Now showing items 1-8 of 8

    • Automated system-level malware detection using machine learning: A comprehensive review / 

      Gyamfi, Nana Kwame,; Goranin, Nikolaj,; Čeponis, Dainius,; Čenys, Antanas, (Applied sciences: Special issue: Security challenges for the internet of things and mobile networks., 2023.)
      Malware poses a significant threat to computer systems and networks. This necessitates the development of effective detection mechanisms. Detection mechanisms dependent on signatures for attack detection perform poorly due ...
    • Development of ICT infrastructure management services for optimization of administration of educational institution activities by using ITIL-v4 

      Dzemydienė, Dalė; Turskienė, Sigita; Šileikienė, Irma (Baltic journal of modern computing, 2023)
      The services for information communication technology (ICT) infrastructure management (i.e., ICT strategy creation, ICT configuration, ICT incidence management, reengineering) have become an increasingly important and ...
    • Development of intelligent service system for multimodal transport management 

      Dzemydienė, Dalė (Development of smart context-aware services for cargo transportation: an operational management approach / editors: Dalė Dzemydienė, Aurelija Burinskienė, Kristina Čižiūnienė, Arūnas Miliauskas, 2022)
      The main objective of this part of the research is to describe the development of a Smart-SDS for multimodal freight transport management. Components of decision-making processes are integrated into the Smart-SDS structures. ...
    • Malware detection using convolutional neural network, a deep learning framework: comparative analysis 

      Gyamfi, Nana Kwame; Goranin, Nikolaj; Čeponis, Dainius; Čenys, Antanas (Journal of internet services and information security, 2022)
      Malware detection is a quintessential task for every security for securing work stations, mobile devices, servers etc. This detection is mainly used for identifying malware that are causing malicious problems. The traditional ...
    • Structure of context recognition in computer-based systems for transportation management 

      Dzemydienė, Dalė (Development of smart context-aware services for cargo transportation: an operational management approach / editors: Dalė Dzemydienė, Aurelija Burinskienė, Kristina Čižiūnienė, Arūnas Miliauskas, 2022)
      The process of context recognition in dynamically changing transportation processes is quite complex. The complexity arises from many aspects of understanding the concept of “context”. When developing computer-based systems, ...
    • Structure of smart service provision system for operative management of transportation 

      Dzemydienė, Dalė (Development of smart context-aware services for cargo transportation: an operational management approach / editors: Dalė Dzemydienė, Aurelija Burinskienė, Kristina Čižiūnienė, Arūnas Miliauskas, 2022)
      The aim of this part of the research is to examine the system architecture required for Smart-SDS in freight transportation processes. Smart-SDS is designed to help prevent accidents, warn of other accidents or adverse ...
    • Wireless communication network infrastructure analysis for smart service system functioning 

      Dzemydienė, Dalė (Development of smart context-aware services for cargo transportation: an operational management approach / editors: Dalė Dzemydienė, Aurelija Burinskienė, Kristina Čižiūnienė, Arūnas Miliauskas, 2022)
      The communication infrastructure, as the basis for technical capabilities, provides the preconditions for interoperability between wireless computer networks and ground vehicles. Such infrastructure supports and enables ...
    • Метод авторизации на основе разложения чисел на простые сомножители 

      Kurylets, Anastasiya; Smelov, Vladimir; Goranin, Nikolaj (Proceedings of BSTU. Physics and Mathematics. Informatics, 2021)
      Статья посвящена описанию метода авторизации на основе разложения чисел на простые сомножители. В ней представлено формальное описание системы авторизации, включающей субъекты и объекты авторизации, а также алгоритмы ...