Maciej Szmit
Maciej Szmit
University of Lodz
Verified email at szmit.info - Homepage
Title
Cited by
Cited by
Year
Zarządzanie projektami
P Pietras, M Szmit
Wybrane metody i techniki, OKW Horyzont sc, Łódź, 2003
64*2003
Usage of modified Holt-Winters method in the anomaly detection of network traffic: Case studies
M Szmit, A Szmit
Journal of Computer Networks and Communications 2012, 2012
402012
Informatyka w zarządzaniu
M Szmit
Difin, 2003
302003
Usage of modern exponential-smoothing models in network traffic modelling
R Jašek, A Szmit, M Szmit
Nostradamus 2013: Prediction, Modeling and Analysis of Complex Systems, 435-444, 2013
242013
Use of holt-winters method in the analysis of network traffic: case study
M Szmit, A Szmit
International Conference on Computer Networks, 224-231, 2011
222011
Ryzyko operacyjne w naukach o zarządzaniu
M Blim, I Staniec, J Zawiła-Niedźwiecki, K Boczkowska, G Kierner, ...
Wydawnictwo CH Beck, 2015
202015
Usage of Holt-Winters Model and Multilayer Perceptron in Network Traffic Modelling and Anomaly Detection
M Szmit, A Szmit, S Adamus, S Bugała
Informatica Vol. 36, Nr 4, 359-368, 2012
202012
Implementation of Brutlag's algorithm in Anomaly Detection 3.0
M Szmit, S Adamus, A Szmit, S Bugała
2012 Federated Conference on Computer Science and Information Systems …, 2012
172012
101 zabezpieczeń przed atakami w sieci komputerowej
M Szmit, M Gusta, M Tomaszewski
162005
Wybrane zagadnienia opiniowania sądowo-informatycznego
M Szmit
12*2014
Traffic Anomaly Detection with Snort
M Szmit, R Wężyk, M Skowroński, A Szmit
Information Systems Architecture and Technology. Information Systems and …, 2007
112007
Usage of pseudo-estimator lad and sarima models for network traffic prediction: case studies
M Szmit, A Szmit
International Conference on Computer Networks, 229-236, 2012
102012
Cyberbezpieczeństwo Administracji publicznej w Polsce. Wybrane zagadnienia
D LISIAK-FELICKA, M SZMIT
EAS Kraków, 2016
82016
Information security management systems in Marshal Offices in Poland
D Lisiak-Felicka, M Szmit
Information Systems In Management 3 (2), 134-144, 2014
72014
Anomaly detection 3.0 for Snort
M Szmit, S Adamus, S Bugala, A Szmit
Securitatea informaţională, 37-41, 2012
72012
Využití nula-jedničkových modelů pro behaviorální analýzu síťového provozu
M Szmit
Internet, competitiveness and organizational security, TBU, Zlín, 2011
72011
Detekcja anomalii ruchu sieciowego w programie Snort
M Skowroński, R Wężyk, M Szmit
Hakin9, 2007
72007
Information security incidents management in marshal offices and voivodeship offices in Poland
D Lisiak-Felicka, M Szmit
Studies & Proceedings of Polish Association for Knowledge Management 72, 28-38, 2014
52014
Wybrane aspekty zarządzania bezpieczeństwem informacji w urzędach marszałkowskich
D Lisiak-Felicka, M Szmit
Securitologia, 39-53, 2013
52013
“Tango Down” – Some Comments to the Security of Cyberspace of Republic of Poland
D Lisiak‑Felicka, M Szmit
Systems supporting production engineering, 133-145, 2012
52012
The system can't perform the operation now. Try again later.
Articles 1–20