Jaroslav Kašpar
YOU?
Author Swipe
View article: Mitigating Norway spruce mortality through the combined use of an anti-attractant for Ips typographus and an attractant for Thanasimus formicarius
Mitigating Norway spruce mortality through the combined use of an anti-attractant for Ips typographus and an attractant for Thanasimus formicarius Open
This study investigates the efficacy of combined treatment strategy, incorporating pheromones for bark beetle I. typographus (IT) and attractant of its natural enemy T. formicarius (TF), along with anti-attractants for IT (containing 1-hex…
View article: Spruce Protection against Ips typographus with Anti-Attractant Blend of Tree-Based Semiochemicals: From Small Experimental Plots to Stand Scales
Spruce Protection against Ips typographus with Anti-Attractant Blend of Tree-Based Semiochemicals: From Small Experimental Plots to Stand Scales Open
Tree-killing bark beetles require rapid management, such as anti-attractants, to stop the enlargement of attack hot-spots. We tested two newer anti-attractant blends, both without verbenone and one with the addition of trans-4-thujanol, in…
View article: Testing the Efficiency of the Push-and-Pull Strategy during Severe Ips typographus Outbreak and Extreme Drought in Norway Spruce Stands
Testing the Efficiency of the Push-and-Pull Strategy during Severe Ips typographus Outbreak and Extreme Drought in Norway Spruce Stands Open
Protection of Norway spruce stands using anti-attractants was tested during an outbreak of bark beetles (Ips typographus) in their spring flight. The aims of this study were as follows: (1) to test the proposed experimental design for tree…
View article: Predictive Cyber Situational Awareness and Personalized Blacklisting
Predictive Cyber Situational Awareness and Personalized Blacklisting Open
Cybersecurity adopts data mining for its ability to extract concealed and indistinct patterns in the data, such as for the needs of alert correlation. Inferring common attack patterns and rules from the alerts helps in understanding the th…
View article: Towards Predicting Cyber Attacks Using Information Exchange and Data Mining
Towards Predicting Cyber Attacks Using Information Exchange and Data Mining Open
In this paper, we present an empirical evaluation of an approach to predict attacker's activities based on information exchange and data mining. We gathered the cyber security alerts shared within the SABU platform, in which around 220,000…
View article: On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts
On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts Open
Data mining is well-known for its ability to extract concealed and indistinct patterns in the data, which is a common task in the field of cyber security. However, data mining is not always used to its full potential among cyber security c…