Follow
Maciej Szmit
Maciej Szmit
University of Lodz
Verified email at szmit.info - Homepage
Title
Cited by
Cited by
Year
Zarządzanie projektami
P Pietras, M Szmit
Wybrane metody i techniki, OKW Horyzont sc, Łódź, 2003
87*2003
Usage of modified holt-winters method in the anomaly detection of network traffic: Case studies
M Szmit, A Szmit
Journal of Computer Networks and Communications 2012, 2012
682012
Informatyka w zarządzaniu
M Szmit
Difin, 2003
372003
Usage of Holt-Winters Model and Multilayer Perceptron in Network Traffic Modelling and Anomaly Detection
M Szmit, A Szmit, S Adamus, S Bugała
Informatica Vol. 36, Nr 4, 359-368, 2012
302012
Usage of modern exponential-smoothing models in network traffic modelling
R Jašek, A Szmit, M Szmit
Nostradamus 2013: Prediction, Modeling and Analysis of Complex Systems, 435-444, 2013
262013
Ryzyko operacyjne w naukach o zarządzaniu
M Blim, I Staniec, J Zawiła-Niedźwiecki, K Boczkowska, G Kierner, ...
Wydawnictwo CH Beck, 2015
252015
Use of holt-winters method in the analysis of network traffic: case study
M Szmit, A Szmit
Computer Networks: 18th Conference, CN 2011, Ustron, Poland, June 14-18 …, 2011
252011
Implementation of Brutlag’s algorithm in Anomaly Detection 3.0
M SZMIT, A SZMIT, S ADAMUS, S BUGALA
Proceedings of the Federated Conference on Computer Science and Information …, 0
24*
101 zabezpieczeń przed atakami w sieci komputerowej
M Szmit, M Gusta, M Tomaszewski
202005
Cyberbezpieczeństwo Administracji publicznej w Polsce. Wybrane zagadnienia
D LISIAK-FELICKA, M SZMIT
EAS Kraków, 2016
182016
Traffic anomaly detection with snort
M Szmit, R Wężyk, M Skowroński, A Szmit
Information Systems Architecture and Technology. Information Systems and …, 2007
172007
Wybrane zagadnienia opiniowania sądowo-informatycznego
M Szmit
16*2014
Usage of pseudo-estimator lad and sarima models for network traffic prediction: case studies
M Szmit, A Szmit
Computer Networks: 19th International Conference, CN 2012, Szczyrk, Poland …, 2012
122012
Využití nula-jedničkových modelů pro behaviorální analýzu síťového provozu
M Szmit
Internet, competitiveness and organizational security, TBU, Zlín, 2011
82011
Information security management systems in Marshal Offices in Poland
D Lisiak-Felicka, M Szmit
Information Systems In Management 3 (2), 134-144, 2014
72014
Anomaly detection 3.0 for Snort
M Szmit, S Adamus, S Bugała, A Szmit
Securitatea informaţională, 37-41, 2012
72012
Detekcja anomalii ruchu sieciowego w programie Snort
M Skowroński, R Wężyk, M Szmit
Hakin9, 2007
72007
GDPR implementation in public administration in Poland – 1.5 year after: An empirical analysis
MS Dominika Lisiak-Felicka
Journal of Economic and Management 43, 5-25, 2021
6*2021
“Tango Down” – Some Comments to the Security of Cyberspace of Republic of Poland
D Lisiak‑Felicka, M Szmit
Systems supporting production engineering, 133-145, 2012
62012
Elementy informatyki sądowej
M Szmit, A Baworowski, A Kmieciak, P Krejza, A Niemiec
Polskie Towarzystwo Informatyczne, Warszawa, 2011
62011
The system can't perform the operation now. Try again later.
Articles 1–20