Peter Komisarczuk
Peter Komisarczuk
Royal Holloway, University of London, Information Security Group (ISG)
Verified email at rhul.ac.uk
Title
Cited by
Cited by
Year
Identification of malicious web pages with static heuristics
C Seifert, I Welch, P Komisarczuk
2008 Australasian Telecommunication Networks and Applications Conference, 91-96, 2008
1512008
Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues
KLA Yau, P Komisarczuk, PD Teal
Journal of Network and Computer Applications 35 (1), 253-267, 2012
1112012
Honeyc-the low-interaction client honeypot
C Seifert, I Welch, P Komisarczuk
Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand 6, 2007
1092007
Cognitive radio-based wireless sensor networks: Conceptual design and open issues
KLA Yau, P Komisarczuk, PD Teal
2009 IEEE 34th Conference on Local Computer Networks, 955-962, 2009
822009
A context-aware and intelligent dynamic channel selection scheme for cognitive radio networks
KLA Yau, P Komisarczuk, PD Teal
2009 4th International Conference on Cognitive Radio Oriented Wireless …, 2009
672009
Capture–A behavioral analysis tool for applications and documents
C Seifert, R Steenson, I Welch, P Komisarczuk, B Endicott-Popovsky
digital investigation 4, 23-30, 2007
612007
On multi-channel MAC protocols in cognitive radio networks
AKL Yau, P Komisarczuk, PD Teal
2008 Australasian Telecommunication Networks and Applications Conference …, 2008
442008
Taxonomy of honeypots
C Seifert, I Welch, P Komisarczuk
442006
Applications of reinforcement learning to cognitive radio networks
KLA Yau, P Komisarczuk, PD Teal
2010 IEEE International Conference on Communications Workshops, 1-6, 2010
432010
Identification of malicious web pages through analysis of underlying dns and web server relationships
C Seifert, I Welch, P Komisarczuk, CU Aval, B Endicott-Popovsky
2008 33rd IEEE Conference on Local Computer Networks (LCN), 935-941, 2008
432008
Anatomy of drive-by download attack
VL Le, I Welch, X Gao, P Komisarczuk
Proceedings of the Eleventh Australasian Information Security Conference …, 2013
372013
An extensible, self contained, layered approach to context acquisition
D Kramer, A Kocurova, S Oussena, T Clark, P Komisarczuk
Proceedings of the Third International Workshop on Middleware for Pervasive …, 2011
372011
Enhancing network performance in distributed cognitive radio networks using single-agent and multi-agent reinforcement learning
KLA Yau, P Komisarczuk, DT Paul
IEEE Local Computer Network Conference, 152-159, 2010
372010
A survey on reinforcement learning models and algorithms for traffic signal control
KLA Yau, J Qadir, HL Khoo, MH Ling, P Komisarczuk
ACM Computing Surveys (CSUR) 50 (3), 1-38, 2017
332017
On initializations for the minkowski weighted k-means
RC De Amorim, P Komisarczuk
International Symposium on Intelligent Data Analysis, 45-55, 2012
312012
High occupancy resource allocation for grid and cloud systems, a study with drive
K Chard, K Bubendorfer, P Komisarczuk
Proceedings of the 19th ACM International Symposium on High Performance …, 2010
312010
Context-awareness and intelligence in distributed cognitive radio networks: A reinforcement learning approach
KLA Yau, P Komisarczuk, PD Teal
2010 Australian Communications Theory Workshop (AusCTW), 35-42, 2010
232010
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots
C Seifert, I Welch, P Komisarczuk
Proceedings of the 2008 ACM symposium on Applied computing, 1426-1432, 2008
222008
True positive cost curve: A cost-based evaluation method for high-interaction client honeypots
C Seifert, P Komisarczuk, I Welch
2009 Third International Conference on Emerging Security Information …, 2009
192009
Two-stage classification model to detect malicious web pages
I Welch, X Gao, P Komisarczuk
2011 IEEE International Conference on Advanced Information Networking and …, 2011
182011
The system can't perform the operation now. Try again later.
Articles 1–20