Follow
Grzegorz Kołaczek
Grzegorz Kołaczek
Wroclaw University of Science and Technology
Verified email at pwr.edu.pl
Title
Cited by
Cited by
Year
Intrusion detection systems vulnerability on adversarial examples
A Warzyński, G Kołaczek
2018 Innovations in Intelligent Systems and Applications (INISTA), 1-4, 2018
652018
Agent-based approach for distributed intrusion detection system design
K Juszczyszyn, NT Nguyen, G Kolaczek, A Grzech, A Pieczynska, ...
International Conference on Computational Science, 224-231, 2006
472006
A mobile agent approach to intrusion detection in network systems
G Kolaczek, A Pieczynska-Kuchtiak, K Juszczyszyn, A Grzech, ...
Knowledge-Based Intelligent Information and Engineering Systems: 9th …, 2005
422005
Anomaly detection in network traffic using selected methods of time series analysis
J Bernacki, G Koaczek
International Journal of Computer Network and Information Security 7 (9), 10, 2015
312015
Specification and verification of constraints in role based access control
G Kolaczek
WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling …, 2003
172003
Motif-based attack detection in network communication graphs
K Juszczyszyn, G Kołaczek
IFIP International Conference on Communications and Multimedia Security, 206-213, 2011
152011
Smart security assessment of composed Web services
G Kołaczek, K Juszczyszyn
Cybernetics and Systems: An International Journal 41 (1), 46-61, 2010
152010
An approach to identity theft detection using social network analysis
G Kolaczek
2009 First Asian Conference on Intelligent Information and Database Systems …, 2009
132009
Attack pattern analysis framework for multiagent intrusion detection system
G Kolaczek, K Juszczyszyn
International Journal of Computational Intelligence Systems 1 (3), 215-224, 2008
132008
Smart work workbench; integrated tool for IT services planning, management, execution and evaluation
M Fraś, A Grzech, K Juszczyszyn, G Kołaczek, J Kwiatkowski, ...
Computational Collective Intelligence. Technologies and Applications: Third …, 2011
112011
Architecture of anomaly detection module for the security operations center
P Bienias, G Kołaczek, A Warzyński
2019 IEEE 28th International Conference on Enabling Technologies …, 2019
102019
Social network analysis based approach to trust modeling for autonomous multi-agent systems
G Kołaczek
Agent and Multi-agent Technology for Internet and Enterprise Systems, 137-156, 2010
102010
Multiagent security evaluation framework for service oriented architecture systems
G Kołaczek
International Conference on Knowledge-Based and Intelligent Information and …, 2009
92009
Application of deontic logic in role-based access control
G Kołaczek
International Journal of Applied Mathematics and Computer Science 12 (2 …, 2002
92002
Security framework for dynamic service-oriented IT systems
G Kołaczek, J Mizera-Pietraszko
Journal of Information and Telecommunication 2 (4), 428-448, 2018
72018
Trust‐based security‐level evaluation method for dynamic service‐oriented environments
G Kołaczek, K Juszczyszyn, P Świątek, A Grzech, P Schauer, P Stelmach, ...
Concurrency and Computation: Practice and Experience 27 (18), 5700-5718, 2015
62015
Specifications and deployment of SOA business applications within a configurable framework provided as a service
A Grzech, K Juszczyszyn, G Kołaczek, J Kwiatkowski, J Sobecki, ...
Advanced SOA Tools and Applications, 7-71, 2014
62014
Business process optimization platform for integrated information systems
K Brzostowski, D Gąsior, A Grzech, K Juszczyszyn, G Kołaczek, A Kozik, ...
Information systems architecture and technology, eds. Jerzy Świątek [i in …, 2014
62014
A new concept of trust modeling and management in complex networks
G Kołaczek
International Conference on Knowledge-Based and Intelligent Information and …, 2008
62008
Application and preliminary evaluation of Anontool applied in the anomaly detection module
P Bienias, A Warzyński, G Kołaczek
2020 IEEE 29th International Conference on Enabling Technologies …, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20