Witold Holubowicz

According to our database1, Witold Holubowicz authored at least 48 papers between 1985 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset.
Sensors, 2021

How to Effectively Collect and Process Network Data for Intrusion Detection?
Entropy, 2021

Missing and Incomplete Data Handling in Cybersecurity Applications.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021

2020
Common Representational Model and Ontologies for Effective Law Enforcement Solutions.
Vietnam. J. Comput. Sci., 2020

On the Impact of Network Data Balancing in Cybersecurity Applications.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case.
Proceedings of the Computational Collective Intelligence - 11th International Conference, 2019

Software Development Metrics Prediction Using Time Series Methods.
Proceedings of the Computer Information Systems and Industrial Management, 2019

2017
Packets tokenization methods for web layer cyber security.
Log. J. IGPL, 2017

The Concept of Applying Lifelong Learning Paradigm to Cybersecurity.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

2016
Evolutionary-based packets classification for anomaly detection in web layer.
Secur. Commun. Networks, 2016

Extreme Learning Machines for Web Layer Anomaly Detection.
Proceedings of the Image Processing and Communications Challenges 8, 2016

Cyber Security of the Application Layer of Mission Critical Industrial Systems.
Proceedings of the Computer Information Systems and Industrial Management, 2016

2015
Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic.
Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015, 2015

Patterns Extraction Method for Anomaly Detection in HTTP Traffic.
Proceedings of the International Joint Conference, 2015

A Practical Framework and Guidelines to Enhance Cyber Security and Privacy.
Proceedings of the International Joint Conference, 2015

2014
End-users needs and requirements for tools to support critical infrastructures protection.
CoRR, 2014

Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Social media in crisis management - The iSAR+ project survey.
Proceedings of the 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2014

Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach.
Proceedings of the Image Processing and Communications Challenges 6, 2014

A Proposal of Algorithm for Web Applications Cyber Attack Detection.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2012
Statistical and signal-based network traffic recognition for anomaly detection.
Expert Syst. J. Knowl. Eng., 2012

Information Exchange Mechanism between Federated Domains: P2P Approach.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Correlation Approach for SQL Injection Attacks Detection.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

The TALOS Project - Autonomous Robotic Patrol Vehicles.
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012

2011
DTN Simulation Tool for N4C Integration Support.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Network Events Correlation for Federated Networks Protection System.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

The TALOS project. EU wide robotic border guard system.
Proceedings of the 16th International Conference on Methods and Models in Automation and Robotics, 2011

2010
Intersection Approach to Vulnerability Handling.
Proceedings of the WEBIST 2010, 2010

Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Performance Evaluation of ADS System Based on Redundant Dictionary.
Proceedings of the Image Processing and Communications Challenges 2, 2010

The Gap between Packet Level QoS and Objective QoE Assessment of WWW on Mobile Devices.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Evaluation of Measurement Based Admission Control Algorithms for IEEE 802.16 Networks in Simulations with L2S Physical Layer Abstraction and nbLDPC Codes.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Ontology Applied in Decision Support System for Critical Infrastructures Protection.
Proceedings of the Trends in Applied Intelligent Systems, 2010

Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services.
Proceedings of the Computer Vision and Graphics - International Conference, 2010

Admission Control and System Capacity Assessment of WiMAX with ACM and nb-LDPC Codes.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Recognizing Anomalies/Intrusions in Heterogeneous Networks.
Proceedings of the Computer Recognition Systems 3, 2009

Ontology-Based Decision Support for Security Management in Heterogeneous Networks.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009

A Novel Signal-Based Approach to Anomaly Detection in IDS Systems.
Proceedings of the Adaptive and Natural Computing Algorithms, 9th International Conference, 2009

Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
e-collaboration platform for the development of rural areas and enterprises.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

2000
Predistortion for Solid State Amplifier of Mobile Radio Systems.
Proceedings of the Personal Wireless Communications, 2000

1995
Convolutional coding of binary CPM schemes with no increase in receiver complexity.
IEEE Trans. Commun., 1995

1994
Good multi-T phase codes under bandwidth and complexity constraints.
IEEE Trans. Inf. Theory, 1994

Optimization of trellis coded TFM via matched codes.
IEEE Trans. Commun., 1994

Land mobile radio systems in Poland.
IEEE J. Sel. Areas Commun., 1994

1990
Simulation study of multi-T phase codes.
IEEE Trans. Commun., 1990

Optimum parameter combinations for multi-h phase codes.
IEEE Trans. Commun., 1990

1985
Multi-T realization of multi- h phase codes.
IEEE Trans. Inf. Theory, 1985


  Loading...