The paper presents some real‑time analytical solutions that work in a proprietary‑designed system for IT security. It describes automatic methods of data transformations and analysis aiming at detection of potential threats (irregular system events, abnormal user behavior) both for time series and text documents without human supervision. Automation procedures used for time series and text documents are presented. Analyzed data was collected by Free Construction while protecting systems of electronic documents repositories (also including the Enterprise Content Management standards).W pracy przedstawiono wybrane rozwiązania analityczne stosowane w czasie rzeczywistym w autorskim systemie bezpieczeństwa teleinformatycznego. Opisano metody wy...
W niniejszym artykule opisano praktyczne podejście do zagadnienia stanowiącego aktualnie nieodłączną...
Malware is a software designed to disrupt or even damage computer system or do other unwanted action...
Various vulnerabilities in software products can often represent a significant security threat if th...
The paper presents some real‑time analytical solutions that work in a proprietary‑designed system fo...
W artykule opisano zastosowanie metody modelowania zagrożeń dla potrzeb oceny poziomu bezpieczeństwa...
The article discusses the problem of threats connected with introduction of informatics to data pro...
This paper focuses on the processes of dealing with security breaches which are becoming one of the ...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Trends and lately we know that most of the attack happens by planting on the systems, application or...
With the development of information technology, the need to solve the problem of information securit...
This paper focuses on the processes of dealing with security breaches which are becomingone of the m...
This bachelor thesis deals with the description of methods for identification and preparation of inc...
The issues of building effective software systems for protection against internal intrusions based o...
Nowadays, with the rapid development of network technologies and with global informatization of soci...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
W niniejszym artykule opisano praktyczne podejście do zagadnienia stanowiącego aktualnie nieodłączną...
Malware is a software designed to disrupt or even damage computer system or do other unwanted action...
Various vulnerabilities in software products can often represent a significant security threat if th...
The paper presents some real‑time analytical solutions that work in a proprietary‑designed system fo...
W artykule opisano zastosowanie metody modelowania zagrożeń dla potrzeb oceny poziomu bezpieczeństwa...
The article discusses the problem of threats connected with introduction of informatics to data pro...
This paper focuses on the processes of dealing with security breaches which are becoming one of the ...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Trends and lately we know that most of the attack happens by planting on the systems, application or...
With the development of information technology, the need to solve the problem of information securit...
This paper focuses on the processes of dealing with security breaches which are becomingone of the m...
This bachelor thesis deals with the description of methods for identification and preparation of inc...
The issues of building effective software systems for protection against internal intrusions based o...
Nowadays, with the rapid development of network technologies and with global informatization of soci...
Cyber security incidents have affected organisations from various industries. Malicious actors aim t...
W niniejszym artykule opisano praktyczne podejście do zagadnienia stanowiącego aktualnie nieodłączną...
Malware is a software designed to disrupt or even damage computer system or do other unwanted action...
Various vulnerabilities in software products can often represent a significant security threat if th...