Witold Holubowicz
Orcid: 0000-0001-5945-8698
According to our database1,
Witold Holubowicz
authored at least 50 papers
between 1985 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset.
Sensors, 2021
Entropy, 2021
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021
2020
Common Representational Model and Ontologies for Effective Law Enforcement Solutions.
Vietnam. J. Comput. Sci., 2020
Proceedings of the Computational Science - ICCS 2020, 2020
2019
The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case.
Proceedings of the Computational Collective Intelligence - 11th International Conference, 2019
Proceedings of the Computer Information Systems and Industrial Management, 2019
2017
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the Image Processing and Communications Challenges 8, 2016
Proceedings of the Computer Information Systems and Industrial Management, 2016
2015
Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015, 2015
Proceedings of the International Joint Conference, 2015
Proceedings of the International Joint Conference, 2015
2014
End-users needs and requirements for tools to support critical infrastructures protection.
CoRR, 2014
Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Proceedings of the 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2014
Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach.
Proceedings of the Image Processing and Communications Challenges 6, 2014
Proceedings of the Computer Information Systems and Industrial Management, 2014
2012
Expert Syst. J. Knowl. Eng., 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012
Proceedings of the 2012 European Intelligence and Security Informatics Conference, 2012
2011
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011
Proceedings of the 16th International Conference on Methods and Models in Automation and Robotics, 2011
2010
Intersection Approach to Vulnerability Handling.
Proceedings of the WEBIST 2010, 2010
Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection.
Proceedings of the Mobile Lightweight Wireless Systems, 2010
Proceedings of the Image Processing and Communications Challenges 2, 2010
The Gap between Packet Level QoS and Objective QoE Assessment of WWW on Mobile Devices.
Proceedings of the Image Processing and Communications Challenges 2, 2010
Evaluation of Measurement Based Admission Control Algorithms for IEEE 802.16 Networks in Simulations with L2S Physical Layer Abstraction and nbLDPC Codes.
Proceedings of the Image Processing and Communications Challenges 2, 2010
Proceedings of the Trends in Applied Intelligent Systems, 2010
Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services.
Proceedings of the Computer Vision and Graphics - International Conference, 2010
Admission Control and System Capacity Assessment of WiMAX with ACM and nb-LDPC Codes.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Proceedings of the Computer Recognition Systems 3, 2009
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009
Proceedings of the Adaptive and Natural Computing Algorithms, 9th International Conference, 2009
Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis.
Proceedings of the Critical Information Infrastructures Security, 2009
Non-Binary LDPC Coding for IMT-Advanced System.
Proceedings of the Selected Papers on Broadband Communication, 2009
WiMAX system level simulation platform based on ns-2 and DSP integration.
Proceedings of the Selected Papers on Broadband Communication, 2009
2008
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008
2000
Predistortion for Solid State Amplifier of Mobile Radio Systems.
Proceedings of the Personal Wireless Communications, 2000
1995
IEEE Trans. Commun., 1995
1994
IEEE Trans. Inf. Theory, 1994
1990
1985