Diploma and bachelor theses

diploma

DEBUG: found in cache:
TypeAuthor and work titleSupervisorYearprogdisc
BP Babayeva Elnaz: Algorithm with Quality-Runtime Tradeoff Parameter for Attack Policy Algorithm in Attack Graphs for Network Security (PDF)Durkota Karel 2016 OI Informatika a počítačové vědy
BP Gavenčiak Karel: Learn and Predict Metasploit Exploit Ranks from Available Vulnerability Information (PDF)Durkota Karel 2016 OI Informatika a počítačové vědy
DP Labuť Martin: Estimating the Attacker's Cost for Exploiting Computer Network Vulnerabilities Durkota Karel 2016 OI Umělá inteligence
Responsible person: Petr Pošík