default search action
Krzysztof Juszczyszyn
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c50]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Maintaining Security and Quality in Mobile and Network Systems - CoNeSec Track Summary. WETICE 2020: 106
2010 – 2019
- 2019
- [c49]Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Complex Networks Monitoring and Security and Fraud Detection for Enterprises. WETICE 2019: 124-125 - 2018
- [r2]Krzysztof Juszczyszyn:
Motif Analysis. Encyclopedia of Social Network Analysis and Mining. 2nd Ed. 2018 - 2017
- [c48]Paulina Kwasnicka, Lukasz Falas, Krzysztof Juszczyszyn:
Execution Management of Computational Services in Service-Oriented Systems. ISAT (1) 2017: 272-282 - [c47]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
CoNeSec Track Report. WETICE 2017: 143 - [c46]Krzysztof Juszczyszyn, Grzegorz Kolaczek, Dominika Dudziak-Gajowiak:
Structural Analysis and Link Prediction in Dynamic Networks of Web Services. WETICE 2017: 144-149 - 2016
- [c45]Lukasz Falas, Krzysztof Juszczyszyn:
Towards Effective Allocation of Resources in Service-Oriented Systems. ISAT (2) 2016: 149-159 - 2015
- [j12]Grzegorz Kolaczek, Krzysztof Juszczyszyn, Pawel Swiatek, Adam Grzech, Patryk Schauer, Pawel Stelmach, Lukasz Falas:
Trust-based security-level evaluation method for dynamic service-oriented environments. Concurr. Comput. Pract. Exp. 27(18): 5700-5718 (2015) - [c44]Grzegorz Kolaczek, Pawel Swiatek, Adam Grzech, Krzysztof Juszczyszyn, Pawel Stelmach, Lukasz Falas, Arkadiusz Slawek, Patryk Schauer:
Online platform to support business analysis and Process Optimization in transportation organizations. CYBCONF 2015: 354-359 - [c43]Pawel Swiatek, Krzysztof Juszczyszyn, Grzegorz Kolaczek, Krzysztof Brzostowski, Patryk Schauer:
Processes' optimization tools for web-service oriented organizations' resources - an ehealth application. HealthCom 2015: 222-226 - [c42]Grzegorz Kolaczek, Pawel Swiatek, Krzysztof Juszczyszyn, Adam Grzech, Arkadiusz Slawek:
The Methodology for Software Development to Support Decision Making Processes. ISAT (3) 2015: 15-24 - [c41]Lukasz Falas, Krzysztof Juszczyszyn:
Dynamic Resource Management Middleware for Modern Service Oriented Systems. ISAT (3) 2015: 37-49 - [c40]Paulina Kwasnicka, Pawel Stelmach, Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Dictionary as a Service - A Software Tool for Vocabulary Development and Maintenance. ISAT (2) 2015: 175-185 - 2014
- [c39]Adam Grzech, Krzysztof Juszczyszyn, Pawel Swiatek:
Methodology and Platform for Business Process Optimization. ICSEng 2014: 377-382 - [p2]Adam Grzech, Krzysztof Juszczyszyn, Grzegorz Kolaczek, Jan Kwiatkowski, Janusz Sobecki, Pawel Swiatek, Adam Wasilewski:
Specifications and Deployment of SOA Business Applications Within a Configurable Framework Provided as a Service. Advanced SOA Tools and Applications 2014: 7-71 - [r1]Krzysztof Juszczyszyn:
Motif Analysis. Encyclopedia of Social Network Analysis and Mining 2014: 983-989 - 2013
- [j11]Krzysztof Juszczyszyn, Pawel Swiatek, Pawel Stelmach, Adam Grzech:
A configurable service-based framework for composition, delivery and evaluation of composite web services in distributed QoS-aware ICT environment. Int. J. Cloud Comput. 2(2/3): 258-272 (2013) - [j10]Marcin Budka, Krzysztof Juszczyszyn, Katarzyna Musial, Anna Musial:
Molecular model of dynamic social network based on e-mail communication. Soc. Netw. Anal. Min. 3(3): 543-563 (2013) - [j9]Katarzyna Musial, Marcin Budka, Krzysztof Juszczyszyn:
Creation and growth of online social network - How do social networks evolve? World Wide Web 16(4): 421-447 (2013) - [c38]Pawel Stelmach, Rafal Pawlaszek, Lukasz Falas, Krzysztof Juszczyszyn:
Towards a Service-Oriented Platform for Exoplanets Discovery. ICSS 2013: 691-700 - [c37]Grzegorz Kolaczek, Krzysztof Juszczyszyn, Pawel Swiatek, Adam Grzech:
Decision Making in Security Level Evaluation Process of Service-Based Applications in Future Internet Architecture. ICSS 2013: 701-714 - [i1]Radoslaw Michalski, Piotr Bródka, Przemyslaw Kazienko, Krzysztof Juszczyszyn:
Quantifying Social Network Dynamics. CoRR abs/1303.5009 (2013) - 2012
- [j8]Pawel Swiatek, Piotr Rygielski, Krzysztof Juszczyszyn, Adam Grzech:
User Assignment and Movement Prediction in Wireless Networks. Cybern. Syst. 43(4): 340-353 (2012) - [j7]Pawel Swiatek, Pawel Stelmach, Agnieszka Prusiewicz, Krzysztof Juszczyszyn:
Service Composition in Knowledge-based SOA Systems. New Gener. Comput. 30(2-3): 165-188 (2012) - [c36]Krzysztof Juszczyszyn, Adam Gonczarek, Jakub M. Tomczak, Katarzyna Musial, Marcin Budka:
A Probabilistic Approach to Structural Change Prediction in Evolving Social Networks. ASONAM 2012: 996-1001 - [c35]Radoslaw Michalski, Piotr Bródka, Przemyslaw Kazienko, Krzysztof Juszczyszyn:
Quantifying social network dynamics. CASoN 2012: 69-74 - [c34]Pawel Swiatek, Krzysztof Juszczyszyn, Krzysztof Brzostowski, Jaroslaw Drapala, Adam Grzech:
Supporting Content, Context and User Awareness in Future Internet Applications. Future Internet Assembly 2012: 154-165 - [c33]Adam Grzech, Krzysztof Juszczyszyn, Pawel Stelmach, Lukasz Falas:
Link Prediction in Dynamic Networks of Services Emerging during Deployment and Execution of Web Services. ICCCI (2) 2012: 109-120 - [c32]Jan Kwiatkowski, Krzysztof Juszczyszyn, Grzegorz Kolaczek:
An Environment for Service Composition, Execution and Resource Allocation. PARA 2012: 77-91 - [c31]Adam Grzech, Krzysztof Juszczyszyn, Pawel Swiatek, Cezary Mazurek, Arkadiusz Sochan:
Applications of the Future Internet Engineering Project. SNPD 2012: 635-642 - [c30]Marcin Budka, Katarzyna Musial, Krzysztof Juszczyszyn:
Predicting the Evolution of Social Networks: Optimal Time Window Size for Increased Accuracy. SocialCom/PASSAT 2012: 21-30 - 2011
- [c29]Krzysztof Juszczyszyn, Agnieszka Prusiewicz:
Educational Services Recommendation Using Social Network Approach. ACIIDS (1) 2011: 327-336 - [c28]Krzysztof Juszczyszyn, Mateusz Paprocki, Agnieszka Prusiewicz, Lesllaw Sieniawski:
Personalization and Content Awareness in Online Lab - Virtual Computational Laboratory. ACIIDS (1) 2011: 367-376 - [c27]Krzysztof Juszczyszyn, Marcin Budka, Katarzyna Musial:
The Dynamic Structural Patterns of Social Networks Based on Triad Transitions. ASONAM 2011: 581-586 - [c26]Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Motif-Based Attack Detection in Network Communication Graphs. Communications and Multimedia Security 2011: 206-213 - [c25]Krzysztof Juszczyszyn, Wojciech Frys:
Discovering the Evolutionary Patterns in Local Topology of an E-Mail Social Network. Web Intelligence/IAT Workshops 2011: 102-105 - [c24]Mariusz Fras, Adam Grzech, Krzysztof Juszczyszyn, Grzegorz Kolaczek, Jan Kwiatkowski, Agnieszka Prusiewicz, Janusz Sobecki, Pawel Swiatek, Adam Wasilewski:
Smart Work Workbench; Integrated Tool for IT Services Planning, Management, Execution and Evaluation. ICCCI (1) 2011: 557-571 - [c23]Pawel Stelmach, Adam Grzech, Krzysztof Juszczyszyn:
A Model for Automated Service Composition System in SOA Environment. DoCEIS 2011: 75-82 - [c22]Piotr Rygielski, Pawel Swiatek, Krzysztof Juszczyszyn, Adam Grzech:
Prediction Based Handovers for Wireless Networks Resources Management. KES (2) 2011: 687-696 - [c21]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Traffic Pattern Analysis for Distributed Anomaly Detection. PPAM (2) 2011: 648-657 - [c20]Krzysztof Juszczyszyn, Katarzyna Musial, Marcin Budka:
Link Prediction Based on Subgraph Evolution in Dynamic Social Networks. SocialCom/PASSAT 2011: 27-34 - [c19]Radoslaw Michalski, Sebastian Palus, Piotr Bródka, Przemyslaw Kazienko, Krzysztof Juszczyszyn:
Modelling Social Network Evolution. SocInfo 2011: 283-286 - 2010
- [j6]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Smart Security Assessment of Composed Web Services. Cybern. Syst. 41(1): 46-61 (2010) - [j5]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Deontic Logic-based Framework for Ontology Aligment in Agent Communities. J. Univers. Comput. Sci. 16(1): 178-197 (2010) - [c18]Krzysztof Juszczyszyn, Anna Musial, Katarzyna Musial, Piotr Bródka:
Utilizing Dynamic Molecular Modelling Technique for Predicting Changes in Complex Social Networks. Web Intelligence/IAT Workshops 2010: 1-4 - [p1]Krzysztof Juszczyszyn, Przemyslaw Kazienko, Katarzyna Musial:
Personalized Ontology-Based Recommender Systems for Multimedia Objects. Agent and Multi-agent Technology for Internet and Enterprise Systems 2010: 275-292
2000 – 2009
- 2009
- [j4]Krzysztof Juszczyszyn, Katarzyna Musial, Przemyslaw Kazienko, Bogdan Gabrys:
Temporal Changes in Local Topology of an Email-Based Social Network. Comput. Informatics 28(6): 763-779 (2009) - [j3]Krzysztof Juszczyszyn, Katarzyna Musial:
Motif Analysis and the Periodic Structural Changes in an Organizational Email-Based Social Network. Int. J. Virtual Communities Soc. Netw. 1(2): 22-35 (2009) - [c17]Katarzyna Musial, Krzysztof Juszczyszyn:
Motif-Based Analysis of Social Position Influence on Interconnection Patterns in Complex Social Network. ACIIDS 2009: 34-39 - [c16]Krzysztof Juszczyszyn, Anna Musial, Katarzyna Musial, Piotr Bródka:
Molecular dynamics modelling of the temporal changes in complex networks. IEEE Congress on Evolutionary Computation 2009: 553-559 - [c15]Bernadetta Mianowska, Marcin Maleszka, Krzysztof Juszczyszyn:
Analysis of Social Network's Structural Properties in Huge Community Portal. ICCCI (SCI Volume) 2009: 135-146 - [c14]Katarzyna Musial, Krzysztof Juszczyszyn:
Properties of Bridge Nodes in Social Networks. ICCCI 2009: 357-364 - [c13]Krzysztof Juszczyszyn, Katarzyna Musial:
Structural Changes in an Email-Based Social Network. KES-AMSTA 2009: 40-49 - [c12]Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Deontic Logic Reasoning for Maintaining Ontology Consistency in Agent Networks. KES-AMSTA 2009: 252-262 - 2008
- [j2]Grzegorz Kolaczek, Krzysztof Juszczyszyn:
Attack Pattern Analysis Framework For Multiagent Intrusion Detection System. Int. J. Comput. Intell. Syst. 1(3): 215-224 (2008) - [c11]Krzysztof Juszczyszyn, Przemyslaw Kazienko, Katarzyna Musial, Bogdan Gabrys:
Temporal Changes in Connection Patterns of an Email-Based Social Network. Web Intelligence/IAT Workshops 2008: 9-12 - [c10]Katarzyna Musial, Krzysztof Juszczyszyn, Bogdan Gabrys, Przemyslaw Kazienko:
Patterns of Interactions in Complex Social Networks Based on Coloured Motifs Analysis. ICONIP (2) 2008: 607-614 - [c9]Krzysztof Juszczyszyn, Przemyslaw Kazienko, Katarzyna Musial:
Local Topology of Social Network Based on Motif Analysis. KES (2) 2008: 97-105 - [c8]Przemyslaw Kazienko, Katarzyna Musial, Krzysztof Juszczyszyn:
Recommendation of Multimedia Objects Based on Similarity of Ontologies. KES (1) 2008: 194-201 - 2007
- [j1]Jason J. Jung, Krzysztof Juszczyszyn, Ngoc Thanh Nguyen:
Centrality measurement on semantically multiplex social networks: divide-and-conquer approach. Int. J. Intell. Inf. Database Syst. 1(3/4): 277-292 (2007) - [c7]Krzysztof Juszczyszyn:
Modeling the Activity of a Multiagent System with Evolving Metadata. KES-AMSTA 2007: 73-81 - 2006
- [c6]Krzysztof Juszczyszyn, Ngoc Thanh Nguyen, Grzegorz Kolaczek, Adam Grzech, Agnieszka Pieczynska, Radoslaw P. Katarzyniak:
Agent-Based Approach for Distributed Intrusion Detection System Design. International Conference on Computational Science (3) 2006: 224-231 - [c5]Krzysztof Juszczyszyn, Grzegorz Kolaczek:
Assessing the Uncertainty of Communication Patterns in Distributed Intrusion Detection System. KES (2) 2006: 243-250 - [c4]Krzysztof Juszczyszyn:
Towards a Computational Framework for Modeling Semantic Interactions in Large Multiagent Communities. KES (3) 2006: 1020-1026 - 2005
- [c3]Grzegorz Kolaczek, Agnieszka Pieczynska-Kuchtiak, Krzysztof Juszczyszyn, Adam Grzech, Radoslaw P. Katarzyniak, Ngoc Thanh Nguyen:
A Mobile Agent Approach to Intrusion Detection in Network Systems. KES (2) 2005: 514-519 - 2004
- [c2]Krzysztof Juszczyszyn:
A Subjective Logic-Based Framework for Aligning Multiple Ontologies. KES 2004: 1194-1200 - 2003
- [c1]Krzysztof Juszczyszyn:
Verifying Enterprise's Mandatory Access Control Policies with Coloured Petri Nets. WETICE 2003: 184-189
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint