The SCEAS System
Navigation Menu

Search the dblp DataBase


Martin Rehák: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michal Pechoucek, Martin Rehák, Vladimír Marík
    Expectations and deployment of agent technology in manufacturing and defence: case studies. [Citation Graph (0, 0)][DBLP]
    AAMAS Industrial Applications, 2005, pp:100-106 [Conf]
  2. Michal Pechoucek, Jan Tozicka, Martin Rehák
    Towards formal model of adversarial action in multi-agent systems. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2006, pp:420-422 [Conf]
  3. Martin Rehák, Michal Pechoucek, Petr Benda
    Fuzzy number approach to trust in coalition environment. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2005, pp:1247-1248 [Conf]
  4. David Sislák, Martin Rehák, Michal Pechoucek, Dusan Pavlícek
    Deployment of A-globe multi-agent platform. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2006, pp:1447-1448 [Conf]
  5. Martin Rehák, Michal Pechoucek, Jan Tozicka
    Adversarial Behavior in Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    CEEMAS, 2005, pp:470-479 [Conf]
  6. Martin Rehák, Premysl Volf, Michal Pechoucek
    Multilevel Approach to Agent-Based Task Allocation in Transportation. [Citation Graph (0, 0)][DBLP]
    CIA, 2006, pp:273-287 [Conf]
  7. Martin Rehák, Michal Pechoucek, Jan Tozicka, David Sislák
    Using Stand-in Agents in Partially Accessible Multi-agent Environment. [Citation Graph (0, 0)][DBLP]
    ESAW, 2004, pp:277-291 [Conf]
  8. Martin Rehák, Michal Pechoucek, Jan Tozicka
    Adversarial Behavior in Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    EUMAS, 2005, pp:500-501 [Conf]
  9. Martin Rehák, Lukás Foltýn, Michal Pechoucek, Petr Benda
    Trust Model for Open Ubiquitous Agent Systems. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:536-542 [Conf]
  10. Martin Rehák, Jan Tozicka, Michal Pechoucek, Filip Zelezný, Milan Rollo
    An Abstract Architecture for Computational Reflection in Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:128-131 [Conf]
  11. David Sislák, Martin Rehák, Michal Pechoucek, Petr Benda
    Optimizing Agents Operation in Partially Inaccessible and Disruptive Environment. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:140-143 [Conf]
  12. Martin Rehák, Milos Gregor, Michal Pechoucek, Jeffrey M. Bradshaw
    Representing Context for Multiagent Trust Modeling. [Citation Graph (0, 0)][DBLP]
    IAT, 2006, pp:737-746 [Conf]
  13. Martin Rehák, Petr Charvát, Michal Pechoucek
    Agent System Application in High-Volume Production Management. [Citation Graph (0, 0)][DBLP]
    BASYS, 2004, pp:193-200 [Conf]
  14. David Sislák, Michal Pechoucek, Milan Rollo, Martin Rehák, Jan Tozicka
    Simulating Agents' Mobility and Inaccessibility with A-globe Multi-agent System. [Citation Graph (0, 0)][DBLP]
    MATES, 2004, pp:258-272 [Conf]
  15. David Sislák, Martin Rehák, Michal Pechoucek
    A-globe: Multi-Agent Platform with Advanced Simulation and Visualization Support. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2005, pp:805-806 [Conf]
  16. Martin Rehák, Michal Pechoucek, Jan Tozicka, Magdalena Prokopová, David Medvigy, Jiri Novotný
    Agent-Based Network Protection Against Malicious Code. [Citation Graph (0, 0)][DBLP]
    CEEMAS, 2007, pp:22-31 [Conf]
  17. Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Pavel Minarík, David Medvigy
    Collaborative Attack Detection in High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    CEEMAS, 2007, pp:73-82 [Conf]
  18. Martin Rehák, Michal Pechoucek
    Trust Modeling with Context Representation and Generalized Identities. [Citation Graph (0, 0)][DBLP]
    CIA, 2007, pp:298-312 [Conf]
  19. Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Jirí Moninec, Tomás Dymácek, David Medvigy
    High-Performance Agent System for Intrusion Detection in Backbone Networks. [Citation Graph (0, 0)][DBLP]
    CIA, 2007, pp:134-148 [Conf]
  20. Eric Platon, Martin Rehák, Nicolas Sabouret, Michal Pechoucek, Shinichi Honiden
    Detecting Intrusions in Agent System by Means of Exception Handling. [Citation Graph (0, 0)][DBLP]
    HoloMAS, 2007, pp:161-172 [Conf]
  21. Martin Rehák, Michal Pechoucek, David Medvigy, Magdalena Prokopová, Jan Tozicka, Lukás Foltýn
    Agent Methods for Network Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP]
    HoloMAS, 2007, pp:149-160 [Conf]
  22. Jan Tozicka, Michal Pechoucek, Martin Rehák, Magdalena Prokopová
    Multi-agent Reflection in Autonomic Systems. [Citation Graph (0, 0)][DBLP]
    HoloMAS, 2007, pp:27-36 [Conf]
  23. Michal Pechoucek, Martin Rehák, Petr Charvát, Tomás Vlcek, Michal Kolar
    Agent-Based Approach to Mass-Oriented Production Planning: Case Study. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2007, v:37, n:3, pp:386-395 [Journal]

  24. CAMNEP: agent-based network intrusion detection system. [Citation Graph (, )][DBLP]

  25. Multi-agent approach to network intrusion detection. [Citation Graph (, )][DBLP]

  26. Dynamic information source selection for intrusion detection systems. [Citation Graph (, )][DBLP]

  27. Trust-Based Classifier Combination for Network Anomaly Detection. [Citation Graph (, )][DBLP]

  28. Incrementally Refined Acquaintance Model for Consortia Composition. [Citation Graph (, )][DBLP]

  29. Network Intrusion Detection by Means of Community of Trusting Agents. [Citation Graph (, )][DBLP]

  30. Incrementally Refined Acquaintance Model for Distributed Planning and Resource Allocation in Semi-trusted Environments. [Citation Graph (, )][DBLP]

  31. High-Speed Network Traffic Acquisition for Agent Systems. [Citation Graph (, )][DBLP]

  32. Agent-Based Network Intrusion Detection System. [Citation Graph (, )][DBLP]

  33. Threat-model-driven runtime adaptation and evaluation of intrusion detection system. [Citation Graph (, )][DBLP]

  34. Improving Anomaly Detection Error Rate by Collective Trust Modeling. [Citation Graph (, )][DBLP]

  35. Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.008secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002