Now showing items 1-20 of 44

    • A deep-learning-based approach to keystroke-injection payload generation 

      Gurčinas, Vitalijus; Dautartas, Juozas; Janulevičius, Justinas; Goranin, Nikolaj; Čenys, Antanas (Electronics: Special issue: Data driven security, 2023)
      Investigation and detection of cybercrimes has been in the spotlight of cybersecurity research for as long as the topic has existed. Modern methods are required to keep up with the pace of the technology and toolset used ...
    • A Fuzzy WASPAS-based approach to determine critical information infrastructures of EU sustainable development 

      Turskis, Zenonas; Goranin, Nikolaj; Nurusheva, Assel; Boranbayev, Seilkhan (Sustainability, 2019)
      Critical information infrastructure exists in di_erent sectors of each country. Its loss or sustainability violation will lead to a negative impact on the supply of essential services, as well as on the social or economic ...
    • A review of modern CMOS transimpedance amplifiers for OTDR applications 

      Romanova, Agata; Barzdėnas, Vaidotas (Electronics, 2019)
      The work presents a review of modern CMOS transimpedance amplifiers (TIAs) in the context of their application for low-cost optical time-domain reflectometry (OTDR). After introducing the basic principles behind the OTDR, ...
    • Adaptation of parallel SaaS to heterogeneous co-located cloud resources 

      Bystrov, Oleg; Pacevič, Ruslan; Kačeniauskas, Arnas (Applied sciences, 2023)
      Cloud computing has received increasing attention due to its promise of delivering on-demand, scalable, and virtually unlimited resources. However, heterogeneity or co-location of virtual cloud resources can cause severe ...
    • Analysis of mobile services in the financial sector 

      Zigmantavičiūtė, Evelina; Šileikienė, Irma (Mokslas – Lietuvos ateitis. Informacinės technologijos ir multimedija = Science – Future of Lithuania. Information technologies and multimedia, 2019)
      Extensive research of mobile financial services has been conducted in digital finance, FinTech, blockchain and cryptocurrencies. These new technologies and products are changing the financial services industry. It is ...
    • Analysis of TCP flood attack using NetFlow 

      Kapustin, Vsevolod; Paulauskas, Nerijus (Mokslas – Lietuvos ateitis. Elektronika ir elektros inžinerija = Science – Future of Lithuania. Electronics and electrical engineering, 2023)
      Traffic analysis is a common question for most of the production systems in various segments of computer networks. Attacks, configuration mistakes, and other factors can cause network increased accessibility and as a result ...
    • Application of histogram-based outlier scores to detect computer network anomalies 

      Paulauskas, Nerijus; Baškys, Algirdas (Electronics, 2019)
      Misuse activity in computer networks constantly creates new challenges and difficulties to ensure data confidentiality, integrity, and availability. The capability to identify and quickly stop the attacks is essential, as ...
    • Application of multicriteria methods for improvement of information security metrics 

      Abdiraman, Aliya; Goranin, Nikolaj; Balevičius, Simas; Nurusheva, Assel; Tumasonienė, Inga (Sustainability: Special issue: Application of cyber security in sustainable system, 2023)
      Metrics are a set of numbers that are used to obtain information about the operation of a process or system. In our case, metrics are used to assess the level of information security of information and communication ...
    • Automated expert system knowledge base development method for information security risk analysis 

      Vitkus, Donatas; Steckevičius, Žilvinas; Goranin, Nikolaj; Kalibatienė, Diana; Čenys, Antanas (International journal of computers, communications and control, 2019)
      Information security risk analysis is a compulsory requirement both from the side of regulating documents and information security management decision making process. Some researchers propose using expert systems (ES) for ...
    • Automated system-level malware detection using machine learning: A comprehensive review / 

      Gyamfi, Nana Kwame,; Goranin, Nikolaj,; Čeponis, Dainius,; Čenys, Antanas, (Applied sciences: Special issue: Security challenges for the internet of things and mobile networks., 2023.)
      Malware poses a significant threat to computer systems and networks. This necessitates the development of effective detection mechanisms. Detection mechanisms dependent on signatures for attack detection perform poorly due ...
    • Cost- and performance-aware resource selection for parallel software on heterogeneous cloud 

      Bystrov, Oleg; Pacevič, Ruslan; Kačeniauskas, Arnas (Concurrency and computation-practice & experience, 2023)
      Cloud providers offer flexible infrastructures and on‐demand services, including the capability to deploy low cost virtual resources of many different types. However, the diversity of cloud resources followed by the important ...
    • Defining the minimum security baseline in a multiple security standards environment by graph theory techniques 

      Olifer, Dmitrij; Goranin, Nikolaj; Čenys, Antanas; Kačeniauskas, Arnas; Janulevičius, Justinas (Applied sciences, 2019)
      One of the best ways to protect an organization’s assets is to implement security requirements defined by different standards or best practices. However, such an approach is complicated and requires specific skills and ...
    • Dynamic expert system-based geographically adapted malware risk evaluation method 

      Vitkus, Donatas; Jezukevičiūtė, Justina; Goranin, Nikolaj (International journal of computers communications & control, 2020)
      Fast development of information systems and technologies while providing new opportunities for people and organizations also make them more vulnerable at the same time. Information security risk assessment helps to identify ...
    • E-mail-based phishing attack taxonomy 

      Rastenis, Justinas; Ramanauskaitė, Simona; Janulevičius, Justinas; Čenys, Antanas; Slotkienė, Asta; Pakrijauskas, Kęstutis (Applied sciences, 2020)
      The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing. Phishing attacks seek to obtain ...
    • Educational organization’s security level estimation model 

      Ramanauskaitė, Simona; Urbonaitė, Neringa; Grigaliūnas, Šarūnas; Preidys, Saulius; Trinkūnas, Vaidotas; Venčkauskas, Algimantas (Applied sciences, 2021)
      During the pandemic, distance learning gained its necessity. Most schools and universities were forced to use e-learning tools. The fast transition to distance learning increased the digitalization of the educational system ...
    • Energy saving techniques in next generation of mobile communication networks 

      Kapustynska, Viroslava (Engineering proceedings: The 2nd International Electronic Conference on Processes session Environmental and Green Processes, 2023)
      Generalized integration of new communication technologies expected to improve human`s life and bring the Sustainable Development Goals achievement closer in the next ten years. People will benefit from rapid exchange of ...
    • Evaluation of deep learning methods efficiency for malicious and benign system calls classification on the AWSCTD 

      Čeponis, Dainius; Goranin, Nikolaj (Security and communication networks, 2019)
      The increasing amount of malware and cyberattacks on a host level increases the need for a reliable anomaly-based host IDS (HIDS) that would be able to deal with zero-day attacks and would ensure low false alarm rate (FAR), ...
    • Evaluation of microservice communication while decomposing monoliths 

      Kazanavičius, Justas; Mažeika, Dalius (Computing and informatics, 2023)
      One of the biggest challenges while migrating from a monolith architecture to a microservice architecture is to define a proper communication technology. In monolith applications, communication between components is performed ...
    • Hash functions and GPU algorithm of infinite grid method for contact search 

      Pacevič, Ruslan; Kačeniauskas, Arnas (Information technology and control, 2022)
      The paper presents the memory-saving GPU algorithm of the infinite grid method with various hash functionsfor contact search in discrete element computations. The implemented hash table of fixed size has the addedbenefit ...
    • High order numerical schemes for solving fractional powers of elliptic operators 

      Čiegis, Raimondas; Vabishchevich, Petr N. (Journal of computational and applied mathematics, 2020)
      In many recent applications when new materials and technologies are developed it is important to describe and simulate new nonlinear and nonlocal diffusion transport processes. A general class of such models deals with ...