Adam Kozakiewicz

Orcid: 0000-0002-1607-5715

According to our database1, Adam Kozakiewicz authored at least 15 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Botnet fingerprinting method based on anomaly detection in SMTP conversations.
CoRR, 2019

2017
Design and evaluation of a system for network threat signatures generation.
J. Comput. Sci., 2017

Botnet Fingerprinting: Anomaly Detection in SMTP Conversations.
IEEE Secur. Priv., 2017

NECOMA - Nippon-European Cyberdefense-Oriented Multilayer Analysis.
Proceedings of the European Project Space on Networks, 2017

2016
Mobile platform for threat monitoring in Wireless Sensor Networks.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Some Remarks on Security Protocols Verification Tools.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016

2015
Cross-layer analysis of malware datasets for malicious campaigns identification.
Proceedings of the International Conference on Military Communications and Information Systems, 2015

Secure DRM mechanism for offline applications.
Proceedings of the International Conference on Military Communications and Information Systems, 2015

More practical application of Trust management credentials.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015

FP-tree and SVM for Malicious Web Campaign Detection.
Proceedings of the Intelligent Information and Database Systems - 7th Asian Conference, 2015

2011
Time Validity in Role-Based Trust Management Inference System.
Proceedings of the Secure and Trust Computing, Data Management, and Applications, 2011

Security Research at NASK: Supporting the Operational Needs of a CERT Team and More.
Proceedings of the First SysSec Workshop 2011, 2011

2009
Network traffic routing using effective bandwidth theory.
Eur. Trans. Telecommun., 2009

2008
Simulation of Critical ICT Infrastructure for Municipal Crisis Management.
Proceedings of the Critical Information Infrastructure Security, 2008

2006
A Two-Level Approach to Building a Campus Grid.
Proceedings of the Fifth International Conference on Parallel Computing in Electrical Engineering (PARELEC 2006), 2006


  Loading...