6 found
Order:
  1.  58
    Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.Rafał Kozik, Marek Pawlicki, Michał Choraś & Witold Pedrycz - 2019 - Complexity 2019:1-9.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  10
    Protecting the application layer in the public domain with machine learning methods.Rafał Kozik & Michał Choraś - 2019 - Logic Journal of the IGPL 27 (2):149-159.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  3.  15
    Proposal and comparison of network anomaly detection based on long-memory statistical models.Tomasz Andrysiak, Łukasz Saganowski, Michał Choraś & Rafał Kozik - 2016 - Logic Journal of the IGPL 24 (6):944-956.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  15
    Unsupervised network traffic anomaly detection with deep autoencoders.Vibekananda Dutta, Marek Pawlicki, Rafał Kozik & Michał Choraś - 2022 - Logic Journal of the IGPL 30 (6):912-925.
    Contemporary Artificial Intelligence methods, especially their subset-deep learning, are finding their way to successful implementations in the detection and classification of intrusions at the network level. This paper presents an intrusion detection mechanism that leverages Deep AutoEncoder and several Deep Decoders for unsupervised classification. This work incorporates multiple network topology setups for comparative studies. The efficiency of the proposed topologies is validated on two established benchmark datasets: UNSW-NB15 and NetML-2020. The results of their analysis are discussed in terms of classification (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  10
    Fake news detection platform—conceptual architecture and prototype.RafaŁ Kozik, Marek Pawlicki, Sebastian Kula & Michał Choraś - 2022 - Logic Journal of the IGPL 30 (6):1005-1016.
    Countering the fake news phenomenon has become one of the most important challenges for democratic societies, governments and non-profit organizations, as well as for the researchers coming from several domains. This is not a local problem and demands a holistic approach to analyzing heterogeneous data and storing the results. The research problem we face in this paper is the proposition of an innovative distributed architecture to tackle the above-mentioned problems. The architecture uses state-of-the-art technologies with a focus on efficiency, scalability (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  6.  6
    Packets tokenization methods for web layer cyber security.Rafał Kozik, Michał Choraś & Witold Hołubowicz - 2017 - Logic Journal of the IGPL 25 (1):103-113.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark