Peter Komisarczuk

According to our database1, Peter Komisarczuk authored at least 46 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank.
Proceedings of the Australasian Computer Science Week, 2020

Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks.
Proceedings of the Australasian Computer Science Week, 2020

2017
A Survey on Reinforcement Learning Models and Algorithms for Traffic Signal Control.
ACM Comput. Surv., 2017

2014
Challenges in developing Capture-HPC exclusion lists.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Formalization of Validation Extension Metamodel for Enterprise Architecture Frameworks.
Proceedings of the ICEIS 2014, 2014

Partitional Clustering of Malware Using K-Means.
Proceedings of the Cyberpatterns, 2014

2013
Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective.
Int. J. Ad Hoc Ubiquitous Comput., 2013

Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Graphical user interfaces in dynamic software product lines.
Proceedings of the 4th International Workshop on Product LinE Approaches in Software Engineering, 2013

Complex Event as an Core Aspect of Enterprise Architecture - EDEMF: Event Driven Enterprise Architecture Modeling Framework.
Proceedings of the ICEIS 2013, 2013

Using document-oriented GUIs in dynamic software product lines.
Proceedings of the Generative Programming: Concepts and Experiences, 2013

Anatomy of Drive-by Download Attack.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues.
J. Netw. Comput. Appl., 2012

A Novel Scoring Model to Detect Potential Malicious Web Pages.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Fingerprinting Seismic Activity across an Internet of Things.
Proceedings of the 5th International Conference on New Technologies, 2012

Comparison of Messaging Protocols for Emerging Wireless Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

On Initializations for the Minkowski Weighted K-Means.
Proceedings of the Advances in Intelligent Data Analysis XI - 11th International Symposium, 2012

2011
Towards Distributed Collaborative Workflow Management for Mobile Devices.
Proceedings of the Data-Driven Process Discovery and Analysis, 2011

An extensible, self contained, layered approach to context acquisition.
Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2011), Lisbon, Portugal, December 12, 2011

Learning mechanisms for achieving context awareness and intelligence in Cognitive Radio networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Identification of Potential Malicious Web Pages.
Proceedings of the Ninth Australasian Information Security Conference, 2011

Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

Performance Analysis of Reinforcement Learning for Achieving Context Awareness and Intelligence in Mobile Cognitive Radio Networks.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

Two-Stage Classification Model to Detect Malicious Web Pages.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Internet Sensor Grid: Experiences with Passive and Active Instruments.
Proceedings of the Communications: Wireless in Developing Countries and Networks of the Future, 2010

Achieving Efficient and Optimal Joint Action in Distributed Cognitive Radio Networks Using Payoff Propagation.
Proceedings of IEEE International Conference on Communications, 2010

High occupancy resource allocation for grid and cloud systems, a study with DRIVE.
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010

Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform.
Proceedings of the 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2010

2009
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Performance analysis of Reinforcement Learning for achieving context-awareness and intelligence in Cognitive Radio networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Cognitive Radio-based Wireless Sensor Networks: Conceptual design and open issues.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks.
Proceedings of the 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2009

Automating Malware Scanning Using Workflows.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

Measurement Study on Malicious Web Servers in the .nz Domain.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Identification of malicious web pages through analysis of underlying DNS and web server relationships.
Proceedings of the LCN 2008, 2008

Identifying and Analyzing Web Server Attacks.
Proceedings of the Advances in Digital Forensics IV, 2008

Designing Workflows for Grid Enabled Internet Instruments.
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

2007
Capture - A behavioral analysis tool for applications and documents.
Digit. Investig., 2007

Grid Enabled Internet Instruments.
Proceedings of the Global Communications Conference, 2007

2005
SIMPLE: developing a LBS positioning solution.
Proceedings of the 4th International Conference on Mobile and Ubiquitous Multimedia, 2005

Efficient dynamic resource specifications.
Proceedings of the 6th International Conference on Mobile Data Management (MDM 2005), 2005

Fine Grained Resource Reservation and Management in Grid Economics.
Proceedings of The 2005 International Conference on Grid Computing and Applications, 2005

A Position Paper: Towards an Utility Computing and Communications Infrastructure.
Proceedings of the 2005 International Conference on Communications in Computing, 2005


  Loading...