default search action
Martin Kopp
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i5]Vojtech Outrata, Michael Adam Polak, Martin Kopp:
Command-line Obfuscation Detection using Small Language Models. CoRR abs/2408.02637 (2024) - 2023
- [c10]Vojtech Outrata, Jaroslav Hlavác, Martin Kopp:
Behavioural Classification of Network Devices using Graph Structure of Private Networks. ITAT 2023: 14-24 - [c9]Jaroslav Hlavác, Martin Kopp, Jan Kohout, Tomás Skopal:
Class Representatives Selection in Non-metric Spaces for Nearest Prototype Classification. SISAP 2023: 111-124 - [i4]Thomas Schmitt, Jens Engel, Martin Kopp, Tobias Rodemann:
Implicit Incorporation of Heuristics in MPC-Based Control of a Hydrogen Plant. CoRR abs/2309.10660 (2023) - 2021
- [c8]Jaroslav Hlavác, Martin Kopp, Michael Polák, Jan Kohout:
Towards Reliable Network Entity Tracking Using Behavioural Bag of Words Representation. ITAT 2021: 53-60 - [c7]Paul Prasse, Jan Brabec, Jan Kohout, Martin Kopp, Lukás Bajer, Tobias Scheffer:
Learning Explainable Representations of Malware Behavior. ECML/PKDD (4) 2021: 53-68 - [i3]Paul Prasse, Jan Brabec, Jan Kohout, Martin Kopp, Lukás Bajer, Tobias Scheffer:
Learning Explainable Representations of Malware Behavior. CoRR abs/2106.12328 (2021) - [i2]Jaroslav Hlavác, Martin Kopp, Jan Kohout:
Cluster Representatives Selection in Non-Metric Spaces for Nearest Prototype Classification. CoRR abs/2107.01345 (2021) - [i1]Jan Kohout, Cenek Skarda, Kyrylo Shcherbin, Martin Kopp, Jan Brabec:
A framework for comprehensible multi-modal detection of cyber threats. CoRR abs/2111.05764 (2021) - 2020
- [j1]Martin Kopp, Tomás Pevný, Martin Holena:
Anomaly explanation with random forests. Expert Syst. Appl. 149: 113187 (2020)
2010 – 2019
- 2018
- [c6]Martin Kopp, Marek Jílek, Martin Holena:
Comparing rule mining approaches for classification with reasoning. ITAT 2018: 52-58 - [c5]Martin Kopp, Martin Grill, Jan Kohout:
Community-based anomaly detection. WIFS 2018: 1-6 - 2017
- [c4]Martin Kopp, Matej Nikl, Martin Holena:
Breaking CAPTCHAs with Convolutional Neural Networks. ITAT 2017: 93-99 - 2016
- [c3]Martin Kopp, Matous Pistora, Martin Holena:
How to Mimic Humans, Guide for Computers. ITAT 2016: 110-117 - [c2]Tomás Pevný, Martin Kopp, Jakub Kroustek, Andrew D. Ker:
Malicons: Detecting Payload in Favicons. Media Watermarking, Security, and Forensics 2016: 1-9 - 2015
- [c1]Martin Kopp, Martin Holena:
Evaluation of Association Rules Extracted during Anomaly Explanation. ITAT 2015: 143-149
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-14 02:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint