default search action
Peter Komisarczuk
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c41]Simon Bell, Peter Komisarczuk:
Measuring the Effectiveness of Twitter's URL Shortener (t.co) at Protecting Users from Phishing and Malware Attacks. ACSW 2020: 2:1-2:11 - [c40]Simon Bell, Peter Komisarczuk:
An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank. ACSW 2020: 3:1-3:11
2010 – 2019
- 2017
- [j4]Kok-Lim Alvin Yau, Junaid Qadir, Hooi Ling Khoo, Mee Hong Ling, Peter Komisarczuk:
A Survey on Reinforcement Learning Models and Algorithms for Traffic Signal Control. ACM Comput. Surv. 50(3): 34:1-34:38 (2017) - 2014
- [c39]Samia Oussena, Joe Essien, Peter Komisarczuk:
Formalization of Validation Extension Metamodel for Enterprise Architecture Frameworks. ICEIS (3) 2014: 427-434 - [c38]Mohammad Puttaroo, Peter Komisarczuk, Renato Cordeiro de Amorim:
Challenges in developing Capture-HPC exclusion lists. SIN 2014: 334 - [p1]Renato Cordeiro de Amorim, Peter Komisarczuk:
Partitional Clustering of Malware Using K-Means. Cyberpatterns 2014: 223-233 - 2013
- [j3]Kok-Lim Alvin Yau, Geong Sen Poh, Peter Komisarczuk:
Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective. Int. J. Ad Hoc Ubiquitous Comput. 12(3): 157-176 (2013) - [c37]Shadi Esnaashari, Ian Welch, Peter Komisarczuk:
Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks. AINA Workshops 2013: 725-729 - [c36]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Anatomy of Drive-by Download Attack. AISC 2013: 49-58 - [c35]Dean Kramer, Samia Oussena, Peter Komisarczuk, Tony Clark:
Using document-oriented GUIs in dynamic software product lines. GPCE 2013: 85-94 - [c34]Hyeonsook Kim, Samia Oussena, Peter Komisarczuk:
Complex Event as an Core Aspect of Enterprise Architecture - EDEMF: Event Driven Enterprise Architecture Modeling Framework. ICEIS (3) 2013: 292-301 - [c33]Dean Kramer, Samia Oussena, Peter Komisarczuk, Tony Clark:
Graphical user interfaces in dynamic software product lines. PLEASE@ICSE 2013: 25-28 - [c32]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand. LCN 2013: 300-303 - 2012
- [j2]Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues. J. Netw. Comput. Appl. 35(1): 253-267 (2012) - [c31]Renato Cordeiro de Amorim, Peter Komisarczuk:
On Initializations for the Minkowski Weighted K-Means. IDA 2012: 45-55 - [c30]Jiva N. Bagale, John P. T. Moore, Antonio D. Kheirkhahzadeh, Peter Komisarczuk:
Comparison of Messaging Protocols for Emerging Wireless Networks. NTMS 2012: 1-5 - [c29]John P. T. Moore, Jiva N. Bagale, Antonio D. Kheirkhahzadeh, Peter Komisarczuk:
Fingerprinting Seismic Activity across an Internet of Things. NTMS 2012: 1-6 - [c28]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
A Novel Scoring Model to Detect Potential Malicious Web Pages. TrustCom 2012: 254-263 - 2011
- [c27]Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Performance Analysis of Reinforcement Learning for Achieving Context Awareness and Intelligence in Mobile Cognitive Radio Networks. AINA 2011: 1-8 - [c26]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Two-Stage Classification Model to Detect Malicious Web Pages. AINA 2011: 113-120 - [c25]Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach. AINA Workshops 2011: 210-215 - [c24]Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk:
Identification of Potential Malicious Web Pages. AISC 2011: 33-40 - [c23]Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Learning mechanisms for achieving context awareness and intelligence in Cognitive Radio networks. LCN 2011: 738-745 - [c22]Dean Kramer, Anna Kocúrová, Samia Oussena, Tony Clark, Peter Komisarczuk:
An extensible, self contained, layered approach to context acquisition. M-MPAC@Middleware 2011: 6 - [c21]Anna Kocúrová, Samia Oussena, Peter Komisarczuk, Tony Clark, Dean Kramer:
Towards Distributed Collaborative Workflow Management for Mobile Devices. SIMPDA 2011: 1-20 - 2010
- [c20]Yu Ren, Pawel A. Dmochowski, Peter Komisarczuk:
Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform. CrownCom 2010: 1-6 - [c19]Kyle Chard, Kris Bubendorfer, Peter Komisarczuk:
High occupancy resource allocation for grid and cloud systems, a study with DRIVE. HPDC 2010: 73-84 - [c18]Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Achieving Efficient and Optimal Joint Action in Distributed Cognitive Radio Networks Using Payoff Propagation. ICC 2010: 1-6 - [c17]Peter Komisarczuk, Ian Welch:
Internet Sensor Grid: Experiences with Passive and Active Instruments. WCITD/NF 2010: 132-145 - [c16]Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning. LCN 2010: 152-159
2000 – 2009
- 2009
- [c15]Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch:
Measurement Study on Malicious Web Servers in the .nz Domain. ACISP 2009: 8-25 - [c14]David Stirling, Ian Welch, Peter Komisarczuk, Christian Seifert:
Automating Malware Scanning Using Workflows. CCGRID 2009: 562-567 - [c13]Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks. CrownCom 2009: 1-6 - [c12]Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Cognitive Radio-based Wireless Sensor Networks: Conceptual design and open issues. LCN 2009: 955-962 - [c11]Kok-Lim Alvin Yau, Peter Komisarczuk, Paul D. Teal:
Performance analysis of Reinforcement Learning for achieving context-awareness and intelligence in Cognitive Radio networks. LCN 2009: 1046-1053 - [c10]Christian Seifert, Peter Komisarczuk, Ian Welch:
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. SECURWARE 2009: 63-69 - 2008
- [c9]David Stirling, Ian Welch, Peter Komisarczuk:
Designing Workflows for Grid Enabled Internet Instruments. CCGRID 2008: 218-225 - [c8]Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch:
Identifying and Analyzing Web Server Attacks. IFIP Int. Conf. Digital Forensics 2008: 151-161 - [c7]Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky:
Identification of malicious web pages through analysis of underlying DNS and web server relationships. LCN 2008: 935-941 - [c6]Christian Seifert, Ian Welch, Peter Komisarczuk:
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots. SAC 2008: 1426-1432 - 2007
- [j1]Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Barbara Endicott-Popovsky:
Capture - A behavioral analysis tool for applications and documents. Digit. Investig. 4(Supplement): 23-30 (2007) - [c5]Peter Komisarczuk, Christian Seifert, Dean Pemberton:
Grid Enabled Internet Instruments. GLOBECOM 2007: 1906-1911 - 2005
- [c4]Kris Bubendorfer, Peter Komisarczuk:
A Position Paper: Towards an Utility Computing and Communications Infrastructure. Communications in Computing 2005: 47-53 - [c3]Kyle Chard, Peter Komisarczuk, Kris Bubendorfer, Ankur Desai:
Fine Grained Resource Reservation and Management in Grid Economics. GCA 2005: 31-38 - [c2]Kris Bubendorfer, Peter Komisarczuk, Kyle Chard:
Efficient dynamic resource specifications. Mobile Data Management 2005: 281-285 - [c1]Jonathan Wierenga, Peter Komisarczuk:
SIMPLE: developing a LBS positioning solution. MUM 2005: 48-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint