List of publications

2023

  1. Kozák, M., & Jureček, M. (2023). Combining Generators of Adversarial Malware Examples to Increase Evasion Rate. Int. Conf. on Security and Cryptography (SECRYPT), 778–786.

2022

  1. Kozák, M., Jureček, M., & Lórencz, R. (2022). Generation of Adversarial Malware and Benign Examples Using Reinforcement Learning. In Artificial Intelligence for Cybersecurity (pp. 3–25). Springer.
  2. Dolejš, J., & Jureček, M. (2022). Interpretability of Machine Learning-Based Results of Malware Detection Using a Set of Rules. In Artificial Intelligence for Cybersecurity (pp. 107–136). Springer.
  3. Jureček, M., & Jurečková, O. (2022). Parallel Instance Filtering for Malware Detection. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 13–20.
  4. Bielik, M., Jureček, M., Jurečková, O., & Lórencz, R. (2022). Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. Int. Conf. on Security and Cryptography (SECRYPT), 415–427.

2021

  1. Jureček, M., Jurečková, O., & Lórencz, R. (2021). Improving Classification of Malware Families using Learning a Distance Metric. Int. Conf. on Information Systems Security and Privacy (ICISSP), 643–652.
  2. Jureček, M., & Lórencz, R. (2021). Application of Distance Metric Learning to Automated Malware Detection. IEEE Access, 9, 96151–96165.
  3. Jureček, M., & Kozák, M. (2021). Representation of PE Files using LSTM Networks. Int. Conf. on Information Systems Security and Privacy (ICISSP), 516–525.

2020

  1. Jureček, M., & Lórencz, R. (2020). Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection. Int. Conf. on Information Systems Security and Privacy (ICISSP), 725–732.

2019

  1. Jureček, M., Buček, J., & Lórencz, R. (2019). Side-Channel Attack on the A5/1 Stream Cipher. 2019 22nd Euromicro Conference on Digital System Design (DSD), 633–638.
  2. Jureček, M., Buček, J., & Lórencz, R. (2019). SPA and DPA attack on the A5/1 Stream Cipher. International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi).
  3. Jureček, M. (2019). Automatická detekcia škodlivého kódu. Počítačové Architektury a Diagnostika (PAD), 35–38.

2018

  1. Jureček, M., & Lórencz, R. (2018). Malware detection using a heterogeneous distance function. Computing and Informatics, 37(3), 759–780.