Our research interest spans multiple areas. We draw from our broad experience from successful research projects and collaborations with academia, industry, and government partners.

Cybersecurity Education

We gather knowledge of new cyber threats and train security professionals in correct and timely responses to these threats. We research innovative methods for learning cybersecurity skills, such as games and cyber defense exercises, from which we analyze data about learners’ interactions.

Selected Publications
  • ŠVÁBENSKÝ, Valdemar, Jan VYKOPAL, Pavel ČELEDA, Kristián TKÁČIK a Daniel POPOVIČ. Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering. Education and Information Technologies. Springer, 2022, -, č. 03, s. 1-32. ISSN 1360-2357. doi:10.1007/s10639-022-10954-4. (IF=2.917)
  • VYKOPAL, Jan, Valdemar ŠVÁBENSKÝ, Pavel ŠEDA a Pavel ČELEDA. Preventing Cheating in Hands-on Lab Assignments. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education (SIGCSE '22). New York, NY, USA: ACM, 2022. s. 78-84. ISBN 978-1-4503-9070-5. doi:10.1145/3478431.3499420. (CORE A, Best Paper Award)
  • ŠVÁBENSKÝ Valdemar, Jan VYKOPAL, Milan ČERMÁK and Martin LAŠTOVIČKA. Enhancing Cybersecurity Skills by Creating Serious Games. In Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education (ITiCSE). Larnaca, Cyprus: ACM, 2018. p. 194-199. DOI: 10.1145/3197091.3197123. (CORE A)

Training Environments

We develop virtualized, controlled, and monitored environments to simulate complex cyber systems and networks. These environments are further used for research and development of new security methods and tools, as well as cybersecurity education. The MUNI KYPO Portal presents our achievements in this area.

Selected Publications
  • VYKOPAL, Jan, Pavel ČELEDA, Pavel ŠEDA, Valdemar ŠVÁBENSKÝ a Daniel TOVARŇÁK. Scalable Learning Environments for Teaching Cybersecurity Hands-on. In 2021 IEEE Frontiers in Education Conference (FIE). New York, NY, USA: IEEE, 2021. s. 1-9. ISBN 978-1-6654-3851-3. doi:10.1109/FIE49875.2021.9637180. (CORE B)
  • VYKOPAL Jan, Martin VIZVÁRY, Radek OŠLEJŠEK, Pavel ČELEDA and Daniel TOVARŇÁK. Lessons Learned from Complex Hands-on Defence Exercises in a Cyber Range. In 2017 IEEE Frontiers in Education Conference (FIE). Indianapolis, USA: IEEE, 2017. p. 1-8. DOI: 10.1109/FIE.2017.8190713. (CORE B)

Network Security

We focus on technologies enabling security analyses over big data. We research mechanisms for intrusion/anomaly detection and malware mitigation through data acquisition, collaborative analysis, information sharing, and automated decision support.

Selected Publications
  • HUSÁK Martin, Jana KOMÁRKOVÁ, Elias BOU-HARB and Pavel ČELEDA. Survey of Attack Projection, Prediction, and Forecasting in Cyber Security. IEEE Communications Surveys and Tutorials, 2019. ISSN 1553-877X. DOI: 10.1109/COMST.2018.2871866. (D1, IF=20.230)
  • REHÁK Martin, Michal PĚCHOUČEK, Martin GRILL, Jan STIBOREK, Karel BARTOŠ and Pavel ČELEDA. Adaptive Multiagent System for Network Traffic Monitoring. IEEE Intelligent Systems, 2009, vol. 24, No 3, p. 16-25. ISSN 1541-1672. DOI: 10.1109/MIS.2009.42. (D1, IF=3.144)

Network Monitoring 

We aim to reliably measure and analyze network data to understand current and emerging threats. We research ways to generate, collect, and analyze large volumes of data in ever-evolving networks.

Selected Publications
  • JIRSÍK Tomáš, Milan ČERMÁK, Daniel TOVARŇÁK and Pavel ČELEDA. Toward Stream-Based IP Flow Analysis. IEEE Communications Magazine, 2017, vol. 55, No 7, p. 70-76. ISSN 0163-6804. DOI: 10.1109/MCOM.2017.1600972. (D1, IF=9.270)
  • HOFSTEDE Rick, Pavel ČELEDA, Brian TRAMMELL, Idilio DRAGO, Ramin SADRE, Anna SPEROTTO and Aiko PRAS. Flow Monitoring Explained: From Packet Capture to Data Analysis with NetFlow and IPFIX. IEEE Communications Surveys and Tutorials, 2014, vol. 16, No 4, p. 2037-2064. ISSN 1553-877X. DOI: 10.1109/COMST.2014.2321898. (D1, IF=6.806)

You are running an old browser version. We recommend updating your browser to its latest version.

More info