Cabaj, Krzysztof.
Krzysztof Cabaj Polish computer scientist
VIAF ID: 156147266983535482858 (Personal)
Permalink: http://viaf.org/viaf/156147266983535482858
Preferred Forms
-
-
- 100 0 _ ‡a Krzysztof Cabaj ‡c Polish computer scientist
4xx's: Alternate Name Forms (2)
Works
Title | Sources |
---|---|
5G Internet of radio light services for Musée de la Carte à Jouer | |
A 5G Radio-Light SDN Architecture for Wireless and Mobile Network Access in Buildings | |
Analyzing Logs of the University Data Repository | |
Challenges and Novel Solutions for 5G Network Security, Privacy and Trust | |
Compromising an IoT device based on Harvard architecture microcontroller | |
Cybersecurity education: Evolution of the discipline and analysis of master programs | |
Cybersecurity: trends, issues, and challenges | |
Developing malware evaluation infrastructure | |
Efficient distributed network covert channels for Internet of things environments† | |
Event and performance logs in system management and evaluation | |
Exploring the Space of System Monitoring | |
Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study | |
Frequent Events and Epochs in Data Stream | |
GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks | |
HoneyPot systems in practice | |
Inżynieria systemów internetu rzeczy / Jacek Wytrębowicz, Paweł Radziszewski, Krzysztof Cabaj.- Warszawa, 2020. | |
Inżynieria systemów internetu rzeczy : zagadnienia bezpieczeństwa i komunikacji | |
LRFI – Fault Injection Tool for Testing Mobile Software | |
Management system for dynamic analysis of malicious software | |
Messaging Protocols for IoT Systems-A Pragmatic Comparison | |
A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods | |
Metody eksploracji danych w analizie ruchu obserwowanego przez systemy honeypot | |
Muzeum Regionalne w Siedlcach | |
Napisane w czasie epidemii..., czyli Muzeum w sieci | |
Network and Application Layer Services for High Performance Communications in Buildings | |
The New Threats of Information Hiding: The Road Ahead | |
On Improving 5G Internet of Radio Light Security Based on LED Fingerprint Identification Method | |
Practical Problems of Internet Threats Analyses | |
SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System | |
Securing Modern Network Architectures with Software Defined Networking | |
Security Architecture in the SILVANUS project | |
Sniffing Detection within the Network | |
Special issue on Advancements in 5G Networks Security | |
Teaching Cyber Security Through Distance Learning with International Students | |
Theory and implementation of a virtualisation level Future Internet defence in depth architecture | |
Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach | |
Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach | |
Towards Self-defending Mechanisms Using Data Mining in the EFIPSANS Framework | |
A trust management architecture for autonomic Future Internet | |
TrustMAS: Trusted Communication Platform for Multi-Agent Systems | |
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall | |
What are suspicious VoIP delays? |