Follow
Maciej Szmit
Maciej Szmit
University of Lodz
Verified email at szmit.info - Homepage
Title
Cited by
Cited by
Year
Zarządzanie projektami
P Pietras, M Szmit
Wybrane metody i techniki, OKW Horyzont sc, Łódź, 2003
85*2003
Usage of modified holt-winters method in the anomaly detection of network traffic: Case studies
M Szmit, A Szmit
Journal of Computer Networks and Communications 2012, 2012
632012
Informatyka w zarządzaniu
M Szmit
Difin, 2003
372003
Usage of Holt-Winters Model and Multilayer Perceptron in Network Traffic Modelling and Anomaly Detection
M Szmit, A Szmit, S Adamus, S Bugała
Informatica Vol. 36, Nr 4, 359-368, 2012
282012
Ryzyko operacyjne w naukach o zarządzaniu
M Blim, I Staniec, J Zawiła-Niedźwiecki, K Boczkowska, G Kierner, ...
Wydawnictwo CH Beck, 2015
252015
Usage of modern exponential-smoothing models in network traffic modelling
R Jašek, A Szmit, M Szmit
Nostradamus 2013: Prediction, Modeling and Analysis of Complex Systems, 435-444, 2013
252013
Use of holt-winters method in the analysis of network traffic: case study
M Szmit, A Szmit
Computer Networks: 18th Conference, CN 2011, Ustron, Poland, June 14-18 …, 2011
242011
Implementation of Brutlag’s algorithm in Anomaly Detection 3.0
M SZMIT, A SZMIT, S ADAMUS, S BUGALA
Proceedings of the Federated Conference on Computer Science and Information …, 0
23*
101 zabezpieczeń przed atakami w sieci komputerowej
M Szmit, M Gusta, M Tomaszewski
202005
Cyberbezpieczeństwo Administracji publicznej w Polsce. Wybrane zagadnienia
D LISIAK-FELICKA, M SZMIT
EAS Kraków, 2016
172016
Traffic Anomaly Detection with Snort
M Szmit, R Wężyk, M Skowroński, A Szmit
Information Systems Architecture and Technology. Information Systems and …, 2007
162007
Wybrane zagadnienia opiniowania sądowo-informatycznego
M Szmit
12*2014
Usage of pseudo-estimator lad and sarima models for network traffic prediction: case studies
M Szmit, A Szmit
Computer Networks: 19th International Conference, CN 2012, Szczyrk, Poland …, 2012
122012
Využití nula-jedničkových modelů pro behaviorální analýzu síťového provozu
M Szmit
Internet, competitiveness and organizational security, TBU, Zlín, 2011
82011
Information security management systems in Marshal Offices in Poland
D Lisiak-Felicka, M Szmit
Information Systems In Management 3 (2), 134-144, 2014
72014
Anomaly detection 3.0 for Snort
M Szmit, S Adamus, S Bugała, A Szmit
Securitatea informaţională, 37-41, 2012
72012
Detekcja anomalii ruchu sieciowego w programie Snort
M Skowroński, R Wężyk, M Szmit
Hakin9, 2007
72007
“Tango Down” – Some Comments to the Security of Cyberspace of Republic of Poland
D Lisiak‑Felicka, M Szmit
Systems supporting production engineering, 133-145, 2012
62012
SECURITY MANAGEMENT AND RISK MANAGEMENT APPROACH IN CYBERSECURITY AND INFORMATION SECURITY MANAGEMENT
M Szmit
52015
Wybrane aspekty zarządzania bezpieczeństwem informacji w urzędach marszałkowskich
D Lisiak-Felicka, M Szmit
Securitologia, 39-53, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20