Zobrazeno 1 - 10
of 73
pro vyhledávání: '"Krzysztof Juszczyszyn"'
Publikováno v:
Egyptian Informatics Journal, Vol 28, Iss , Pp 100562- (2024)
This research aimed to investigate the application of Vlse Kriterijumska Optimizacija I Kompromisno Resenje (VIKOR) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) multi-criteria decision-making to select the optimal cl
Externí odkaz:
https://doaj.org/article/bcf84f01d2454ae88c03a21739009ec1
Publikováno v:
Scientific Journal of the Military University of Land Forces, Vol 192, Iss 2, Pp 321-334 (2019)
The work presents the essence of problems appearing in the ICT security management process in the context of systems characterized by significant dynamics of configuration and heterogeneity of resources both in the hardware and software layer. Basic
Externí odkaz:
https://doaj.org/article/752b274d0663450baee9fcd5c432a3e8
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 1, Iss 3 (2008)
The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and di
Externí odkaz:
https://doaj.org/article/fd341d7297524462a7ea55276df67306
Publikováno v:
Scientific Journal of the Military University of Land Forces, Vol 192, Iss 2, Pp 321-334 (2019)
The work presents the essence of problems appearing in the ICT security management process in the context of systems characterized by significant dynamics of configuration and heterogeneity of resources both in the hardware and software layer. Basic
Publikováno v:
WETICE
The purpose of Complex Networks Monitoring and Security and Fraud Detection for Enterprises - CoNeSec track is two-fold: Firstly, the track offers a forum for scientists and engineers to exchange ideas on novel analytical techniques using network log
Publikováno v:
WETICE
The purpose of Complex Networks Monitoring and Security and Fraud Detection for Enterprises - CoNeSec track is two-fold: Firstly, the track offers a forum for scientists and engineers to exchange ideas on novel analytical techniques using network log
Publikováno v:
AIP Conference Proceedings.
The paper analyses related work on complex networks models in logistic networks, and proposes new, potentially applicable, approaches, stemming from network theory. There is also a proposal of using motif analysis to study complex logistic network lo
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319999807
The work includes research results characterizing the impact of distributed denial of service attacks (DDoS) on the resources of host operating systems and virtual machines performance. Analysis of existing types of virtualization has been made. It w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3e70c51c0e1dbe654676ec7a7ac2623a
https://doi.org/10.1007/978-3-319-99981-4_4
https://doi.org/10.1007/978-3-319-99981-4_4
Autor:
Krzysztof Juszczyszyn
Publikováno v:
Encyclopedia of Social Network Analysis and Mining ISBN: 9781461471639
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a18f7cc0181dcc6275d93657bdf0191c
https://doi.org/10.1007/978-1-4939-7131-2_238
https://doi.org/10.1007/978-1-4939-7131-2_238
Autor:
Łukasz Falas, Patryk Schauer, Krzysztof Juszczyszyn, Grzegorz Kołaczek, Adam Grzech, Paweł Stelmach, Paweł Świltek
Publikováno v:
Concurrency and Computation: Practice and Experience. 27:5700-5718
A method of decision-making in security-level estimation process of service-based applications in future Internet architecture is proposed. We demonstrate how distributed services can be composed to form an application run within the next-generation