default search action
Marek Amanowicz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j3]Marek Amanowicz, Damian Jankowski:
Detection and Classification of Malicious Flows in Software-Defined Networks Using Data Mining Techniques. Sensors 21(9): 2972 (2021)
2010 – 2019
- 2019
- [c9]Mariusz Kamola, Przemyslaw Jaskóla, Marek Amanowicz:
Decision Support System for Identification and Security Management of Essential and Digital Services. ICMCIS 2019: 1-7 - [c8]Sebastian Szwaczyk, Marek Amanowicz, Konrad S. Wrona, Andrzej Karbowski:
Risk-aware routing approach for software-defined networks. ICMCIS 2019: 1-7 - 2018
- [j2]Marek Amanowicz, Jaroslaw Krygier:
On Applicability of Network Coding Technique for 6LoWPAN-based Sensor Networks. Sensors 18(6): 1718 (2018) - [c7]Damian Jankowski, Marek Amanowicz:
A study on flow features selection for malicious activities detection in software defined networks. ICMCIS 2018: 1-9 - [c6]Sebastian Szwaczyk, Konrad S. Wrona, Marek Amanowicz:
Applicability of risk analysis methods to risk-aware routing in software-defined networks. ICMCIS 2018: 1-7 - 2017
- [c5]Konrad S. Wrona, Marek Amanowicz, Sebastian Szwaczyk, Krzysztof Gierlowski:
SDN testbed for validation of cross-layer data-centric security policies. ICMCIS 2017: 1-6 - [c4]Marek Amanowicz, Jacek Jarmakiewicz:
Cyber Security Provision for Industrial Control Systems. KKA 2017: 611-620 - 2016
- [j1]Konrad S. Wrona, Sander Oudkerk, Sebastian Szwaczyk, Marek Amanowicz:
Content-based security and protected core networking with software-defined networks. IEEE Commun. Mag. 54(10): 138-144 (2016) - [c3]Damian Jankowski, Marek Amanowicz:
A method of network workload generation for evaluation of intrusion detection systems in SDN environment. ICMCIS 2016: 1-7 - 2015
- [c2]Joanna Glowacka, Marek Amanowicz, Marcin Glowacki:
Robustness of trust-based protection (TUBE) scheme to reputation attacks in military mobile ad-hoc networks. ICMCIS 2015: 1-10 - [c1]Joanna Glowacka, Jaroslaw Krygier, Marek Amanowicz:
A trust-based situation awareness system for military applications of the internet of things. WF-IoT 2015: 490-495
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint