Krzysztof Cabaj

Orcid: 0000-0002-5955-5890

According to our database1, Krzysztof Cabaj authored at least 53 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods.
IEEE Trans. Comput. Soc. Syst., August, 2024

Efficient Cyberattack Detection Methods in Industrial Control Systems.
Sensors, June, 2024

Performance evaluation of Raspberry Pi 4 and STM32 Nucleo boards for security-related operations in IoT environments.
Comput. Networks, 2024

Methodology for Conducting a Study of the Vulnerability of PLC Control Algorithms to Cyber Attacks.
IEEE Access, 2024

Strategies to Use Harvesters in Trustworthy Fake News Detection Systems.
Proceedings of the Advances in Computational Collective Intelligence, 2024

Identity and Access Management Architecture in the SILVANUS Project.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Deep Learning for Combating Misinformation in Multicategorical Text Contents.
Sensors, December, 2023

Forgery Cyber-Attack Supported by LSTM Neural Network: An Experimental Case Study.
Sensors, August, 2023

GAN Neural Networks Architectures for Testing Process Control Industrial Network Against Cyber-Attacks.
IEEE Access, 2023

Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Security Architecture in the SILVANUS project.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Resource Partitioning in Phoenix-RTOS for Critical and Noncritical Software for UAV systems.
Proceedings of the 17th Conference on Computer Science and Intelligence Systems, 2022

Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Messaging Protocols for IoT Systems - A Pragmatic Comparison.
Sensors, 2021

On Improving 5G Internet of Radio Light Security Based on LED Fingerprint Identification Method.
Sensors, 2021

Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Challenges and Novel Solutions for 5G Network Security, Privacy and Trust.
IEEE Wirel. Commun., 2020

Special issue on Advancements in 5G Networks Security.
Future Gener. Comput. Syst., 2020

Efficient distributed network covert channels for Internet of things environments†.
J. Cybersecur., 2020

Sniffing Detection Based on Network Traffic Probing and Machine Learning.
IEEE Access, 2020

Network and Application Layer Services for High Performance Communications in Buildings.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2020

Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Distributed packet inspection for network security purposes in software-defined networking environments.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System.
Secur. Commun. Networks, 2019

Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
The New Threats of Information Hiding: The Road Ahead.
IT Prof., 2018

Cybersecurity: trends, issues, and challenges.
EURASIP J. Inf. Secur., 2018

Cybersecurity education: Evolution of the discipline and analysis of master programs.
Comput. Secur., 2018

Software-defined networking-based crypto ransomware detection using HTTP traffic characteristics.
Comput. Electr. Eng., 2018

A Scalable and License Free 5G Internet of Radio Light Architecture for Services in Homes & Businesses.
Proceedings of the 2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2018

Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018


2017
The impact of malware evolution on the analysis methods and infrastructure.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall.
IEEE Netw., 2016

Developing malware evaluation infrastructure.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

2015
Practical Problems of Internet Threats Analyses.
Proceedings of the Theory and Engineering of Complex Systems and Dependability - Proceedings of the Tenth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, June 29, 2015

2014
Analyzing Logs of the University Data Repository.
Proceedings of the Intelligent Tools for Building a Scientific Information Platform: From Research to Implementation, 2014

SDN Architecture Impact on Network Security.
Proceedings of the Position Papers of the 2014 Federated Conference on Computer Science and Information Systems, 2014

2013
Exploring the Space of System Monitoring.
Proceedings of the Intelligent Tools for Building a Scientific Information Platform, 2013

Theory and implementation of a virtualisation level Future Internet defence in depth architecture.
Int. J. Trust. Manag. Comput. Commun., 2013

2012
What are suspicious VoIP delays?
Multim. Tools Appl., 2012

A Virtualization-Level Future Internet Defense-in-Depth Architecture.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
LRFI - Fault Injection Tool for Testing Mobile Software.
Proceedings of the Emerging Intelligent Technologies in Industry, 2011

2010
Towards Self-defending Mechanisms Using Data Mining in the EFIPSANS Framework.
Proceedings of the Advances in Multimedia and Network Information System Technologies, 2010

2008
Data Mining Approach to Analysis of Computer Logs Using New Patterns.
Proceedings of the New Trends in Multimedia and Network Information Systems, 2008

TrustMAS: Trusted Communication Platform for Multi-Agent Systems.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

2007
Frequent Events and Epochs in Data Stream.
Proceedings of the Rough Sets and Intelligent Systems Paradigms, International Conference, 2007


  Loading...