Marek Amanowicz

Orcid: 0000-0002-9132-5788

According to our database1, Marek Amanowicz authored at least 12 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Detection and Classification of Malicious Flows in Software-Defined Networks Using Data Mining Techniques.
Sensors, 2021

2019
Risk-aware routing approach for software-defined networks.
Proceedings of the International Conference on Military Communications and Information Systems, 2019

Decision Support System for Identification and Security Management of Essential and Digital Services.
Proceedings of the International Conference on Military Communications and Information Systems, 2019

2018
On Applicability of Network Coding Technique for 6LoWPAN-based Sensor Networks.
Sensors, 2018

Applicability of risk analysis methods to risk-aware routing in software-defined networks.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

A study on flow features selection for malicious activities detection in software defined networks.
Proceedings of the International Conference on Military Communications and Information Systems, 2018

2017
Cyber Security Provision for Industrial Control Systems.
Proceedings of the Trends in Advanced Intelligent Control, Optimization and Automation - Proceedings of KKA 2017, 2017

SDN testbed for validation of cross-layer data-centric security policies.
Proceedings of the International Conference on Military Communications and Information Systems, 2017

2016
Content-based security and protected core networking with software-defined networks.
IEEE Commun. Mag., 2016

A method of network workload generation for evaluation of intrusion detection systems in SDN environment.
Proceedings of the International Conference on Military Communications and Information Systems, 2016

2015
A trust-based situation awareness system for military applications of the internet of things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Robustness of trust-based protection (TUBE) scheme to reputation attacks in military mobile ad-hoc networks.
Proceedings of the International Conference on Military Communications and Information Systems, 2015


  Loading...