Abstract is missing.
- Detection of Network Attacks Using Hybrid ARIMA-GARCH ModelTomasz Andrysiak, Lukasz Saganowski, Miroslaw Maszewski, Adam Marchewka. 1-12 [doi]
- Towards Mixed-Mode Risk Management - A ConceptAndrzej Bialas, Barbara Flisiuk. 13-25 [doi]
- Software Support of the Common Criteria Vulnerability AssessmentAndrzej Bialas. 26-38 [doi]
- On the Performance of Some C# ConstructionsIlona Bluemke, Piotr Gawkowski, Waldemar Grabski, Konrad Grochowski. 39-48 [doi]
- Deep Stacking Convex Neuro-Fuzzy System and Its On-line LearningYevgeniy Bodyanskiy, Olena Vynokurova, Iryna Pliss, Dmytro Peleshko, Yuriy Rashkevych. 49-59 [doi]
- Fault Tolerant ASIC/ULA-Based Computing Systems Testing via FPGA Prototyping with Fault InjectionOleg Brekhov, Alexander Klimenko. 60-66 [doi]
- Critical Energy Infrastructure Safety Assurance Strategies Considering Emergent Interaction RiskEugene Brezhnev, Vyacheslav Kharchenko, Viacheslav Manulik, Konstantin Leontiev. 67-78 [doi]
- Modelling an Optimal Capital Structure of the Telecommunication CompanyAlexandr Y. Bystryakov, Tatiana K. Blokhina, Elena V. Savenkova, Oksana A. Karpenko, Elena V. Ponomarenko. 79-88 [doi]
- Specification of Constraints in a System-of-Systems ConfigurationDariusz Caban, Tomasz Walkowiak. 89-96 [doi]
- A Methodological Framework for Model-Based Self-management of Services and Components in Dependable Cyber-Physical SystemsDe-Jiu Chen, Zhonghai Lu. 97-105 [doi]
- Maintenance of Wind Turbine Scheduling Based on Output Power Data and Wind ForecastGuglielmo D'Amico, Filippo Petroni, Robert Adam Sobolewski. 106-117 [doi]
- Deadlock Detection in Distributed Systems Using the IMDS Formalism and Petri NetsWiktor B. Daszczuk, Wlodek M. Zuberek. 118-130 [doi]
- Scheduling Tasks in Embedded Systems Based on NoC Architecture Using Simulated AnnealingDariusz Dorota. 131-140 [doi]
- Adaptation of Ant Colony Algorithm for CAD of Complex Systems with Higher Degree of DependabilityMieczyslaw Drabowski. 141-150 [doi]
- Context-Aware Anomaly Detection in Embedded SystemsFatemeh Ehsani-Besheli, Hamid R. Zarandi. 151-165 [doi]
- Comparative Analysis of Calculations in Cryptographic Protocols Using a Combination of Different Bases of Finite FieldsSergey B. Gashkov, Alexander Frolov. 166-177 [doi]
- Dynamic Redundancy in Communication Network of Air Traffic Management SystemIgor Kabashkin. 178-185 [doi]
- Availability Models and Maintenance Strategies for Smart Building Automation Systems Considering Attacks on Component VulnerabilitiesVyacheslav Kharchenko, Yuriy Ponochovnyi, Al-Sudani Mustafa Qahtan Abdulmunem, Anton Andrashov. 186-195 [doi]
- Concept of Multi-criteria Evaluation of the Airport Security Control ProcessArtur Kierzkowski, Tomasz Kisiel. 196-204 [doi]
- Extending Continuous Integration with Post-mortem Debug Automation of Unhandled Exceptions Occurred in Kernel or User Mode ApplicationsHenryk Krawczyk, Dawid Zima. 205-214 [doi]
- The Methodology of Studying of Active Traffic Management Module Self-oscillation RegimeDmitry S. Kulyabov, Anna V. Korolkova, Tatyana R. Velieva, Ekaterina G. Eferina, Leonid A. Sevastianov. 215-224 [doi]
- Effectiveness Examination of a Multi-channel CSMA/CA DetectorDariusz Laskowski, Marcin Pólkowski, Piotr Lubkowski, Leszek Nowosielski. 225-232 [doi]
- IaaS vs. Traditional Hosting for Web Applications - Cost Effectiveness Analysis for a Local MarketPawel Lorenc, Marek Woda. 233-243 [doi]
- High Quality Stabilization of an Inverted Pendulum Using the Controller Based on Trigonometric FunctionMichal Lower. 244-253 [doi]
- The Application of RFID Technology in Supporting the Process of Reliable Identification of Objects in Video Surveillance SystemsPiotr Lubkowski, Dariusz Laskowski, Marcin Pólkowski. 254-263 [doi]
- Aspect-Oriented Management of Service Requests for Assurance of High Performance and DependabilityPawel Lubomski, Pawel Pszczolinski, Henryk Krawczyk. 264-276 [doi]
- Process of Mobile Application Development from the Security PerspectiveAneta Majchrzycka, Aneta Poniszewska-Maranda. 277-286 [doi]
- Managing and Enhancing Performance BenchmarksJakub Maleszewski, Janusz Sosnowski. 287-297 [doi]
- Reliability Optimization for Controller Placement in Software-Defined NetworksJerzy Martyna. 298-307 [doi]
- Agent Approach to Network Systems Experimental Analysis in Case of Critical SituationsJacek Mazurkiewicz. 308-319 [doi]
- Reliability Assessment of Driving Systems of City BusesMarek Mlynczak, Murat Muzdybayev, Alfiya Muzdybayeva, Dinara Myrzabekova. 320-330 [doi]
- Testing the Significance of Parameters of Models Estimating Execution Time of Parallel Program Loops According to the Open MPI StandardLukasz Nozdrzykowski, Magdalena Nozdrzykowska. 331-339 [doi]
- On Application of Regime-Switching Models for Short-Term Traffic Flow ForecastingDmitry Pavlyuk. 340-349 [doi]
- Critical Information Infrastructure Protection Model and Methodology, Based on National and NATO StudyLachezar Petrov, Nikolai Stoianov, Todor Tagarev. 350-357 [doi]
- The Method of Creating Players in the Marketing StrategyHenryk Piech, Aleksandra Ptak, Michal Saczek. 358-367 [doi]
- Principles of Mobile Walking Robot Control in Scope of Technical Monitoring TasksOleksandr Radomskyi. 368-382 [doi]
- Computer Systems - Simple, Complicated or ComplexDominik Strzalka. 383-393 [doi]
- Improving FPGA Implementations of BLAKE and BLAKE2 Algorithms with Memory ResourcesJaroslaw Sugier. 394-406 [doi]
- Assurance Case Patterns On-line CatalogueMonika Szczygielska, Aleksander Jarzebowicz. 407-417 [doi]
- Information System as a Cause of Cargo Handling Process Disruption in Intermodal TerminalJustyna Swieboda, Mateusz Zajac. 418-427 [doi]
- Anticipation Scheduling in Grid Virtual OrganizationsVictor V. Toporkov, Dmitry Yemelyanov, Vadim Loginov, Petr Potekhin. 428-438 [doi]
- Stability Enhancement Against Fluctuations in Complex Networks by Optimal Bandwidth AllocationK. Y. Henry Tsang, K. Y. Michael Wong. 439-449 [doi]
- The Scope of the Collected Data for a Holistic Risk Assessment Performance in the Road Freight Transport CompaniesAgnieszka Tubis, Sylwia Werbinska-Wojciechowska. 450-463 [doi]
- Language Processing Modelling Notation - Orchestration of NLP MicroservicesTomasz Walkowiak. 464-473 [doi]
- Type Variety Principle and the Algorithm of Strategic Planning of Diversified Portfolio of Electricity Generation SourcesVolodymyr Zaslavskyi, Maya Pasichna. 474-485 [doi]