List of publications
2024
- Louthánová, P., Kozák, M., Jureček, M., Stamp, M., & Di Troia, F. (2024). A comparison of adversarial malware generators. Journal of Computer Virology and Hacking Techniques, 20, 623–639.
- Kozák, M., Jureček, M., Stamp, M., & Troia, F. D. (2024). Creating valid adversarial examples of malware. Journal of Computer Virology and Hacking Techniques, 20, 607–621.
- Jurečková, O., Jureček, M., Stamp, M., Di Troia, F., & Lórencz, R. (2024). Classification and online clustering of zero-day malware. Journal of Computer Virology and Hacking Techniques, 20, 579–592.
- Berušková, J., Jureček, M., & Jurečková, O. (2024). Reducing overdefined systems of polynomial equations derived from small scale variants of the AES via data mining methods. Journal of Computer Virology and Hacking Techniques, 20, 885–900.
2023
- Kozák, M., & Jureček, M. (2023). Combining Generators of Adversarial Malware Examples to Increase Evasion Rate. Int. Conf. on Security and Cryptography (SECRYPT), 778–786.
2022
- Dolejš, J., & Jureček, M. (2022). Interpretability of Machine Learning-Based Results of Malware Detection Using a Set of Rules. In Artificial Intelligence for Cybersecurity (pp. 107–136). Springer.
- Bielik, M., Jureček, M., Jurečková, O., & Lórencz, R. (2022). Yet Another Algebraic Cryptanalysis of Small Scale Variants of AES. Int. Conf. on Security and Cryptography (SECRYPT), 415–427.
- Jureček, M., & Jurečková, O. (2022). Parallel Instance Filtering for Malware Detection. 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 13–20.
- Kozák, M., Jureček, M., & Lórencz, R. (2022). Generation of Adversarial Malware and Benign Examples Using Reinforcement Learning. In Artificial Intelligence for Cybersecurity (pp. 3–25). Springer.
2021
- Jureček, M., & Lórencz, R. (2021). Application of Distance Metric Learning to Automated Malware Detection. IEEE Access, 9, 96151–96165.
- Jureček, M., Jurečková, O., & Lórencz, R. (2021). Improving Classification of Malware Families using Learning a Distance Metric. Int. Conf. on Information Systems Security and Privacy (ICISSP), 643–652.
- Jureček, M., & Kozák, M. (2021). Representation of PE Files using LSTM Networks. Int. Conf. on Information Systems Security and Privacy (ICISSP), 516–525.
2020
- Jureček, M., & Lórencz, R. (2020). Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware Detection. Int. Conf. on Information Systems Security and Privacy (ICISSP), 725–732.
2019
- Jureček, M., Buček, J., & Lórencz, R. (2019). Side-Channel Attack on the A5/1 Stream Cipher. 2019 22nd Euromicro Conference on Digital System Design (DSD), 633–638.
- Jureček, M., Buček, J., & Lórencz, R. (2019). SPA and DPA attack on the A5/1 Stream Cipher. International Workshop on Cryptographic Architectures Embedded in Reconfigurable Devices (CryptArchi).
- Jureček, M. (2019). Automatická detekcia škodlivého kódu. Počítačové Architektury a Diagnostika (PAD), 35–38.
2018
- Jureček, M., & Lórencz, R. (2018). Malware detection using a heterogeneous distance function. Computing and Informatics, 37(3), 759–780.