default search action
Lukasz Saganowski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c18]Lukasz Saganowski, Tomasz Andrysiak:
Prediction of Water Usage for Advanced Metering Infrastructure Network with Intelligent Water Meters. CISIS-ICEUTE 2023: 122-131 - 2022
- [c17]Lukasz Saganowski, Tomasz Andrysiak:
Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detection. CISIS-ICEUTE 2022: 30-39 - 2020
- [j8]Lukasz Saganowski, Tomasz Andrysiak:
Time series forecasting with model selection applied to anomaly detection in network traffic. Log. J. IGPL 28(4): 531-545 (2020) - [j7]Tomasz Andrysiak, Lukasz Saganowski:
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis. J. Univers. Comput. Sci. 26(4): 508-527 (2020) - [c16]Tomasz Andrysiak, Lukasz Saganowski:
Neural Network Analysis of PLC Traffic in Smart City Street Lighting Network. CISIS 2020: 436-445 - [c15]Tomasz Andrysiak, Lukasz Saganowski:
Maintenance and Security System for PLC Railway LED Sign Communication Infrastructure. ICCS (4) 2020: 170-183
2010 – 2019
- 2019
- [c14]Tomasz Andrysiak, Lukasz Saganowski:
A Comparative Study of Statistical and Neural Network Models for PLC Network Traffic Anomaly Detection. DepCoS-RELCOMEX 2019: 10-20 - 2018
- [c13]Tomasz Andrysiak, Lukasz Saganowski:
Dynamic Time Warping Analysis for Security Purposes in Wireless Sensor Networks. DepCoS-RELCOMEX 2018: 1-12 - 2017
- [j6]Tomasz Andrysiak, Lukasz Saganowski, Piotr Kiedrowski:
Anomaly Detection in Smart Metering Infrastructure with the Use of Time Series Analysis. J. Sensors 2017: 8782131:1-8782131:15 (2017) - [j5]Tomasz Andrysiak, Lukasz Saganowski, Piotr Kiedrowski:
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing. Secur. Commun. Networks 2017: 7892182:1-7892182:19 (2017) - [c12]Tomasz Andrysiak, Lukasz Saganowski, Miroslaw Maszewski, Adam Marchewka:
Detection of Network Attacks Using Hybrid ARIMA-GARCH Model. DepCoS-RELCOMEX 2017: 1-12 - [c11]Tomasz Andrysiak, Lukasz Saganowski, Miroslaw Maszewski:
Time Series Forecasting Using Holt-Winters Model Applied to Anomaly Detection in Network Traffic. SOCO-CISIS-ICEUTE 2017: 567-576 - 2016
- [j4]Tomasz Andrysiak, Lukasz Saganowski, Wojciech Mazurczyk:
Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average. EURASIP J. Wirel. Commun. Netw. 2016: 245 (2016) - [j3]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:
Proposal and comparison of network anomaly detection based on long-memory statistical models. Log. J. IGPL 24(6): 944-956 (2016) - [j2]Lukasz Saganowski, Tomasz Andrysiak, Rafal Kozik, Michal Choras:
DWT-based anomaly detection method for cyber security of wireless sensor networks. Secur. Commun. Networks 9(15): 2911-2922 (2016) - 2015
- [c10]Tomasz Andrysiak, Lukasz Saganowski:
DDoS Attacks Detection by Means of Statistical Models. CORES 2015: 797-806 - [c9]Tomasz Andrysiak, Lukasz Saganowski:
Network Anomaly Detection Based on Statistical Models with Long-Memory Dependence. DepCoS-RELCOMEX 2015: 1-10 - [c8]Tomasz Andrysiak, Lukasz Saganowski, Adam Marchewka:
A Comparative Study of Statistical Models with Long and Short-Memory Dependence for Network Anomaly Detection. IP&C 2015: 255-265 - 2014
- [c7]Tomasz Andrysiak, Lukasz Saganowski:
Network Anomaly Detection Based on ARFIMA Model. IP&C 2014: 255-261 - [c6]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:
Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model. SOCO-CISIS-ICEUTE 2014: 545-554 - 2012
- [j1]Michal Choras, Lukasz Saganowski, Rafal Renk, Witold Holubowicz:
Statistical and signal-based network traffic recognition for anomaly detection. Expert Syst. J. Knowl. Eng. 29(3): 232-245 (2012) - [c5]Lukasz Saganowski, Marcin Goncerzewicz, Tomasz Andrysiak:
Anomaly Detection Preprocessor for SNORT IDS System. IP&C 2012: 225-232 - [c4]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras:
DDoS Attacks Detection by Means of Greedy Algorithms. IP&C 2012: 303-310 - [c3]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras:
Greedy Algorithms for Network Anomaly Detection. CISIS/ICEUTE/SOCO Special Sessions 2012: 235-244 - 2010
- [c2]Rafal Renk, Lukasz Saganowski, Michal Choras, Witold Holubowicz:
Performance Evaluation of ADS System Based on Redundant Dictionary. IP&C 2010: 477-484
2000 – 2009
- 2009
- [c1]Lukasz Saganowski, Michal Choras, Rafal Renk, Witold Holubowicz:
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems. ICANNGA 2009: 527-536 - [p1]Michal Choras, Lukasz Saganowski, Rafal Renk, Rafal Kozik, Witold Holubowicz:
Recognizing Anomalies/Intrusions in Heterogeneous Networks. Computer Recognition Systems 3 2009: 577-584
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint