Zarządzanie projektami P Pietras, M Szmit Wybrane metody i techniki, OKW Horyzont sc, Łódź, 2003 | 87* | 2003 |
Usage of Modified Holt‐Winters Method in the Anomaly Detection of Network Traffic: Case Studies M Szmit, A Szmit Journal of Computer Networks and Communications 2012 (1), 192913, 2012 | 68 | 2012 |
Informatyka w zarządzaniu M Szmit Difin, 2003 | 38 | 2003 |
Usage of Holt-Winters Model and Multilayer Perceptron in Network Traffic Modelling and Anomaly Detection M Szmit, A Szmit, S Adamus, S Bugała Informatica Vol. 36, Nr 4, 359-368, 2012 | 29 | 2012 |
Usage of modern exponential-smoothing models in network traffic modelling R Jašek, A Szmit, M Szmit Nostradamus 2013: Prediction, Modeling and Analysis of Complex Systems, 435-444, 2013 | 27 | 2013 |
Ryzyko operacyjne w naukach o zarządzaniu M Blim, I Staniec, J Zawiła-Niedźwiecki, K Boczkowska, G Kierner, ... Wydawnictwo CH Beck, 2015 | 25 | 2015 |
Use of holt-winters method in the analysis of network traffic: case study M Szmit, A Szmit Computer Networks: 18th Conference, CN 2011, Ustron, Poland, June 14-18 …, 2011 | 25 | 2011 |
Implementation of Brutlag’s algorithm in Anomaly Detection 3.0 M SZMIT, A SZMIT, S ADAMUS, S BUGALA Proceedings of the Federated Conference on Computer Science and Information …, 0 | 22* | |
101 zabezpieczeń przed atakami w sieci komputerowej M Szmit, M Gusta, M Tomaszewski | 21 | 2005 |
Traffic anomaly detection with snort M Szmit, R Wężyk, M Skowroński, A Szmit Information Systems Architecture and Technology. Information Systems and …, 2007 | 19 | 2007 |
Cyberbezpieczeństwo Administracji publicznej w Polsce. Wybrane zagadnienia D LISIAK-FELICKA, M SZMIT EAS Kraków, 2016 | 18 | 2016 |
Wybrane zagadnienia opiniowania sądowo-informatycznego M Szmit | 17* | 2014 |
Usage of pseudo-estimator lad and sarima models for network traffic prediction: case studies M Szmit, A Szmit Computer Networks: 19th International Conference, CN 2012, Szczyrk, Poland …, 2012 | 13 | 2012 |
Information security management systems in Marshal Offices in Poland D Lisiak-Felicka, M Szmit Information Systems In Management 3 (2), 134-144, 2014 | 7 | 2014 |
Anomaly detection 3.0 for Snort M Szmit, S Adamus, S Bugała, A Szmit Securitatea informaţională, 37-41, 2012 | 7 | 2012 |
Využití nula-jedničkových modelů pro behaviorální analýzu síťového provozu M Szmit Internet, competitiveness and organizational security, TBU, Zlín, 2011 | 7 | 2011 |
GDPR implementation in public administration in Poland – 1.5 year after: An empirical analysis MS Dominika Lisiak-Felicka Journal of Economic and Management 43, 5-25, 2021 | 6* | 2021 |
“Tango Down” – Some Comments to the Security of Cyberspace of Republic of Poland D Lisiak‑Felicka, M Szmit Systems supporting production engineering, 133-145, 2012 | 6 | 2012 |
Elementy informatyki sądowej M Szmit, A Baworowski, A Kmieciak, P Krejza, A Niemiec Polskie Towarzystwo Informatyczne, Warszawa, 2011 | 6 | 2011 |
Detekcja anomalii ruchu sieciowego w programie Snort M Skowroński, R Wężyk, M Szmit Hakin9, 2007 | 6 | 2007 |