Now showing items 1-20 of 87

    • A deep-learning-based approach to keystroke-injection payload generation 

      Gurčinas, Vitalijus; Dautartas, Juozas; Janulevičius, Justinas; Goranin, Nikolaj; Čenys, Antanas (Electronics: Special issue: Data driven security, 2023)
      Investigation and detection of cybercrimes has been in the spotlight of cybersecurity research for as long as the topic has existed. Modern methods are required to keep up with the pace of the technology and toolset used ...
    • A Fuzzy WASPAS-based approach to determine critical information infrastructures of EU sustainable development 

      Turskis, Zenonas; Goranin, Nikolaj; Nurusheva, Assel; Boranbayev, Seilkhan (Sustainability, 2019)
      Critical information infrastructure exists in di_erent sectors of each country. Its loss or sustainability violation will lead to a negative impact on the supply of essential services, as well as on the social or economic ...
    • A review of modern CMOS transimpedance amplifiers for OTDR applications 

      Romanova, Agata; Barzdėnas, Vaidotas (Electronics, 2019)
      The work presents a review of modern CMOS transimpedance amplifiers (TIAs) in the context of their application for low-cost optical time-domain reflectometry (OTDR). After introducing the basic principles behind the OTDR, ...
    • Adaptation of parallel SaaS to heterogeneous co-located cloud resources 

      Bystrov, Oleg; Pacevič, Ruslan; Kačeniauskas, Arnas (Applied sciences, 2023)
      Cloud computing has received increasing attention due to its promise of delivering on-demand, scalable, and virtually unlimited resources. However, heterogeneity or co-location of virtual cloud resources can cause severe ...
    • Adapted anomaly detection for RAN performance 

      Momkutė, Dovilė; Žvinys, Karolis; Barzdėnas, Vaidotas (2018 IEEE. 6th workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE), November 8-10, 2018 Vilnius, Lithuania : proceedings / edited by: Dalius Navakauskas, Andrejs Romanovs, Darius Plonis, 2018)
      The complexity of mobile radio access networks is increasing rapidly. At the same time, customers’ expectations for the service quality are keeping the pressure on operators. It requires huge human efforts to maintain a ...
    • Analysis of mobile services in the financial sector 

      Zigmantavičiūtė, Evelina; Šileikienė, Irma (Mokslas – Lietuvos ateitis. Informacinės technologijos ir multimedija = Science – Future of Lithuania. Information technologies and multimedia, 2019)
      Extensive research of mobile financial services has been conducted in digital finance, FinTech, blockchain and cryptocurrencies. These new technologies and products are changing the financial services industry. It is ...
    • Analysis of TCP flood attack using NetFlow 

      Kapustin, Vsevolod; Paulauskas, Nerijus (Mokslas – Lietuvos ateitis. Elektronika ir elektros inžinerija = Science – Future of Lithuania. Electronics and electrical engineering, 2023)
      Traffic analysis is a common question for most of the production systems in various segments of computer networks. Attacks, configuration mistakes, and other factors can cause network increased accessibility and as a result ...
    • Application of deep learning methods in host-based intrusion detection systems 

      Čeponis, Dainius; Goranin, Nikolaj (11th international workshop on data analysis methods for software systems, Druskininkai, Lithuania, November 28-30, 2019 / Lithuanian Computer Society, Vilnius University Institute of Data Science and Digital Technologies, Lithuanian Academy of Sciences, 2019)
      Protection of information plays an important role in the daily schedule of a modern company. Various types of businesses are dealing with a huge amount of sensitive data: it can be not only data belonging to the private ...
    • Application of histogram-based outlier scores to detect computer network anomalies 

      Paulauskas, Nerijus; Baškys, Algirdas (Electronics, 2019)
      Misuse activity in computer networks constantly creates new challenges and difficulties to ensure data confidentiality, integrity, and availability. The capability to identify and quickly stop the attacks is essential, as ...
    • Application of multicriteria methods for improvement of information security metrics 

      Abdiraman, Aliya; Goranin, Nikolaj; Balevičius, Simas; Nurusheva, Assel; Tumasonienė, Inga (Sustainability: Special issue: Application of cyber security in sustainable system, 2023)
      Metrics are a set of numbers that are used to obtain information about the operation of a process or system. In our case, metrics are used to assess the level of information security of information and communication ...
    • Automated data availability modeling according to information management structure 

      Ramanauskaitė, Simona; Kaušpadienė, Laima; Janulevičius, Justinas; Čenys, Antanas; Matulevičius, Raimundas (Proceedings of Academicsera 30th international conference, Hamburg, Germany, 4th-5th October 2018, 2018)
      Data availability plays an important role in the workflow of an enterprise. Therefore it is necessary to evaluate the availability of different types of data used by an enterprise. Most existing solutions for evaluation ...
    • Automated expert system knowledge base development method for information security risk analysis 

      Vitkus, Donatas; Steckevičius, Žilvinas; Goranin, Nikolaj; Kalibatienė, Diana; Čenys, Antanas (International journal of computers, communications and control, 2019)
      Information security risk analysis is a compulsory requirement both from the side of regulating documents and information security management decision making process. Some researchers propose using expert systems (ES) for ...
    • Automated system-level anomaly detection and classification using modified random forest 

      Gyamfi, Nana Kwame; Čeponis, Dainius; Goranin, Nikolaj (Proceedings of 2022 1st International Conference on AI in Cybersecurity (ICAIC), 24-26 May 2022, Victoria, TX, USA, 2022)
      It is imperative for Internet-based services to monitor service performance closely and detect anomalies as soon as possible. Despite this, deploying anomaly detectors to a particular service is still an extremely challenging ...
    • Automated system-level malware detection using machine learning: A comprehensive review / 

      Gyamfi, Nana Kwame,; Goranin, Nikolaj,; Čeponis, Dainius,; Čenys, Antanas, (Applied sciences: Special issue: Security challenges for the internet of things and mobile networks., 2023.)
      Malware poses a significant threat to computer systems and networks. This necessitates the development of effective detection mechanisms. Detection mechanisms dependent on signatures for attack detection perform poorly due ...
    • Babylon.js valdymo pelyte analizė 

      Usovaitė, Ana (Inžinerinė ir kompiuterinė grafika: konferencijos pranešimų medžiaga, 2021)
      3D graphics are very often used in modern applications. One way to render 3D graphics is to use the Babilon.js graphics engine. This engine has integrated features to organize mouse control. The article presents three ...
    • Baziniai Directx 12 primityvų tipai ir jų taikymas objektams atvaizduoti 

      Ušpurienė, Ana (Inžinerinė ir kompiuterinė grafika: konferencijos pranešimų medžiaga, 2021)
      Direct3D is one of the most important part of a game or a game engine. The Direct3D 12 graphics pipeline ensures smooth graphics display in games in real time. In the first stage of the graphic pipeline (Input-Assembler), ...
    • C2C application as an example of e-shop for handmade: Tools, security issues, basic technologies 

      Pleskach, Valentyna; Zosimov, Viacheslav; Bulgakova, Oleksandra; Pleskach, Mariia; Volnyanska, Eva (CEUR Workshop Proceedings: IT&I-2022 - Selected Papers of the IX International Scientific Conference "Information Technology and Implementation" Conference Proceedings, November 30 - December 02, 2022, Kyiv, Ukraine, 2022)
      The paper is devoted to the analysis of the economic state and level of development of the digital economy and e-commerce, as the main component of the digital economy. The paper presents the C2C application of e-shop for ...
    • Convolutional neural network approach for anomaly-based intrusion detection on IoT-enabled smart space orchestration system 

      Upman, Vikas; Goranin, Nikolaj; Čenys, Antanas (DAMSS 2022: 13th conference on data analysis methods for software systems, Druskininkai, Lithuania, December 1–3, 2022, 2022)
    • Cost and performance analysis of MPI-based SaaS on the private cloud infrastructure 

      Bystrov, Oleg; Kačeniauskas, Arnas; Pacevič, Ruslan (Parallel processing and applied mathematics: 14th International Conference, PPAM 2022, Gdansk, Poland, September 11–14, 2022, Revised Selected Papers, Part I, 2023)
      The paper presents the cost and performance analysis of parallel MPI-based software as a service (SaaS) deployed on the OpenStack cloud infrastructure. The parallel SaaS was developed by using C++ programming language and ...
    • Cost- and performance-aware resource selection for parallel software on heterogeneous cloud 

      Bystrov, Oleg; Pacevič, Ruslan; Kačeniauskas, Arnas (Concurrency and computation-practice & experience, 2023)
      Cloud providers offer flexible infrastructures and on‐demand services, including the capability to deploy low cost virtual resources of many different types. However, the diversity of cloud resources followed by the important ...