Intrusion detection systems vulnerability on adversarial examples A Warzyński, G Kołaczek 2018 Innovations in Intelligent Systems and Applications (INISTA), 1-4, 2018 | 67 | 2018 |
Agent-based approach for distributed intrusion detection system design K Juszczyszyn, NT Nguyen, G Kolaczek, A Grzech, A Pieczynska, ... International Conference on Computational Science, 224-231, 2006 | 48 | 2006 |
A mobile agent approach to intrusion detection in network systems G Kolaczek, A Pieczynska-Kuchtiak, K Juszczyszyn, A Grzech, ... Knowledge-Based Intelligent Information and Engineering Systems: 9th …, 2005 | 42 | 2005 |
Anomaly detection in network traffic using selected methods of time series analysis J Bernacki, G Koaczek International Journal of Computer Network and Information Security 7 (9), 10, 2015 | 31 | 2015 |
Specification and verification of constraints in role based access control G Kolaczek WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling …, 2003 | 17 | 2003 |
Motif-based attack detection in network communication graphs K Juszczyszyn, G Kołaczek IFIP International Conference on Communications and Multimedia Security, 206-213, 2011 | 15 | 2011 |
Smart security assessment of composed Web services G Kołaczek, K Juszczyszyn Cybernetics and Systems: An International Journal 41 (1), 46-61, 2010 | 15 | 2010 |
Attack pattern analysis framework for multiagent intrusion detection system G Kolaczek, K Juszczyszyn International Journal of Computational Intelligence Systems 1 (3), 215-224, 2008 | 14 | 2008 |
An approach to identity theft detection using social network analysis G Kolaczek 2009 First Asian Conference on Intelligent Information and Database Systems …, 2009 | 13 | 2009 |
Smart work workbench; integrated tool for IT services planning, management, execution and evaluation M Fraś, A Grzech, K Juszczyszyn, G Kołaczek, J Kwiatkowski, ... Computational Collective Intelligence. Technologies and Applications: Third …, 2011 | 11 | 2011 |
Architecture of anomaly detection module for the security operations center P Bienias, G Kołaczek, A Warzyński 2019 IEEE 28th International Conference on Enabling Technologies …, 2019 | 10 | 2019 |
Social network analysis based approach to trust modeling for autonomous multi-agent systems G Kołaczek Agent and Multi-agent Technology for Internet and Enterprise Systems, 137-156, 2010 | 10 | 2010 |
Multiagent security evaluation framework for service oriented architecture systems G Kołaczek International Conference on Knowledge-Based and Intelligent Information and …, 2009 | 9 | 2009 |
Application of deontic logic in role-based access control G Kołaczek International Journal of Applied Mathematics and Computer Science 12 (2 …, 2002 | 9 | 2002 |
Security framework for dynamic service-oriented IT systems G Kołaczek, J Mizera-Pietraszko Journal of Information and Telecommunication 2 (4), 428-448, 2018 | 7 | 2018 |
Trust‐based security‐level evaluation method for dynamic service‐oriented environments G Kołaczek, K Juszczyszyn, P Świątek, A Grzech, P Schauer, P Stelmach, ... Concurrency and Computation: Practice and Experience 27 (18), 5700-5718, 2015 | 6 | 2015 |
Specifications and deployment of SOA business applications within a configurable framework provided as a service A Grzech, K Juszczyszyn, G Kołaczek, J Kwiatkowski, J Sobecki, ... Advanced SOA Tools and Applications, 7-71, 2014 | 6 | 2014 |
Business process optimization platform for integrated information systems K Brzostowski, D Gąsior, A Grzech, K Juszczyszyn, G Kołaczek, A Kozik, ... Information systems architecture and technology, eds. Jerzy Świątek [i in …, 2014 | 6 | 2014 |
A new concept of trust modeling and management in complex networks G Kołaczek International Conference on Knowledge-Based and Intelligent Information and …, 2008 | 6 | 2008 |
Application and preliminary evaluation of Anontool applied in the anomaly detection module P Bienias, A Warzyński, G Kołaczek 2020 IEEE 29th International Conference on Enabling Technologies …, 2020 | 5 | 2020 |