List of publications

2024

  1. Louthánová, P., Kozák, M., Jureček, M., Stamp, M., & Di Troia, F. (2024). A comparison of adversarial malware generators. Journal of Computer Virology and Hacking Techniques, 20, 623–639.
  2. Kozák, M., Jureček, M., Stamp, M., & Troia, F. D. (2024). Creating valid adversarial examples of malware. Journal of Computer Virology and Hacking Techniques, 20, 607–621.
  3. Jurečková, O., Jureček, M., Stamp, M., Di Troia, F., & Lórencz, R. (2024). Classification and online clustering of zero-day malware. Journal of Computer Virology and Hacking Techniques, 20, 579–592.
  4. Shukla, A., Jureček, M., & Stamp, M. (2024). Social media bot detection using Dropout-GAN. Journal of Computer Virology and Hacking Techniques, 20, 669–680.
  5. Berušková, J., Jureček, M., & Jurečková, O. (2024). Reducing overdefined systems of polynomial equations derived from small scale variants of the AES via data mining methods. Journal of Computer Virology and Hacking Techniques, 20, 885–900.

2023

  1. Kozák, M., & Jureček, M. (2023). Combining Generators of Adversarial Malware Examples to Increase Evasion Rate. Int. Conf. on Security and Cryptography (SECRYPT), 778–786.

2022

  1. Dolejš, J., & Jureček, M. (2022). Interpretability of Machine Learning-Based Results of Malware Detection Using a Set of Rules. In Artificial Intelligence for Cybersecurity (pp. 107–136). Springer.
  2. Bielik, M., Jureček, M., Jurečková, O., & Lórencz, R. (2022). Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. Int. Conf. on Security and Cryptography (SECRYPT), 415–427.
  3. Jureček, M., & Jurečková, O. (2022). Parallel Instance Filtering for Malware Detection. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 13–20.
  4. Kozák, M., Jureček, M., & Lórencz, R. (2022). Generation of Adversarial Malware and Benign Examples Using Reinforcement Learning. In Artificial Intelligence for Cybersecurity (pp. 3–25). Springer.

2021

  1. Jureček, M., & Lórencz, R. (2021). Application of Distance Metric Learning to Automated Malware Detection. IEEE Access, 9, 96151–96165.
  2. Jureček, M., Jurečková, O., & Lórencz, R. (2021). Improving Classification of Malware Families using Learning a Distance Metric. Int. Conf. on Information Systems Security and Privacy (ICISSP), 643–652.
  3. Jureček, M., & Kozák, M. (2021). Representation of PE Files using LSTM Networks. Int. Conf. on Information Systems Security and Privacy (ICISSP), 516–525.

2020

  1. Jureček, M., & Lórencz, R. (2020). Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection. Int. Conf. on Information Systems Security and Privacy (ICISSP), 725–732.

2019

  1. Jureček, M., Buček, J., & Lórencz, R. (2019). Side-Channel Attack on the A5/1 Stream Cipher. 2019 22nd Euromicro Conference on Digital System Design (DSD), 633–638.
  2. Jureček, M., Buček, J., & Lórencz, R. (2019). SPA and DPA attack on the A5/1 Stream Cipher. International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi).
  3. Jureček, M. (2019). Automatická detekcia škodlivého kódu. Počítačové Architektury a Diagnostika (PAD), 35–38.

2018

  1. Jureček, M., & Lórencz, R. (2018). Malware detection using a heterogeneous distance function. Computing and Informatics, 37(3), 759–780.