Intelligent Transportation Systems–Models, Challenges, Security Aspects
J Kołodziej, C Hopmann, G Coppa, D Grzonka… - Cybersecurity of Digital …, 2022 - Springer
As cars and other transportation devices become increasingly interconnected, mobility takes
on a new meaning, offering new opportunities. The integration of new communications …
on a new meaning, offering new opportunities. The integration of new communications …
[PDF][PDF] Comparative study of supervised learning methods for malware analysis
M Kruczkowski, E Niewiadomska-Szynkiewicz - Journal of Telecommunications …, 2014 - jtit.pl
Malware is a software designed to disrupt or even damage computer system or do other
unwanted actions. Nowadays, malware is a common threat of the World Wide Web. Anti …
unwanted actions. Nowadays, malware is a common threat of the World Wide Web. Anti …
FP-tree and SVM for malicious web campaign detection
M Kruczkowski, E Niewiadomska-Szynkiewicz… - … and Database Systems …, 2015 - Springer
The classification of the massive amount of malicious software variants into families is a
challenging problem faced by the network community. In this paper (The work was …
challenging problem faced by the network community. In this paper (The work was …
Cross-layer analysis of malware datasets for malicious campaigns identification
M Kruczkowski… - 2015 International …, 2015 - ieeexplore.ieee.org
In this paper, we investigate the problem of detecting correlations among datasets
containing malicious data concerned with various types of network attacks and related …
containing malicious data concerned with various types of network attacks and related …
Joanna Kolodziej1, 3 (B), Cornelio Hopmann2, Giovanni Coppa2
D Grzonka, A Widlak - Cybersecurity of Digital Service Chains …, 2022 - books.google.com
As cars and other transportation devices become increasingly interconnected, mobility takes
on a new meaning, offering new opportunities. The integration of new communications …
on a new meaning, offering new opportunities. The integration of new communications …
[引用][C] Holistic Approach for Malware Web Campaigns Identification
M Kruczkowski, E Niewiadomska-Szynkiewicz - Selected problems in …, 2015 - nask.pl
ISO/OSI reference model. Assuming multi-source and multilayered nature of propagation of
malware, the authors claim that such approach should help to obtain better results with …
malware, the authors claim that such approach should help to obtain better results with …
The Rough Set Analysis for Malicious Web Campaigns Identification
M Kruczkowski, M Miciak - … 10: 10th International Conference, IP&C'2018 …, 2019 - Springer
The malware (malicious software) identification has to be supported by a comprehensive
and extensive analysis of data from the Internet, and it is a hot topic nowadays. Data mining …
and extensive analysis of data from the Internet, and it is a hot topic nowadays. Data mining …
[图书][B] An artificial co-stimulation classifier for malicious API calls classification in portable executable malwares
SM Abdulla - 2012 - search.proquest.com
Recently, most researchers have employed behaviour based detection systems to classify
Portable Executable (PE) malwares. They usually tried to identify malicious Application …
Portable Executable (PE) malwares. They usually tried to identify malicious Application …
[引用][C] Analizator kampanii złośliwego oprogramowania wspierający systemy bezpieczeństwa sieci komputerowych
M Kruczkowski - Przegląd Telekomunikacyjny+ Wiadomości …, 2016