Kamil Malinka
Kamil Malinka
Verified email at fit.vutbr.cz
Title
Cited by
Cited by
Year
E-banking security-comparative study
P Hanaek, K Malinka, J Schafer
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
382008
Peer-to-peer networks security
J Schäfer, K Malinka, P Hanácek
2008 The Third International Conference on Internet Monitoring and …, 2008
162008
Autorizace elektronických transakcí a autentizace dat i uživatelů
VV Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, V Holer, K Malinka, ...
Masarykova univerzita, 2008
142008
Security in peer-to-peer networks: Empiric model of file diffusion in bittorrent
J Schäfer, K Malinka
2009 Fourth International Conference on Internet Monitoring and Protection …, 2009
132009
Peer-to-peer networks: Security analysis
J Schäfer, K Malinka, P Hanáček
International Journal On Advances in Security Volume 2, Number 1, 2009, 2009
82009
Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication
K Malinka
2009 Fourth International Conference on Internet Monitoring and Protection …, 2009
62009
Development of social networks in email communication
K Malinka, J Schäfer
2009 Fourth International Conference on Internet Monitoring and Protection …, 2009
52009
Analyses of real email traffic properties
K Malinka, P Hanáček, D Cvrček
Radioengineering 18 (4), 7, 2009
42009
Malware spreading models in peer-to-peer networks
J Schafer, K Malinka, P Hanacek
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
42008
Autentizace uživatelů a autorizace elektronických transakcí
V Matyáš, J Krhovják, V Lorenc, M Kumpošt, Z Říha, D Cvrček, J Staudek, ...
TATE International, sro, 2007
32007
Increasing trust in Tor node list using blockchain
L Hellebrandt, I Homoliak, K Malinka, P Hanáček
2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC …, 2019
22019
Evaluation of biometric authentication based on visual evoked potentials
K Malinka, P Hanáček, M Trzos
2011 Carnahan Conference on Security Technology, 1-7, 2011
22011
Visual Evoked Potentials in Biometric Authentication
K Malinka
Proceedings of the 16th Conference Student EEICT 5, 251-255, 2010
12010
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors
I Homoliak, K Malinka, P Hanacek
IEEE Access 8, 112427-112453, 2020
2020
Security and Encryption at Modern Databases
M Ocenas, I Homoliak, P Hanacek, K Malinka
Proceedings of the 2020 4th International Conference on Cryptography …, 2020
2020
Bezpečnost ICT ve vnitřních předpisech a školení zaměstnanců
P Loutocký, K Malinka
Revue pro právo a technologie 7 (14), 45-64, 2016
2016
The Challenge of Increasing Safe Response of Antivirus Software Users
V Šťavová, V Matyáš, K Malinka
Springer International Publishing,, 2016
2016
Právní aspekty sledování využití výpočetní techniky zaměstnancem
K Malinka, J Harašta
2016
The challenge of increasing safe response of antivirus software users
V Stavova, V Matyas, K Malinka
International Doctoral Workshop on Mathematical and Engineering Methods in …, 2015
2015
Systém pro distribuci dotazníků v počítačových učebnách
R Janča, K Malinka, V Šťavová
2015
The system can't perform the operation now. Try again later.
Articles 1–20