Adam Kozakiewicz

Learn More
— Bioinformatics is a large group of methods used in biology, mostly for analysis of gene sequences. The algorithms developed for this task have recently found a new application in network threat detection. This paper is an introduction to this area of research, presenting a survey of bioinformatics methods applied to this task, outlining the individual(More)
The paper discusses how digital rights management (DRM) approach can be adapted to work in local or offline mode, without access to global central servers. The focus of this adaptation is not on protection of copyright in a commercial content setting but on restricting access to non-public documents to legitimate users. Therefore we work under assumption(More)
The article proposes a two-layered system for distributed computation. The setup combines two different tools - Globus and Mosix - in order to harness the computing power wasted in unused student laboratories. The system is easy to set up and use. We present the results of experiments on a simple testbed, using the Google PageRank algorithm as an example(More)
The article is devoted to security aspects of Wireless Sensor Networks. Starting with review and classification of existing threats and methods of improving security, the paper presents an idea of securing WSNs using honeypots for verification of its proper functioning. Several implementation possibilities are presented, as well as identification of the(More)
Trust management is an approach to access control in distributed open systems, where access control decisions are based on policy statements made by multiple principals. The family of Role-based Trust management languages (RT) is an effective means for representing security policies and credentials in decentralized, distributed, large scale access control(More)
The paper presents research results on similarities in structure of malicious domain names. The purpose of research was to verify the argument: Among malicious domain names the similarities in structure are significantly different from the similarities in structure among benign domain names.nie na sygnaturach, co skutkuje wykrywaniem tylko znanych wcześniej(More)
In this paper, we investigate the problem of detecting correlations among datasets containing malicious data concerned with various types of network attacks and related events of the infections taken from a numerous sources and organizations. We propose a graph based technique to depict relationships between malicious data based on values of attributes(More)
CZASOWA WAŻNOŚĆ POŚWIADCZEŃ JĘZYKA RT T + Streszczenie. Język RT T należy do języków zarządzania zaufaniem z rodziny ję-zyków role-based trust management, który jest używany do reprezentowania polityk bezpieczeństwa oraz poświadczeń w rozproszonym upoważnianiu. Łączy on zalety kontroli dostępu, opartej na roli i systemów zarządzania zaufaniem. W artykule(More)