Rafal Renk

According to our database1, Rafal Renk authored at least 23 papers between 2001 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment.
Proceedings of the Intelligent Computing Methodologies - 18th International Conference, 2022

The cybersecurity-related ethical issues of cloud technology and how to avoid them.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2019
Q-Rapids framework for advanced data analysis to improve rapid software development.
J. Ambient Intell. Humaniz. Comput., 2019

Increasing product owners' cognition and decision-making capabilities by data analysis approach.
Cogn. Technol. Work., 2019

2018
Platform for Software Quality and Dependability Data Analysis.
Proceedings of the Contemporary Complex Systems and Their Dependability, 2018

2017
The Concept of Applying Lifelong Learning Paradigm to Cybersecurity.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

2016
Scenario-Based Evaluation of 112 Application "Pomoc".
Proceedings of the Information Systems for Crisis Response and Management in Mediterranean Countries, 2016

Extreme Learning Machines for Web Layer Anomaly Detection.
Proceedings of the Image Processing and Communications Challenges 8, 2016

Cyber Security of the Application Layer of Mission Critical Industrial Systems.
Proceedings of the Computer Information Systems and Industrial Management, 2016

2015
Text Analysis Tool TWeet lOcator - TAT2.
Proceedings of the 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2015

Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic.
Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015, 2015

Patterns Extraction Method for Anomaly Detection in HTTP Traffic.
Proceedings of the International Joint Conference, 2015

A Practical Framework and Guidelines to Enhance Cyber Security and Privacy.
Proceedings of the International Joint Conference, 2015

2014
End-users needs and requirements for tools to support critical infrastructures protection.
CoRR, 2014

Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

A Proposal of Algorithm for Web Applications Cyber Attack Detection.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2012
Statistical and signal-based network traffic recognition for anomaly detection.
Expert Syst. J. Knowl. Eng., 2012

Information Exchange Mechanism between Federated Domains: P2P Approach.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

2010
Performance Evaluation of ADS System Based on Redundant Dictionary.
Proceedings of the Image Processing and Communications Challenges 2, 2010

2009
Recognizing Anomalies/Intrusions in Heterogeneous Networks.
Proceedings of the Computer Recognition Systems 3, 2009

Ontology-Based Decision Support for Security Management in Heterogeneous Networks.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009

A Novel Signal-Based Approach to Anomaly Detection in IDS Systems.
Proceedings of the Adaptive and Natural Computing Algorithms, 9th International Conference, 2009

2001
3-D Modeling and Parametrisation of Pelvis and Hip Joint.
Proceedings of the Computer Analysis of Images and Patterns, 9th International Conference, 2001


  Loading...