default search action
Jan Vykopal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Ján Dovjak:
Automated feedback for participants of hands-on cybersecurity training. Educ. Inf. Technol. 29(9): 11555-11584 (2024) - [c35]Valdemar Svábenský, Jan Vykopal, Martin Horák, Martin Hofbauer, Pavel Celeda:
From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises. ITiCSE (1) 2024 - [c34]Jan Vykopal, Pavel Celeda, Valdemar Svábenský, Martin Hofbauer, Martin Horák:
Research and Practice of Delivering Tabletop Exercises. ITiCSE (1) 2024 - [i22]Jan Vykopal, Pavel Celeda, Valdemar Svábenský, Martin Hofbauer, Martin Horák:
Research and Practice of Delivering Tabletop Exercises. CoRR abs/2404.10206 (2024) - [i21]Valdemar Svábenský, Jan Vykopal, Martin Horák, Martin Hofbauer, Pavel Celeda:
From Paper to Platform: Evolution of a Novel Learning Environment for Tabletop Exercises. CoRR abs/2404.10988 (2024) - [i20]Valdemar Svábenský, Kristián Tkácik, Aubrey Birdwell, Richard Weiss, Ryan S. Baker, Pavel Celeda, Jan Vykopal, Jens Mache, Ankur Chattopadhyay:
Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments. CoRR abs/2408.08531 (2024) - 2023
- [j7]Razvan Beuran, Jan Vykopal, Daniela Belajová, Pavel Celeda, Yasuo Tan, Yoichi Shinoda:
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. Comput. Secur. 128: 103120 (2023) - [j6]Jan Vykopal, Pavel Seda, Valdemar Svábenský, Pavel Celeda:
Smart Environment for Adaptive Learning of Cybersecurity Skills. IEEE Trans. Learn. Technol. 16(3): 443-456 (2023) - [c33]Lydia Kraus, Valdemar Svábenský, Martin Horák, Vashek Matyás, Jan Vykopal, Pavel Celeda:
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. ITiCSE (1) 2023: 236-242 - [i19]Jan Vykopal, Pavel Seda, Valdemar Svábenský, Pavel Celeda:
Smart Environment for Adaptive Learning of Cybersecurity Skills. CoRR abs/2307.05281 (2023) - [i18]Lydia Kraus, Valdemar Svábenský, Martin Horák, Vashek Matyás, Jan Vykopal, Pavel Celeda:
Want to Raise Cybersecurity Awareness? Start with Future IT Professionals. CoRR abs/2307.07608 (2023) - [i17]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Lydia Kraus:
Applications of Educational Data Mining and Learning Analytics on Data From Cybersecurity Training. CoRR abs/2307.08582 (2023) - [i16]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Kristián Tkácik, Daniel Popovic:
Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering. CoRR abs/2307.10260 (2023) - 2022
- [j5]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Kristián Tkácik, Daniel Popovic:
Student assessment in cybersecurity training automated by pattern mining and clustering. Educ. Inf. Technol. 27(7): 9231-9262 (2022) - [j4]Valdemar Svábenský, Jan Vykopal, Pavel Celeda, Lydia Kraus:
Applications of educational data mining and learning analytics on data from cybersecurity training. Educ. Inf. Technol. 27(9): 12179-12212 (2022) - [c32]Sufatrio, Jan Vykopal, Ee-Chien Chang:
Collaborative Paradigm of Teaching Penetration Testing using Real-World University Applications. ACE 2022: 114-122 - [c31]Pavel Seda, Jan Vykopal, Pavel Celeda, Igor Ignác:
Designing Adaptive Cybersecurity Hands-on Training. FIE 2022: 1-8 - [c30]Jan Vykopal, Valdemar Svábenský, Pavel Seda, Pavel Celeda:
Preventing Cheating in Hands-on Lab Assignments. SIGCSE (1) 2022: 78-84 - [c29]Valdemar Svábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Celeda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay:
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. SIGCSE (1) 2022: 787-793 - [i15]Jan Vykopal, Valdemar Svábenský, Pavel Seda, Pavel Celeda:
Preventing Cheating in Hands-on Lab Assignments. CoRR abs/2201.01154 (2022) - [i14]Pavel Seda, Jan Vykopal, Valdemar Svábenský, Pavel Celeda:
Reinforcing Cybersecurity Hands-on Training With Adaptive Learning. CoRR abs/2201.01574 (2022) - 2021
- [j3]Valdemar Svábenský, Pavel Celeda, Jan Vykopal, Silvia Brisáková:
Cybersecurity knowledge and skills taught in capture the flag challenges. Comput. Secur. 102: 102154 (2021) - [j2]Radek Oslejsek, Vít Rusnák, Karolína Dockalová Burská, Valdemar Svábenský, Jan Vykopal, Jakub Cegan:
Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. IEEE Trans. Vis. Comput. Graph. 27(8): 3425-3437 (2021) - [c28]Pavel Seda, Jan Vykopal, Valdemar Svábenský, Pavel Celeda:
Reinforcing Cybersecurity Hands-on Training With Adaptive Learning. FIE 2021: 1-9 - [c27]Valdemar Svábenský, Jan Vykopal, Daniel Tovarnák, Pavel Celeda:
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. FIE 2021: 1-9 - [c26]Jan Vykopal, Pavel Celeda, Pavel Seda, Valdemar Svábenský, Daniel Tovarnák:
Scalable Learning Environments for Teaching Cybersecurity Hands-on. FIE 2021: 1-9 - [c25]Miriam Gáliková, Valdemar Svábenský, Jan Vykopal:
Toward Guidelines for Designing Cybersecurity Serious Games. SIGCSE 2021: 1275 - [i13]Valdemar Svábenský, Pavel Celeda, Jan Vykopal, Silvia Brisáková:
Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges. CoRR abs/2101.01421 (2021) - [i12]Jan Vykopal, Pavel Celeda, Pavel Seda, Valdemar Svábenský, Daniel Tovarnák:
Scalable Learning Environments for Teaching Cybersecurity Hands-on. CoRR abs/2110.10004 (2021) - [i11]Valdemar Svábenský, Richard Weiss, Jack Cook, Jan Vykopal, Pavel Celeda, Jens Mache, Radoslav Chudovský, Ankur Chattopadhyay:
Evaluating Two Approaches to Assessing Student Progress in Cybersecurity Exercises. CoRR abs/2112.02053 (2021) - [i10]Valdemar Svábenský, Jan Vykopal, Daniel Tovarnák, Pavel Celeda:
Toolset for Collecting Shell Commands and Its Application in Hands-on Cybersecurity Training. CoRR abs/2112.11118 (2021) - 2020
- [c24]Valdemar Svábenský, Jan Vykopal, Pavel Celeda:
What Are Cybersecurity Education Papers About?: A Systematic Literature Review of SIGCSE and ITiCSE Conferences. SIGCSE 2020: 2-8 - [c23]Jan Vykopal, Valdemar Svábenský, Ee-Chien Chang:
Benefits and Pitfalls of Using Capture the Flag Games in University Courses. SIGCSE 2020: 752-758 - [c22]Pavel Celeda, Jan Vykopal, Valdemar Svábenský, Karel Slávicek:
KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. SIGCSE 2020: 1026-1032 - [i9]Radek Oslejsek, Vít Rusnák, Karolína Dockalová Burská, Valdemar Svábenský, Jan Vykopal, Jakub Cegan:
Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training. CoRR abs/2003.03610 (2020) - [i8]Jan Vykopal, Valdemar Svábenský, Ee-Chien Chang:
Benefits and Pitfalls of Using Capture the Flag Games in University Courses. CoRR abs/2004.11556 (2020) - [i7]Pavel Celeda, Jan Vykopal, Valdemar Svábenský, Karel Slávicek:
KYPO4INDUSTRY: A Testbed for Teaching Cybersecurity of Industrial Control Systems. CoRR abs/2004.11575 (2020)
2010 – 2019
- 2019
- [c21]Valdemar Svábenský, Jan Vykopal, Pavel Celeda:
Towards Learning Analytics in Cybersecurity Capture the Flag Games. SIGCSE 2019: 1255 - [c20]Radek Oslejsek, Vít Rusnák, Karolína Dockalová Burská, Valdemar Svábenský, Jan Vykopal:
Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. VizSEC 2019: 1-11 - [i6]Valdemar Svábenský, Jan Vykopal:
Gathering Insights from Teenagers' Hacking Experience with Authentic Cybersecurity Tools. CoRR abs/1903.04174 (2019) - [i5]Valdemar Svábenský, Jan Vykopal, Pavel Celeda:
What Are Cybersecurity Education Papers About? A Systematic Literature Review of SIGCSE and ITiCSE Conferences. CoRR abs/1911.11675 (2019) - [i4]Radek Oslejsek, Vít Rusnák, Karolína Dockalová Burská, Valdemar Svábenský, Jan Vykopal:
Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study. CoRR abs/1912.10781 (2019) - 2018
- [c19]Radek Oslejsek, Jan Vykopal, Karolína Dockalová Burská, Vít Rusnák:
Evaluation of Cyber Defense Exercises Using Visual Analytics Process. FIE 2018: 1-9 - [c18]Valdemar Svábenský, Jan Vykopal:
Gathering Insights from Teenagers' Hacking Experience with Authentic Cybersecurity Tools. FIE 2018: 1-4 - [c17]Valdemar Svábenský, Jan Vykopal, Milan Cermák, Martin Lastovicka:
Enhancing cybersecurity skills by creating serious games. ITiCSE 2018: 194-199 - [c16]Valdemar Svábenský, Jan Vykopal:
Challenges Arising from Prerequisite Testing in Cybersecurity Games. SIGCSE 2018: 56-61 - [c15]Jan Vykopal, Radek Oslejsek, Karolína Dockalová Burská, Kristína Zákopcanová:
Timely Feedback in Unstructured Cybersecurity Exercises. SIGCSE 2018: 173-178 - [i3]Valdemar Svábenský, Jan Vykopal, Milan Cermák, Martin Lastovicka:
Enhancing Cybersecurity Skills by Creating Serious Games. CoRR abs/1804.03567 (2018) - 2017
- [c14]Jan Vykopal, Martin Vizváry, Radek Oslejsek, Pavel Celeda, Daniel Tovarnák:
Lessons learned from complex hands-on defence exercises in a cyber range. FIE 2017: 1-8 - [c13]Jan Vykopal, Radek Oslejsek, Pavel Celeda, Martin Vizváry, Daniel Tovarnák:
KYPO Cyber Range: Design and Use Cases. ICSOFT 2017: 310-321 - [c12]Martin Husák, Milan Cermák, Martin Lastovicka, Jan Vykopal:
Exchanging security events: Which and how many alerts can we aggregate? IM 2017: 604-607 - [c11]Jan Vykopal, Jakub Cegan:
Finding Exercise Equilibrium: How to Support the Game Balance at the Very Beginning? (Abstract Only). SIGCSE 2017: 719 - [i2]Valdemar Svábenský, Jan Vykopal:
Challenges Arising from Prerequisite Testing in Cybersecurity Games. CoRR abs/1712.03163 (2017) - [i1]Jan Vykopal, Radek Oslejsek, Karolína Dockalová Burská, Kristína Zákopcanová:
Timely Feedback in Unstructured Cybersecurity Exercises. CoRR abs/1712.09424 (2017) - 2016
- [c10]Jan Vykopal, Milos Barták:
On the Design of Security Games: From Frustrating to Engaging Learning. ASE @ USENIX Security Symposium 2016 - 2015
- [c9]Martin Husák, Petr Velan, Jan Vykopal:
Security Monitoring of HTTP Traffic Using Extended Flows. ARES 2015: 258-265 - 2014
- [j1]Martin Drasar, Martin Vizváry, Jan Vykopal:
Similarity as a central approach to flow-based anomaly detection. Int. J. Netw. Manag. 24(4): 318-336 (2014) - [c8]Martin Vizváry, Jan Vykopal:
Future of DDoS Attacks Mitigation in Software Defined Networks. AIMS 2014: 123-127 - [c7]Milan Cermák, Pavel Celeda, Jan Vykopal:
Detection of DNS Traffic Anomalies in Large Networks. EUNICE 2014: 215-226 - [c6]Daniel Kouril, Tomás Rebok, Tomás Jirsík, Jakub Cegan, Martin Drasar, Martin Vizváry, Jan Vykopal:
Cloud-based testbed for simulation of cyber attacks. NOMS 2014: 1-6 - 2011
- [c5]Jan Vykopal:
A Flow-Level Taxonomy and Prevalence of Brute Force Attacks. ACC (2) 2011: 666-675 - [c4]Vojtech Krmicek, Jan Vykopal:
NetFlow Based Network Protection. SecureComm 2011: 543-546 - 2010
- [c3]Martin Drasar, Jan Vykopal, Radek Krejcí, Pavel Celeda:
Aspect-Based Attack Detection in Large-Scale Networks. RAID 2010: 488-489
2000 – 2009
- 2009
- [c2]Vojtech Krmicek, Jan Vykopal, Radek Krejcí:
Netflow based system for NAT detection. StudentWorkshop@CoNEXT 2009: 23-24 - [c1]Pavel Minarík, Jan Vykopal, Vojtech Krmicek:
Improving Host Profiling with Bidirectional Flows. CSE (3) 2009: 231-237
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-25 01:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint