Now showing items 1-20 of 28

    • Analysis of Automated Forecasting Model Possibilities for Company Financial Accounting Data 

      Štrimaitis, Rokas; Ramanauskaitė, Simona; Stefanovič, Pavel (2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 2023)
    • Cell attribute-based algorithm for crack visualization 

      Pacevič, Ruslan; Markauskas, Darius; Radvilavičius, Lukas; Kačeniauskas, Arnas; Kutas, Remigijus (Information technology and control, 2013)
      The paper presents the development of the visualization algorithm for propagating cracks. The novel algorithm is based on the cell attribute obtained from the damaged lattice connections employed for discrete element ...
    • Clustering visually similar web page elements for structured web data extraction 

      Grigalis, Tomas; Radvilavičius, Lukas; Čenys, Antanas; Gordevičius, Juozas (Web Engineering : 12th International Conference, ICWE 2012, Berlin, Germany, July 23-27, 2012 : proceedings, 2012)
      We propose a novel approach for extraction of structured web data called ClustVX. It clusters visually similar web page elements by exploiting their visual formatting and structural features. Clusters are then used to ...
    • Composite DoS attack model 

      Ramanauskaitė, Simona; Čenys, Antanas (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2012)
      Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system ...
    • Database level honeytoken modules for active DBMS protection 

      Čenys, Antanas; Rainys, Darius; Radvilavičius, Lukas; Goranin, Nikolaj (Advances in Information Systems Development. Bridging the Gap between Academia and Industry : 14th International Conference on Information Systems Development - Bridging the Gap between Academia and Industry (ISD 2005), Karlstad, Sweden, Aug 14-17, 2005, 2006)
    • Detection and measurement of information system risks through adaptive management diagnostic expert systems 

      Janulevičius, Justinas; Šiaudinytė, Lauryna; Čenys, Antanas; Goranin, Nikolaj (12th IMEKO TC10 Workshop on Technical Diagnostics : New Perspectives in Measurements, Tools and Techniques for Industrial Applications. June 6-7, 2013, Florence, Italy, 2013)
    • Ekspertinės sistemos smulkiojo ir vidutinio verslo rizikos valdymo problemoms spręsti 

      Janulevičius, Justinas; Goranin, Nikolaj (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2013)
      Ekspertinės informacijos ir išvadų prieinamumas – viena svarbiausių tinkamos ekspertizės sąlygų. Tinkamos, kompetentingos ir laiku gautos ekspertinės žinios sudaro galimybes sklandžiai procesų raidai. Smulkusis ir vidutinis ...
    • Extension of the genetic algorithm based malware strategy evolution forecasting model for botnet strategy evolution modeling 

      Goranin, Nikolaj; Čenys, Antanas; Juknius, Jonas (Information assurance and cyber defence: symposium organised by the Information Systems and Technology Panel, held in Tallinn, Estonia, 22-23 November 2010 / NATO, Partner for Peace Nations and Med Dialogue Nations, 2010)
      Botnets are considered to be among the biggest current threats to global IT infrastructure. Botnets are rapidly evolving and forecasting their survivability and propagation strategies is important for development of ...
    • Generating Xpath expressions for structured web data record segmentation 

      Grigalis, Tomas; Čenys, Antanas (Information and software technologies : 18th International Conference, ICIST 2012, Kaunas, Lithuania, September 13-14, 2012 : proceedings, 2012)
      Record segmentation is a core problem in structured web data extraction. In this paper we present a novel technique that segments structured web data into individual data records that come from underlying database. Proposed ...
    • Genetic algorithm based palm recognition method for biometric authentication systems 

      Čenys, Antanas; Gibavičius, Darius; Goranin, Nikolaj; Marozas, Leonardas (Elektronika ir elektrotechnika, 2013)
      Biometric authentication systems are steadily becoming a solution to wide number of authentication and identity management problems. Unique parts of human body that can be recognized and used as a mean to identify a person ...
    • Lietuvoje išrastas judančio žmogaus tapatybės identifikavimo prietaisas 

      Grigalis, Tomas (Mokslas ir technika : Lietuvos MA ir Lietuvos inžinierių sąjungos mėnesinis žurnalas, 2013)
      2013 metų sausio mėn. Vilniaus Gedimino technikos universitetas pristatė prietaisą, gebantį atpažinti judančio žmogaus tapatybę pagal akies rainelę. Ši naujovė gali pasitarnauti ypatingo saugumo reikalaujančiose zonose ...
    • Malicious Botnet survivability mechanism evolution forecasting by means of a genetic algorithm 

      Goranin, Nikolaj; Čenys, Antanas; Juknius, Jonas (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2012)
      Botnets are considered to be among the most dangerous modern malware types and the biggest current threats to global IT infrastructure. Botnets are rapidly evolving, and therefore forecasting their survivability strategies ...
    • Modelling of central processing unit work Denial of service attacks 

      Ramanauskaitė, Simona; Čenys, Antanas (Information technologies' 2011 : proceedings of the 17th international conference on information and software technologies, IT 2011, Kaunas, Lithuania, April 27-29, 2011 / Kaunas University of Technology; edited by Rimantas Butleris, Rita Butkienė, 2011)
      Denial of service attacks is one type of cyber attacks, when attacker tries to make some kind of service not available to its legitimate users. It becomes more relevant for service providers, however, for estimating of the ...
    • Mums patiems reiktų drąsiau ir dažniau išsakyti savo nuomonę 

      Jučiūtė, Edita; Čenys, Antanas (Sapere Aude, 2015)
      Pasauliniai pokyčiai keičia ir mokslo vertybes. Europoje vyksta bendras posūkis nuo fundamentinio mokslo prie taikomojo. Labiausiai akcentuojama ta mokslo dalis, kuri gali pakeisti ekonomiką ir visuomenės gyvenimą. „Mokslas ...
    • Ontologijos naudojimas informacijos saugumo reikalavimams susieti 

      Ramanauskaitė, Simona; Radvilė, Eglė; Olifer, Dmitrij (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2013)
      Esant daugybei informacijos saugą reglamentuojančių dokumentų, gairių ir standartų, aktualu tarpusavyje susieti juose apibrėžtus saugumo reikalavimus. Skirtinguose saugos dokumentuose aprašyti saugumo reikalavimai gali ne ...
    • Ontology-based security standards mapping pptimization by the means of Graph theory 

      Ramanauskaitė, Simona; Goranin, Nikolaj; Čenys, Antanas; Olifer, Dmitrij (International congress on engineering and technology (ICET 2013), 25–27th June, Dubrovnik, Croatia, 2013, 2013)
      There are many security standards which a company can use. Sometimes usage of security standards can be required by regulating institutions. While security standards can differ in purpose and covered area, more than one ...
    • Overview of real-time antivirus scanning engines 

      Radvilavičius, Lukas; Marozas, Leonardas; Čenys, Antanas (Journal of engineering science and technology review. JESTR, 2012)
      Malicious code is one of the biggest problems in the world of networks. There exist various methods and techniques stating that they protect user. For quite some time the most popular protection method against viruses was ...
    • Raising effectiveness of access control systems by applying multi-criteria decision analysis: part 1 – problem definition 

      Marozas, Leonardas; Goranin, Nikolaj; Čenys, Antanas; Radvilavičius, Lukas; Turskis, Zenonas (Technological and economic development of economy, 2013)
      Currently, control of access to information and physical resources has become extremely important. Numerous methods and solutions for architecture of systems aimed at controlling physical access are available; however, ...
    • Saugumo patikros ir etiško įsilaužimo technologijos 

      Čenys, Antanas; Juknius, Jonas (2011)
    • Security ontology for adaptive mapping of security standards 

      Ramanauskaitė, Simona; Olifer, Dmitrij; Goranin, Nikolaj; Čenys, Antanas (International Journal of Computers, Communications & Control (IJCCC), 2013)
      Adoption of security standards has the capability of improving the security level in an organization as well as to provide additional benefits and possibilities to the organization. However mapping of used standards has ...