default search action
Radek Fujdiak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Eva Holasova, Radek Fujdiak, Jiri Misurec:
Comparative Analysis of Classification Methods and Suitable Datasets for Protocol Recognition in Operational Technologies. Algorithms 17(5): 208 (2024) - [c55]Willi Lazarov, Samuel Janek, Zdenek Martinasek, Radek Fujdiak:
Event-based Data Collection and Analysis in the Cyber Range Environment. ARES 2024: 105:1-105:8 - [c54]Ondrej Pospisil, Radek Fujdiak:
Identification of industrial devices based on payload. ARES 2024: 158:1-158:9 - [c53]Willi Lazarov, Antonin Bohacik, David Kohout, Radek Fujdiak:
Training Scenario for Security Testing of the Kerberos Protocol. IEA/AIE 2024: 56-67 - 2023
- [j10]Matej Vrtal, Radek Fujdiak, Jan Benedikt, Pavel Praks, Radim Bris, Michal Ptacek, Petr Toman:
Time-Dependent Unavailability Exploration of Interconnected Urban Power Grid and Communication Network. Algorithms 16(12): 561 (2023) - [j9]Karel Kuchar, Eva Holasova, Ondrej Pospisil, Henri Ruotsalainen, Radek Fujdiak, Adrian Wagner:
Hunting Network Anomalies in a Railway Axle Counter System. Sensors 23(6): 3122 (2023) - [c52]Antonin Bohacik, Eva Holasova, Radek Fujdiak, Jan Racka:
Convolutional Neural Network-Based Classification of Secured IEC 104 Traffic in Energy Systems. ICCNS 2023: 159-165 - [c51]Ondrej Pospisil, Radek Fujdiak:
Identifying Industry Devices via Time Delay in Dataflow. ICCNS 2023: 173-177 - [c50]Karel Kuchar, Petr Blazek, Radek Fujdiak:
From Playground to Battleground: Cyber Range Training for Industrial Cybersecurity Education. ICCNS 2023: 209-214 - [c49]Eva Holasova, Radek Fujdiak, Petr Blazek, Antonin Bohacik:
Automated Neural Network Structure Design for Efficient. ICCNS 2023: 215-221 - [c48]Jan Pospisil, Radek Fujdiak:
Increasing data rate of LoRa technology using frequency division multiplex. ICCNS 2023: 330-334 - 2022
- [j8]Radek Fujdiak, Konstantin Mikhaylov, Jan Pospisil, Ales Povalac, Jiri Misurec:
Insights into the Issue of Deploying a Private LoRaWAN. Sensors 22(5): 2042 (2022) - [j7]Henri Ruotsalainen, Guanxiong Shen, Junqing Zhang, Radek Fujdiak:
LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review. Sensors 22(9): 3127 (2022) - [j6]Rastislav Róka, Radek Fujdiak, Eva Holasova, Karel Kuchar, Milos Orgon, Jiri Misurec:
Protection Schemes in HPON Networks Based on the PWFBA Algorithm. Sensors 22(24): 9885 (2022) - [c47]Marwa Gadala, Lorenzo Strigini, Radek Fujdiak:
Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs. ARES 2022: 131:1-131:9 - [c46]Petr Ilgner, Radek Fujdiak:
Fuzzing Framework for IEC 60870-5-104 Protocol. CSSE 2022: 190-194 - [c45]Eva Holasova, Radek Fujdiak:
Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite Used. ICCST 2022: 1-7 - [c44]Petr Ilgner, Radek Fujdiak:
Fuzzing ICS Protocols: Modbus Fuzzer Framework. ICCST 2022: 1-6 - [c43]Pavel Masek, Elham Younesian, Martin Bahna, Radek Mozny, Michal Mikulasek, Martin Stusek, Aleksandr Ometov, Jiri Hosek, Radek Fujdiak, Petr Mlynek:
Performance Analysis of Different LoRaWAN Frequency Bands for mMTC Scenarios. TSP 2022: 417-420 - 2021
- [j5]Marek Sikora, Radek Fujdiak, Karel Kuchar, Eva Holasova, Jiri Misurec:
Generator of Slow Denial-of-Service Cyber Attacks. Sensors 21(16): 5473 (2021) - [j4]Ondrej Pospisil, Petr Blazek, Karel Kuchar, Radek Fujdiak, Jiri Misurec:
Application Perspective on Cybersecurity Testbed for Industrial Control Systems. Sensors 21(23): 8119 (2021) - [c42]Ondrej Pospisil, Petr Blazek, Radek Fujdiak, Jiri Misurec:
Active Scanning in the Industrial Control Systems. ISCSIC 2021: 227-232 - [c41]Marek Sikora, Radek Fujdiak, Jiri Misurec:
Analysis and detection of application-independent slow Denial of Service cyber attacks. ISI 2021: 1-6 - 2020
- [j3]Jan Pospisil, Radek Fujdiak, Konstantin Mikhaylov:
Investigation of the Performance of TDoA-Based Localization Over LoRaWAN in Theory and Practice. Sensors 20(19): 5464 (2020) - [c40]Eva Holasova, Radek Fujdiak, Karel Kuchar:
Specific Anomaly Detection Method in Wireless Communication Networks. CSNet 2020: 1-3 - [c39]Karel Kuchar, Radek Fujdiak, Petr Blazek, Zdenek Martinasek, Eva Holasova:
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks. CSNet 2020: 1-3 - [c38]Konstantin Mikhaylov, Martin Stusek, Pavel Masek, Radek Fujdiak, Radek Mozny, Sergey Andreev, Jiri Hosek:
Communication Performance of a Real-Life Wide-Area Low-Power Network Based on Sigfox Technology. ICC 2020: 1-6 - [c37]Jirí Pokorný, Radek Fujdiak, Martin Kovanda, Martin Strajt, Jiri Hosek:
Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined Radio. ICUMT 2020: 78-81 - [c36]Marek Sikora, Andrej Krivulcik, Radek Fujdiak, Petr Blazek:
Design of Advanced Slow Denial of Service Attack Generator. ICUMT 2020: 99-104 - [c35]Konstantin Mikhaylov, Martin Stusek, Pavel Masek, Radek Fujdiak, Radek Mozny, Sergey Andreev, Jiri Hosek:
On the Performance of Multi-Gateway LoRaWAN Deployments: An Experimental Study. WCNC 2020: 1-6
2010 – 2019
- 2019
- [c34]Konstantin Mikhaylov, Radek Fujdiak, Ari Pouttu, Miroslav Voznák, Lukas Malina, Petr Mlynek:
Energy Attack in LoRaWAN: Experimental Validation. ARES 2019: 74:1-74:6 - [c33]Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak:
A Secure Publish/Subscribe Protocol for Internet of Things. ARES 2019: 75:1-75:10 - [c32]Radek Fujdiak, Petr Blazek, Petr Chmelar, Petr Dittrich, Miroslav Voznák, Petr Mlynek, Jan Slacik, Petr Musil, Pavel Jurka, Jiri Misurec:
Communication Model of Smart Substation for Cyber-Detection Systems. CN 2019: 256-271 - [c31]Radek Fujdiak, Jiri Misurec, Jirí Pokorný, Lukás Zobal, Peter T. Popov, Vladimir Stankovic, Petr Mlynek, Pavel Mrnustik, Petr Blazek, Petr Musil:
Security and Performance Trade-offs for Data Distribution Service in Flying Ad-Hoc Networks. ICUMT 2019: 1-5 - [c30]Lukás Zobal, Dusan Kolár, Radek Fujdiak:
Current State of Honeypots and Deception Strategies in Cybersecurity. ICUMT 2019: 1-9 - [c29]Radek Fujdiak, Petr Blazek, Ludovic Apvrille, Zdenek Martinasek, Petr Mlynek, Renaud Pacalet, David Smekal, Pavel Mrnustik, Maros Barabas, Maysam Zoor:
Modeling the Trade-off Between Security and Performance to Support the Product Life Cycle. MECO 2019: 1-6 - [c28]Radek Fujdiak, Petr Blazek, Petr Mlynek, Jiri Misurec:
Developing Battery of Vulnerability Tests for Industrial Control Systems. NTMS 2019: 1-5 - [c27]Radek Fujdiak, Petr Mlynek, Pavel Mrnustik, Maros Barabas, Petr Blazek, Filip Borcik, Jiri Misurec:
Managing the Secure Software Development. NTMS 2019: 1-4 - [i1]Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak:
A Secure Publish/Subscribe Protocol for Internet of Things. IACR Cryptol. ePrint Arch. 2019: 740 (2019) - 2018
- [c26]Radek Fujdiak, Petr Blazek, Konstantin Mikhaylov, Lukas Malina, Petr Mlynek, Jiri Misurec, Vojtech Blazek:
On Track of Sigfox Confidentiality with End-to-End Encryption. ARES 2018: 19:1-19:6 - [c25]Radek Fujdiak, Jan Slacik, Milos Orgon, Petr Mlynek, Jiri Misurec, Jozef Hallon, Jan Halgos:
Investigation of Power Line Communication and Wi-Fi Co-existence in Smart Home. ICUMT 2018: 1-4 - [c24]Radek Fujdiak, Václav Uher, Petr Mlynek, Petr Blazek, Jan Slacik, Vladimir Sedlacek, Jirí Misurec, Marina Volkova, Petr Chmelar:
IP Traffic Generator Using Container Virtualization Technology. ICUMT 2018: 1-6 - [c23]Radek Fujdiak, Petr Mlynek, Jiri Misurec, Martin Strajt:
Simulated Coverage Estimation of Single Gateway LoRaWAN Network. IWSSIP 2018: 1-4 - [c22]Radek Fujdiak, Petr Mlynek, Petr Blazek, Maros Barabas, Pavel Mrnustik:
Seeking the Relation Between Performance and Security in Modern Systems: Metrics and Measures. TSP 2018: 1-5 - [c21]Radek Fujdiak, Milos Orgon, Jozef Hallon, Lukas Potisk, Jan Slacik, Petr Mlynek, Jiri Misurec:
Radiation of an Electromagnetic Field from the Power Line Communication Adapters. TSP 2018: 1-4 - [c20]Petr Mlynek, Jan Slacik, Radek Fujdiak:
Experimental Measurements of Communication Technologies for Mesh Distribution Networks of Low Voltage. TSP 2018: 1-5 - [c19]Jan Slacik, Petr Mlynek, Radek Fujdiak:
Broadband Power-line Devices Comparison and HomePlug AV2 Experimental Measurement. TSP 2018: 1-4 - 2017
- [c18]Radek Fujdiak, Petr Mlynek, Jiri Misurec, Janko Slacik:
Software Optimization of Advanced Encryption Standard for Ultra-Low-Power MSP430. CSOC (3) 2017: 469-478 - [c17]Radek Fujdiak, Petr Mlynek, Sergey Bezzateev, Romina Muka, Jan Slacik, Jiri Misurec, Ondrej Raso:
Lightweight structures of big numbers for cryptographic primitives in limited devices. ICUMT 2017: 289-293 - [c16]Jan Slacik, Petr Mlynek, Radek Fujdiak, Jiri Misurec, Pavel Silhavy:
Performance evaluation of multi-carrier power line communication systems in real condition for smart grid neighborhood area networks. ICUMT 2017: 391-397 - [c15]Jan Slacik, Petr Mlynek, Radek Fujdiak, Katerina Dobesova:
Experimental measurements of multi-carrier power line communication systems. TSP 2017: 91-96 - 2016
- [j2]Lukas Malina, Jan Hajny, Radek Fujdiak, Jiri Hosek:
On perspective of security and privacy-preserving solutions in the internet of things. Comput. Networks 102: 83-95 (2016) - [j1]Pavel Masek, Jan Masek, Petr Frantik, Radek Fujdiak, Aleksandr Ometov, Jiri Hosek, Sergey Andreev, Petr Mlynek, Jiri Misurec:
A Harmonized Perspective on Transportation Management in Smart Cities: The Novel IoT-Driven Environment for Road Traffic Modeling. Sensors 16(11): 1872 (2016) - [c14]Radek Fujdiak, Pavel Masek, Petr Mlynek, Jiri Misurec, Ekaterina Olshannikova:
Using genetic algorithm for advanced municipal waste collection in Smart City. CSNDSP 2016: 1-6 - [c13]Radek Fujdiak, Pavel Masek, Petr Mlynek, Jiri Misurec, Ammar Muthanna:
Advanced optimization method for improving the urban traffic management. FRUCT 2016: 48-53 - [c12]Pavel Masek, Radek Fujdiak, Krystof Zeman, Jiri Hosek, Ammar Muthanna:
Remote networking technology for IoT: Cloud-based access for AllJoyn-enabled devices. FRUCT 2016: 200-205 - [c11]Petr Mlynek, Radek Fujdiak, Jiri Misurec, Jan Slacik:
Experimental measurements of noise influence on narrowband Power Line Communication. ICUMT 2016: 94-100 - [c10]Ammar Muthanna, Pavel Masek, Jiri Hosek, Radek Fujdiak, Oshdi Hussein, Alexander Paramonov, Andrey Koucheryavy:
Analytical Evaluation of D2D Connectivity Potential in 5G Wireless Systems. NEW2AN 2016: 395-403 - [c9]Radek Fujdiak, Petr Mlynek, Jiri Misurec, Pavel Masek:
Design of low-power random number generator using signal quantization error in Smart Grid. TSP 2016: 7-10 - [c8]Petr Mlynek, Radek Fujdiak, Jiri Misurec:
Power line topology prediction using time domain reflectometry. TSP 2016: 199-202 - [c7]Irina E. Krivtsova, Ilya S. Lebedev, Mikhail E. Sukhoparov, Nurzhan Bazhayev, Igor A. Zikratov, Aleksandr Ometov, Sergey Andreev, Pavel Masek, Radek Fujdiak, Jiri Hosek:
Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network. WWIC 2016: 297-308 - 2015
- [c6]Radek Fujdiak, Pavel Masek, Jiri Hosek, Petr Mlynek, Jiri Misurec:
Efficiency evaluation of different types of cryptography curves on low-power devices. ICUMT 2015: 269-274 - [c5]Pavel Masek, Krystof Zeman, Zenon Kuder, Jiri Hosek, Sergey Andreev, Radek Fujdiak, Franz Kröpfl:
Wireless M-BUS: An Attractive M2M Technology for 5G-Grade Home Automation. IoT 360 (1) 2015: 144-156 - [c4]Radek Fujdiak, Jiri Misurec, Petr Mlynek, Tomas Petrak:
Verification of genetic algorithm in dynamic traffic light management. TSP 2015: 314-318 - [c3]Radek Fujdiak, Jiri Misurec, Petr Mlynek, Ondrej Raso:
Analysis of random number generator from texas instrument in MSP430 x5xx families. TSP 2015: 653-656 - [c2]Petr Mlynek, Martin Koutny, Jiri Misurec, Radek Fujdiak:
Evaluation of load impedances, discontinuity and impedance mismatch in PLC networks by experimental measurements with coupling circuits. TSP 2015: 657-661 - [c1]Ondrej Raso, Petr Mlynek, Radek Fujdiak, Ladislav Pospichal, Pavel Kubicek:
Implementation of Elliptic Curve Diffie Hellman in ultra-low power microcontroller. TSP 2015: 662-666
Coauthor Index
aka: Jirí Misurec
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint