Joint detection of malicious domains and infected clients
Prasse, Paul, Knaebel, René, Machlica, Lukáš, Pevný, Tomáš, Scheffer, Tobias
Published in Machine learning (01.09.2019)
Published in Machine learning (01.09.2019)
Get full text
Journal Article
Decision-Forest Voting Scheme for Classification of Rare Classes in Network Intrusion Detection
Brabec, Jan, Machlica, Lukas
Published in 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (01.10.2018)
Published in 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC) (01.10.2018)
Get full text
Conference Proceeding
Automatic recognition of bird individuals on an open set using as-is recordings
Ptacek, Ladislav, Machlica, Lukas, Linhart, Pavel, Jaska, Pavel, Muller, Ludek
Published in Bioacoustics (Berkhamsted) (02.01.2016)
Published in Bioacoustics (Berkhamsted) (02.01.2016)
Get full text
Journal Article
An efficient implementation of Probabilistic Linear Discriminant Analysis
Machlica, Lukas, Zajic, Zbynek
Published in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (01.05.2013)
Published in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (01.05.2013)
Get full text
Conference Proceeding
Bottleneck ANN: Dealing with small amount of data in shift-MLLR adaptation
Zajic, Z., Machlica, L., Muller, L.
Published in 2012 IEEE 11th International Conference on Signal Processing (01.10.2012)
Published in 2012 IEEE 11th International Conference on Signal Processing (01.10.2012)
Get full text
Conference Proceeding
Initialization of adaptation by sufficient statistics using phonetic tree
Zajic, Z., Machlica, L., Muller, L.
Published in 2012 IEEE 11th International Conference on Signal Processing (01.10.2012)
Published in 2012 IEEE 11th International Conference on Signal Processing (01.10.2012)
Get full text
Conference Proceeding
Malware Detection by Analysing Network Traffic with Neural Networks
Prasse, Paul, Machlica, Lukas, Pevny, Tomas, Havelka, Jiri, Scheffer, Tobias
Published in 2017 IEEE Security and Privacy Workshops (SPW) (01.05.2017)
Published in 2017 IEEE Security and Privacy Workshops (SPW) (01.05.2017)
Get full text
Conference Proceeding