|
Search the dblp DataBase
Martin Rehák:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michal Pechoucek, Martin Rehák, Vladimír Marík
Expectations and deployment of agent technology in manufacturing and defence: case studies. [Citation Graph (0, 0)][DBLP] AAMAS Industrial Applications, 2005, pp:100-106 [Conf]
- Michal Pechoucek, Jan Tozicka, Martin Rehák
Towards formal model of adversarial action in multi-agent systems. [Citation Graph (0, 0)][DBLP] AAMAS, 2006, pp:420-422 [Conf]
- Martin Rehák, Michal Pechoucek, Petr Benda
Fuzzy number approach to trust in coalition environment. [Citation Graph (0, 0)][DBLP] AAMAS, 2005, pp:1247-1248 [Conf]
- David Sislák, Martin Rehák, Michal Pechoucek, Dusan Pavlícek
Deployment of A-globe multi-agent platform. [Citation Graph (0, 0)][DBLP] AAMAS, 2006, pp:1447-1448 [Conf]
- Martin Rehák, Michal Pechoucek, Jan Tozicka
Adversarial Behavior in Multi-agent Systems. [Citation Graph (0, 0)][DBLP] CEEMAS, 2005, pp:470-479 [Conf]
- Martin Rehák, Premysl Volf, Michal Pechoucek
Multilevel Approach to Agent-Based Task Allocation in Transportation. [Citation Graph (0, 0)][DBLP] CIA, 2006, pp:273-287 [Conf]
- Martin Rehák, Michal Pechoucek, Jan Tozicka, David Sislák
Using Stand-in Agents in Partially Accessible Multi-agent Environment. [Citation Graph (0, 0)][DBLP] ESAW, 2004, pp:277-291 [Conf]
- Martin Rehák, Michal Pechoucek, Jan Tozicka
Adversarial Behavior in Multi-Agent Systems. [Citation Graph (0, 0)][DBLP] EUMAS, 2005, pp:500-501 [Conf]
- Martin Rehák, Lukás Foltýn, Michal Pechoucek, Petr Benda
Trust Model for Open Ubiquitous Agent Systems. [Citation Graph (0, 0)][DBLP] IAT, 2005, pp:536-542 [Conf]
- Martin Rehák, Jan Tozicka, Michal Pechoucek, Filip Zelezný, Milan Rollo
An Abstract Architecture for Computational Reflection in Multi-Agent Systems. [Citation Graph (0, 0)][DBLP] IAT, 2005, pp:128-131 [Conf]
- David Sislák, Martin Rehák, Michal Pechoucek, Petr Benda
Optimizing Agents Operation in Partially Inaccessible and Disruptive Environment. [Citation Graph (0, 0)][DBLP] IAT, 2005, pp:140-143 [Conf]
- Martin Rehák, Milos Gregor, Michal Pechoucek, Jeffrey M. Bradshaw
Representing Context for Multiagent Trust Modeling. [Citation Graph (0, 0)][DBLP] IAT, 2006, pp:737-746 [Conf]
- Martin Rehák, Petr Charvát, Michal Pechoucek
Agent System Application in High-Volume Production Management. [Citation Graph (0, 0)][DBLP] BASYS, 2004, pp:193-200 [Conf]
- David Sislák, Michal Pechoucek, Milan Rollo, Martin Rehák, Jan Tozicka
Simulating Agents' Mobility and Inaccessibility with A-globe Multi-agent System. [Citation Graph (0, 0)][DBLP] MATES, 2004, pp:258-272 [Conf]
- David Sislák, Martin Rehák, Michal Pechoucek
A-globe: Multi-Agent Platform with Advanced Simulation and Visualization Support. [Citation Graph (0, 0)][DBLP] Web Intelligence, 2005, pp:805-806 [Conf]
- Martin Rehák, Michal Pechoucek, Jan Tozicka, Magdalena Prokopová, David Medvigy, Jiri Novotný
Agent-Based Network Protection Against Malicious Code. [Citation Graph (0, 0)][DBLP] CEEMAS, 2007, pp:22-31 [Conf]
- Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Pavel Minarík, David Medvigy
Collaborative Attack Detection in High-Speed Networks. [Citation Graph (0, 0)][DBLP] CEEMAS, 2007, pp:73-82 [Conf]
- Martin Rehák, Michal Pechoucek
Trust Modeling with Context Representation and Generalized Identities. [Citation Graph (0, 0)][DBLP] CIA, 2007, pp:298-312 [Conf]
- Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Jirí Moninec, Tomás Dymácek, David Medvigy
High-Performance Agent System for Intrusion Detection in Backbone Networks. [Citation Graph (0, 0)][DBLP] CIA, 2007, pp:134-148 [Conf]
- Eric Platon, Martin Rehák, Nicolas Sabouret, Michal Pechoucek, Shinichi Honiden
Detecting Intrusions in Agent System by Means of Exception Handling. [Citation Graph (0, 0)][DBLP] HoloMAS, 2007, pp:161-172 [Conf]
- Martin Rehák, Michal Pechoucek, David Medvigy, Magdalena Prokopová, Jan Tozicka, Lukás Foltýn
Agent Methods for Network Intrusion Detection and Response. [Citation Graph (0, 0)][DBLP] HoloMAS, 2007, pp:149-160 [Conf]
- Jan Tozicka, Michal Pechoucek, Martin Rehák, Magdalena Prokopová
Multi-agent Reflection in Autonomic Systems. [Citation Graph (0, 0)][DBLP] HoloMAS, 2007, pp:27-36 [Conf]
- Michal Pechoucek, Martin Rehák, Petr Charvát, Tomás Vlcek, Michal Kolar
Agent-Based Approach to Mass-Oriented Production Planning: Case Study. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2007, v:37, n:3, pp:386-395 [Journal]
CAMNEP: agent-based network intrusion detection system. [Citation Graph (, )][DBLP]
Multi-agent approach to network intrusion detection. [Citation Graph (, )][DBLP]
Dynamic information source selection for intrusion detection systems. [Citation Graph (, )][DBLP]
Trust-Based Classifier Combination for Network Anomaly Detection. [Citation Graph (, )][DBLP]
Incrementally Refined Acquaintance Model for Consortia Composition. [Citation Graph (, )][DBLP]
Network Intrusion Detection by Means of Community of Trusting Agents. [Citation Graph (, )][DBLP]
Incrementally Refined Acquaintance Model for Distributed Planning and Resource Allocation in Semi-trusted Environments. [Citation Graph (, )][DBLP]
High-Speed Network Traffic Acquisition for Agent Systems. [Citation Graph (, )][DBLP]
Agent-Based Network Intrusion Detection System. [Citation Graph (, )][DBLP]
Threat-model-driven runtime adaptation and evaluation of intrusion detection system. [Citation Graph (, )][DBLP]
Improving Anomaly Detection Error Rate by Collective Trust Modeling. [Citation Graph (, )][DBLP]
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.008secs
|