Grzech, Adam
20  Ergebnisse:
Personensuche X
?
1

Trust‐based security‐level evaluation method for dynamic se..:

Kołaczek, Grzegorz ; Juszczyszyn, Krzysztof ; Świątek, Paweł...
Concurrency and Computation: Practice and Experience.  27 (2015)  18 - p. 5700-5718 , 2015
 
?
3

Supporting Content, Context and User Awareness in Future In..:

, In: The Future Internet; Lecture Notes in Computer Science,
 
?
 
?
8

New Frontiers in Applied Artificial Intelligence 

21st International Conference on Industrial, Engineering an...  Lecture Notes in Computer Science ; 5027
 
?
 
?
10

Agent and multi-agent systems: technologies and application 

first KES international symposium, KES-AMSTA 2007, Wroclaw,...  Lecture notes in computer science ; 4496, Lecture notes in artificial intelligence
 
?
11

Agent and Multi-Agent Systems: Technologies and Application 

First KES International Symposium, KES-AMSTA 2007, Wroclaw,...  Lecture Notes in Computer Science ; 4496;SpringerLink, Bücher
 
?
12

ANOMALY DETECTION IN DISTRIBUTED COMPUTER COMMUNICATION SYS..:

Grzech, Adam
Cybernetics and Systems.  37 (2006)  6 - p. 635-652 , 2006
 
?
13

PROCEDURES OF DESIGNING ENTERPRISE NETWORK COMMUNICATION SU..:

Grzech, Adam
Cybernetics and Systems.  31 (2000)  5 - p. 531-545 , 2000
 
?
14

Optimal monitoring system for a distributed intrusion detec..:

Grzech, Adam Piotr
Artificial Life and Robotics.  14 (2009)  4 - p. 453-456 , 2009
 
?
15

A Model for Automated Service Composition System in SOA Env..:

Stelmach, Paweł ; Grzech, Adam ; Juszczyszyn, Krzysztof
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-642-19170-1_8.  , 2011
 
1-15