Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kozik, Rafal
add a person with the name Kozik, Rafal
 

Other publications of authors with the same name

Intersection Approach to Vulnerability Handling., , , and . WEBIST (1), page 171-174. INSTICC Press, (2010)Ontology Applied in Decision Support System for Critical Infrastructures Protection., , , and . IEA/AIE (1), volume 6096 of Lecture Notes in Computer Science, page 671-680. Springer, (2010)Evaluation of the Pre-processing Methods in Image-Based Palmprint Biometrics., , and . IP&C, volume 681 of Advances in Intelligent Systems and Computing, page 43-48. Springer, (2017)Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach., , and . IP&C, volume 313 of Advances in Intelligent Systems and Computing, page 285-292. Springer, (2014)Computer Vision Method for Detecting Adult-Oriented Content in Images., and . IP&C, volume 184 of Advances in Intelligent Systems and Computing, page 19-24. Springer, (2012)Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection., , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 749-760. Springer, (2019)Network Events Correlation for Federated Networks Protection System., , , , and . ServiceWave, volume 6994 of Lecture Notes in Computer Science, page 100-111. Springer, (2011)Netflow-Based Malware Detection and Data Visualisation System., , and . CISIM, volume 10244 of Lecture Notes in Computer Science, page 652-660. Springer, (2017)Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications., , , and . SOCO-CISIS-ICEUTE, volume 299 of Advances in Intelligent Systems and Computing, page 527-535. Springer, (2014)Distributing extreme learning machines with Apache Spark for NetFlow-based malware activity detection.. Pattern Recognition Letters, (2018)