Follow
Tomasz Surmacz
Tomasz Surmacz
Institute of Computer Engineering, Control, and Robotics; Wroclaw University of Technology
Verified email at okapi.ict.pwr.wroc.pl
Title
Cited by
Cited by
Year
Multi-camera vehicle tracking using edge computing and low-power communication
M Nikodem, M Słabicki, T Surmacz, P Mrówka, C Dołęga
Sensors 20 (11), 3334, 2020
312020
An analysis of lockergoga ransomware
A Adamov, A Carlsson, T Surmacz
2019 IEEE East-West Design & Test Symposium (EWDTS), 1-5, 2019
312019
DASH7 alliance protocol in monitoring applications
G Ergeerts, M Nikodem, D Subotic, T Surmacz, B Wojciechowski, ...
2015 10th International Conference on P2P, Parallel, Grid, Cloud and …, 2015
312015
Serecon: A secure dynamic partial reconfiguration controller
K Kepa, F Morgan, K Kosciuszkiewicz, T Surmacz
2008 IEEE Computer Society Annual Symposium on VLSI, 292-297, 2008
292008
SeReCon: a secure reconfiguration controller for self-reconfigurable systems
K Kepa, F Morgan, K Kosciuszkiewicz, T Surmacz
International Journal of Critical Computer-Based Systems 1 (1-3), 86-103, 2010
232010
HTTP2vec: Embedding of HTTP requests for detection of anomalous traffic
M Gniewkowski, H Maciejewski, TR Surmacz, W Walentynowicz
arXiv preprint arXiv:2108.01763, 2021
142021
Reliability of e-mail delivery in the era of spam
TR Surmacz
2nd International Conference on Dependability of Computer Systems (DepCoS …, 2007
132007
Transmission power control based on packet reception rate
M Nikodem, M Slabicki, T Surmacz, B Wojciechowski
2014 6th International Conference on New Technologies, Mobility and Security …, 2014
102014
Realistic model of radio communication in wireless sensor networks
M Słabicki, B Wojciechowski, T Surmacz
Computer Networks: 19th International Conference, CN 2012, Szczyrk, Poland …, 2012
102012
Sec2vec: Anomaly detection in HTTP traffic and malicious URLs
M Gniewkowski, H Maciejewski, T Surmacz, W Walentynowicz
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 1154-1162, 2023
92023
An analysis of lockergoga ransomware. In 2019 IEEE East-West Design & Test Symposium (EWDTS)
A Adamov, A Carlsson, T Surmacz
Batumi, Georgia, 1-5, 2019
82019
Lessons learned from the deployment of wireless sensor networks
T Surmacz, M Słabicki, B Wojciechowski, M Nikodem
Computer Networks: 20th International Conference, CN 2013, Lwówek ¦l±ski …, 2013
72013
Measurement of data flow in usenet news management
TR Surmacz
Measurement Science Review 5, 47-51, 2005
52005
Http2vec: embedding of HTTP requests for detection of anomalous traffic. CoRR abs/2108.01763 (2021)
M Gniewkowski, H Maciejewski, TR Surmacz, W Walentynowicz
5
Anomaly detection techniques for different ddos attack types
M Gniewkowski, H Maciejewski, T Surmacz
International Conference on Dependability and Complex Systems, 63-78, 2022
42022
SeReCon: A trusted environment for SoPC design
K Kepa, F Morgan, K Kosciuszkiewicz, T Surmacz
2008 Third International Conference on Dependability of Computer Systems …, 2008
42008
Rapid protocol development in wireless sensor networks using wireshark plugins
T Surmacz
Computer Aided Systems Theory-EUROCAST 2013: 14th International Conference …, 2013
32013
Negative difference resistance and its application to construct boolean logic circuits
M Nikodem, MA Bawiec, TR Surmacz
Computer Networks: 17th Conference, CN 2010, Ustroń, Poland, June 15-19 …, 2010
32010
Bandwidth control in redundant news server links
TR Surmacz
2006 International Conference on Dependability of Computer Systems, 143-149, 2006
32006
Clustering and data aggregation as factors of wireless sensor network lifetime
B Wojciechowski, M Nikodem, T Surmacz
Computer Aided Systems Theory–EUROCAST 2011: 13th International Conference …, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20