Oleksiy Mazhelis

According to our database1, Oleksiy Mazhelis authored at least 50 papers between 2001 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2018
Exploring Business Model Changes in Software-as-a-Service Firms.
Proceedings of the Software Business - 9th International Conference, 2018

2017
Detection of Fake Profiles in Social Media - Literature Review.
Proceedings of the 13th International Conference on Web Information Systems and Technologies, 2017

2016
Cost benefits of flexible hybrid cloud storage: Mitigating volume variation with shorter acquisition cycle.
J. Syst. Softw., 2016

Adoption of Constrained Application Protocol: A Techno-Economic Perspective.
Int. J. Innov. Digit. Econ., 2016

A gap analysis of Internet-of-Things platforms.
Comput. Commun., 2016

Towards enabling privacy preserving smart city apps.
Proceedings of the IEEE International Smart Cities Conference, 2016

2015
Contemporary Internet of Things platforms.
CoRR, 2015

Network Analysis of Platform Ecosystems: The Case of Internet of Things Ecosystem.
Proceedings of the Software Business - 6th International Conference, 2015

Cost Efficiency of Hybrid Cloud Storage: Shortening Acquisition Cycle to Mitigate Volume Variation.
Proceedings of the International Conference on Information Systems, 2015

2014
Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications.
Decis. Support Syst., 2014

Role of acquisition intervals in private and public cloud storage costs.
Decis. Support Syst., 2014

A framework for evaluating Internet-of-Things platforms: Application provider viewpoint.
Proceedings of the IEEE World Forum on Internet of Things, 2014

2013
Vertical software industry evolution: The impact of software costs and limited customer base.
Inf. Softw. Technol., 2013

Applying Wavelet Packet Decomposition and One-Class Support Vector Machine on Vehicle Acceleration Traces for Road Anomaly Detection.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013

Cloud Services Pricing Models.
Proceedings of the Software Business. From Physical Products to Software Services and Solutions, 2013

Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications.
Proceedings of the Emerging Management Mechanisms for the Future Internet, 2013

2012
Economic aspects of hybrid cloud infrastructure: User organization perspective.
Inf. Syst. Frontiers, 2012

Defining an Internet-of-Things Ecosystem.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2012

Advantages of Public Cloud Infrastructure in Different Technology Adoption Lifecycle Stages.
Proceedings of the Software Business - Third International Conference, 2012

Costs of Using Hybrid Cloud Infrastructure: Towards a General Framework.
Proceedings of the Software Business - Third International Conference, 2012

Software Business in the Telecommunications Sector.
Proceedings of the Telecommunication Economics, 2012

Hybrid Cloud Architecture for Short Message Services.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Distributed Road Surface Condition Monitoring Using Mobile Phones.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

Real-time recognition of personal routes using instance-based learning.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

Role of Data Communications in Hybrid Cloud Costs.
Proceedings of the 37th EUROMICRO Conference on Software Engineering and Advanced Applications, SEAA 2011, Oulu, Finland, August 30, 2011

Context-Aware Personal Route Recognition.
Proceedings of the Discovery Science - 14th International Conference, 2011

Dedicated vs. On-demand Infrastructure Costs in Communications-intensive Applications.
Proceedings of the CLOSER 2011, 2011

2010
Using recursive Bayesian estimation for matching GPS measurements to imperfect road network data.
Proceedings of the 13th International IEEE Conference on Intelligent Transportation Systems, 2010

Information Security Culture: A Survey.
Proceedings of the Eighth International Network Conference (INC 2010), 2010

Managerial Growth Challenges in Small Software Firms: A Multiple-Case Study of Growth-Oriented Enterprises.
Proceedings of the Software Business - First International Conference, 2010

Software-as-a-Service in the Telecommunication Industry: Problems and Opportunities.
Proceedings of the Software Business - First International Conference, 2010

2008
Security Assessment and Planning in Small Organizations.
Proceedings of the Seventh International Network Conference (INC 2008), 2008

Analyzing Impact of Interface Implementation Efforts on the Structure of a Software Market - OSS/BSS Market Polarization Scenario.
Proceedings of the ICSOFT 2008, 2008

2007
A framework for behavior-based detection of user substitution in a mobile context.
Comput. Secur., 2007

One-Class Classifiers: A Review and Analysis of Suitability in the Context of Mobile-Masquerader Detection.
ARIMA J., 2007

Support for Knowledge and Innovations in Software Development - Community within Company: Inner Source Environment.
Proceedings of the WEBIST 2007, 2007

Comparing Classifier Combining Techniques for Mobile-Masquerader Detection.
Proceedings of the The Second International Conference on Availability, 2007

2006
The Place and Role of Security Patterns in Software Development Process.
Proceedings of the Security in Information Systems, 2006

Evaluating Classifiers for Mobile-Masquerader Detection.
Proceedings of the Security and Privacy in Dynamic Environments, 2006

Estimating Accuracy of Mobile-Masquerader Detection Using Worst-Case and Best-Case Scenario.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Defining Complexity Factors for the Architecture Evaluation Framework.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
An integrated identity verification system for mobile terminals.
Inf. Manag. Comput. Security, 2005

Specifying Patterns for Mobile Application Domain Using General Architectural Components.
Proceedings of the Product Focused Software Process Improvement, 2005

2004
Characteristics and Measures for Mobile-Masquerader Detection.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Modelling Dependencies Between Classifiers in Mobile Masquerader Detection.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Combining One-Class Classifiers for Mobile-User Substitution Detection.
Proceedings of the ICEIS 2004, 2004

2002
Learning temporal patterns for anomaly intrusion detection.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users.
Proceedings of the Certification and Security in E-Services, From E-Govenment to E-Business, IFIP 17<sup>th</sup> World Computer Congress, 2002

2001
Learning Temporal Regularities of User Behavior for Anomaly Detection.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001


  Loading...