Search Results - "Baláž, Anton"
-
1
A non‐intrusive Smart metering system: Analytics and simulation of power consumption
Published in Concurrency and computation (10-07-2020)“…Summary This contribution deals with the design and experimental implementation of a Smart Metering Architecture which supports different transport…”
Get full text
Journal Article -
2
Android Access Control Extension
Published in Acta Informatica Pragensia (31-12-2015)“…The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel…”
Get full text
Journal Article -
3
Intrusion Detection Architecture Utilizing Graphics Processors
Published in Acta Informatica Pragensia (29-12-2012)“…With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been…”
Get full text
Journal Article -
4
Data Acquisition in Non-Invasive Brain-Computer Interface Using Emotiv Epoc Neuroheadset
Published in Acta electrotechnica et informatica (01-06-2012)“…This paper deals with the issue of the brain-computer interface (BCI) - the human-machine interface (HMI) based on acquisition, analysis and transformation of…”
Get full text
Journal Article -
5
Artificial neural network based IDS
Published in 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI) (01-01-2017)“…The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural…”
Get full text
Conference Proceeding -
6
Algorithm Design for User Experience Enhancement of Volume Dataset Reading from Storage Using 3D Binary Image as the Metadata
Published in 2019 IEEE 17th World Symposium on Applied Machine Intelligence and Informatics (SAMI) (01-01-2019)“…The paper deals with the problematics of volume datasets that can be considered as the three dimensional regular grids of scalar values or regular grids of…”
Get full text
Conference Proceeding -
7
MongoDB scheme analysis
Published in 2017 IEEE 21st International Conference on Intelligent Engineering Systems (INES) (01-10-2017)“…The aim of this work is to create a web administration interface for the MongoDB database to analyze the stored data. The application design was based on the…”
Get full text
Conference Proceeding -
8
Peer to Peer System Deployment
Published in Acta electrotechnica et informatica (01-03-2016)Get full text
Journal Article -
9
Data flow graph mapping techniques of computer architecture with data driven computation model
Published in 2011 IEEE 9th International Symposium on Applied Machine Intelligence and Informatics (SAMI) (01-01-2011)“…Article introduces architecture of computer with data driven computation model based on principles of tile computing which is modern approach to multi-core…”
Get full text
Conference Proceeding -
10
Intrusion detection system based on partially ordered events and patterns
Published in 2009 International Conference on Intelligent Engineering Systems (01-04-2009)“…The purpose of this paper is to present intrusion detection systems (IDS) and proposed architecture of the IDS based on partially ordered events and patterns…”
Get full text
Conference Proceeding -
11
Priority of instructions execution and DFG mapping techniques of computer architecture with data driven computation model
Published in 2011 IEEE 9th International Symposium on Intelligent Systems and Informatics (01-09-2011)“…The article introduces proposed computer architecture with data driven computation model based on principles of tile computing as the modern approach to…”
Get full text
Conference Proceeding -
12
Security sandbox based on RBAC model
Published in 2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI) (01-05-2016)“…The article presents a security solution of mapping RBAC model in to Linux kernel systems. RBAC management model represents an effective concept of mapping…”
Get full text
Conference Proceeding -
13
Web Search Engine
Published in Acta electrotechnica et informatica (01-01-2011)“…Searching an information is essential part of the Internet today. There are many algorithms and methods for effective web search engines, where the results are…”
Get full text
Journal Article -
14
The CASE tool for programming of the multi-core System-on-a-Chip with the data flow computation control
Published in 2017 IEEE 15th International Symposium on Applied Machine Intelligence and Informatics (SAMI) (01-01-2017)“…The paper describes Computer Aided Software Engineering (CASE) tool, that supports programming of the experimental multi-core tile based System-on-a-Chip…”
Get full text
Conference Proceeding -
15
Extending Minecraft for Teaching Bitcoin Cryptocurrency
Published in 2023 IEEE 21st World Symposium on Applied Machine Intelligence and Informatics (SAMI) (19-01-2023)“…This paper describes the author's additions to Minecraft and Bitcoin. The topic of the paper is an implementation of modification into the popular game…”
Get full text
Conference Proceeding -
16
ICT Security through Games
Published in 2024 IEEE 22nd World Symposium on Applied Machine Intelligence and Informatics (SAMI) (25-01-2024)“…With the increasing number of connected devices today, there is a growing reliance on digital technologies. This trend brings along an increased incidence of…”
Get full text
Conference Proceeding -
17
P-double operators in the pipeline system of DF-KPI architecture
Published in 2012 IEEE 16th International Conference on Intelligent Engineering Systems (INES) (01-06-2012)“…The data flow technique is a multiprocessor technique which enables parallelism to be found without being explicitly declared. One of the most important steps…”
Get full text
Conference Proceeding -
18
Information Hiding Using Domain-Specific Hierarchical Data Structure Symmetry-aware Sparse Voxel Directed Acyclic Graphs
Published in 2022 IEEE 20th Jubilee World Symposium on Applied Machine Intelligence and Informatics (SAMI) (02-03-2022)“…Steganography is considered to be the science and the art of hidden communication through an open communication channel or hiding information using innocent…”
Get full text
Conference Proceeding -
19
Possibilities of methods for IDS testing
Published in 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA) (01-11-2019)“…The aim of this paper is to present what devices IDS and IPS are and ways of possibilities of testing these devices. In the individual chapters we present the…”
Get full text
Conference Proceeding -
20
Classification of Security for System Vulnerabilities
Published in 2019 IEEE 17th International Symposium on Intelligent Systems and Informatics (SISY) (01-09-2019)“…The result of this publication is a presentation of a risk assessment and monitoring tool in computer systems at the network infrastructure, operating systems…”
Get full text
Conference Proceeding