List of publications

2025

  1. Sharma, A., Jureček, M., & Stamp, M. (2025). Keystroke dynamics for user identification. In Machine Learning, Deep Learning and AI for Cybersecurity (pp. 601–622). Springer.
  2. Jurečková, O., Jureček, M., & Stamp, M. (2025). Online Clustering of Known and Emerging Malware Families. In Machine Learning, Deep Learning and AI for Cybersecurity (pp. 37–59). Springer.
  3. Peraus Benjamı́n, & Jureček, M. (2025). Reducing the Surface for Adversarial Attacks in Malware Detectors. In Machine Learning, Deep Learning and AI for Cybersecurity (pp. 231–266). Springer.
  4. Děd, L., & Jureček, M. (2025). Selecting Representative Samples from Malware Datasets. In Machine Learning, Deep Learning and AI for Cybersecurity (pp. 113–142). Springer.
  5. Kozák, M., & Jureček, M. (2025). Effectiveness of Adversarial Benign and Malware Examples in Evasion and Poisoning Attacks. In Machine Learning, Deep Learning and AI for Cybersecurity (pp. 267–290). Springer.
  6. Stamp, M., & Jureček, M. (2025). Machine Learning, Deep Learning and AI for Cybersecurity. Springer.

2024

  1. Louthánová, P., Kozák, M., Jureček, M., Stamp, M., & Di Troia, F. (2024). A comparison of adversarial malware generators. Journal of Computer Virology and Hacking Techniques, 20, 623–639.
  2. Kozák, M., Jureček, M., Stamp, M., & Troia, F. D. (2024). Creating valid adversarial examples of malware. Journal of Computer Virology and Hacking Techniques, 20, 607–621.
  3. Jurečková, O., Jureček, M., Stamp, M., Di Troia, F., & Lórencz, R. (2024). Classification and online clustering of zero-day malware. Journal of Computer Virology and Hacking Techniques, 20, 579–592.
  4. Shukla, A., Jureček, M., & Stamp, M. (2024). Social media bot detection using Dropout-GAN. Journal of Computer Virology and Hacking Techniques, 20, 669–680.
  5. Berušková, J., Jureček, M., & Jurečková, O. (2024). Reducing overdefined systems of polynomial equations derived from small scale variants of the AES via data mining methods. Journal of Computer Virology and Hacking Techniques, 20, 885–900.

2023

  1. Kozák, M., & Jureček, M. (2023). Combining Generators of Adversarial Malware Examples to Increase Evasion Rate. Int. Conf. on Security and Cryptography (SECRYPT), 778–786.

2022

  1. Kozák, M., Jureček, M., & Lórencz, R. (2022). Generation of Adversarial Malware and Benign Examples Using Reinforcement Learning. In Artificial Intelligence for Cybersecurity (pp. 3–25). Springer.
  2. Dolejš, J., & Jureček, M. (2022). Interpretability of Machine Learning-Based Results of Malware Detection Using a Set of Rules. In Artificial Intelligence for Cybersecurity (pp. 107–136). Springer.
  3. Bielik, M., Jureček, M., Jurečková, O., & Lórencz, R. (2022). Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. Int. Conf. on Security and Cryptography (SECRYPT), 415–427.
  4. Jureček, M., & Jurečková, O. (2022). Parallel Instance Filtering for Malware Detection. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 13–20.

2021

  1. Jureček, M., Jurečková, O., & Lórencz, R. (2021). Improving Classification of Malware Families using Learning a Distance Metric. Int. Conf. on Information Systems Security and Privacy (ICISSP), 643–652.
  2. Jureček, M., & Kozák, M. (2021). Representation of PE Files using LSTM Networks. Int. Conf. on Information Systems Security and Privacy (ICISSP), 516–525.
  3. Jureček, M., & Lórencz, R. (2021). Application of Distance Metric Learning to Automated Malware Detection. IEEE Access, 9, 96151–96165.

2020

  1. Jureček, M., & Lórencz, R. (2020). Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection. Int. Conf. on Information Systems Security and Privacy (ICISSP), 725–732.

2019

  1. Jureček, M., Buček, J., & Lórencz, R. (2019). Side-Channel Attack on the A5/1 Stream Cipher. 2019 22nd Euromicro Conference on Digital System Design (DSD), 633–638.
  2. Jureček, M., Buček, J., & Lórencz, R. (2019). SPA and DPA attack on the A5/1 Stream Cipher. International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi).
  3. Jureček, M. (2019). Automatická detekcia škodlivého kódu. Počítačové Architektury a Diagnostika (PAD), 35–38.

2018

  1. Jureček, M., & Lórencz, R. (2018). Malware detection using a heterogeneous distance function. Computing and Informatics, 37(3), 759–780.