default search action
Tomasz Andrysiak
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j12]Krzysztof Palczynski, Damian Ledzinski, Tomasz Andrysiak:
Entropy Measurements for Leukocytes' Surrounding Informativeness Evaluation for Acute Lymphoblastic Leukemia Classification. Entropy 24(11): 1560 (2022) - 2020
- [j11]Lukasz Saganowski, Tomasz Andrysiak:
Time series forecasting with model selection applied to anomaly detection in network traffic. Log. J. IGPL 28(4): 531-545 (2020) - [j10]Tomasz Andrysiak, Lukasz Saganowski:
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis. J. Univers. Comput. Sci. 26(4): 508-527 (2020) - [j9]Tomasz Andrysiak:
Sparse representation and overcomplete dictionary learning for anomaly detection in electrocardiograms. Neural Comput. Appl. 32(5): 1269-1285 (2020) - 2019
- [j8]Jörg Keller, Manuel Graña, Rafal Kozik, Tomasz Andrysiak, Michal Choras:
Recent Advances, Emerging Methods and Applications of Pattern Recognition. J. Univers. Comput. Sci. 25(6): 569-570 (2019) - 2017
- [j7]Tomasz Andrysiak, Lukasz Saganowski, Piotr Kiedrowski:
Anomaly Detection in Smart Metering Infrastructure with the Use of Time Series Analysis. J. Sensors 2017: 8782131:1-8782131:15 (2017) - [j6]Tomasz Andrysiak, Lukasz Saganowski, Piotr Kiedrowski:
Predictive Abuse Detection for a PLC Smart Lighting Network Based on Automatically Created Models of Exponential Smoothing. Secur. Commun. Networks 2017: 7892182:1-7892182:19 (2017) - 2016
- [j5]Tomasz Andrysiak:
Machine Learning Techniques Applied to Data Analysis and Anomaly Detection in ECG Signals. Appl. Artif. Intell. 30(6): 610-634 (2016) - [j4]Tomasz Andrysiak, Lukasz Saganowski, Wojciech Mazurczyk:
Network anomaly detection for railway critical infrastructure based on autoregressive fractional integrated moving average. EURASIP J. Wirel. Commun. Netw. 2016: 245 (2016) - [j3]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:
Proposal and comparison of network anomaly detection based on long-memory statistical models. Log. J. IGPL 24(6): 944-956 (2016) - [j2]Lukasz Saganowski, Tomasz Andrysiak, Rafal Kozik, Michal Choras:
DWT-based anomaly detection method for cyber security of wireless sensor networks. Secur. Commun. Networks 9(15): 2911-2922 (2016) - 2007
- [j1]Ryszard S. Choras, Tomasz Andrysiak, Michal Choras:
Integrated color, texture and shape information for content-based image retrieval. Pattern Anal. Appl. 10(4): 333-343 (2007)
Conference and Workshop Papers
- 2023
- [c21]Lukasz Saganowski, Tomasz Andrysiak:
Prediction of Water Usage for Advanced Metering Infrastructure Network with Intelligent Water Meters. CISIS-ICEUTE 2023: 122-131 - 2022
- [c20]Krzysztof Palczynski, Tomasz Andrysiak, Marcin Glowacki, Michal Kierul, Tomasz Kierul:
Analysis of Long-Range Forecast Strategies for IoT on Urban Water Consumption Prediction Task. CISIS-ICEUTE 2022: 3-11 - [c19]Lukasz Saganowski, Tomasz Andrysiak:
Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detection. CISIS-ICEUTE 2022: 30-39 - 2020
- [c18]Tomasz Andrysiak, Lukasz Saganowski:
Neural Network Analysis of PLC Traffic in Smart City Street Lighting Network. CISIS 2020: 436-445 - [c17]Tomasz Andrysiak, Lukasz Saganowski:
Maintenance and Security System for PLC Railway LED Sign Communication Infrastructure. ICCS (4) 2020: 170-183 - 2019
- [c16]Tomasz Andrysiak, Lukasz Saganowski:
A Comparative Study of Statistical and Neural Network Models for PLC Network Traffic Anomaly Detection. DepCoS-RELCOMEX 2019: 10-20 - 2018
- [c15]Tomasz Andrysiak, Lukasz Saganowski:
Dynamic Time Warping Analysis for Security Purposes in Wireless Sensor Networks. DepCoS-RELCOMEX 2018: 1-12 - 2017
- [c14]Tomasz Andrysiak, Lukasz Saganowski, Miroslaw Maszewski, Adam Marchewka:
Detection of Network Attacks Using Hybrid ARIMA-GARCH Model. DepCoS-RELCOMEX 2017: 1-12 - [c13]Tomasz Andrysiak:
Sparse Representation Based Anomalies Detection in Electrocardiography Signals. SOCO-CISIS-ICEUTE 2017: 428-438 - [c12]Tomasz Andrysiak, Lukasz Saganowski, Miroslaw Maszewski:
Time Series Forecasting Using Holt-Winters Model Applied to Anomaly Detection in Network Traffic. SOCO-CISIS-ICEUTE 2017: 567-576 - 2015
- [c11]Tomasz Andrysiak, Lukasz Saganowski:
DDoS Attacks Detection by Means of Statistical Models. CORES 2015: 797-806 - [c10]Tomasz Andrysiak, Lukasz Saganowski:
Network Anomaly Detection Based on Statistical Models with Long-Memory Dependence. DepCoS-RELCOMEX 2015: 1-10 - [c9]Tomasz Andrysiak, Lukasz Saganowski, Adam Marchewka:
A Comparative Study of Statistical Models with Long and Short-Memory Dependence for Network Anomaly Detection. IP&C 2015: 255-265 - 2014
- [c8]Tomasz Andrysiak, Lukasz Saganowski:
Network Anomaly Detection Based on ARFIMA Model. IP&C 2014: 255-261 - [c7]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:
Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model. SOCO-CISIS-ICEUTE 2014: 545-554 - 2012
- [c6]Lukasz Saganowski, Marcin Goncerzewicz, Tomasz Andrysiak:
Anomaly Detection Preprocessor for SNORT IDS System. IP&C 2012: 225-232 - [c5]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras:
DDoS Attacks Detection by Means of Greedy Algorithms. IP&C 2012: 303-310 - [c4]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras:
Greedy Algorithms for Network Anomaly Detection. CISIS/ICEUTE/SOCO Special Sessions 2012: 235-244 - 2006
- [c3]Michal Choras, Tomasz Andrysiak:
Symmetry-Based Salient Points Detection in Face Images. ICAISC 2006: 758-767 - [c2]Tomasz Andrysiak, Michal Choras:
Stereo disparity estimation using discrete orthogonal moments. ICINCO-RA 2006: 504-507 - 2005
- [c1]Ryszard S. Choras, Tomasz Andrysiak, Michal Choras:
Content Based Image Retrieval Technique. CORES 2005: 371-378
Parts in Books or Collections
- 2006
- [p1]Tomasz Andrysiak, Michal Choras:
Image Filtration and Feature Extraction for Face Recognition. Biometrics, Computer Security Systems and Artificial Intelligence Applications 2006: 3-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint