Остановите войну!
for scientists:
default search action
Peter Komisarczuk
- > Home > Persons > Peter Komisarczuk
Publications
- 2013
- [c37]Shadi Esnaashari, Ian Welch, Peter Komisarczuk:
Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks. AINA Workshops 2013: 725-729 - [c36]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Anatomy of Drive-by Download Attack. AISC 2013: 49-58 - [c32]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand. LCN 2013: 300-303 - 2012
- [c28]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
A Novel Scoring Model to Detect Potential Malicious Web Pages. TrustCom 2012: 254-263 - 2011
- [c26]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Two-Stage Classification Model to Detect Malicious Web Pages. AINA 2011: 113-120 - [c24]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Identification of Potential Malicious Web Pages. AISC 2011: 33-40 - 2010
- [c19]Kyle Chard, Kris Bubendorfer, Peter Komisarczuk:
High occupancy resource allocation for grid and cloud systems, a study with DRIVE. HPDC 2010: 73-84 - [c17]Peter Komisarczuk, Ian Welch:
Internet Sensor Grid: Experiences with Passive and Active Instruments. WCITD/NF 2010: 132-145 - 2009
- [c15]Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch:
Measurement Study on Malicious Web Servers in the .nz Domain. ACISP 2009: 8-25 - [c14]David Stirling, Ian Welch, Peter Komisarczuk, Christian Seifert:
Automating Malware Scanning Using Workflows. CCGRID 2009: 562-567 - [c10]Christian Seifert, Peter Komisarczuk, Ian Welch:
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. SECURWARE 2009: 63-69 - 2008
- [c9]David Stirling, Ian Welch, Peter Komisarczuk:
Designing Workflows for Grid Enabled Internet Instruments. CCGRID 2008: 218-225 - [c8]Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch:
Identifying and Analyzing Web Server Attacks. IFIP Int. Conf. Digital Forensics 2008: 151-161 - [c7]Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky:
Identification of malicious web pages through analysis of underlying DNS and web server relationships. LCN 2008: 935-941 - [c6]Christian Seifert, Ian Welch, Peter Komisarczuk:
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. SAC 2008: 1426-1432 - 2007
- [j1]Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Barbara Endicott-Popovsky:
Capture - A behavioral analysis tool for applications and documents. Digit. Investig. 4(Supplement): 23-30 (2007) - [c5]Peter Komisarczuk, Christian Seifert, Dean Pemberton:
Grid Enabled Internet Instruments. GLOBECOM 2007: 1906-1911 - 2005
- [c4]Kris Bubendorfer, Peter Komisarczuk:
A Position Paper: Towards an Utility Computing and Communications Infrastructure. Communications in Computing 2005: 47-53 - [c3]Kyle Chard, Peter Komisarczuk, Kris Bubendorfer, Ankur Desai:
Fine Grained Resource Reservation and Management in Grid Economics. GCA 2005: 31-38 - [c2]Kris Bubendorfer, Peter Komisarczuk, Kyle Chard:
Efficient dynamic resource specifications. Mobile Data Management 2005: 281-285
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint