Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Informačná stránka zamestnanca SAV

Publikačná činnosť

Ing. Jean Rosemond Dora, PhD.

Publikačná činnosť obsahuje údaje z on-line databázy Ústrednej Knižnice SAV.

Zvoľte si rok/kategóriu pre výpis publikácií:
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav - NEMOGA, Karol. Ontology for blind SQL injection. In Computing and informatics, 2023, vol. 42, no. 2, p. 480-500. (2022: 0.7 - IF, Q4 - JCR, 0.196 - SJR, Q4 - SJR). ISSN 1335-9150. Dostupné na: https://doi.org/10.31577/cai_2023_2_480 (APVV-19-0220 : Ontologická reprezentácia pre bezpečnosť informačných systémov.) Typ: ADDA
    Citácie:
    [1.1] BRATSAS, Charalampos - ANASTASIADIS, Efstathios Konstantinos - ANGELIDIS, Alexandros K. - IOANNIDIS, Lazaros - KOTSAKIS, Rigas - OUGIAROGLOU, Stefanos. Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review. In JOURNAL OF CYBERSECURITY AND PRIVACY, 2024, vol. 4, no. 3, pp. 518-545. Dostupné na: https://doi.org/10.3390/jcp4030025, Registrované v: WOS
    [1.1] QIN, Qiurong - LI, Yueqin - MI, Yajie - SHEN, Jinhui - WU, Kexin - WANG, Zhenzhao. Sql injection detection algorithm based on Bi-LSTM and integrated feature selection. In JOURNAL OF SUPERCOMPUTING, 2025, vol. 81, no. 4, art. no. 608. ISSN 0920-8542. Dostupné na: https://doi.org/10.1007/s11227-025-07109-w, Registrované v: WOS
    [1.2] AUGUSTINE, Nwabudike - SULTAN, Abu Bakar Md - OSMAN, Mohd Hafeez - SHARIF, Khaironi Yatim. Application of Artificial Intelligence in Detecting SQL Injection Attacks. In International Journal on Informatics Visualization, 2024-12-01, 8, 4, pp. 2131-2138. Dostupné na: https://doi.org/10.62527/joiv.8.4.3631, Registrované v: SCOPUS
    [1.2] MALI, Krishna - PADHIAR, Sneha - JOSHI, Kirtan - DOBARIYA, Nisarg - VAGHASIYA, Dhrudeep. SQL Injection Discovery and Deterrence Techniques for Web Applications. In Lecture Notes in Networks and Systems, 2025-01-01, 1293, pp. 299-309. ISBN [9789819632466]. ISSN 23673370. Dostupné na: https://doi.org/10.1007/978-981-96-3247-3_23, Registrované v: SCOPUS
    [1.2] ODEH, Ammar - TALEB, Anas Abu. Ensemble learning techniques against structured query language injection attacks. In Indonesian Journal of Electrical Engineering and Computer Science, 2024-08-01, 35, 2, pp. 1004-1012. ISSN 25024752. Dostupné na: https://doi.org/10.11591/ijeecs.v35.i2.pp1004-1012, Registrované v: SCOPUS
    [1.2] PEREZ, Orlando Requejo - VASQUEZ, Felipe Alarcon - LOPEZ, Luis Porras - PAREDES, Sheylath Astorga. SQL Database for Vulnerability Analysis in Web Services. In Proceedings 2024 14th International Conference on Dependable Systems Services and Technologies Trustworthy AI Internet of Robotics and Big Data for A Safe and Secure World Dessert 2024, 2024-01-01, pp. ISBN [9798331510930]. Dostupné na: https://doi.org/10.1109/DESSERT65323.2024.11122026, Registrované v: SCOPUS
    [1.2] RAHUL, Sriramoju - KUMARAN, U. - SAI, Thippaluru Tharun - PRAMODH, Tripuramallu - BALASUBRAMANIAN, Sundaravadivazhagn. Preventing SQL Injection Attacks on Web Applications for Enhanced Security and CIA Triad Compliance. In Lecture Notes in Networks and Systems, 2024-01-01, 1074 LNNS, pp. 99-110. ISSN 23673370. Dostupné na: https://doi.org/10.1007/978-981-97-6103-6_8, Registrované v: SCOPUS
    [1.2] SHAMA - JAIN, Sarika. Cybersecurity Knowledge Representation: A Survey of Ontological Approaches. In Lecture Notes in Networks and Systems, 2026-01-01, 1794 LNNS, pp. 137-157. ISBN [9783032153975]. ISSN 23673370. Dostupné na: https://doi.org/10.1007/978-3-032-15398-2_11, Registrované v: SCOPUS
    [3.1] ACUÑA, E.G. Healthcare cybersecurity: Data poisoning in the age of AI. In Journal of Comprehensive Business Administration Research. 2024, pp. 1-12. doi: 10.47852/bonviewJCBAR42024067.
    [3.1] YAROVENKO, G.M. - PERKHUN, L.P. - NEBABA, N.A. - BULHAKOVA, O.F. - KOSTENKO, V.V. Development of a model for the formalization of the process of detecting insider cyber threats in banks: An ontological approach. In Actual Problems in Economics. 2023, no. 268, pp. 71-83. doi: 10.32752/1993-6788-2023-1-268-71-83.
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Detection of attacks in software-defined networks (SDN)* : *how to conduct attacks in SDN environments. In IEEE 17th international symposium on applied computational intelligence and informatics (SACI 2023) : Proceedings. - Danvers, US : IEEE, 2023, p. 623-630. ISBN 979-8-3503-2109-8. Dostupné na: https://doi.org/10.1109/SACI58269.2023.10158584 (IEEE 17th international symposium on applied computational intelligence and informatics.) Typ: ADMB
    Citácie:
    [1.2] KUMAR, Ankit - KANOJIYA, Anurag Kumar - SUBITHA, D. Introduction to Network Sensing Systems in Society 5.0: Issues and Challenges. In Networked Sensing Systems, 2025-01-01, pp. 1-29. Dostupné na: https://doi.org/10.1002/9781394310890.ch1, Registrované v: SCOPUS
    [3.1] STOJANOVIĆ, M. - KOSTIĆ-LJUBISAVLJEVIĆ, A. - MANOVIĆ, M. Bezbednost SND mreža: problemi i moguća rešenja. In XLI Simpozijum o novim tehnologijama u poštanskom i telekomunikacionom saobraćaju (PosTel 2023). 2023, pp. 1-10. doi: 10.37528/FTTE/9788673954752/POSTEL.2023.011.
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Dangerousness of client-side code execution with Microsoft Office. In Computing and informatics, 2024, vol. 43, no. 5, p. 1219-1233. (2023: 0.7 - IF, Q4 - JCR, 0.258 - SJR, Q3 - SJR). ISSN 1335-9150. Dostupné na: https://doi.org/10.31577/cai_2024_5_1219 Typ: ADDA
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Exploitation of thick client application vulnerabilities and a synopsis of mitigation. In SACI 2024 - 18th IEEE International Symposium on Applied Computational Intelligence and Informatics, Proceedings, 2024, p. 431-436. Dostupné na: https://doi.org/10.1109/SACI60582.2024.10619849 Typ: ADMB
    Citácie:
    [1.2] CHEN, Xiao - SHA, Le Tian - XIAO, Fu - PAN, Jia Ye - DONG, Jian Kuo. AB-DHD: An Attention Mechanism and Bi-Directional Gated Recurrent Unit Based Model for Dynamic Link Library Hijacking Vulnerability Discovery. In Journal of Computer Science and Technology, 2025-05-01, 40, 3, pp. 887-903. ISSN 10009000. Dostupné na: https://doi.org/10.1007/s11390-025-4497-x, Registrované v: SCOPUS
    [3.1] NUGROHO, H.W. - HAMIDI, K. Manufurrt: A feasibility investment and operational desktop calculator. In SITEKIN: Jurnal Sains, Teknologi dan Industri. ISSN 2721-2041, 2025, vol. 22, no. 2, pp. 365-377.
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav - NEMOGA, Karol. Detection and exploitation of intelligent platform management interface (IPMI)*. In SAMI 2024 - 2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics, Proceedings. - Danvers : IEEE, 2024, p. 265-270. ISBN 979-8-3503-1720-6. Dostupné na: https://doi.org/10.1109/SAMI60510.2024.10432895 (SAMI 2024 : 2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics.) Typ: ADMB
    Citácie:
    [1.1] DAKIC, Vedran - BERTINA, Karlo - REDZEPAGIC, Jasmin - REGVART, Damir. The RedFish API and vSphere Hypervisor API: A Unified Framework for Policy-Based Server Monitoring. In ELECTRONICS, 2024, vol. 13, no. 23, art. no. 4624. ISSN 2079-9292. Dostupné na: https://doi.org/10.3390/electronics13234624, Registrované v: WOS
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav - NEMOGA, Karol. Exploitation of the Java deserialization vulnerability to access ForgeRock-OpenAM server. In SISY 2023 - IEEE 21st International Symposium on Intelligent Systems and Informatics : Proceedings. - Budapest, Hungary : IEEE, 2023, p. 345-350. ISBN 979-8-3503-4336-6. Dostupné na: https://doi.org/10.1109/SISY60376.2023.10417960 (SISY 2023 : IEEE 21st International Symposium on Intelligent Systems and Informatics.) Typ: ADMB
    Citácie:
    [1.1] ZHAO, Lingbo - WANG, Zhilu - WANG, Shuquan - ZHANG, Yuhui - HOU, Rui - MENG, Dan. Exploring the ransomware ecosystem and the active defense concept: Review of attacks and defense. In JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, vol. 94, no., art. no. 104171. ISSN 2214-2126. Dostupné na: https://doi.org/10.1016/j.jisa.2025.104171, Registrované v: WOS
  • STAŇO, Michal - HLUCHÝ, Ladislav - DORA, Jean Rosemond - NGUYEN, Ngoc Diep. Federated learning for offensive security in cyber-medical systems inspired by Petri nets. In ICCC 2024 - IEEE 11th International Conference on Computational Cybernetics and Cyber-Medical Systems : Proceedings, 2024, 77-82 pp. ISSN 2471-9269. Dostupné na: https://doi.org/10.1109/ICCC62278.2024.10582955 (ICCC 2024 : IEEE 11th International Conference on Computational Cybernetics and Cyber-Medical Systems.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav** - STAŇO, Michal**. In-memory shellcode runner detection in internet of things (IoT) networks: a lightweight behavioral and semantic analysis framework. In Sensors, 2025, vol. 25, no. 17, art. no. 5425. (2024: 3.5 - IF, Q2 - JCR, 0.764 - SJR, Q1 - SJR). ISSN 1424-8220. Dostupné na: https://doi.org/10.3390/s25175425 Typ: ADCA
    Citácie:
    [1.1] RAI, Andri - IM, Eul Gyu. MemCatcher: An In-Depth Analysis Approach to Detect In-Memory Malware. In APPLIED SCIENCES-BASEL, 2025, vol. 15, no. 21, art. no. 11800. Dostupné na: https://doi.org/10.3390/app152111800, Registrované v: WOS
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Attacks on active directory - resource-based constrained delegation and new patches. In 2025 Cybernetics & Informatics (K&I) : 32nd International Conference. - Danvers, US : IEEE, 2025, p. 13-18. ISBN 979-8-3315-4181-1. ISSN 2767-875X. Dostupné na: https://doi.org/10.1109/KI64036.2025.10916465 (2025 Cybernetics & Informatics (K&I) : 32nd International Conference.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Attacks on active directory - Kerberos delegation : exploitation of active directory using Kerberos constrained delegation. In 6th IEEE International Symposium on Logistics and Industrial Informatics : LINDI 2024. Proceedings. - Danvers : IEEE, 2024, p. 103-108. ISBN 979-8-3315-1620-8. Dostupné na: https://doi.org/10.1109/LINDI63813.2024.10820404 (LINDI 2024 : IEEE international symposium on logistics and industrial informatics.) Typ: ADMB
    Citácie:
    [1.2] ZHAO, Hongyang - LIN, Yuxiang. Research on Domain Privilege Escalation Mechanism Based on sAMAccountName Spoofing. In 2025 10th International Symposium on Advances in Electrical Electronics and Computer Engineering Isaeece 2025, 2025-01-01, pp. 658-662. ISBN [9798331513382]. Dostupné na: https://doi.org/10.1109/ISAEECE66033.2025.11160172, Registrované v: SCOPUS
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Security review of a client-side code execution with HTML smuggling attack. In IEEE 12th international conference on computational cybernetics and cyber-medical systems : ICCC 2025. Proceedings. - Danvers : IEEE, 2025, p. 131-136. ISBN 979-8-3315-0246-1. Dostupné na: https://doi.org/10.1109/ICCC64928.2025.10999118 (ICCC 2025 : IEEE 12th international conference on computational cybernetics and cyber-medical systems.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. A theoretical review of mitigation techniques for thick client application vulnerabilities. In IEEE 24th international symposium on computational intelligence and informatics : CINTI 2024. Proceedings. - Danvers : IEEE, 2024, p. 75-80. ISBN 979-8-3503-5343-3. Dostupné na: https://doi.org/10.1109/CINTI63048.2024.10830893 (CINTI 2024 : IEEE 24th international symposium on computational intelligence and informatics.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. PowerShell proxy-aware intercommunication and manipulation. In 13th international symposium on digital forensics and security : ISDFS '25. - Danvers : IEEE, 2025, p. 1-5. ISBN 979-8-3315-0993-4. Dostupné na: https://doi.org/10.1109/ISDFS65363.2025.11012000 (ISDFS '25 : International symposium on digital forensics and security.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Bypassing network activity monitors using process hollowing. In 2025 25th international conference on control systems and computer science : CSCS 2025. - Danvers : IEEE, 2025, p. 237-242. ISBN 979-8-3315-7343-0. ISSN 2379-0482. Dostupné na: https://doi.org/10.1109/CSCS66924.2025.00043 (CSCS 2025 : International conference on control systems and computer science.) Typ: ADMB
    Citácie:
    [1.1] HUANG, Gang-Cheng - LAI, Tai-Hung. Legacy Code, Live Risk: Empirical Evidence of Malware Detection Gaps. In APPLIED SCIENCES-BASEL, 2025, vol. 15, no. 22, art. no. 11862. Dostupné na: https://doi.org/10.3390/app152211862, Registrované v: WOS
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Advanced techniques to execute a shellcode in Word memory. In 29th IEEE international conference on intelligent engineering systems 2025 : INES 2025. Proceedings, 2025, p. 359-364. ISSN 1562-5850. Dostupné na: https://doi.org/10.1109/INES67149.2025.11078202 (INES 2025 : IEEE international conference on intelligent engineering systems 2025.) Typ: ADMB
    Citácie:
    [1.1] HUANG, Gang-Cheng - LAI, Tai-Hung. Legacy Code, Live Risk: Empirical Evidence of Malware Detection Gaps. In APPLIED SCIENCES-BASEL, 2025, vol. 15, no. 22, art. no. 11862. Dostupné na: https://doi.org/10.3390/app152211862, Registrované v: WOS
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Locating and removing signatures from malicious files for antivirus evasion attempt. In 2025 IEEE 8th international conference on computer and communication engineering technology (CCET 2025). - Danvers : IEEE, 2025, p. 66-71. ISBN 979-8-3315-5810-9. Dostupné na: https://doi.org/10.1109/CCET66260.2025.11199370 (2025 IEEE 8th international conference on computer and communication engineering technology : CCET 2025.) Typ: ADMB
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Process injection and migration techniques : * strategies to bypass security software of network communication after a successful reverse shell. In IEEE 23rd world symposium on applied machine intelligence and informatics : SAMI 2025. Proceedings. - Danvers : IEEE, 2025, p. 17-22. ISBN 979-8-3503-7936-5. ISSN 2767-9438. Dostupné na: https://doi.org/10.1109/SAMI63904.2025.10883319 (SAMI 2025 : IEEE 23rd world symposium on applied machine intelligence and informatics.) Typ: ADMB
    Citácie:
    [1.1] BRIZENDINE, Bramwell - KUSUMA, Shiva Shashank - RIMAL, Bhaskar P. Process Injection Using Return-Oriented Programming. In IEEE ACCESS, 2025, vol. 13, no., pp. 133790-133816. ISSN 2169-3536. Dostupné na: https://doi.org/10.1109/ACCESS.2025.3592128, Registrované v: WOS
    [1.1] HUANG, Gang-Cheng - LAI, Tai-Hung. Legacy Code, Live Risk: Empirical Evidence of Malware Detection Gaps. In APPLIED SCIENCES-BASEL, 2025, vol. 15, no. 22, art. no. 11862. Dostupné na: https://doi.org/10.3390/app152211862, Registrované v: WOS
  • DORA, Jean Rosemond - HLUCHÝ, Ladislav. Withelisting defeat through arbitrary C-sharp code execution. In 2025 7th international conference on computer communication and the internet : ICCCI 2025. Proceedings. - Danvers : IEEE, 2025, p. 168-172. ISBN 979-8-3315-1158-6. ISSN 2833-2350. Dostupné na: https://doi.org/10.1109/ICCCI65070.2025.11158506 (ICCCI 2025 : 2025 7th international conference on computer communication and the internet.) Typ: ADMB
  • STAŇO, Michal - ČIERNIK, Matej - HLUCHÝ, Ladislav - BOBÁK, Martin - DORA, Jean Rosemond. Enhancing UML model dynamics: a source code generation approach. In Acta Polytechnica Hungarica : journal of applied sciences at Budapest Tech Hungary, 2026, vol. 23, no. 2, p. 203-217. ISSN 1785-8860. Dostupné na internete: https://acta.uni-obuda.hu/Stano_Ciernik_Hluchy_Bobak_Dora_166.pdf Typ: ADMA
  • STAŇO, Michal - HLUCHÝ, Ladislav - SKOVAJSOVÁ, Lenka - HUCKO, Michal - DORA, Jean Rosemond. Integration of hyperspectral data segmentation methods with QGIS and PDAL: from theory to reproducible practice. In IEEE 25th international symposium on computational intelligence and informatics : CINTI 2025. Proceedings. - Danvers : IEEE, 2025, p. 161-166. ISBN 979-8-3315-5291-6. Dostupné na: https://doi.org/10.1109/CINTI67731.2025.11311819 (CINTI 2025 : IEEE 25th international symposium on computational intelligence and informatics.) Typ: ADMB
Ohlasy:
1.1 Citácie v zahraničných publikáciách registrované v citačných indexoch Web of Science Core Collection
1.2 Citácie v zahraničných publikáciách registrované v databáze SCOPUS
2.1 Citácie v domácich publikáciách registrované v citačných indexoch Web of Science Core Collection
2.2 Citácie v domácich publikáciách registrované v databáze SCOPUS
*3 Citácie v zahraničných publikáciách neregistrované v citačných indexoch
3.1 Citácie v zahraničných publikáciách neregistrované v citačných indexoch
3.2 Citácie v zahraničných publikáciách registrované v iných vedeckých citačných databázach, ako je Web of Science Core Collection a Scopus
*4 Citácie v domácich publikáciách neregistrované v citačných indexoch
4.1 Citácie v domácich publikáciách neregistrované v citačných indexoch
4.2 Citácie v domácich publikáciách registrované v iných vedeckých citačných databázach, ako je Web of Science Core Collection a Scopus
5 Recenzie v zahraničných publikáciách
6 Recenzie v domácich publikáciách
7 Umelecké kritiky zahraničné
8 Umelecké kritiky domáce
9 Reprodukcie umeleckých diel autora v zahraničnej publikácii alebo médiu
*9 Citácie v zahraničných publikáciách registrované v iných vedeckých citačných databázach, ako je Web of Science Core Collection a Scopus
10 Reprodukcie umeleckých diel autora domácej publikácii alebo médiu
*10 Citácie v domácich publikáciách registrované v iných vedeckých citačných databázach, ako je Web of Science Core Collection a Scopus