p. 193-194. ISBN: 978-84-606-5438-4.Detail
DALECKÝ, Š.; ZBOŘIL, F. An Approach to ANFIS Performance. In Advances in Intelligent Systems and Computing. Mendel 2015 Recent Advances in Soft Computing. Brno: 2015. p. 195-206. ISBN: 978-3-319-19823-1.Detail
SNÁŠELOVÁ, P.; ZBOŘIL, F. Genetic Algorithm using Theory of Chaos. Procedia Computer Science, 2015, vol. 2015, no. 51, p. 316-325. ISSN: 1877-0509.Detail
FIEDOR, T.; HOLÍK, L.; LENGÁL, O.; VOJNAR, T. Nested Antichains for WS1S. In Proceedings of TACAS'15. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2015. p. 658-674. ISBN: 978-3-662-46680-3.Detail
HRUŠKA, M.; LENGÁL, O.; ŠIMÁČEK, J.; VOJNAR, T.; HOLÍK, L.; ROGALEWICZ, A. Forester: Shape Analysis Using Tree Automata (Competition Contribution). In Proceedings of TACAS'15. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2015. p. 432-435. ISBN: 978-3-662-46680-3.Detail
ŠÁTEK, V.; KOCINA, F.; KUNOVSKÝ, J.; SCHIRRER, A. Taylor Series Based Solution of Linear ODE Systems and MATLAB Solvers Comparison. In MATHMOD VIENNA 2015 - 8th Vienna Conference on Mathematical Modelling. ARGESIM REPORT No. 44. Vienna: ARGE Simulation News, 2015. p. 693-694. ISBN: 978-3-901608-46-9.Detail
ARON, L.; HANÁČEK, P. Introduction to Android 5 Security. In Proceedings of Student Research Forum Papers and Posters at SOFSEM 2015. The 41st International Conference on Current Trends in Theory and Practice of Computer Science. Pec pod Snezkou: CEUR-WS.org, 2015. p. 103-111. ISBN: 978-80-87136-20-1.Detail
EASTWOOD, S.; SHMERKO, V.; YANUSHKEVICH, S.; DRAHANSKÝ, M.; GORODNICHY, D. Biometric-Enabled Authentication Machines: A Survey of Open-Set Real-World Applications. IEEE Transactions on Human-Machine Systems, 2016, vol. 46, no. 2, p. 231-242. ISSN: 2168-2291.Detail
VALENTA, V.; NEČASOVÁ, G.; KUNOVSKÝ, J.; ŠÁTEK, V.; KOCINA, F. Adaptive Solution of the Wave Equation. In Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications. Colmar: SciTePress - Science and Technology Publications, 2015. p. 154-162. ISBN: 978-989-758-120-5.Detail
CHALOUPKA, J.; KUNOVSKÝ, J.; ŠÁTEK, V.; VEIGEND, P.; MARTINKOVIČOVÁ, A. Numerical Integration of Multiple Integrals Using Taylor's Polynomial. In Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications. Colmar: SciTePress - Science and Technology Publications, 2015. p. 163-171. ISBN: 978-989-758-120-5.Detail
DRAHANSKÝ, M. Experiments with fingers, finger fakes and finger and hand veins. Gjovik: 2015. p. 1-32.Detail
SVOBODA, J.; BRONSTEIN, M.; DRAHANSKÝ, M. Contactless biometric hand geometry recognition using a low-cost 3D camera. In Proceedings 2015 International Conference on Biometrics. Phuket: IEEE Biometric Council, 2015. p. 452-457. ISBN: 978-1-4799-7824-3.Detail
ARON, L.; HANÁČEK, P. Overview of security on mobile devices. In The 2nd IEEE World Symposium on Web Application and Networking (WSWAN'2015). Sousse: N&N Global Technology, 2015. p. 2-16. ISBN: 978-9938-9563-3-7.Detail
KOLÁŘ, R.; SEMERÁD, L.; DRAHANSKÝ, M.; ODSTRČILÍK, J.; HÁJEK, J.; BOROVSKÝ, J. Bimodal Eye Imaging System for Biometric and Medical Applications. Security and Protection of Information 2015. Brno: University of Defence in Brno, 2015. p. 83-95. ISBN: 978-80-7231-997-8.Detail
DRAHANSKÝ, M.; KANICH, O. Vulnerabilities of Biometric Systems. Security and Protection of Information 2015. Brno: University of Defence in Brno, 2015. p. 53-60. ISBN: 978-80-7231-997-8.Detail
SPURNÝ, J.; KANICH, O.; DRAHANSKÝ, M.; DOLEŽEL, M.; SHINODA, K. New materials for spoofing touch-based fingerprint scanners. In Proceedings of International Conference on Computer Application Technologies 2015. Matsue: IEEE Computer Society, 2015. p. 207-211. ISBN: 978-1-4673-8211-3.Detail
SEMERÁD, L.; DRAHANSKÝ, M. Biometric entropy of retina. In Proceedings of Information and Digital Technologies 2015. Žilina: University of Žilina, 2015. p. 291-293. ISBN: 978-1-4673-7185-8.Detail
RICHTA, T.; JANOUŠEK, V.; KOČÍ, R. Dynamic Software Architecture for Distributed Embedded Control Systems. In PNSE 2015 Petri Nets and Software Engineering. CEUR Workshop Proceedings. CEUR Workshop Proceedings. Bruxelles: CEUR-WS.org, 2015. p. 133-150. ISSN: 1613-0073.Detail
HOLÍK, L.; LENGÁL, O.; VOJNAR, T.; JONSSON, B.; TRINH, Q.; ABDULLA, P. Verification of heap manipulating programs with ordered data by extended forest automata. Acta Informatica, 2015, vol. 53, no. 4, p. 357-385. ISSN: 0001-5903.Detail
YANUSHKEVICH, S.; EASTWOOD, S.; MANDERSON, T.; SAMOIL, S.; DRAHANSKÝ, M.; SHMERKO, V. Taxonomy and Modeling of Impersonation in e-Border Authentication. In Proceedings of EST 2015. Braunschweig: Technische Universität Braunschweig, 2015. p. 1-6. ISBN: 978-1-61208-427-5.Detail
KOČÍ, R.; JANOUŠEK, V. The Object Oriented Petri Net Component Model. The Tenth International Conference on Software Engineering Advances. Barcelona: Xpert Publishing Services, 2015. p. 18-24. ISBN: 978-1-61208-438-1.Detail
DRAHANSKÝ, M.; HANÁČEK, P.; ZBOŘIL, F.; HENZL, M.; ZBOŘIL, F.; YIM, J.; SHIM, K. Cryptomodules in Wireless Networks using Biometric Authentication: Securing Nodes in Wireless Networks. In Improving Information Security Practices through Computational Intelligence. Washington: IGI Global, 2015. p. 198-227. ISBN: 978-1-4666-9426-2.Detail
PERINGER, P.; MÜLLER, P.; VOJNAR, T. Predator Hunting Party (Competition Contribution). In Proceedings of TACAS'15. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2015. p. 443-446. ISBN: 978-3-662-46680-3.Detail
SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. Cryptanalysis of Symmetric Encryption Algorithm Using Symbolic Regression and Genetic Programming. Santa's Crypto Get-Together 2015. Praha: TNS, 2015. p. 43-44. ISBN: 978-80-904257-7-4.Detail
ŽÁK, M.; ROZMAN, J. Design, Construction and Control of Hexapod Walking Robot. In 2015 IEEE 13th International Scientific Conference on Informatics, INFORMATICS 2015 - Proceedings. Poprad: Faculty of Electrical Engineering and Informatics, University of Technology Košice, 2016. p. 302-307. ISBN: 978-1-4673-9867-1.Detail
IAREMKO, I.; ARON, L.; HANÁČEK, P. Improving IP Geolocation Using Network Measurement Characteristics. HKICEAS. Hong Kong: Higher Education Forum, 2015. p. 210-220. ISBN: 978-986-87417-4-4.Detail
ŽÁK, M.; ROZMAN, J.; ZBOŘIL, F. Overview of Bio-Inspired Control Mechanisms for Hexapod Robot. In International Conference on Intelligent Systems Design and Applications, ISDA. Marrakesh: Machine Intelligence Research Labs, 2016. p. 160-165. ISBN: 978-1-4673-8709-5.Detail
HÁJEK, J.; DRAHANSKÝ, M.; KOLÁŘ, R.; ODSTRČILÍK, J.; BOROVSKÝ, J. Bimodal eye imaging system. In Signal-Image Technology and Internet-Based Systems. Bangkok: Institute of Electrical and Electronics Engineers, 2015. p. 572-575. ISBN: 978-1-4673-9721-6.Detail
BREITENBACHER, D.; HOMOLIAK, I.; HANÁČEK, P. Parallelized Self-Initializing Quadratic Sieve using OpenMP. Santa's Crypto Get-Together 2015. Praha: Trusted Network Solutions, a.s., 2015. p. 39-40. ISBN: 978-80-904257-7-4.Detail
HOLÍK, L.; ISBERNER, M.; JONSSON, B. Mediator Synthesis in a Component Algebra with Data. In Correct System Design. Lecture Notes in Computer Science. Berlin: Springer Verlag, 2015. p. 238-259. ISBN: 978-3-319-23505-9.Detail
HOLÍK, L.; HAZIZA, F.; ABDULLA, P. View Abstraction - A Tutorial. In 2nd International Workshop on Synthesis of Complex Parameters. OpenAccess Series in Informatics (OASIcs). OpenAccess Series in Informatics. Dagstuhl: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2015. p. 1-15. ISBN: 978-3-939897-82-8. ISSN: 2190-6807.Detail
FIEDOR, J.; VOJNAR, T.; LETKO, Z.; LOURENCO, J. Dynamic Validation of Contracts in Concurrent Code. In Proceedings of EUROCAST'15. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2015. p. 555-564. ISBN: 978-3-319-27339-6.Detail
CHARVÁT, L.; SMRČKA, A.; VOJNAR, T. Microprocessor Hazard Analysis via Formal Verification of Parameterized Systems. In Computer Aided Systems Theory - EUROCAST 2015. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Zurich: Springer International Publishing, 2015. p. 605-614. ISBN: 978-3-319-27340-2. ISSN: 0302-9743.Detail
KOCINA, F.; ŠÁTEK, V.; VEIGEND, P.; NEČASOVÁ, G.; VALENTA, V.; KUNOVSKÝ, J. New Trends in Taylor Series Based Applications. In 13rd International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2015. p. 1-4. ISBN: 978-0-7354-1287-3. ISSN: 0094-243X.Detail
VEIGEND, P.; KUNOVSKÝ, J.; KOCINA, F.; NEČASOVÁ, G.; ŠÁTEK, V.; VALENTA, V. Electronic Representation of Wave Equation. In 13rd International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2015. p. 1-4. ISBN: 978-0-7354-1392-4. ISSN: 0094-243X.Detail
HOLÍK, L.; CHEN, Y.; REZINE, A.; RUMMER, P.; STENMAN, J.; ABDULLA, P.; ATIG, M. Norn: An SMT Solver for String Constraints. In Computer Aided Verification. Lecture Notes in Computer Science Volume 9206. Cham: Springer International Publishing, 2015. p. 462-469. ISBN: 978-3-319-21689-8.Detail
KUNOVSKÝ, J.; ŠÁTEK, V.; NEČASOVÁ, G.; VEIGEND, P.; KOCINA, F. The Positive Properties of Taylor Series Method. In Proceedings of the 13th International Conference Informatics' 2015. Poprad: Institute of Electrical and Electronics Engineers, 2015. p. 156-160. ISBN: 978-1-4673-9867-1.Detail
KOCINA, F.; VEIGEND, P.; NEČASOVÁ, G.; KUNOVSKÝ, J. Parallel Computations of Differential Equations. Proceedings of the 10th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science. Telč: Ing. Vladislav Pokorný - Litera, 2015. p. 28-35. ISBN: 978-80-214-5254-1.Detail
KUNOVSKÝ, J. Modern Taylor Series Method. In Proceedings of the 2015 IEEE 13th International Scientific Conference on Informatics, INFORMATICS 2015. Poprad: Institute of Electrical and Electronics Engineers, 2015. p. 1-8. ISBN: 978-1-4673-9867-1.Detail
DRAHANSKÝ, M.; KOLÁŘ, R.; MŇUK, T. Elektronické zařízení pro snímání obrazu sítnice a duhovky oka. Česká a slovenská oftalmologie, 2015, roč. 71, č. 6, s. 302-308. ISSN: 1211-9059.Detail
DRAHANSKÝ, M.; KANICH, O.; BŘEZINOVÁ, E.; SHINODA, K. Experiments with optical properties of skin on fingers. Journal on Systemics, Cybernetics and Informatics, 2016, vol. 2016, no. 2, p. 37-46. ISSN: 2168-5053.Detail
BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. In Proceedings of The 20th World Multi-Conference on Systemics, Cybernetics and Informatics. Journal on Systemics, Cybernetics and Informatics. WMSCI 2016 - 20th World Multi-Conference on Systemics, Cybernetics and Informatics, Proceedings. Orlando: The International Institute of Informatics and Systemics, 2016. p. 55-62. ISBN: 978-1-941763-47-6. ISSN: 1690-4524.Detail
ARON, L.; HANÁČEK, P. Mobile Security for Banking on Android Platform. Proceedings of the International Conference on Computing Technology, Information Security and Risk Management. Dubai: The Society of Digital Information and Wireless Communications, 2016. p. 7-14. ISBN: 978-1-941968-31-4.Detail
LUŽA, R.; DRAHANSKÝ, M.; ZBOŘIL, F. RUDA - Robot for Search for Human Beings in Debrits and Avalanches. In Proceedings of ISDA 2015. Marrakesh: Faculty of Information Technology, Czech Technical University, 2016. p. 1-6. ISBN: 978-1-4673-8712-5.Detail
LUŽA, R.; ZBOŘIL, F.; DRAHANSKÝ, M. High-level control of RUDA - the robot for rescuing people in debris and under avalanches. In ICCC. Tatranská Lomnica: The University of Technology Košice, 2016. p. 467-472. ISBN: 978-1-4673-8605-0.Detail
ŽÁK, M.; ROZMAN, J.; ZBOŘIL, F. Hexapod Robot: Test Platform for Bio-Inspired Controllers. In Proceedings of the 2016 17th International Carpathian Control Conference, ICCC 2016. Tatranská Lomnica: The University of Technology Košice, 2016. p. 819-824. ISBN: 978-1-4673-8606-7.Detail
ROGALEWICZ, A.; VOJNAR, T.; IOSIF, R. Abstraction Refinement and Antichains for Trace Inclusion of Infinite State Systems. In Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science. Heidelberg: Springer Verlag, 2016. p. 71-89. ISBN: 978-3-662-49673-2.Detail
DALECKÝ, Š.; SNÁŠELOVÁ, P.; LUŽA, R.; ŽÁK, M.; ROZMAN, J.; ZBOŘIL, F. SmartMowers as a Part of a SmartCity. In Proceedings of the 2016 17th International Carpathian Control Conference, ICCC 2016. Tatranská Lomnica: The University of Technology Košice, 2016. p. 156-160. ISBN: 978-1-4673-8606-7.Detail
HOLÍK, L.; MEYER, R.; WOLF, S.; HAZIZA, F. Pointer Race Freedom. In Verification, Model Checking, and Abstract Interpretation (VMCAI). Lecture Notes in Computer Science. Berlin: Springer Verlag, 2016. p. 393-412. ISBN: 978-3-662-49121-8.Detail
LUŽA, R.; DRAHANSKÝ, M.; ZBOŘIL, F. Localization of rescue robot in hybrid environment. ICCITR2016. Dubai: Higher Institute of Technological Studies, 2016. p. 1-4. ISBN: 978-9973-9816-2-2.Detail
ŽÁK, M.; ROZMAN, J.; ZBOŘIL, F. Overview of Bio-Inspired Control Mechanisms for Hexapod Robot. International Journal of Computer Information Systems and Industrial Management Applications, 2016, vol. 2016, no. 8, p. 125-134. ISSN: 2150-7988.Detail
HENZL, M.; HANÁČEK, P. A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards. Radioengineering, 2016, vol. 2016, no. 1, p. 132-139. ISSN: 1210-2512.Detail
KOČÍ, R.; JANOUŠEK, V. Modeling System Requirements Using Use Cases and Petri Nets. ThinkMind ICSEA 2016, The Eleventh International Conference on Software Engineering Advances. Řím: Xpert Publishing Services, 2016. p. 160-165. ISBN: 978-1-61208-498-5.Detail
PACURA, D.; DRAHANSKÝ, M. CUDA Accelerated Real-time Digital Image Stabilization in a Video Stream. International Journal of Software Engineering and Its Applications, 2016, vol. 10, no. 6, p. 113-124. ISSN: 1738-9984.Detail
BREITENBACHER, D.; HOMOLIAK, I.; JAROŠ, J.; HANÁČEK, P. Impact of Optimization and Parallelism on Factorization Speed of SIQS. Journal on Systemics, Cybernetics and Informatics, 2016, vol. 14, no. 3, p. 51-58. ISSN: 1690-4524.Detail
VANČO, M.; ARON, L. Dynamic Security Policy Enforcement on Android. International Journal of Security and Its Applications, 2016, vol. 2016, no. 10, p. 141-148. ISSN: 1738-9976.Detail
PERINGER, P.; ŠOKOVÁ, V.; TRTÍK, M.; VOJNAR, T.; HOLÍK, L.; KOTOUN, M. Predator Shape Analysis Tool Suite. In Proceedings of HVC 2016. Lecture Notes in Computer Science. Zurich: Springer International Publishing, 2016. p. 202-209. ISBN: 978-3-319-49052-6.Detail
KOCINA, F.; KUNOVSKÝ, J.; NEČASOVÁ, G.; ŠÁTEK, V.; VEIGEND, P. Parallel solution of higher order differential equations. In Proceedings of the 2016 International Conference on High Performance Computing & Simulation (HPCS 2016). Insbruck: Institute of Electrical and Electronics Engineers, 2016. p. 302-309. ISBN: 978-1-5090-2088-1.Detail
BAROTOVÁ, Š.; DRAHANSKÝ, M.; PERNICKÝ, R. Detection of Ridge Damages in Fingerprint Recognition Caused by Skin Diseases. International Journal of Signal Processing, Image Processing and Pattern Recognition, 2016, vol. 9, no. 11, p. 125-146. ISSN: 2005-4254.Detail
CHARVÁT, L.; SMRČKA, A.; VOJNAR, T. Hades: Microprocessor Hazard Analysis via Formal Verification of Parameterized Systems. In Proceedings 11th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science (MEMICS 2016). Electronic Proceedings in Theoretical Computer Science, EPTCS. Electronic Proceedings in Theoretical Computer Science. Brno: Faculty of Informatics MU, 2016. p. 87-93. ISBN: 978-80-210-8362-2. ISSN: 2075-2180.Detail
DRAHANSKÝ, M.; KANICH, O.; BŘEZINOVÁ, E. Challenges for fingerprint recognition - spoofing, skin diseases and environmental effects. In Handbook of Biometrics for Forensic Science. Advances in Computer Vision and Pattern Recognition. Cham: Springer Verlag, 2017. p. 63-83. ISBN: 978-3-319-50671-5.Detail
HOMOLIAK, I.; BREITENBACHER, D.; HANÁČEK, P. Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. Journal of Computers, 2017, vol. 12, no. 2, p. 143-155. ISSN: 1796-203X.Detail
HOLÍK, L.; MEYER, R.; MUSKALLA, S. Summaries for Context-Free Games. In 36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2016). Leibniz International Proceedings in Informatics (LIPIcs). Dagstuhl: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, 2016. p. 41-57. ISBN: 978-3-95977-027-9.Detail
DRAHANSKÝ, M. Moderní biometrické systémy založené na více charakteristikách a jejich vlastnosti. Vědecké spisy Vysokého učení technického v Brně. Edice Habilitační a inaugurační spisy, sv. 557. Brno: Nakladatelství Vysokého učení technického v Brně VUTIUM, 2016. s. 0-0. ISBN: 978-80-214-5451-4.Detail
MALČÍK, D.; DRAHANSKÝ, M. Microscopic Analysis of Chips. International Journal of Security and Its Applications, 2016, vol. 2016, no. 11, p. 47-66. ISSN: 1738-9976.Detail
SMETKA, T.; HOMOLIAK, I.; HANÁČEK, P. On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm. In Proceedings of 2016 IEEE International Carnahan Conference on Security Technology. Orlando, Fl: Institute of Electrical and Electronics Engineers, 2016. p. 305-312. ISBN: 978-1-5090-1072-1.Detail
HOLÍK, L.; MEYER, R.; MUSKALLA, S. An Anti Chain-based Approach to Recursive Program Verification. In Proceedings of International Conference on Networked Systems. Lecture Notes in Computer Science (LNCS). Cham: Springer International Publishing, 2016. p. 322-336. ISBN: 978-3-319-26849-1.Detail
HOMOLIAK, I.; ŠULÁK, L.; HANÁČEK, P. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. In Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science. Lecture Notes in Computer Science. Jeju Island: Springer International Publishing, 2017. p. 66-78. ISBN: 978-3-319-56549-1. ISSN: 0302-9743.Detail
CHALOUPKA, J.; KOCINA, F.; VEIGEND, P.; NEČASOVÁ, G.; ŠÁTEK, V.; KUNOVSKÝ, J. Multiple Integral Computations. In 14th International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2017. p. 1-4. ISSN: 0094-243X.Detail
KOCINA, F.; NEČASOVÁ, G.; VEIGEND, P.; CHALOUPKA, J.; ŠÁTEK, V.; KUNOVSKÝ, J. Modelling VLSI Circuits Using Taylor Series. In 14th International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2017. p. 1-4. ISSN: 0094-243X.Detail
NEČASOVÁ, G.; KOCINA, F.; VEIGEND, P.; CHALOUPKA, J.; ŠÁTEK, V.; KUNOVSKÝ, J. Solving Wave Equation Using Finite Differences and Taylor Series. In 14th International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2017. p. 1-4. ISSN: 0094-243X.Detail
KUČERA, R.; ŠÁTEK, V.; HASLINGER, J.; POCHYLÝ, F.; KOKO, J.; SASSI, T. Numerical Modelling of the Stokes Flow with Threshold Slip Boundary Conditions. In 14th International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2017. p. 1-4. ISSN: 0094-243X.Detail
ČEŠKA, M.; ALDEGHERI, S.; BARNAT, J.; BOMBIERI, N.; BUSATO, F. Parametric Multi-Step Scheme for GPU-Accelerated Graph Decomposition into Strongly Connected Components. In Proceedings of 2nd Workshop on Performance Engineering for Large Scale Graph Analytics. Lecture Notes in Computer Science. Cham: Springer Verlag, 2016. p. 519-531. ISBN: 978-3-319-58942-8.Detail
ŠIMKOVÁ, H.; KŘENA, B.; VOJNAR, T.; LETKO, Z.; UR, S.; DUDKA, V.; VOLKOVICH, Z.; AVROS, R. Boosted Decision Trees for Behaviour Mining of Concurrent Programs. Concurrency Computation Practice and Experience, 2017, vol. 29, no. 21, p. 4268-4289. ISSN: 1532-0634.Detail
VEIGEND, P.; NEČASOVÁ, G.; KOCINA, F.; CHALOUPKA, J.; ŠÁTEK, V.; KUNOVSKÝ, J. Real Time Simulation of Transport Delay. In 14th International Conference of Numerical Analysis and Applied Mathematics. AIP conference proceedings. Rhodes: American Institute of Physics, 2017. p. 1-4. ISSN: 0094-243X.Detail
VEIGEND, P.; RAFFAI, P.; NEČASOVÁ, G.; ŠÁTEK, V.; KUNOVSKÝ, J. Simulation of the Gas Flow Through the Piston Ring Pack. In 15rd International Conference of Numerical Analysis and Applied Mathematics. Thessaloniki: American Institute of Physics, 2018. p. 1-4. ISBN: 978-0-7354-1690-1.Detail
LUŽA, R.; VYROUBALOVÁ, J.; APJAR, M.; DRAHANSKÝ, M. Control algorithms for rescue robot RUDA. In Modeling and Simulation of Autonomous Systems. Lecture Notes in Computer Science. Řím: Springer International Publishing, 2018. p. 204-222. ISBN: 978-3-319-76071-1. ISSN: 0302-9743.Detail
KANICH, O.; KOŠŤÁK, D.; DRAHANSKÝ, M. Psoriasis Damage Simulation into Synthetic Fingerprint. In Proceedings 18th International Conference of the Biometrics Special Interest Group. Lecture Notes in Informatics. Darmstadt: GI - Group for computer science, 2019. p. 205-212. ISBN: 978-3-88579-690-9.Detail
TRUTMAN, M.; SCHIFFEL, S. Creating Action Heuristics for General Game Playing Agents. In Computer Games, CGW 2015. Communications in Computer and Information Science. Communications in Computer and Information Science. Berlín: Springer Verlag, 2016. p. 149-164. ISSN: 1865-0929.Detail
DRAHANSKÝ, M. Biometrics - Liveness Detection, Recognition of Finger Veins, 3D Hand, Eye Iris and Retina, 3D Face and Thermo-Face. Brno: 2015. p. 1-30.Detail
MRÁČEK, Š.; DVOŘÁK, R.; VÁŇA, J.; NOVOTNÝ, T.; DRAHANSKÝ, M. 3D Face Recognition Utilizing a Low-Cost Depth Sensor. 11th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2015). Ljubljana: 2015. p. 1 (1 s.). ISBN: 978-1-4799-6026-2.Detail
ROGALEWICZ, A.; IOSIF, R.; VOJNAR, T.: SLIDE; SLIDE: Separation Logic with Inductive Definitions. Nástroj i dokumentaci lze získat na URL: http://www.fit.vutbr.cz/research/groups/verifit/tools/slide/. URL: https://www.fit.vut.cz/research/product/373/. (software)Detail
LENGÁL, O.; VOJNAR, T.; ENEA, C.; SIGHIREANU, M.: spen; SPEN - A Solver for Separation Logic Entailments. http://www.liafa.univ-paris-diderot.fr/spen/. URL: http://www.liafa.univ-paris-diderot.fr/spen/. (software)Detail
FIEDOR, T.; LENGÁL, O.; HOLÍK, L.; VOJNAR, T.: dwina; dWiNA - An Implementation of Decision Procedure for WS1S. Nástroj i dokumentaci lze získat na URL:http://www.fit.vutbr.cz/research/groups/verifit/tools/dWiNA/. URL: https://www.fit.vut.cz/research/product/432/. (software)Detail
ROGALEWICZ, A.; IOSIF, R.; VOJNAR, T.: TRACER; INCLUDER (tracer): Trace Inclusion for Data Word Automata. Nástroj i dokumentaci lze získat na URL: http://www.fit.vutbr.cz/research/groups/verifit/tools/includer/. URL: https://www.fit.vut.cz/research/product/422/. (software)Detail
CHARVÁT, L.; SMRČKA, A.; VOJNAR, T.: HADES; HADES (Hazard Detection System). http://www.fit.vutbr.cz/research/groups/verifit/tools/hades/. URL: http://www.fit.vutbr.cz/research/groups/verifit/tools/hades/. (software)Detail