default search action
Grzegorz Kolaczek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Adam Wasilewski, Grzegorz Kolaczek:
One Size Does Not Fit All: Multivariant User Interface Personalization in E-Commerce. IEEE Access 12: 65570-65582 (2024) - [j8]Aulia Arif Wardana, Grzegorz Kolaczek, Arkadiusz Warzynski, Parman Sukarno:
Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network. Int. J. Inf. Sec. 23(5): 3329-3349 (2024) - [c44]Adam Wasilewski, Grzegorz Kolaczek:
Sustainability in the Digital Age: Assessing the Carbon Footprint of E-commerce Platforms. ICCS (3) 2024: 154-161 - 2023
- [c43]Marcin Smereka, Grzegorz Kolaczek, Janusz Sobecki, Adam Wasilewski:
Adaptive user interface for workflow-ERP system. KES 2023: 2381-2391 - 2022
- [c42]Aulia Arif Wardana, Grzegorz Kolaczek, Parman Sukarno:
Collaborative Intrusion Detection System for Internet of Things Using Distributed Ledger Technology: A Survey on Challenges and Opportunities. ACIIDS (1) 2022: 339-350 - 2021
- [c41]Robert Lukas, Grzegorz Kolaczek:
Android Malware Detection Using Deep Learning Methods. WETICE 2021: 119-124 - 2020
- [c40]Janusz Sobecki, Adam Wasilewski, Grzegorz Kolaczek:
Self-adaptation of Workflow Business Software to the User's Requirements and Behavior. KES 2020: 3506-3513 - [c39]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Maintaining Security and Quality in Mobile and Network Systems - CoNeSec Track Summary. WETICE 2020: 106 - [c38]Piotr Bienias, Arkadiusz Warzynski, Grzegorz Kolaczek:
Application and preliminary evaluation of Anontool applied in the anomaly detection module. WETICE 2020: 119-123
2010 – 2019
- 2019
- [c37]Vladyslav Loboda, Grzegorz Kolaczek:
Sound and Keystroke Dynamics Analysis for User Authenticity Verification. ISKE 2019: 551-558 - [c36]Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Complex Networks Monitoring and Security and Fraud Detection for Enterprises. WETICE 2019: 124-125 - [c35]Piotr Bienias, Grzegorz Kolaczek, Arkadiusz Warzynski:
Architecture of Anomaly Detection Module for the Security Operations Center. WETICE 2019: 126-131 - 2018
- [j7]Grzegorz Kolaczek, Jolanta Mizera-Pietraszko:
Security framework for dynamic service-oriented IT systems. J. Inf. Telecommun. 2(4): 428-448 (2018) - [c34]Jolanta Mizera-Pietraszko, Ricardo Rodríguez Jorge, Grzegorz Kolaczek, Edgar Alonso Martínez-García:
Information Streaming Systems: A Review. INISTA 2018: 1-9 - [c33]Arkadiusz Warzynski, Grzegorz Kolaczek:
Intrusion detection systems vulnerability on adversarial examples. INISTA 2018: 1-4 - 2017
- [c32]Grzegorz Kolaczek, Jolanta Mizera-Pietraszko:
Analysis of dynamic service oriented systems for security related problems detection. INISTA 2017: 472-477 - [c31]Jolanta Mizera-Pietraszko, Grzegorz Kolaczek, Ricardo Rodríguez Jorge:
Source-target mapping model of streaming data flow for machine translation. INISTA 2017: 490-494 - [c30]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
CoNeSec Track Report. WETICE 2017: 143 - [c29]Krzysztof Juszczyszyn, Grzegorz Kolaczek, Dominika Dudziak-Gajowiak:
Structural Analysis and Link Prediction in Dynamic Networks of Web Services. WETICE 2017: 144-149 - 2016
- [c28]Jaroslaw Bernacki, Grzegorz Kolaczek:
RFID Security: A Method for Tracking Prevention. ISCIS 2016: 241-249 - [c27]Marcin Jerzy Orzel, Grzegorz Kolaczek:
Detection of Security Incidents in a Context of Unwelcome or Dangerous Activity of Web Robots. MISSI 2016: 215-225 - 2015
- [j6]Grzegorz Kolaczek, Krzysztof Juszczyszyn, Pawel Swiatek, Adam Grzech, Patryk Schauer, Pawel Stelmach, Lukasz Falas:
Trust-based security-level evaluation method for dynamic service-oriented environments. Concurr. Comput. Pract. Exp. 27(18): 5700-5718 (2015) - [c26]Grzegorz Kolaczek, Pawel Swiatek, Adam Grzech, Krzysztof Juszczyszyn, Pawel Stelmach, Lukasz Falas, Arkadiusz Slawek, Patryk Schauer:
Online platform to support business analysis and Process Optimization in transportation organizations. CYBCONF 2015: 354-359 - [c25]Pawel Swiatek, Krzysztof Juszczyszyn, Grzegorz Kolaczek, Krzysztof Brzostowski, Patryk Schauer:
Processes' optimization tools for web-service oriented organizations' resources - an ehealth application. HealthCom 2015: 222-226 - [c24]Grzegorz Kolaczek, Pawel Swiatek, Krzysztof Juszczyszyn, Adam Grzech, Arkadiusz Slawek:
The Methodology for Software Development to Support Decision Making Processes. ISAT (3) 2015: 15-24 - [c23]Paulina Kwasnicka, Pawel Stelmach, Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Dictionary as a Service - A Software Tool for Vocabulary Development and Maintenance. ISAT (2) 2015: 175-185 - [c22]Grzegorz Kolaczek, Pawel Swiatek, Jerzy Swiatek, Krzysztof Brzostowski, Adam Grzech, Arkadiusz Slawek:
Test Scenarios and Validation Results of POP Methodology. ISAT (3) 2015: 201-210 - [p4]Grzegorz Kolaczek, Slawomir Balcerzak:
Identification of Shill Bidding for Online Auctions Using Anomaly Detection. New Trends in Intelligent Information and Database Systems 2015: 111-120 - 2014
- [c21]Grzegorz Kolaczek, Tomasz Kuzemko:
Security Incident Detection Using Multidimensional Analysis of the Web Server Log Files. ICCCI 2014: 663-672 - [p3]Adam Grzech, Krzysztof Juszczyszyn, Grzegorz Kolaczek, Jan Kwiatkowski, Janusz Sobecki, Pawel Swiatek, Adam Wasilewski:
Specifications and Deployment of SOA Business Applications Within a Configurable Framework Provided as a Service. Advanced SOA Tools and Applications 2014: 7-71 - 2013
- [j5]Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski:
Theory and implementation of a virtualisation level Future Internet defence in depth architecture. Int. J. Trust. Manag. Comput. Commun. 1(3/4): 274-299 (2013) - [c20]Grzegorz Kolaczek, Krzysztof Juszczyszyn, Pawel Swiatek, Adam Grzech:
Decision Making in Security Level Evaluation Process of Service-Based Applications in Future Internet Architecture. ICSS 2013: 701-714 - [p2]Grzegorz Kolaczek:
Multi-agent Platform for Security Level Evaluation of Information and Communication Services. Advanced Methods for Computational Collective Intelligence 2013: 107-116 - 2012
- [c19]Grzegorz Kolaczek, Agnieszka Prusiewicz:
Anomaly Detection System Based on Service Oriented Architecture. ACIIDS (3) 2012: 376-385 - [c18]Jan Kwiatkowski, Krzysztof Juszczyszyn, Grzegorz Kolaczek:
An Environment for Service Composition, Execution and Resource Allocation. PARA 2012: 77-91 - [c17]Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski:
A Virtualization-Level Future Internet Defense-in-Depth Architecture. SNDS 2012: 283-292 - 2011
- [c16]Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Motif-Based Attack Detection in Network Communication Graphs. Communications and Multimedia Security 2011: 206-213 - [c15]Mariusz Fras, Adam Grzech, Krzysztof Juszczyszyn, Grzegorz Kolaczek, Jan Kwiatkowski, Agnieszka Prusiewicz, Janusz Sobecki, Pawel Swiatek, Adam Wasilewski:
Smart Work Workbench; Integrated Tool for IT Services Planning, Management, Execution and Evaluation. ICCCI (1) 2011: 557-571 - [c14]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Traffic Pattern Analysis for Distributed Anomaly Detection. PPAM (2) 2011: 648-657 - 2010
- [j4]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Smart Security Assessment of Composed Web Services. Cybern. Syst. 41(1): 46-61 (2010) - [j3]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Deontic Logic-based Framework for Ontology Aligment in Agent Communities. J. Univers. Comput. Sci. 16(1): 178-197 (2010) - [p1]Grzegorz Kolaczek:
Social Network Analysis Based Approach to Trust Modeling for Autonomous Multi-agent Systems. Agent and Multi-agent Technology for Internet and Enterprise Systems 2010: 137-156
2000 – 2009
- 2009
- [j2]Grzegorz Kolaczek:
Trust Modeling in a Virtual Organization Using Social Network Metrics. Int. J. Virtual Communities Soc. Netw. 1(3): 50-61 (2009) - [c13]Grzegorz Kolaczek:
An Approach to Identity Theft Detection Using Social Network Analysis. ACIIDS 2009: 78-81 - [c12]Grzegorz Kolaczek:
Model for Trust Dynamics in Service Oriented Information Systems. ICCCI 2009: 573-583 - [c11]Grzegorz Kolaczek:
Multiagent Security Evaluation Framework for Service Oriented Architecture Systems. KES (1) 2009: 30-37 - [c10]Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Deontic Logic Reasoning for Maintaining Ontology Consistency in Agent Networks. KES-AMSTA 2009: 252-262 - [c9]Grzegorz Kolaczek, Adam Wasilewski:
Software Security in the Model for Service Oriented Architecture Quality. PPAM (1) 2009: 226-235 - 2008
- [j1]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Attack Pattern Analysis Framework For Multiagent Intrusion Detection System. Int. J. Comput. Intell. Syst. 1(3): 215-224 (2008) - [c8]Grzegorz Kolaczek, Adam Turowiec, Dominik Kasprzak, Witold Holubowicz:
e-collaboration platform for the development of rural areas and enterprises. IMCSIT 2008: 397-401 - [c7]Grzegorz Kolaczek:
Trust modeling in virtual communities using social network metrics. ISKE 2008: 1421-1426 - [c6]Grzegorz Kolaczek:
A New Concept of Trust Modeling and Management in Complex Networks. KES (1) 2008: 237-244 - 2007
- [c5]Grzegorz Kolaczek:
Multiagent Approach to Network Traffic Anomalies Uncertainty Level Assessment in Distributed Intrusion Detection System. KES-AMSTA 2007: 486-495 - 2006
- [c4]Krzysztof Juszczyszyn, Ngoc Thanh Nguyen, Grzegorz Kolaczek, Adam Grzech, Agnieszka Pieczynska, Radoslaw P. Katarzyniak:
Agent-Based Approach for Distributed Intrusion Detection System Design. International Conference on Computational Science (3) 2006: 224-231 - [c3]Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Assessing the Uncertainty of Communication Patterns in Distributed Intrusion Detection System. KES (2) 2006: 243-250 - 2005
- [c2]Grzegorz Kolaczek, Agnieszka Pieczynska-Kuchtiak, Krzysztof Juszczyszyn, Adam Grzech, Radoslaw P. Katarzyniak, Ngoc Thanh Nguyen:
A Mobile Agent Approach to Intrusion Detection in Network Systems. KES (2) 2005: 514-519 - 2003
- [c1]Grzegorz Kolaczek:
Specification and Verification of Constraints in Role Based Access Control for Enterprise Security System. WETICE 2003: 190-195
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-27 00:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint