default search action
Witold Holubowicz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j13]Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, Witold Holubowicz, Michal Choras:
How to Effectively Collect and Process Network Data for Intrusion Detection? Entropy 23(11): 1532 (2021) - [j12]Maria-Elena Mihailescu, Darius Mihai, Mihai Carabas, Mikolaj Komisarek, Marek Pawlicki, Witold Holubowicz, Rafal Kozik:
The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset. Sensors 21(13): 4319 (2021) - [c35]Marek Pawlicki, Michal Choras, Rafal Kozik, Witold Holubowicz:
Missing and Incomplete Data Handling in Cybersecurity Applications. ACIIDS 2021: 413-426 - 2020
- [j11]Rafal Kozik, Michal Choras, Marek Pawlicki, Witold Holubowicz, Dirk Pallmer, Wilmuth Müller, Ernst-Josef Behmer, Ioannis V. Loumiotis, Konstantinos P. Demestichas, Roxana Horincar, Claire Laudy, David Faure:
Common Representational Model and Ontologies for Effective Law Enforcement Solutions. Vietnam. J. Comput. Sci. 7(1): 1-18 (2020) - [c34]Marek Pawlicki, Michal Choras, Rafal Kozik, Witold Holubowicz:
On the Impact of Network Data Balancing in Cybersecurity Applications. ICCS (4) 2020: 196-210
2010 – 2019
- 2019
- [c33]Michal Choras, Rafal Kozik, Marek Pawlicki, Witold Holubowicz, Xavier Franch:
Software Development Metrics Prediction Using Time Series Methods. CISIM 2019: 311-323 - [c32]Rafal Kozik, Michal Choras, Marek Pawlicki, Witold Holubowicz, Dirk Pallmer, Wilmuth Müller, Ernst-Josef Behmer, Ioannis V. Loumiotis, Konstantinos P. Demestichas, Roxana Horincar, Claire Laudy, David Faure:
The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case. ICCCI (2) 2019: 335-345 - 2017
- [j10]Rafal Kozik, Michal Choras, Witold Holubowicz:
Packets tokenization methods for web layer cyber security. Log. J. IGPL 25(1): 103-113 (2017) - [c31]Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
The Concept of Applying Lifelong Learning Paradigm to Cybersecurity. ICIC (3) 2017: 663-671 - 2016
- [j9]Rafal Kozik, Michal Choras, Witold Holubowicz:
Evolutionary-based packets classification for anomaly detection in web layer. Secur. Commun. Networks 9(15): 2901-2910 (2016) - [c30]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Cyber Security of the Application Layer of Mission Critical Industrial Systems. CISIM 2016: 342-351 - [c29]Rafal Kozik, Michal Choras, Witold Holubowicz, Rafal Renk:
Extreme Learning Machines for Web Layer Anomaly Detection. IP&C 2016: 226-233 - 2015
- [c28]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Patterns Extraction Method for Anomaly Detection in HTTP Traffic. CISIS-ICEUTE 2015: 227-236 - [c27]Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
A Practical Framework and Guidelines to Enhance Cyber Security and Privacy. CISIS-ICEUTE 2015: 485-495 - [c26]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic. CORES 2015: 767-775 - 2014
- [c25]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
A Proposal of Algorithm for Web Applications Cyber Attack Detection. CISIM 2014: 680-687 - [c24]Rafal Kozik, Michal Choras, Witold Holubowicz:
Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach. IP&C 2014: 285-292 - [c23]Adam Flizikowski, Witold Holubowicz, Anna Stachowicz, Laura Hokkanen, Taina A. Kurki, Niina Päivinen, Thomas Delavallade:
Social media in crisis management - The iSAR+ project survey. ISCRAM 2014 - [c22]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications. SOCO-CISIS-ICEUTE 2014: 527-535 - [i1]Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
End-users needs and requirements for tools to support critical infrastructures protection. CoRR abs/1404.7564 (2014) - 2012
- [j8]Michal Choras, Lukasz Saganowski, Rafal Renk, Witold Holubowicz:
Statistical and signal-based network traffic recognition for anomaly detection. Expert Syst. J. Knowl. Eng. 29(3): 232-245 (2012) - [c21]Michal Tanas, Grzegorz Taberski, Witold Holubowicz, Krzysztof Samp, Agnieszka Spronska, Jakub Glówka, Mateusz Macias:
The TALOS Project - Autonomous Robotic Patrol Vehicles. EISIC 2012: 359-361 - [c20]Michal Choras, Rafal Kozik, Damian Puchalski, Witold Holubowicz:
Correlation Approach for SQL Injection Attacks Detection. CISIS/ICEUTE/SOCO Special Sessions 2012: 177-185 - [c19]Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
Information Exchange Mechanism between Federated Domains: P2P Approach. CISIS/ICEUTE/SOCO Special Sessions 2012: 187-196 - 2011
- [c18]Michal Tanas, Witold Holubowicz, Andrzej Adamczyk, Grzegorz Taberski:
The TALOS project. EU wide robotic border guard system. MMAR 2011: 336-340 - [c17]Michal Choras, Rafal Kozik, Rafal Piotrowski, Juliusz Brzostek, Witold Holubowicz:
Network Events Correlation for Federated Networks Protection System. ServiceWave 2011: 100-111 - [c16]Witold Holubowicz, Lukasz Kiedrowski, Krzysztof Romanowski:
DTN Simulation Tool for N4C Integration Support. ServiceWave 2011: 327-328 - 2010
- [c15]Adam Flizikowski, Witold Holubowicz, Marcin Przybyszewski, Slawomir Grzegorzewski:
Admission Control and System Capacity Assessment of WiMAX with ACM and nb-LDPC Codes. AINA 2010: 1077-1084 - [c14]Michal Choras, Adam Flizikowski, Rafal Kozik, Witold Holubowicz:
Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services. ICCVG (1) 2010: 275-282 - [c13]Michal Choras, Rafal Kozik, Adam Flizikowski, Witold Holubowicz:
Ontology Applied in Decision Support System for Critical Infrastructures Protection. IEA/AIE (1) 2010: 671-680 - [c12]Adam Flizikowski, Marcin Przybyszewski, Witold Holubowicz:
Evaluation of Measurement Based Admission Control Algorithms for IEEE 802.16 Networks in Simulations with L2S Physical Layer Abstraction and nbLDPC Codes. IP&C 2010: 447-459 - [c11]Adam Flizikowski, Damian Puchalski, Kacper Sachajdak, Witold Holubowicz:
The Gap between Packet Level QoS and Objective QoE Assessment of WWW on Mobile Devices. IP&C 2010: 461-468 - [c10]Rafal Renk, Lukasz Saganowski, Michal Choras, Witold Holubowicz:
Performance Evaluation of ADS System Based on Redundant Dictionary. IP&C 2010: 477-484 - [c9]Rafal Kozik, Michal Choras, Witold Holubowicz:
Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection. MOBILIGHT 2010: 451-463 - [c8]Michal Choras, Salvatore D'Antonio, Rafal Kozik, Witold Holubowicz:
Intersection Approach to Vulnerability Handling. WEBIST (1) 2010: 171-174
2000 – 2009
- 2009
- [c7]Adam Flizikowski, Rafal Kozik, Henryk Gierszal, Marcin Przybyszewski, Witold Holubowicz:
WiMAX system level simulation platform based on ns-2 and DSP integration. BroadBandCom 2009: 99-104 - [c6]Henryk Gierszal, Witold Holubowicz, Adam Mickiewicz, Lukasz Kiedrowski, Adam Flizikowski:
Non-Binary LDPC Coding for IMT-Advanced System. BroadBandCom 2009: 135-140 - [c5]Michal Choras, Adam Flizikowski, Rafal Kozik, Witold Holubowicz:
Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis. CRITIS 2009: 98-110 - [c4]Lukasz Saganowski, Michal Choras, Rafal Renk, Witold Holubowicz:
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems. ICANNGA 2009: 527-536 - [c3]Michal Choras, Rafal Kozik, Adam Flizikowski, Rafal Renk, Witold Holubowicz:
Ontology-Based Decision Support for Security Management in Heterogeneous Networks. ICIC (2) 2009: 920-927 - [p1]Michal Choras, Lukasz Saganowski, Rafal Renk, Rafal Kozik, Witold Holubowicz:
Recognizing Anomalies/Intrusions in Heterogeneous Networks. Computer Recognition Systems 3 2009: 577-584 - 2008
- [c2]Grzegorz Kolaczek, Adam Turowiec, Dominik Kasprzak, Witold Holubowicz:
e-collaboration platform for the development of rural areas and enterprises. IMCSIT 2008: 397-401 - 2000
- [c1]Henryk Gierszal, Witold Holubowicz, Przemyslaw Sulek:
Predistortion for Solid State Amplifier of Mobile Radio Systems. PWC 2000: 227-238
1990 – 1999
- 1995
- [j7]Witold Holubowicz, Fidel Morales-Moreno:
Convolutional coding of binary CPM schemes with no increase in receiver complexity. IEEE Trans. Commun. 43(2/3/4): 1221-1224 (1995) - 1994
- [j6]Witold Holubowicz, T. Bortnik:
Land mobile radio systems in Poland. IEEE J. Sel. Areas Commun. 12(7): 1206-1215 (1994) - [j5]Fidel Morales-Moreno, Witold Holubowicz, Subbarayan Pasupathy:
Optimization of trellis coded TFM via matched codes. IEEE Trans. Commun. 42(234): 1586-1594 (1994) - [j4]Witold Holubowicz, R. Bobrowski:
Good multi-T phase codes under bandwidth and complexity constraints. IEEE Trans. Inf. Theory 40(5): 1699-1702 (1994) - 1990
- [j3]Witold Holubowicz, Frank A. Cassara:
Simulation study of multi-T phase codes. IEEE Trans. Commun. 38(10): 1664-1666 (1990) - [j2]Witold Holubowicz:
Optimum parameter combinations for multi-h phase codes. IEEE Trans. Commun. 38(11): 1929-1931 (1990)
1980 – 1989
- 1985
- [j1]Witold Holubowicz, Pawel Szulakiewicz:
Multi-T realization of multi- h phase codes. IEEE Trans. Inf. Theory 31(4): 528-529 (1985)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint