Now showing items 1-15 of 15

    • Cell attribute-based algorithm for crack visualization 

      Pacevič, Ruslan; Markauskas, Darius; Radvilavičius, Lukas; Kačeniauskas, Arnas; Kutas, Remigijus (Information technology and control, 2013)
      The paper presents the development of the visualization algorithm for propagating cracks. The novel algorithm is based on the cell attribute obtained from the damaged lattice connections employed for discrete element ...
    • Composite DoS attack model 

      Ramanauskaitė, Simona; Čenys, Antanas (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2012)
      Preparation for potential threats is one of the most important phases ensuring system security. It allows evaluating possible losses, changes in the attack process, the effectiveness of used countermeasures, optimal system ...
    • Ekspertinės sistemos smulkiojo ir vidutinio verslo rizikos valdymo problemoms spręsti 

      Janulevičius, Justinas; Goranin, Nikolaj (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2013)
      Ekspertinės informacijos ir išvadų prieinamumas – viena svarbiausių tinkamos ekspertizės sąlygų. Tinkamos, kompetentingos ir laiku gautos ekspertinės žinios sudaro galimybes sklandžiai procesų raidai. Smulkusis ir vidutinis ...
    • Genetic algorithm based palm recognition method for biometric authentication systems 

      Čenys, Antanas; Gibavičius, Darius; Goranin, Nikolaj; Marozas, Leonardas (Elektronika ir elektrotechnika, 2013)
      Biometric authentication systems are steadily becoming a solution to wide number of authentication and identity management problems. Unique parts of human body that can be recognized and used as a mean to identify a person ...
    • Malicious Botnet survivability mechanism evolution forecasting by means of a genetic algorithm 

      Goranin, Nikolaj; Čenys, Antanas; Juknius, Jonas (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2012)
      Botnets are considered to be among the most dangerous modern malware types and the biggest current threats to global IT infrastructure. Botnets are rapidly evolving, and therefore forecasting their survivability strategies ...
    • Ontologijos naudojimas informacijos saugumo reikalavimams susieti 

      Ramanauskaitė, Simona; Radvilė, Eglė; Olifer, Dmitrij (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2013)
      Esant daugybei informacijos saugą reglamentuojančių dokumentų, gairių ir standartų, aktualu tarpusavyje susieti juose apibrėžtus saugumo reikalavimus. Skirtinguose saugos dokumentuose aprašyti saugumo reikalavimai gali ne ...
    • Overview of real-time antivirus scanning engines 

      Radvilavičius, Lukas; Marozas, Leonardas; Čenys, Antanas (Journal of engineering science and technology review. JESTR, 2012)
      Malicious code is one of the biggest problems in the world of networks. There exist various methods and techniques stating that they protect user. For quite some time the most popular protection method against viruses was ...
    • Raising effectiveness of access control systems by applying multi-criteria decision analysis: part 1 – problem definition 

      Marozas, Leonardas; Goranin, Nikolaj; Čenys, Antanas; Radvilavičius, Lukas; Turskis, Zenonas (Technological and economic development of economy, 2013)
      Currently, control of access to information and physical resources has become extremely important. Numerous methods and solutions for architecture of systems aimed at controlling physical access are available; however, ...
    • Security ontology for adaptive mapping of security standards 

      Ramanauskaitė, Simona; Olifer, Dmitrij; Goranin, Nikolaj; Čenys, Antanas (International Journal of Computers, Communications & Control (IJCCC), 2013)
      Adoption of security standards has the capability of improving the security level in an organization as well as to provide additional benefits and possibilities to the organization. However mapping of used standards has ...
    • Specialized genetic algorithm based simulation tool designed for malware evolution forecasting 

      Juzonis, Vaidas; Goranin, Nikolaj; Čenys, Antanas; Olifer, Dmitrij (Annales UMCS Informatica, 2012)
      From the security point of view malware evolution forecasting is very important, since it provides an opportunity to predict malware epidemic outbreaks, develop effective countermeasure techniques and evaluate information ...
    • State-of-the-art web data extraction systems for online business intelligence 

      Grigalis, Tomas; Čenys, Antanas (Informacijos mokslai : mokslo darbai, 2013)
      The success of a company hinges on identifying and responding to competitive pressures. The main ob - jective of online business intelligence is to collect valuable information from many Web sources to sup - port decision ...
    • Šiuolaikinių tinklalapių automatizuotam naršymui ir testavimui skirtų priemonių analizė ir pritaikomumas informacijai rinkti 

      Grigalis, Tomas; Marozas, Leonardas; Radvilavičius, Lukas (Mokslas – Lietuvos ateitis = Science – future of Lithuania: elektronika ir elektrotechnika = Electronics and electrical engineering, 2012)
      Internetui tapus milžiniška informacijos duomenų baze, susiduriama su informacijos rinkimo problema – kaip iš itin gausaus kiekio informacijos šaltinių pasirinkti tokį, kuris gebėtų informacijos naudotojui pateikti tinkamą ...
    • Unsupervised structured data extraction from template-generated web pages 

      Grigalis, Tomas; Čenys, Antanas (Journal of Universal Computer Science (J.UCS), 2014)
      This paper studies structured data extraction from template-generated Web pages. Such pages contain most of structured data on the Web. Extracted structured data can be later integrated and reused in very big range of ...
    • Using XPaths of inbound links to cluster template-generated web pages 

      Grigalis, Tomas; Čenys, Antanas (Computer science and information systems (ComSIS), 2014)
      Template-generated Web pages contain most of structured data on the Web. Clustering these pages according to their template structure is an important problem in wrapper-based structured data extraction systems. These systems ...
    • Visualization of mapped security standards for analysis and use optimisation 

      Ramanauskaitė, Simona; Olifer, Dmitrij; Goranin, Nikolaj; Čenys, Antanas; Radvilavičius, Lukas (International journal of computer theory and engineering, 2014)
      There are many security standards which the company can use. While security standards can differ in purpose and covered area, more than one standard can be used at the same time which leads to overlap and potential conflicts ...