Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kamil Malinka is active.

Publication


Featured researches published by Kamil Malinka.


international conference on internet monitoring and protection | 2008

Peer-to-Peer Networks Security

Jiri Schafer; Kamil Malinka; Petr Hanacek

In this work wepsilare dealing with security in highly distributed systems, namely in peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them against real world data. This should lead to creation of models for peer-to-peer networks defense and for detection of Malware spreading. Also we are proposing our system for automatic downloading and detection of new viruses in peer-to-peer networks with all possible extensions.


international carnahan conference on security technology | 2008

E-banking security - comparative study

Petr Hanaek; Kamil Malinka; Jiri Schafer

In this article wepsilare dealing with security of bankpsilas applications remote access. This article summarizes basic forms of electronic banking and wildly used authentication and authorization methods. There is needed to access each one separately because of different approaches for different types of communication paths (for e.g. telephonic banking, internet banking).


international conference on internet monitoring and protection | 2009

Security in Peer-to-Peer Networks: Empiric Model of File Diffusion in BitTorrent

Jiri Schafer; Kamil Malinka

In this work we analyze propagation of files in the BitTorrent network. The paper covers security problems in peer-to-peer networks and establishes a malware propagation model. We give overview of existing models and their weaknesses and introduce a propagation or epidemiological model based on model based on real data and real user behavior in the peer-to-peer network BitTorrent. We describe our empirical epidemiological model in detail and propose some advanced strategies which can help in fight against malware. Further we present our empiric, as its application.


IEEE Aerospace and Electronic Systems Magazine | 2010

e-banking security - A comparative study

Petr Hanacek; Kamil Malinka; Jiri Schafer

Herein we are dealing with the security of banks applications remote access. This article summarizes basic forms of electronic banking and widely used authentication and authorization methods. There is a need to access each one separately because of different approaches for different types of communication paths (telephonic banking, internet banking, etc.).


international carnahan conference on security technology | 2011

Evaluation of biometric authentication based on visual evoked potentials

Kamil Malinka; Petr Hanacek; Michal Trzos

This article is dealing with biometric authentication. We propose an analysis of challenge-response approach usability together with an appropriate candidate for such an approach — visual evoked potentials (VEP). Their physiological properties and recognition capabilities are presented. We design and implement methods covering all phases necessary for processing VEP as a biometric characteristic and perform them on a test database. The efficiency of our approach is presented in an appropriate way. We also propose our design of a biometric authentication system based on the VEP characteristic.


international conference on internet monitoring and protection | 2009

Development of Social Networks in Email Communication

Kamil Malinka; Jiri Schafer

In this paper, we perform an empirical analysis of email traffic logs obtained from a large university to better understand the development of social networks. We analyzed data containing records of emails sent over a period of 10 months – the largest dataset we are aware of. We study the long term evolution of social networks on real world data. The initial analysis of data is followed by an exploration of existence of how social network impacts the anonymity. We describe possibilities of modeling social network and describe dynamics of their development. Based on our result we design attack of proper selection, which could cause higher successfulness of disclosure attacks.


international conference on internet monitoring and protection | 2009

Usability of Visual Evoked Potentials as Behavioral Characteristics for Biometric Authentication

Kamil Malinka

Biometric authentication methods are one of three approaches currently used. They offer a lot of benefits as well as they have few disadvantages. One of these disadvantages is low level of flexibility. It’s not possible to change your biometric characteristic or even to increase number of your characteristics. This could be problem if we consider many systems with different level of security. Corruption of system with low level of security could help attacker to gain access to system with higher level of security. Solution of this problem could lie in use of behavioral biometric. The article introduces challenge-response approach in this area. We discuss possibilities of challenge-response biometric authentication and show new behavioral biometric suitable for this approach – visual evoked potentials. We give description of physiological features of this characteristic, discuss this properties and usability. We try to answer the question if it’s suitable only for liveness testing or it’s possible to use it for full authentication. Further we present design of prototype challenge-response biometric authentication system which takes advantage of visual evoked potentials.


international carnahan conference on security technology | 2008

Malware spreading models in peer-to-peer networks

Jiri Schafer; Kamil Malinka; Petr Hanacek

In this article we are dealing with security problems of peer-to-peer networks, with malware propagation model, establishing empirical model of file propagation in peer-to-peer networks and we are describing our system for automatic file downloading.


Archive | 2012

Behavioural Patterns and Social Networks in Anonymity Systems

Kamil Malinka; Petr Hanacek

This chapter deals with anonymous communication. Our aim is to extend knowledge of the security limits of anonymity systems with information based on real-world traffic data. We perform a set of analyses targeting the behavioural patterns of users and their impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested in are inter-arrival times and the number of messages sent by an individual user. The importance of our analyses’ results for the design and implementation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identifiable social networks and their development in time are presented in the context of the security of anonymous systems.


Data Security Management | 2015

Právní aspekty interních instrukcí – část II.

Radim Polčák; Zdeněk Říha; Kamil Malinka

Collaboration


Dive into the Kamil Malinka's collaboration.

Top Co-Authors

Avatar

Jiri Schafer

Brno University of Technology

View shared research outputs
Top Co-Authors

Avatar

Petr Hanacek

Brno University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge