George Markowsky

According to our database1, George Markowsky authored at least 54 papers between 1975 and 2023.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Budget Theorem and the Russo-Ukrainian War.
Proceedings of the 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2023

Is Performance Fairness Achievable in Presence of Attackers Under Federated Learning?
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques.
Proceedings of the 13th International Conference on Dependable Systems, 2023

2021
Detection DNS Tunneling Botnets.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Lanchester's Equations and Cyberwarfare.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Lattice-Based Technique to Visualize and Compare Regional Terrorism Using the Global Terrorism Database.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

2020
Proof-of-Activity Consensus Protocol Based on a Network's Active Nodes Indication.
Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security, 2020

2019
Botnet Detection Approach for the Distributed Systems.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Lattice Data Analytics: The Poset of Irreducibles and the MacNeille Completion.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

2018
The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.
Proceedings of the 14th International Conference on ICT in Education, 2018

Distributed System for Detecting the Malware in LAN.
Proceedings of the Advances in Intelligent Systems and Computing III, 2018

Distributed Malware Detection System Based on Decentralized Architecture in Local Area Networks.
Proceedings of the Advances in Intelligent Systems and Computing III, 2018

2017
The problem of interceptor top level domains revisited.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

2015
Scanning for vulnerable devices in the Internet of Things.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

The problem of interceptor top level domains.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2014
The Sad History of Random Bits.
J. Cyber Secur. Mobil., 2014

2013
Was the 2006 Debian SSL Debacle a system accident?
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Adapting American ERP systems for China: Cross-cultural issues and a case study.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

2012
Security network interface for alarm systems.
Comput. Stand. Interfaces, 2012

2011
Universal asset assessment system based on excel™.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

Evolutionary dynamics of revolution: Opinion modeling in society based on graphs and rules.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

2010
Consumer Guide to Online Cybersecurity Resources: UMCEG.
Proceedings of the 2010 International Conference on Security & Management, 2010

High School Cyber Defense Competitions: Lessons from the Trenches.
Proceedings of the 2010 International Conference on Security & Management, 2010

2007
Security Tools for GRID- Systems.
Proceedings of the 2007 International Conference on Security & Management, 2007

Survey of Supercomputer Cluster Security Issues.
Proceedings of the 2007 International Conference on Security & Management, 2007

RF Eavesdropping Beowulf Clusters.
Proceedings of the 2007 International Conference on Security & Management, 2007

2004
Database design for CAD system optimising distributed sensor networks for perimeter security.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

1997
An introduction to algorithmic information theory.
Complex., 1997

1996
Introduction To Algorithmic Information Theory.
J. Univers. Comput. Sci., 1996

1991
Bounding fault detection probabilities in combinational circuits.
J. Electron. Test., 1991

1988
Learning Probabilistic Prediction Functions (Extended Abstract)
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988

Learning Probabilistic Prediction Functions.
Proceedings of the First Annual Workshop on Computational Learning Theory, 1988

1987
Bounding Signal Probabilities in Combinational Circuits.
IEEE Trans. Computers, 1987

1983
Intersection-union systems.
Discret. Appl. Math., 1983

On Sets of Boolean <i> n </i> -Projections Surjective.
Acta Informatica, 1983

1981
An Evaluation of Local Path ID Swapping in Computer Networks.
IEEE Trans. Commun., 1981

Syndrome-Testability Can be Achieved by Circuit Modification.
IEEE Trans. Computers, 1981

The Weighted Syndrome Sums Approach to VLSI Testing.
IEEE Trans. Computers, 1981

Best Huffman Trees.
Acta Informatica, 1981

A Fast Algorithm for Steiner Trees.
Acta Informatica, 1981

VLSI Self-Testing Based on Syndrome Techniques.
Proceedings of the Proceedings International Test Conference 1981, 1981

1980
Fleshing Out Wire Frames.
IBM J. Res. Dev., 1980

On a Class of One-Step Majority-Logic Decodable Cyclic Codes.
IBM J. Res. Dev., 1980

The level polynomials of the free distributive lattices.
Discret. Math., 1980

1979
Diagnosing Single Faults in Fanout-Free Combinational Circuits.
IEEE Trans. Computers, 1979

Search within a Page.
J. ACM, 1979

1978
Slide Search.
Research Report / RJ / IBM / San Jose, California, June, 1978

On the number of prime implicants.
Discret. Math., 1978

Exact and Approximate Membership Testers
Proceedings of the 10th Annual ACM Symposium on Theory of Computing, 1978

Analysis of a Universal Class of Hash Functions.
Proceedings of the Mathematical Foundations of Computer Science 1978, 1978

1977
Categories of Chain-Complete Posets.
Theor. Comput. Sci., 1977

Multidimensional Bin Packing Algorithms.
IBM J. Res. Dev., 1977

1976
Lower bounds on the lengths of node sequences in directed graphs.
Discret. Math., 1976

1975
Bases for Chain-Complete Posets
Proceedings of the 16th Annual Symposium on Foundations of Computer Science, 1975


  Loading...