Mizera-Pietraszko, Jolanta
22  results:
Search for persons X
?
1

Vulnerability Analysis of IoT Devices to Cyberattacks Based..:

, In: Intelligent Information and Database Systems; Lecture Notes in Computer Science,
 
?
3

Extensions of the Diffie-Hellman Key Agreement Protocol Bas..:

, In: Intelligent Information and Database Systems; Lecture Notes in Computer Science,
 
?
4

Symmetric and Asymmetric Cryptography on the Special Linear..:

, In: Intelligent Information and Database Systems; Lecture Notes in Computer Science,
 
?
5

Viterbi Algorithm and HMM Implementation to Multicriteria D..:

, In: Advanced Information Networking and Applications; Lecture Notes in Networks and Systems,
 
?
6

Detecting Attacks on Computer Networks Using Artificial Int..:

, In: Proceedings of the 14th International Conference on Management of Digital EcoSystems,
 
?
7

Hybrid chaotic firefly decision making model for Parkinson'..:

Dash, Sujata ; Abraham, Ajith ; Luhach, Ashish Kr..
International Journal of Distributed Sensor Networks.  16 (2020)  1 - p. 155014771989521 , 2020
 
?
8

Android Hook Detection Based on Machine Learning and Dynami..:

, In: Advances in Intelligent Systems and Computing; Web, Artificial Intelligence and Network Applications,
 
?
9

Stability of Positive Systems in WSN Gateway for IoT&IIoT:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Quality, Reliability, Security and Robustness in Heterogeneous Systems,
 
?
11

Rough Set Theory for Optimization of Packet Management Mech..:

, In: Advances in Intelligent Systems and Computing; Web, Artificial Intelligence and Network Applications,
 
?
12

Lecture Notes in Real-Time Intelligent Systems 

Advances in Intelligent Systems and Computing, 756
 
?
13

Security framework for dynamic service-oriented IT systems:

Kołaczek, Grzegorz ; Mizera-Pietraszko, Jolanta
Journal of Information and Telecommunication.  2 (2018)  4 - p. 428-448 , 2018
 
?
14

Weight Adaptation Stability of Linear and Higher-Order Neur..:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
 
1-15