Author of the publication

Q-Rapids Tool Prototype: Supporting Decision-Makers in Managing Quality in Rapid Software Development.

, , , , , , , , and . CAiSE Forum, volume 317 of Lecture Notes in Business Information Processing, page 200-208. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kozik, Rafal
add a person with the name Kozik, Rafal
 

Other publications of authors with the same name

Network Events Correlation for Federated Networks Protection System., , , , and . ServiceWave, volume 6994 of Lecture Notes in Computer Science, page 100-111. Springer, (2011)Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection., , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 749-760. Springer, (2019)Intersection Approach to Vulnerability Handling., , , and . WEBIST (1), page 171-174. INSTICC Press, (2010)Netflow-Based Malware Detection and Data Visualisation System., , and . CISIM, volume 10244 of Lecture Notes in Computer Science, page 652-660. Springer, (2017)Ontology Applied in Decision Support System for Critical Infrastructures Protection., , , and . IEA/AIE (1), volume 6096 of Lecture Notes in Computer Science, page 671-680. Springer, (2010)Evaluation of the Pre-processing Methods in Image-Based Palmprint Biometrics., , and . IP&C, volume 681 of Advances in Intelligent Systems and Computing, page 43-48. Springer, (2017)Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach., , and . IP&C, volume 313 of Advances in Intelligent Systems and Computing, page 285-292. Springer, (2014)Computer Vision Method for Detecting Adult-Oriented Content in Images., and . IP&C, volume 184 of Advances in Intelligent Systems and Computing, page 19-24. Springer, (2012)Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection., , , and . Complexity, (2019)Lightweight Verification Schema for Image-Based Palmprint Biometric Systems., , and . Mobile Information Systems, (2019)