Grzegorz Kolaczek

Orcid: 0000-0001-7125-0988

According to our database1, Grzegorz Kolaczek authored at least 54 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adaptive user interface for workflow-ERP system.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

2022
Collaborative Intrusion Detection System for Internet of Things Using Distributed Ledger Technology: A Survey on Challenges and Opportunities.
Proceedings of the Intelligent Information and Database Systems - 14th Asian Conference, 2022

2021
Android Malware Detection Using Deep Learning Methods.
Proceedings of the 30th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2021

2020
Maintaining Security and Quality in Mobile and Network Systems - CoNeSec Track Summary.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Application and preliminary evaluation of Anontool applied in the anomaly detection module.
Proceedings of the 29th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2020

Self-adaptation of Workflow Business Software to the User's Requirements and Behavior.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 24th International Conference KES-2020, 2020

2019
Complex Networks Monitoring and Security and Fraud Detection for Enterprises.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Architecture of Anomaly Detection Module for the Security Operations Center.
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019

Sound and Keystroke Dynamics Analysis for User Authenticity Verification.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

2018
Security framework for dynamic service-oriented IT systems.
J. Inf. Telecommun., 2018

Intrusion detection systems vulnerability on adversarial examples.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018

Information Streaming Systems: A Review.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018

2017
CoNeSec Track Report.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Structural Analysis and Link Prediction in Dynamic Networks of Web Services.
Proceedings of the 26th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2017

Source-target mapping model of streaming data flow for machine translation.
Proceedings of the IEEE International Conference on INnovations in Intelligent SysTems and Applications, 2017

Analysis of dynamic service oriented systems for security related problems detection.
Proceedings of the IEEE International Conference on INnovations in Intelligent SysTems and Applications, 2017

2016
Detection of Security Incidents in a Context of Unwelcome or Dangerous Activity of Web Robots.
Proceedings of the Multimedia and Network Information Systems, 2016

RFID Security: A Method for Tracking Prevention.
Proceedings of the Computer and Information Sciences - 31st International Symposium, 2016

2015
Identification of Shill Bidding for Online Auctions Using Anomaly Detection.
Proceedings of the New Trends in Intelligent Information and Database Systems, 2015

Trust-based security-level evaluation method for dynamic service-oriented environments.
Concurr. Comput. Pract. Exp., 2015

Dictionary as a Service - A Software Tool for Vocabulary Development and Maintenance.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology - ISAT 2015, 2015

Test Scenarios and Validation Results of POP Methodology.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology - ISAT 2015, 2015

The Methodology for Software Development to Support Decision Making Processes.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology - ISAT 2015, 2015

Processes' optimization tools for web-service oriented organizations' resources - an ehealth application.
Proceedings of the 17th International Conference on E-health Networking, 2015

Online platform to support business analysis and Process Optimization in transportation organizations.
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015

2014
Specifications and Deployment of SOA Business Applications Within a Configurable Framework Provided as a Service.
Proceedings of the Advanced SOA Tools and Applications, 2014

Security Incident Detection Using Multidimensional Analysis of the Web Server Log Files.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2014

2013
Multi-agent Platform for Security Level Evaluation of Information and Communication Services.
Proceedings of the Advanced Methods for Computational Collective Intelligence, 2013

Theory and implementation of a virtualisation level Future Internet defence in depth architecture.
Int. J. Trust. Manag. Comput. Commun., 2013

Decision Making in Security Level Evaluation Process of Service-Based Applications in Future Internet Architecture.
Proceedings of the Advances in Systems Science, 2013

2012
A Virtualization-Level Future Internet Defense-in-Depth Architecture.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

An Environment for Service Composition, Execution and Resource Allocation.
Proceedings of the Applied Parallel and Scientific Computing, 2012

Anomaly Detection System Based on Service Oriented Architecture.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Traffic Pattern Analysis for Distributed Anomaly Detection.
Proceedings of the Parallel Processing and Applied Mathematics, 2011

Smart Work Workbench; Integrated Tool for IT Services Planning, Management, Execution and Evaluation.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2011

Motif-Based Attack Detection in Network Communication Graphs.
Proceedings of the Communications and Multimedia Security, 2011

2010
Social Network Analysis Based Approach to Trust Modeling for Autonomous Multi-agent Systems.
Proceedings of the Agent and Multi-agent Technology for Internet and Enterprise Systems, 2010

Deontic Logic-based Framework for Ontology Aligment in Agent Communities.
J. Univers. Comput. Sci., 2010

Smart Security Assessment of Composed Web Services.
Cybern. Syst., 2010

2009
Trust Modeling in a Virtual Organization Using Social Network Metrics.
Int. J. Virtual Communities Soc. Netw., 2009

Software Security in the Model for Service Oriented Architecture Quality.
Proceedings of the Parallel Processing and Applied Mathematics, 2009

Deontic Logic Reasoning for Maintaining Ontology Consistency in Agent Networks.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2009

Multiagent Security Evaluation Framework for Service Oriented Architecture Systems.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

Model for Trust Dynamics in Service Oriented Information Systems.
Proceedings of the Computational Collective Intelligence. Semantic Web, 2009

An Approach to Identity Theft Detection Using Social Network Analysis.
Proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009

2008
Attack Pattern Analysis Framework For Multiagent Intrusion Detection System.
Int. J. Comput. Intell. Syst., 2008

A New Concept of Trust Modeling and Management in Complex Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

Trust modeling in virtual communities using social network metrics.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

e-collaboration platform for the development of rural areas and enterprises.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

2007
Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

2006
Assessing the Uncertainty of Communication Patterns in Distributed Intrusion Detection System.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Agent-Based Approach for Distributed Intrusion Detection System Design.
Proceedings of the Computational Science, 2006

2005
A Mobile Agent Approach to Intrusion Detection in Network Systems.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2003
Specification and Verification of Constraints in Role Based Access Control for Enterprise Security System.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003


  Loading...