Follow
Grzegorz Kołaczek
Grzegorz Kołaczek
Associate Professor at Wroclaw University of Science and Technology
Verified email at pwr.edu.pl
Title
Cited by
Cited by
Year
Intrusion detection systems vulnerability on adversarial examples
A Warzyński, G Kołaczek
2018 Innovations in Intelligent Systems and Applications (INISTA), 1-4, 2018
672018
Agent-based approach for distributed intrusion detection system design
K Juszczyszyn, NT Nguyen, G Kolaczek, A Grzech, A Pieczynska, ...
International Conference on Computational Science, 224-231, 2006
482006
A mobile agent approach to intrusion detection in network systems
G Kolaczek, A Pieczynska-Kuchtiak, K Juszczyszyn, A Grzech, ...
Knowledge-Based Intelligent Information and Engineering Systems: 9th …, 2005
422005
Anomaly detection in network traffic using selected methods of time series analysis
J Bernacki, G Koaczek
International Journal of Computer Network and Information Security 7 (9), 10, 2015
312015
Specification and verification of constraints in role based access control
G Kolaczek
WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling …, 2003
172003
Motif-based attack detection in network communication graphs
K Juszczyszyn, G Kołaczek
IFIP International Conference on Communications and Multimedia Security, 206-213, 2011
152011
Smart security assessment of composed Web services
G Kołaczek, K Juszczyszyn
Cybernetics and Systems: An International Journal 41 (1), 46-61, 2010
152010
Attack pattern analysis framework for multiagent intrusion detection system
G Kolaczek, K Juszczyszyn
International Journal of Computational Intelligence Systems 1 (3), 215-224, 2008
142008
An approach to identity theft detection using social network analysis
G Kolaczek
2009 First Asian Conference on Intelligent Information and Database Systems …, 2009
132009
Smart work workbench; integrated tool for IT services planning, management, execution and evaluation
M Fraś, A Grzech, K Juszczyszyn, G Kołaczek, J Kwiatkowski, ...
Computational Collective Intelligence. Technologies and Applications: Third …, 2011
112011
Architecture of anomaly detection module for the security operations center
P Bienias, G Kołaczek, A Warzyński
2019 IEEE 28th International Conference on Enabling Technologies …, 2019
102019
Social network analysis based approach to trust modeling for autonomous multi-agent systems
G Kołaczek
Agent and Multi-agent Technology for Internet and Enterprise Systems, 137-156, 2010
102010
Multiagent security evaluation framework for service oriented architecture systems
G Kołaczek
International Conference on Knowledge-Based and Intelligent Information and …, 2009
92009
Application of deontic logic in role-based access control
G Kołaczek
International Journal of Applied Mathematics and Computer Science 12 (2 …, 2002
92002
Security framework for dynamic service-oriented IT systems
G Kołaczek, J Mizera-Pietraszko
Journal of Information and Telecommunication 2 (4), 428-448, 2018
72018
Trust‐based security‐level evaluation method for dynamic service‐oriented environments
G Kołaczek, K Juszczyszyn, P Świątek, A Grzech, P Schauer, P Stelmach, ...
Concurrency and Computation: Practice and Experience 27 (18), 5700-5718, 2015
62015
Specifications and deployment of SOA business applications within a configurable framework provided as a service
A Grzech, K Juszczyszyn, G Kołaczek, J Kwiatkowski, J Sobecki, ...
Advanced SOA Tools and Applications, 7-71, 2014
62014
Business process optimization platform for integrated information systems
K Brzostowski, D Gąsior, A Grzech, K Juszczyszyn, G Kołaczek, A Kozik, ...
Information systems architecture and technology, eds. Jerzy Świątek [i in …, 2014
62014
A new concept of trust modeling and management in complex networks
G Kołaczek
International Conference on Knowledge-Based and Intelligent Information and …, 2008
62008
Application and preliminary evaluation of Anontool applied in the anomaly detection module
P Bienias, A Warzyński, G Kołaczek
2020 IEEE 29th International Conference on Enabling Technologies …, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20