default search action
Ivan Homoliak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Kamil Malinka, Anton Firc, Petr Kaska, Tomás Lapsanský, Oskar Sandor, Ivan Homoliak:
Resilience of Voice Assistants to Synthetic Speech. ESORICS (1) 2024: 66-84 - [c23]Martin Peresíni, Tomás Hladký, Kamil Malinka, Ivan Homoliak:
DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains. HICSS 2024: 5960-5969 - [c22]Ivan Homoliak, Martin Peresíni:
SoK: Cryptocurrency Wallets - A Security Review and Classification based on Authentication Factors. ICBC 2024: 1-8 - [i24]Ivan Homoliak, Martin Peresíni:
SoK: Cryptocurrency Wallets - A Security Review and Classification based on Authentication Factors. CoRR abs/2402.17659 (2024) - [i23]Jakub Res, Ivan Homoliak, Martin Peresíni, Ales Smrcka, Kamil Malinka, Petr Hanácek:
Enhancing Security of AI-Based Code Synthesis with GitHub Copilot via Cheap and Efficient Prompt-Engineering. CoRR abs/2403.12671 (2024) - 2023
- [j10]Sarad Venugopalan, Ivana Stancíková, Ivan Homoliak:
Always on Voting: A Framework for Repetitive Voting on the Blockchain. IEEE Trans. Emerg. Top. Comput. 11(4): 1082-1092 (2023) - [c21]Martin Peresíni, Federico Matteo Bencic, Martin Hrubý, Kamil Malinka, Ivan Homoliak:
Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection. Blockchain 2023: 1-8 - [c20]Rastislav Budinský, Ivana Stancíková, Ivan Homoliak:
Mitigating Undercutting Attacks: Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule. Blockchain 2023: 25-32 - [c19]Ivan Homoliak, Zengpeng Li, Pawel Szalachowski:
BBB-Voting: Self-Tallying End-to-End Verifiable 1-out-of-k Blockchain-Based Boardroom Voting. Blockchain 2023: 297-306 - [c18]Jozef Drga, Ivan Homoliak, Juraj Vanco, Athanasios V. Vasilakos, Martin Peresíni, Petr Hanácek:
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. ICBC 2023: 1-4 - [c17]Ivana Stancíková, Ivan Homoliak:
SBvote: Scalable Self-Tallying Blockchain-Based Voting. SAC 2023: 203-211 - [i22]Rastislav Budinský, Ivan Homoliak, Ivana Stancíková:
Fee-Redistribution Smart Contracts for Transaction-Fee-Based Regime of Blockchains with the Longest Chain Rule. CoRR abs/2302.04910 (2023) - [i21]Martin Peresíni, Ivan Homoliak, Federico Matteo Bencic, Martin Hrubý, Kamil Malinka:
Incentive Attacks on DAG-Based Blockchains with Random Transaction Selection. CoRR abs/2305.16757 (2023) - [i20]Ivan Homoliak, Martin Peresíni, Patrik Holop, Jakub Handzus, Fran Casino:
CBDC-AquaSphere: Interoperable Central Bank Digital Currency Built on Trusted Computing and Blockchain. CoRR abs/2305.16893 (2023) - [i19]Martin Peresíni, Tomás Hladký, Kamil Malinka, Ivan Homoliak:
DAG-Sword: A Simulator of Large-Scale Network Topologies for DAG-Oriented Proof-of-Work Blockchains. CoRR abs/2311.04638 (2023) - 2022
- [j9]Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Yuval Elovici, Nils Ole Tippenhauer:
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version). IEEE Internet Things J. 9(12): 9640-9658 (2022) - [c16]Lenka Turonová, Lukás Holík, Ivan Homoliak, Ondrej Lengál, Margus Veanes, Tomás Vojnar:
Counting in Regexes Considered Harmful: Exposing ReDoS Vulnerability of Nonbacktracking Matchers. USENIX Security Symposium 2022: 4165-4182 - [d1]Ivan Homoliak, Petr Hanácek:
ASNM Datasets: A Collection of Network Traffic Data for Testing of Adversarial Classifiers and Network Intrusion Detectors. IEEE DataPort, 2022 - [i18]Ivana Stancíková, Ivan Homoliak:
SBvote: Scalable Self-Tallying Blockchain-Based Voting. CoRR abs/2206.06019 (2022) - [i17]Jozef Drga, Ivan Homoliak, Juraj Vanco, Martin Peresíni, Petr Hanácek:
Detecting and Preventing Credential Misuse in OTP-Based Two and Half Factor Authentication Toward Centralized Services Utilizing Blockchain-Based Identity Management. CoRR abs/2211.03490 (2022) - 2021
- [j8]Ivan Homoliak, Sarad Venugopalan, Daniël Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski:
The Security Reference Architecture for Blockchains: Toward a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. IEEE Commun. Surv. Tutorials 23(1): 341-390 (2021) - [j7]Fran Casino, Nikolaos Lykousas, Ivan Homoliak, Constantinos Patsakis, Julio C. Hernandez-Castro:
Intercepting Hail Hydra: Real-time detection of Algorithmically Generated Domains. J. Netw. Comput. Appl. 190: 103135 (2021) - [i16]Sarad Venugopalan, Ivan Homoliak:
Always on Voting: A Framework for Repetitive Voting on the Blockchain. CoRR abs/2107.10571 (2021) - [i15]Martin Peresíni, Federico Matteo Bencic, Kamil Malinka, Ivan Homoliak:
DAG-Oriented Protocols PHANTOM and GHOSTDAG under Incentive Attack via Transaction Selection Strategy. CoRR abs/2109.01102 (2021) - 2020
- [j6]Ivan Homoliak, Kamil Malinka, Petr Hanácek:
ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors. IEEE Access 8: 112427-112453 (2020) - [c15]Ivan Homoliak, Dominik Breitenbacher, Ondrej Hujnak, Pieter H. Hartel, Alexander Binder, Pawel Szalachowski:
SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. AFT 2020: 145-162 - [c14]Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun:
CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies. Blockchain 2020: 17-25 - [c13]Martin Ocenas, Ivan Homoliak, Petr Hanácek, Kamil Malinka:
Security and Encryption at Modern Databases. ICCSP 2020: 19-23 - [i14]Ivan Homoliak, Pawel Szalachowski:
Aquareum: A Centralized Ledger Enhanced with Blockchain and Trusted Computing. CoRR abs/2005.13339 (2020) - [i13]Qingze Hum, Wei Jin Tan, Shi Ying Tey, Latasha Lenus, Ivan Homoliak, Yun Lin, Jun Sun:
CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies. CoRR abs/2006.10280 (2020) - [i12]Fran Casino, Nikolaos Lykousas, Ivan Homoliak, Constantinos Patsakis, Julio C. Hernandez-Castro:
Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains. CoRR abs/2008.02507 (2020) - [i11]Sarad Venugopalan, Ivan Homoliak, Zengpeng Li, Pawel Szalachowski:
BBB-Voting: 1-out-of-k Blockchain-Based Boardroom Voting. CoRR abs/2010.09112 (2020)
2010 – 2019
- 2019
- [j5]Pieter H. Hartel, Ivan Homoliak, Daniël Reijsbergen:
An Empirical Study Into the Success of Listed Smart Contracts in Ethereum. IEEE Access 7: 177539-177555 (2019) - [j4]Ivan Homoliak, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martín Ochoa:
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Comput. Surv. 52(2): 30:1-30:40 (2019) - [j3]Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanácek:
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. EAI Endorsed Trans. Security Safety 5(17): e4 (2019) - [c12]Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Pawel Szalachowski:
A Security Reference Architecture for Blockchains. Blockchain 2019: 390-397 - [c11]Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici:
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. AsiaCCS 2019: 479-484 - [c10]Lukás Hellebrandt, Ivan Homoliak, Kamil Malinka, Petr Hanácek:
Increasing Trust in Tor Node List Using Blockchain. IEEE ICBC 2019: 29-32 - [c9]Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder:
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. IJCNN 2019: 1-10 - [c8]Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun:
StrongChain: Transparent and Collaborative Proof-of-Work Consensus. USENIX Security Symposium 2019: 819-836 - [i10]Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Pawel Szalachowski:
A Security Reference Architecture for Blockchains. CoRR abs/1904.06898 (2019) - [i9]Dominik Breitenbacher, Ivan Homoliak, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici:
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version). CoRR abs/1905.01027 (2019) - [i8]Pawel Szalachowski, Daniël Reijsbergen, Ivan Homoliak, Siwei Sun:
StrongChain: Transparent and Collaborative Proof-of-Work Consensus. CoRR abs/1905.09655 (2019) - [i7]Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder:
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. CoRR abs/1905.11831 (2019) - [i6]Pieter H. Hartel, Ivan Homoliak, Daniël Reijsbergen:
An Empirical Study into the Success of Listed Smart Contracts in Ethereum. CoRR abs/1908.11597 (2019) - [i5]Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniël Reijsbergen, Richard Schumi, Pawel Szalachowski:
The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses. CoRR abs/1910.09775 (2019) - [i4]Ivan Homoliak, Petr Hanácek:
ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors. CoRR abs/1910.10528 (2019) - 2018
- [j2]Athul Harilal, Flavio Toffalini, Ivan Homoliak, John Henry Castellanos, Juan Guarnizo, Soumik Mondal, Martín Ochoa:
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(1): 54-85 (2018) - [c7]Flavio Toffalini, Ivan Homoliak, Athul Harilal, Alexander Binder, Martín Ochoa:
Detection of Masqueraders Based on Graph Partitioning of File System Access Events. IEEE Symposium on Security and Privacy Workshops 2018: 217-227 - [i3]Ivan Homoliak, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martín Ochoa:
Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. CoRR abs/1805.01612 (2018) - [i2]Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanácek:
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach. CoRR abs/1805.02684 (2018) - [i1]Ivan Homoliak, Dominik Breitenbacher, Alexander Binder, Pawel Szalachowski:
An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets. CoRR abs/1812.03598 (2018) - 2017
- [j1]Ivan Homoliak, Dominik Breitenbacher, Petr Hanácek:
Convergence Optimization of Backpropagation Artificial Neural Network Used for Dichotomous Classification of Intrusion Detection Dataset. J. Comput. 12(2): 143-155 (2017) - [c6]Athul Harilal, Flavio Toffalini, John Henry Castellanos, Juan Guarnizo, Ivan Homoliak, Martín Ochoa:
TWOS: A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. MIST@CCS 2017: 45-56 - 2016
- [b1]Ivan Homoliak:
Detekce Útoků v Síťovém Provozu ; Intrusion Detection in Network Traffic. Brno University of Technology, Czech Republic, 2016 - [c5]Tomas Smetka, Ivan Homoliak, Petr Hanácek:
On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm. ICCST 2016: 1-8 - [c4]Ivan Homoliak, Martin Teknos, Maros Barabas, Petr Hanácek:
Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. SecureComm 2016: 770-773 - [c3]Ivan Homoliak, Ladislav Sulak, Petr Hanácek:
Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. WISA 2016: 66-78 - 2014
- [c2]Ivan Homoliak, Daniel Ovsonka, Karel Koranda, Petr Hanácek:
Characteristics of buffer overflow attacks tunneled in HTTP traffic. ICCST 2014: 1-6 - [c1]Ivan Homoliak, Daniel Ovsonka, Matej Grégr, Petr Hanácek:
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic. ICITST 2014: 310-317
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-17 21:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint