Browsing Mokslinės publikacijos (PDB) / Scientific publications (PDB) by Department "Informacinių sistemų katedra / Department of Information Systems"
Now showing items 1-20 of 28
-
Analysis of Automated Forecasting Model Possibilities for Company Financial Accounting Data
(2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), 2023) -
Cell attribute-based algorithm for crack visualization
(Information technology and control, 2013)The paper presents the development of the visualization algorithm for propagating cracks. The novel algorithm is based on the cell attribute obtained from the damaged lattice connections employed for discrete element ... -
Clustering visually similar web page elements for structured web data extraction
(Web Engineering : 12th International Conference, ICWE 2012, Berlin, Germany, July 23-27, 2012 : proceedings, 2012)We propose a novel approach for extraction of structured web data called ClustVX. It clusters visually similar web page elements by exploiting their visual formatting and structural features. Clusters are then used to ... -
Composite DoS attack model
(Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2012)Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system ... -
Database level honeytoken modules for active DBMS protection
(Advances in Information Systems Development. Bridging the Gap between Academia and Industry : 14th International Conference on Information Systems Development - Bridging the Gap between Academia and Industry (ISD 2005), Karlstad, Sweden, Aug 14-17, 2005, 2006) -
Detection and measurement of information system risks through adaptive management diagnostic expert systems
(12th IMEKO TC10 Workshop on Technical Diagnostics : New Perspectives in Measurements, Tools and Techniques for Industrial Applications. June 6-7, 2013, Florence, Italy, 2013) -
Ekspertinės sistemos smulkiojo ir vidutinio verslo rizikos valdymo problemoms spręsti
(Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2013)Ekspertinės informacijos ir išvadų prieinamumas – viena svarbiausių tinkamos ekspertizės sąlygų. Tinkamos, kompetentingos ir laiku gautos ekspertinės žinios sudaro galimybes sklandžiai procesų raidai. Smulkusis ir vidutinis ... -
Extension of the genetic algorithm based malware strategy evolution forecasting model for botnet strategy evolution modeling
(Information assurance and cyber defence: symposium organised by the Information Systems and Technology Panel, held in Tallinn, Estonia, 22-23 November 2010 / NATO, Partner for Peace Nations and Med Dialogue Nations, 2010)Botnets are considered to be among the biggest current threats to global IT infrastructure. Botnets are rapidly evolving and forecasting their survivability and propagation strategies is important for development of ... -
Generating Xpath expressions for structured web data record segmentation
(Information and software technologies : 18th International Conference, ICIST 2012, Kaunas, Lithuania, September 13-14, 2012 : proceedings, 2012)Record segmentation is a core problem in structured web data extraction. In this paper we present a novel technique that segments structured web data into individual data records that come from underlying database. Proposed ... -
Genetic algorithm based palm recognition method for biometric authentication systems
(Elektronika ir elektrotechnika, 2013)Biometric authentication systems are steadily becoming a solution to wide number of authentication and identity management problems. Unique parts of human body that can be recognized and used as a mean to identify a person ... -
Lietuvoje išrastas judančio žmogaus tapatybės identifikavimo prietaisas
(Mokslas ir technika : Lietuvos MA ir Lietuvos inžinierių sąjungos mėnesinis žurnalas, 2013)2013 metų sausio mėn. Vilniaus Gedimino technikos universitetas pristatė prietaisą, gebantį atpažinti judančio žmogaus tapatybę pagal akies rainelę. Ši naujovė gali pasitarnauti ypatingo saugumo reikalaujančiose zonose ... -
Malicious Botnet survivability mechanism evolution forecasting by means of a genetic algorithm
(Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2012)Botnets are considered to be among the most dangerous modern malware types and the biggest current threats to global IT infrastructure. Botnets are rapidly evolving, and therefore forecasting their survivability strategies ... -
Modelling of central processing unit work Denial of service attacks
(Information technologies' 2011 : proceedings of the 17th international conference on information and software technologies, IT 2011, Kaunas, Lithuania, April 27-29, 2011 / Kaunas University of Technology; edited by Rimantas Butleris, Rita Butkienė, 2011)Denial of service attacks is one type of cyber attacks, when attacker tries to make some kind of service not available to its legitimate users. It becomes more relevant for service providers, however, for estimating of the ... -
Mums patiems reiktų drąsiau ir dažniau išsakyti savo nuomonę
(Sapere Aude, 2015)Pasauliniai pokyčiai keičia ir mokslo vertybes. Europoje vyksta bendras posūkis nuo fundamentinio mokslo prie taikomojo. Labiausiai akcentuojama ta mokslo dalis, kuri gali pakeisti ekonomiką ir visuomenės gyvenimą. „Mokslas ... -
Ontologijos naudojimas informacijos saugumo reikalavimams susieti
(Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2013)Esant daugybei informacijos saugą reglamentuojančių dokumentų, gairių ir standartų, aktualu tarpusavyje susieti juose apibrėžtus saugumo reikalavimus. Skirtinguose saugos dokumentuose aprašyti saugumo reikalavimai gali ne ... -
Ontology-based security standards mapping pptimization by the means of Graph theory
(International congress on engineering and technology (ICET 2013), 25–27th June, Dubrovnik, Croatia, 2013, 2013)There are many security standards which a company can use. Sometimes usage of security standards can be required by regulating institutions. While security standards can differ in purpose and covered area, more than one ... -
Overview of real-time antivirus scanning engines
(Journal of engineering science and technology review. JESTR, 2012)Malicious code is one of the biggest problems in the world of networks. There exist various methods and techniques stating that they protect user. For quite some time the most popular protection method against viruses was ... -
Raising effectiveness of access control systems by applying multi-criteria decision analysis: part 1 – problem definition
(Technological and economic development of economy, 2013)Currently, control of access to information and physical resources has become extremely important. Numerous methods and solutions for architecture of systems aimed at controlling physical access are available; however, ... -
Security ontology for adaptive mapping of security standards
(International Journal of Computers, Communications & Control (IJCCC), 2013)Adoption of security standards has the capability of improving the security level in an organization as well as to provide additional benefits and possibilities to the organization. However mapping of used standards has ...
