default search action
Kamil Malinka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Jakub Vostoupal, Václav Stupka, Jakub Harasta, Frantisek Kasl, Pavel Loutocký, Kamil Malinka:
The legal aspects of cybersecurity vulnerability disclosure: To the NIS 2 and beyond. Comput. Law Secur. Rev. 53: 105988 (2024) - [j4]Kamil Malinka, Anton Firc, Milan Salko, Daniel Prudký, Karolína Radacovská, Petr Hanácek:
Comprehensive multiparametric analysis of human deepfake speech recognition. EURASIP J. Image Video Process. 2024(1): 24 (2024) - [c17]Andrej Kristofík, Jakub Vostoupal, Kamil Malinka, Frantisek Kasl, Pavel Loutocký:
Beyond the Bugs: Enhancing Bug Bounty Programs through Academic Partnerships. ARES 2024: 106:1-106:8 - [c16]Kamil Malinka, Anton Firc, Petr Kaska, Tomás Lapsanský, Oskar Sandor, Ivan Homoliak:
Resilience of Voice Assistants to Synthetic Speech. ESORICS (1) 2024: 66-84 - [c15]Martin Peresíni, Tomás Hladký, Kamil Malinka, Ivan Homoliak:
DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains. HICSS 2024: 5960-5969 - [c14]Kamil Malinka, Anton Firc, Pavel Loutocký, Jakub Vostoupal, Andrej Kristofík, Frantisek Kasl:
Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report. ITiCSE (1) 2024 - [c13]Anton Firc, Kamil Malinka, Petr Hanácek:
Deepfake Speech Detection: A Spectrogram Analysis. SAC 2024: 1312-1320 - [c12]Milan Salko, Anton Firc, Kamil Malinka:
Security Implications of Deepfakes in Face Authentication. SAC 2024: 1376-1384 - [i6]Jakub Res, Ivan Homoliak, Martin Peresíni, Ales Smrcka, Kamil Malinka, Petr Hanácek:
Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering. CoRR abs/2403.12671 (2024) - [i5]Kamil Malinka, Anton Firc, Pavel Loutocký, Jakub Vostoupal, Andrej Kristofík, Frantisek Kasl:
Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report. CoRR abs/2404.12043 (2024) - 2023
- [c11]Filip Plesko, Tomás Goldmann, Kamil Malinka:
Facial Image Reconstruction and its Influence to Face Recognition. BIOSIG 2023: 1-5 - [c10]Daniel Prudký, Anton Firc, Kamil Malinka:
Assessing the Human Ability to Recognize Synthetic Speech in Ordinary Conversation. BIOSIG 2023: 1-5 - [c9]Martin Peresíni, Federico Matteo Bencic, Martin Hrubý, Kamil Malinka, Ivan Homoliak:
Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection. Blockchain 2023: 1-8 - [c8]Ondrej Hujnak, Kamil Malinka, Petr Hanácek:
Indirect Bluetooth Low Energy Connection Detection. ICOIN 2023: 328-333 - [c7]Jan Zboril, Ondrej Hujnak, Kamil Malinka:
IoT Gateways Network Communication Analysis. ICOIN 2023: 334-339 - [c6]Kamil Malinka, Martin Peresíni, Anton Firc, Ondrej Hujnak, Filip Janus:
On the Educational Impact of ChatGPT: Is Artificial Intelligence Ready to Obtain a University Degree? ITiCSE (1) 2023: 47-53 - [i4]Kamil Malinka, Martin Peresíni, Anton Firc, Ondrej Hujnak, Filip Janus:
On the Educational Impact of ChatGPT: Is Artificial Intelligence Ready to Obtain a University Degree? CoRR abs/2303.11146 (2023) - [i3]Martin Peresíni, Ivan Homoliak, Federico Matteo Bencic, Martin Hrubý, Kamil Malinka:
Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection. CoRR abs/2305.16757 (2023) - [i2]Martin Peresíni, Tomás Hladký, Kamil Malinka, Ivan Homoliak:
DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains. CoRR abs/2311.04638 (2023) - 2022
- [j3]Kamil Malinka, Ondrej Hujnak, Petr Hanácek, Lukás Hellebrandt:
E-Banking Security Study - 10 Years Later. IEEE Access 10: 16681-16699 (2022) - [j2]Vashek Matyas, Kamil Malinka, Lydia Kraus, Lenka Knapova, Agata Kruzikova:
Even if users do not read security directives, their behavior is not so catastrophic. Commun. ACM 65(1): 37-40 (2022) - [c5]Anton Firc, Kamil Malinka:
The dawn of a text-dependent society: deepfakes as a threat to speech verification systems. SAC 2022: 1646-1655 - 2021
- [i1]Martin Peresíni, Federico Matteo Bencic, Kamil Malinka, Ivan Homoliak:
DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy. CoRR abs/2109.01102 (2021) - 2020
- [j1]Ivan Homoliak, Kamil Malinka, Petr Hanácek:
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access 8: 112427-112453 (2020) - [c4]Martin Ocenas, Ivan Homoliak, Petr Hanácek, Kamil Malinka:
Security and Encryption at Modern Databases. ICCSP 2020: 19-23
2010 – 2019
- 2019
- [c3]Lukás Hellebrandt, Ivan Homoliak, Kamil Malinka, Petr Hanácek:
Increasing Trust in Tor Node List Using Blockchain. IEEE ICBC 2019: 29-32 - 2015
- [c2]Vlasta Stavova, Vashek Matyas, Kamil Malinka:
The Challenge of Increasing Safe Response of Antivirus Software Users. MEMICS 2015: 133-143 - 2011
- [c1]Kamil Malinka, Petr Hanácek, Michal Trzos:
Evaluation of biometric authentication based on visual evoked potentials. ICCST 2011: 1-7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint