Radek Oslejsek
Radek Oslejsek
Masaryk University, Faculty of Informatics
Verified email at - Homepage
Cited by
Cited by
Kypo cyber range: Design and use cases
J Vykopal, R Ošlejšek, P Čeleda, M Vizvary, D Tovarňák
SciTePress, 2017
Lessons learned from complex hands-on defence exercises in a cyber range
J Vykopal, M Vizvary, R Oslejsek, P Celeda, D Tovarnak
2017 IEEE Frontiers in education conference (FIE), 1-8, 2017
Hybrid approach to sonification of color images
I Kopecek, R Oslejsek
Convergence and Hybrid Information Technology, 2008. ICCIT'08. Third …, 2008
Gate to accessibility of computer graphics
I Kopeček, R Ošlejšek
International Conference on Computers for Handicapped Persons, 295-302, 2008
Conceptual model of visual analytics for hands-on cybersecurity training
R Ošlejšek, V Rusňák, K Burská, V Švábenský, J Vykopal, J Čegan
IEEE transactions on visualization and computer graphics 27 (8), 3425-3437, 2020
Timely feedback in unstructured cybersecurity exercises
J Vykopal, R Ošlejšek, K Burská, K Zákopčanová
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
Visual feedback for players of multi-level capture the flag games: Field usability study
R Ošlejšek, V Rusňák, K Burská, V Švábenský, J Vykopal
2019 IEEE Symposium on Visualization for Cyber Security (VizSec), 1-11, 2019
Annotation of pictures by means of graphical ontologies
R Ošlejšek
CSREA Press, 2009
Evaluation of cyber defense exercises using visual analytics process
R Ošlejšek, J Vykopal, K Burská, V Rusňák
2018 IEEE Frontiers in Education Conference (FIE), 1-9, 2018
Creating pictures by dialogue
I Kopeček, R Ošlejšek
Computers Helping People with Special Needs: 10th International Conference …, 2006
Kypo: A tool for collaborative study of cyberattacks in safe cloud environment
Z Eichler, R Ošlejšek, D Toth
Human Aspects of Information Security, Privacy, and Trust: Third …, 2015
Process mining analysis of puzzle-based cybersecurity training
M Macák, R Oslejsek, B Buhnova
Proceedings of the 27th ACM Conference on on Innovation and Technology in …, 2022
Exploratory analysis of file system metadata for rapid investigation of security incidents
M Beran, F Hrdina, D Kouřil, R Ošlejšek, K Zákopčanová
2020 IEEE Symposium on Visualization for Cyber Security (VizSec), 11-20, 2020
Reliability analysis in component-based development via probabilistic model checking
N Benes, B Buhnova, I Cerna, R Oslejsek
Proceedings of the 15th ACM SIGSOFT symposium on Component Based Software …, 2012
Communicative images
I Kopecek, R Oslejsek
Smart Graphics: 11th International Symposium, SG 2011, Bremen, Germany, July …, 2011
The prisoner’s dilemma in the workplace: how cooperative behavior of managers influence organizational performance and stress
J Spurný, I Kopeček, R Ošlejšek, J Plhák, F Caputo
Kybernetes 51 (1), 52-76, 2022
A flexible, low-level scene graph traversal with explorers
R Ošlejšek, J Sochor
Proceedings of the 21st spring conference on Computer graphics, 203-210, 2005
Applying process discovery to cybersecurity training: an experience report
M Macák, R Oslejsek, B Buhnova
2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2022
Data-driven insight into the puzzle-based cybersecurity training
KD Burská, V Rusňák, R Ošlejšek
Computers & Graphics 102, 441-451, 2022
VRECKO: Virtual Reality Framework.
J Flasar, L Pokluda, R Oslejsek, P Kolcárek, J Sochor
TPCG, 203-208, 2005
The system can't perform the operation now. Try again later.
Articles 1–20