Patryk Szewczyk

Orcid: 0000-0003-3040-9344

According to our database1, Patryk Szewczyk authored at least 21 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Survey of Advanced Border Gateway Protocol Attack Detection Techniques.
Sensors, October, 2024

Voice Synthesis Improvement by Machine Learning of Natural Prosody.
Sensors, March, 2024

MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks.
IEEE Internet Things J., March, 2024

Matrix Profile data mining for BGP anomaly detection.
Comput. Networks, 2024

2023
DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol.
Comput. Networks, July, 2023

An exploration of Australian attitudes towards privacy.
Inf. Comput. Secur., 2023

2022
A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results.
Proceedings of the Human Aspects of Information Security and Assurance, 2022

2021
Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms.
Proceedings of the 31st International Telecommunication Networks and Applications Conference, 2021

A snapshot analysis of publicly available BYOD policies.
Proceedings of the ACSW '21: 2021 Australasian Computer Science Week Multiconference, 2021

2020
Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference?
Proceedings of the Human Aspects of Information Security and Assurance, 2020

2018
An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards.
Int. J. Inf. Secur. Priv., 2018

2017
Broadband Router Security: History, Challenges and Future Implications.
J. Digit. Forensics Secur. Law, 2017

Future challenges for smart cities: Cyber-security and digital forensics.
Digit. Investig., 2017

An Analysis of Unauthorized Wireless Network Usage in Western Australia.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

Jurisdictional Issues in Cloud Forensics.
Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance, 2017

2012
An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users.
J. Digit. Forensics Secur. Law, 2012

2011
Analysis of Data Remaining on Second Hand ADSL Routers.
J. Digit. Forensics Secur. Law, 2011

Usability of Internet Security Software: Have they got it right?
Proceedings of the 5th International Conference on Network and System Security, 2011

Using Traffic Analysis to Identify the Second Generation Onion Router.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

2010
Ignorant Experts: Computer and Network Security Support from Internet Service Providers.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2009
Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective.
J. Digit. Forensics Secur. Law, 2009


  Loading...