Wybrane publikacje |
1 | Referat konferencyjny 2022
Collaborative Intrusion Detection System for Internet of Things using Distributed Ledger Technology: a survey on challenges and opportunities. W: Intelligent Information and Database Systems : 14th Asian Conference, ACIIDS 2022, Ho Chi Minh City, Vietnam, November 28-30, 2022 : proceedings. Pt. 1 / eds. Ngoc Thanh Nguyen [i in.]. Cham : Springer, cop. 2022. s. 339-350. ISBN: 978-3-031-21742-5; 978-3-031-21743-2 | Zasoby:DOIURLSFX | |
|
2 | Referat konferencyjny 2021
Android malware detection using deep learning methods. W: 2021 IEEE 30th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2021 : 27-29 October 2021, Virtual Conference : proceedings. Piscataway, NJ : IEEE, cop. 2021. s. 119-124. ISBN: 978-1-6654-2789-0 | Zasoby:DOI | |
|
3 | Referat konferencyjny 2020
Application and preliminary evaluation of Anontool applied in the anomaly detection module. W: 2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2020, Virtual Conference, 4-6 November 2020 : proceedings. Piscataway, NJ : IEEE, 2020. s. 119-123. ISBN: 978-1-7281-6975-0 | Zasoby:DOIURL | |
|
4 | Referat konferencyjny 2020
Application and evaluation of selected machine learning algorithms in anomaly detection module for SOC. W: Developments of Artificial Intelligence Technologies in Computation and Robotics : Proceedings of the 14th International FLINS Conference (FLINS 2020), Cologne, Germany, 18-21 August 2020 / eds. Zhong Li [i in.]. Singapore : World Scientific Publishing, cop. 2020. s. 971-978. ISBN: 978-981-122-332-7; 978-981-122-334-1 | Zasoby:DOISFX | |
|
5 | Referat konferencyjny 2020
Self-adaptation of workflow business software to the user’s requirements and behavior. W: Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES 2020 / eds. M. Cristani, C. Toro, C. Zanni-Merk, R. J. Howlett and L. C. Jain. Amsterdam : Elsevier, cop. 2020. s. 1211-1220. | Zasoby:DOISFX | |
|
6 | Referat konferencyjny 2019
Sound and keystroke dynamics analysis for user authenticity verification. W: Proceedings of IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE 2019) : November 14-16, 2019, Dalian, China / eds. Li Zou [i in.]. [B.m.] : IEEE, cop. 2019. s. 617-624. ISBN: 978-1-7281-2348-6 | Zasoby:DOI | |
|
7 | Artykuł 2019
Solving problems relating to ICT security management systems including various characteristics of the environment and system = Rozwiązywanie problemów z zarządzaniem bezpieczeństwem systemów teleinformatycznych z uwzględnieniem zmiennej charakterystyki środowiska i systemu. Scientific Journal of the Military University of Land Forces. 2019, vol. 51, nr 2, s. 321-334. ISSN: 2544-7122; 2545-0719 | Zasoby:DOISFX | |
|
8 | Referat konferencyjny 2019
Complex Networks Monitoring and Security and Fraud Detection for Enterprises. W: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, (WETICE 2019), Capri, Italy, 12-14 June 2019 : proceedings. [B.m.] : IEEE, 2019. s. 124-125. ISBN: 978-1-7281-0677-9; 978-1-7281-0676-2 | Zasoby:DOIURL | |
|
9 | Referat konferencyjny 2019
Architecture of anomaly detection module for the Security Operations Center. W: 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, (WETICE 2019), Capri, Italy, 12-14 June 2019 : proceedings. [B.m.] : IEEE, 2019. s. 126-131. ISBN: 978-1-7281-0677-9; 978-1-7281-0676-2 | Zasoby:DOIURL | |
|
10 | Referat konferencyjny 2019
Evaluation of an impact of the DoS attacks on the selected virtualization platforms. W: Information Systems Architecture and Technology : Proceedings of 39th International Conference on Information Systems Architecture and Technology, ISAT 2018. Pt. 1 / eds. Leszek Borzemski, Jerzy Świątek, Zofia Wilimowska. Cham : Springer, cop. 2019. s. 30-40. ISBN: 978-3-319-99980-7 | Zasoby:DOISFX | |
|