关注
Jakub Nowak
Jakub Nowak
在 iisi.pcz.pl 的电子邮件经过验证
标题
引用次数
引用次数
年份
LSTM recurrent neural networks for short text and sentiment classification
J Nowak, A Taspinar, R Scherer
Artificial Intelligence and Soft Computing: 16th International Conference …, 2017
1952017
Accurate and fast URL phishing detector: a convolutional neural network approach
W Wei, Q Ke, J Nowak, M Korytkowski, R Scherer, M Woźniak
Computer Networks 178, 107275, 2020
1852020
Random forests for profiling computer network users
J Nowak, M Korytkowski, R Nowicki, R Scherer, A Siwocha
Artificial Intelligence and Soft Computing: 17th International Conference …, 2018
132018
Fingerprinting of URL logs: continuous user authentication from behavioural patterns
J Nowak, T Holotyak, M Korytkowski, R Scherer, S Voloshynovskiy
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
52020
Classification of computer network users with convolutional neural networks
J Nowak, M Korytkowski, R Scherer
2018 Federated Conference on Computer Science and Information Systems …, 2018
42018
URL-based Phishing Attack Detection by Convolutional Neural Networks.
J Nowak, M Korytkowski, M Wozniak, R Scherer
Aust. J. Intell. Inf. Process. Syst. 15 (2), 60-67, 2019
22019
Convolutional recurrent neural networks for computer network analysis
J Nowak, M Korytkowski, R Scherer
Artificial Neural Networks and Machine Learning–ICANN 2019: Text and Time …, 2019
12019
Sequential Data Mining of Network Traffic in URL Logs
M Korytkowski, J Nowak, R Nowicki, K Milkowska, M Scherer, P Goetzen
Artificial Intelligence and Soft Computing: 18th International Conference …, 2019
12019
Discovering Sequences in Systems Logs by Neural Networks.
J Nowak, M Korytkowski, M Wozniak, R Scherer
Aust. J. Intell. Inf. Process. Syst. 17 (2), 69-76, 2019
2019
系统目前无法执行此操作,请稍后再试。
文章 1–9