Zobrazeno 1 - 10
of 183
pro vyhledávání: '"Rafał Kozik"'
Publikováno v:
Vietnam Journal of Computer Science, Vol 10, Iss 01, Pp 1-23 (2023)
In intelligent information systems data play a critical role. The issue of missing data is one of the commonplace problems occurring in data collected in the real world. The problem stems directly from the very nature of data collection. In this pape
Externí odkaz:
https://doaj.org/article/42ab15ec678144839e8f3e691a7d6a5f
Autor:
Rafał Kozik, Wojciech Mazurczyk, Krzysztof Cabaj, Aleksandra Pawlicka, Marek Pawlicki, Michał Choraś
Publikováno v:
Sensors, Vol 23, Iss 24, p 9666 (2023)
Currently, one can observe the evolution of social media networks. In particular, humans are faced with the fact that, often, the opinion of an expert is as important and significant as the opinion of a non-expert. It is possible to observe changes a
Externí odkaz:
https://doaj.org/article/f514154a38424da6b4e0fe292c1e1fe9
Publikováno v:
Scientific Reports, Vol 11, Iss 1, Pp 1-13 (2021)
Abstract The ubiquity of social media and their deep integration in the contemporary society has granted new ways to interact, exchange information, form groups, or earn money—all on a scale never seen before. Those possibilities paired with the wi
Externí odkaz:
https://doaj.org/article/dcb4f2ec0016451d954337a664b12586
Publikováno v:
Journal of Universal Computer Science, Vol 26, Iss 11, Pp 1422-1434 (2020)
Artificial Intelligence plays a significant role in building effective cybersecurity tools. Security has a crucial role in the modern digital world and has become an essential area of research. Network Intrusion Detection Systems (NIDS) are among the
Externí odkaz:
https://doaj.org/article/855e238c41704c2b97ecf9e87fdbc22e
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 9636 (2022)
Network flow-based cyber anomaly detection is a difficult and complex task. Although several approaches to tackling this problem have been suggested, many research topics remain open. One of these concerns the problem of model transferability. There
Externí odkaz:
https://doaj.org/article/2385be7e55b449c19a851df4443c4b9c
Publikováno v:
Sensors, Vol 22, Iss 16, p 5968 (2022)
Contemporary cyberthreats continue to evolve, powering the neverending development arms race [...]
Externí odkaz:
https://doaj.org/article/9722ad45ea484a449a56f30c59980462
Publikováno v:
Journal of Universal Computer Science, Vol 25, Iss 1, Pp 2-15 (2019)
This paper outlines and proposes a new approach to cyber attack detection on the basis of the practical application of the efficient lifelong learning cybersecurity system. One of the main difficulties in machine learning is to build intelligent syst
Externí odkaz:
https://doaj.org/article/2ff1348aa3c84303a5a1c46e1cf3e696
Publikováno v:
Entropy, Vol 24, Iss 1, p 108 (2022)
This Special Issue aimed to gather high-quality advancements in theoretical and practical aspects of computer recognition, pattern recognition, image processing and machine learning (shallow and deep), including, in particular, novel implementations
Externí odkaz:
https://doaj.org/article/3806c7ca4fc747e0a63e24538d08a22e
Publikováno v:
Entropy, Vol 23, Iss 11, p 1532 (2021)
The number of security breaches in the cyberspace is on the rise. This threat is met with intensive work in the intrusion detection research community. To keep the defensive mechanisms up to date and relevant, realistic network traffic datasets are n
Externí odkaz:
https://doaj.org/article/e9dc1dc7b51440d9be1d59c2133f58f4
Publikováno v:
Sensors, Vol 21, Iss 15, p 5248 (2021)
This paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as their advantages and disadvantages, possible applications and security conc
Externí odkaz:
https://doaj.org/article/f85ba7d0e4594250bf32bdcb58a6f2fe