Andrzej Bialas

Orcid: 0000-0002-5986-7886

According to our database1, Andrzej Bialas authored at least 33 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Anomaly Detection Module for Network Traffic Monitoring in Public Institutions.
Sensors, March, 2023

2021
Detecting anomalies and attacks in network traffic monitoring with classification methods and XAI-based explainability.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021

Outlier Detection in Network Traffic Monitoring.
Proceedings of the 10th International Conference on Pattern Recognition Applications and Methods, 2021

2019
Vulnerability Assessment of Sensor Systems.
Sensors, 2019

Anomaly Detection in Network Traffic Security Assurance.
Proceedings of the Engineering in Dependability of Computer Systems and Networks, 2019

Structurization of the Common Criteria Vulnerability Assessment Process.
Proceedings of the Engineering in Dependability of Computer Systems and Networks, 2019

2018
Common Criteria IT Security Evaluation Methodology - An Ontological Approach.
Proceedings of the Contemporary Complex Systems and Their Dependability, 2018

2017
Towards Mixed-Mode Risk Management - A Concept.
Proceedings of the Advances in Dependability Engineering of Complex Systems, 2017

Software Support of the Common Criteria Vulnerability Assessment.
Proceedings of the Advances in Dependability Engineering of Complex Systems, 2017

2016
Computer-Aided Sensor Development Focused on Security Issues.
Sensors, 2016

Critical Infrastructure Protection - How to Assess the Protection Efficiency.
Proceedings of the Dependability Engineering and Complex Systems, 2016

2015
Experimentation tool for critical infrastructures risk management.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015

Critical Infrastructures Risk Manager - The Basic Requirements Elaboration.
Proceedings of the Theory and Engineering of Complex Systems and Dependability - Proceedings of the Tenth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, June 29, 2015

2014
Enhancement of the ValueSec Risk Management Model.
Proceedings of the Position Papers of the 2014 Federated Conference on Computer Science and Information Systems, 2014

Computer Support for the Railway Safety Management System - First Validation Results.
Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30, 2014

Computer Support for the Railway Safety Management System - Requirements Analysis.
Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30, 2014

2013
How to Develop a Biometric System with Claimed Assurance.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

Risk Assessment Aspects in Mastering the Value Function of Security Measures.
Proceedings of the New Results in Dependability and Computer Systems, 2013

2011
Common Criteria Related Security Design Patterns for Intelligent Sensors - Knowledge Engineering-Based Implementation.
Sensors, 2011

2010
Common Criteria Related Security Design Patterns - Validation on the Intelligent Sensor Example Designed for Mine Environment.
Sensors, 2010

Intelligent Sensors Security.
Sensors, 2010

Ontological Approach to the Business Continuity Management System Development.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Ontology-Based Security Problem Definition and Solution for the Common Criteria Compliant Development Process.
Proceedings of the Fourth International Conference on Dependability of Computer Systems, 2009

Validation of the Specification Means Ontology on the Simple Firewall Case.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Ontology-based Approach to the Common Criteria Compliant IT Security Development.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Semiformal Approach to the IT Security Development.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007

Modeling the Security Objectives According to the Common Criteria Methodology.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Development of an Integrated, Risk-Based Platform for Information and E-Services Security.
Proceedings of the Computer Safety, 2006

Information Security Systems vs. Critical Information Infrastructure Protection Systems - Similarities and Differences.
Proceedings of the 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 2006

A Semiformal Approach to the Security Problem of the Target of Evaluation (TOE) Modeling.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
The ISMS Business Environment Elaboration Using a UML Approach.
Proceedings of the Software Engineering: Evolution and Emerging Technologies, 2005

IT Security Modeling.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
A UML Approach in the ISMS Implementation.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004


  Loading...