Connectivity, Traffic Flow and Applied Statistics in Cyber Security K Thakur, ML Ali, S Kopecky, A Kamruzzaman, L Tao 2016 IEEE International Conference on Smart Cloud (SmartCloud), 295-300, 2016 | 21 | 2016 |
An analysis of information security event managers K Thakur, S Kopecky, M Nuseir, ML Ali, M Qiu 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing …, 2016 | 17 | 2016 |
Nature Inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Grey Wolf Algorithm Techniques S Kopecky, C Dwyer 2022 International Conference on Electrical, Computer and Energy …, 2022 | 2 | 2022 |
Challenges of Deepfakes S Kopecky Science and Information Conference, 158-166, 2024 | 1 | 2024 |
Nature Inspired Metaheuristic Techniques of Firefly and Grey Wolf Algorithms Implemented in Phishing Intrusion Detection Systems S Kopecky, C Dwyer Science and Information Conference, 1309-1332, 2023 | 1 | 2023 |
Nature-inspired Metaheuristic Effectiveness Used in Phishing Intrusion Detection Systems with Firefly Algorithm Techniques CD Sandra Kopecky 2022 International Conference on Electrical, Computer and Energy …, 2022 | | 2022 |
Cyber security paradox from a user's view point S Kopecky 2017 Computing Conference, 783-787, 2017 | | 2017 |
An Analysis of Information Security Event Managers and the Data Extracted for Detecting Hidden Threats K Thakur, S Kopecky, M Nuseir, A Copeland, N Saxena, D Bivins | | |