Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jiří Novotný is active.

Publication


Featured researches published by Jiří Novotný.


field-programmable logic and applications | 2003

Project of IPv6 Router with FPGA Hardware Accelerator

Jiří Novotný; Otto Fucik; David Antoš

This paper deals with a hardware accelerator as a part of the Liberouter project which is focused on design and implementation of a PC based IPv6 router. Major part of the Liberouter project is the development of a hardware accelerator – the PCI board called COMBO6 and its FPGA design which allows processing most of the network traffic in hardware.


Archive | 2012

Dependable Networks and Services

Ramin Sadre; Jiří Novotný; Pavel Čeleda; Martin Waldburger; Burkhard Stiller

The threat landscape is continuously evolving. Large, widespread worm infections are leaving more and more space to more stealthy attacks targeting highly valuable targets. Industrial Control Systems (ICS) are rapidly becoming a new major target of cyber-criminals: ICS are evolving, bringing powerful capabilities into the critical infrastructure environment along with new and yet undiscovered threats. This was pointed out in multiple occasions by security experts and was confirmed by a recent survey carried out by Symantec: according to the survey (http://bit.ly/bka8UF), 53% of a total of 1580 critical infrastructure industries have admitted to being targeted by cyber attacks. The survey implies that the incidents reported by the press over the last several years are nothing but the tip of a considerably larger problem: the vast majority of these incidents has never been disclosed. Moreover, when looking at the few publicly disclosed incidents such as Stuxnet, we see a completely different level of sophistication, compared to traditional malware witnessed in the wild in previous years. This talk will dive into the challenges and the opportunities associated to ICS security research, and on the tools at our disposal to improve our ability to protect such critical environments. Ontology-Driven Dynamic Discovery and Distributed Coordination of a Robot Swarm Niels Bouten, Anna Hristoskova, Femke Ongenae, Jelle Nelis, and Filip De Turck Ghent University Department of Information Technology IBBT Gaston Crommenlaan 8/201, B-9050 Ghent, Belgium {niels.bouten,anna.hristoskova,femke.ongenae, jelle.nelis,filip.deturck}@intec.ugent.be http://ibcn.intec.ugent.be Abstract. Swarm robotic systems rely heavily on dynamic interactions to provide interoperability between the different autonomous robots. In Swarm robotic systems rely heavily on dynamic interactions to provide interoperability between the different autonomous robots. In current systems, interactions between robots are programmed into the applications controlling them. Incorporating service discovery into these applications allows the robots to dynamically discover other devices. However, since most of these mechanisms use syntax-based matching, the robots cannot reason about the offered functionality. Moreover, as contextual information is often not included in the matching process, it is impossible for robots to select the most suitable device under the current context. This paper aims to tackle these issues by proposing a framework for semantic service discovery in a dynamically changing environment. A semantic layer was added to an existing discovery protocol, offering a semantic interface. Using this framework, services can be searched based on what they offer, with services best suiting the current context yielding the highest matching scores.


CEEMAS '07 Proceedings of the 5th international Central and Eastern European conference on Multi-Agent Systems and Applications V | 2007

Agent-Based Network Protection Against Malicious Code

Martin Rehak; Michal Pěchouček; Jan Tožička; Magda Prokopová; David Medvigy; Jiří Novotný

This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e.g. worms) and related threats. Agents are not only used as a system-integration platform, but we use modern agent approaches to trust modeling and distributed task allocation to efficiently detect and also counter the attack by automatically created and deployed filters. The ability of the system to react autonomously, without direct human supervision, is crucial in countering the fast-spreading worms, that employ efficient scanning strategies to immediately spread farther once they infect a single host in the network.


Archive | 2010

Hardware Acceleration for Cyber Security

Jiří Novotný; Pavel Čeleda; Tomáš Dedek; Radek Krejčí


Archive | 2009

CAMNEP: Multistage Collective Network Behavior Analysis Systemwith Hardware Accelerated NetFlow Probes

Martin Rehak; Pavel Čeleda; Michal Pěchouček; Jiří Novotný


Archive | 2003

Liberouter---New Way in IPv6 Routers

Jiří Novotný; Otto Fucik; David Antoš


Archive | 2012

Proceedings of the 6th IFIP WG 6.6 international autonomous infrastructure, management, and security conference on Dependable Networks and Services

Ramin Sadre; Jiří Novotný; Pavel Čeleda; Martin Waldburger; Burkhard Stiller


Archive | 2012

Dependable Networks and Services, 6th IFIP WG 6.6 InternationalConference on Autonomous Infrastructure, Management, andSecurity, AIMS 2012

Ramin Sadre; Jiří Novotný; Pavel Čeleda; Martin Waldburger; Burkhard Stiller


Archive | 2010

Hardware Acceleration: An Essential Part of Cyber Security inHigh-Speed Networks

Jiří Novotný; Pavel Čeleda; Radek Krejčí


Archive | 2010

NfSen Plugin Supporting the Virtual Network Monitoring

Vojtěch Krmíček; Pavel Čeleda; Jiří Novotný

Collaboration


Dive into the Jiří Novotný's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michal Pěchouček

Czech Technical University in Prague

View shared research outputs
Top Co-Authors

Avatar

Otto Fucik

Brno University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Medvigy

Czech Technical University in Prague

View shared research outputs
Researchain Logo
Decentralizing Knowledge