default search action
Patryk Szewczyk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Ben Scott, Michael N. Johnstone, Patryk Szewczyk, Steven Richardson:
BGP anomaly detection as a group dynamics problem. Comput. Networks 257: 110926 (2025) - 2024
- [j12]Ben Scott, Michael N. Johnstone, Patryk Szewczyk, Steven Richardson:
Matrix Profile data mining for BGP anomaly detection. Comput. Networks 242: 110257 (2024) - [j11]Mohammad Al-Fawa'reh, Jumana Abu-Khalaf, Patryk Szewczyk, James Jin Kang:
MalBoT-DRL: Malware Botnet Detection Using Deep Reinforcement Learning in IoT Networks. IEEE Internet Things J. 11(6): 9610-9629 (2024) - [j10]Joseph Kane, Michael N. Johnstone, Patryk Szewczyk:
Voice Synthesis Improvement by Machine Learning of Natural Prosody. Sensors 24(5): 1624 (2024) - [j9]Ben Scott, Michael N. Johnstone, Patryk Szewczyk:
A Survey of Advanced Border Gateway Protocol Attack Detection Techniques. Sensors 24(19): 6414 (2024) - 2023
- [j8]Alaa Alatram, Leslie F. Sikos, Mike Johnstone, Patryk Szewczyk, James Jin Kang:
DoS/DDoS-MQTT-IoT: A dataset for evaluating intrusions in IoT networks using the MQTT protocol. Comput. Networks 231: 109809 (2023) - [j7]Aleatha Shanley, Mike Johnstone, Patryk Szewczyk, Michael Crowley:
An exploration of Australian attitudes towards privacy. Inf. Comput. Secur. 31(3): 353-367 (2023) - 2022
- [c9]Leah Shanley, Michael N. Johnstone, Patryk Szewczyk, Michael Crowley:
A Survey of Australian Attitudes Towards Privacy: Some Preliminary Results. HAISA 2022: 228-239 - [i1]Qi An, Patryk Szewczyk, Michael N. Johnstone, James Jin Kang:
Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms. CoRR abs/2201.05962 (2022) - 2021
- [c8]Ben Scott, Raina Mason, Patryk Szewczyk:
A snapshot analysis of publicly available BYOD policies. ACSW 2021: 5:1-5:6 - [c7]Qi An, Patryk Szewczyk, Michael N. Johnstone, James Jin Kang:
Enhancement of Healthcare Data Performance Metrics using Neural Network Machine Learning Algorithms. ITNAC 2021: 172-179 - 2020
- [c6]Leah Shanley, Michael N. Johnstone, Michael Crowley, Patryk Szewczyk:
Australian Attitudes Towards Privacy of Information: Will COVID-19 Make a Difference? HAISA 2020: 3-15
2010 – 2019
- 2018
- [j6]Patryk Szewczyk, Krishnun Sansurooah, Patricia A. H. Williams:
An Australian Longitudinal Study Into Remnant Data Recovered From Second-Hand Memory Cards. Int. J. Inf. Secur. Priv. 12(4): 82-97 (2018) - 2017
- [j5]Zubair A. Baig, Patryk Szewczyk, Craig Valli, Priya Rabadia, Peter Hannay, Maxim Chernyshev, Mike Johnstone, Paresh Kerai, Ahmed Ibrahim, Krishnun Sansurooah, Syed Naeem Firdous, Matthew Peacock:
Future challenges for smart cities: Cyber-security and digital forensics. Digit. Investig. 22: 3-13 (2017) - [j4]Patryk Szewczyk, Rose Macdonald:
Broadband Router Security: History, Challenges and Future Implications. J. Digit. Forensics Secur. Law 12(4): 55-74 (2017) - [c5]Michael James, Patryk Szewczyk:
Jurisdictional Issues in Cloud Forensics. HAISA 2017: 225-235 - [c4]Patryk Szewczyk, Dan Blackman, Krishnun Sansurooah:
An Analysis of Unauthorized Wireless Network Usage in Western Australia. HAISA 2017: 272-281 - 2012
- [j3]Patryk Szewczyk:
An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users. J. Digit. Forensics Secur. Law 7(4): 51-72 (2012) - 2011
- [j2]Patryk Szewczyk:
Analysis of Data Remaining on Second Hand ADSL Routers. J. Digit. Forensics Secur. Law 6(3): 17-30 (2011) - [c3]John Barker, Peter Hannay, Patryk Szewczyk:
Using Traffic Analysis to Identify the Second Generation Onion Router. EUC 2011: 72-78 - [c2]Patryk Szewczyk:
Usability of Internet Security Software: Have they got it right? NSS 2011: 337-341 - 2010
- [c1]Patryk Szewczyk, Craig Valli:
Ignorant Experts: Computer and Network Security Support from Internet Service Providers. NSS 2010: 323-327
2000 – 2009
- 2009
- [j1]Craig Valli, Patryk Szewczyk:
Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective. J. Digit. Forensics Secur. Law 4(3): 5-16 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint