Security ontology for adaptive mapping of security standards S Ramanauskaitė, D Olifer, N Goranin, A Čenys International Journal of Computers, Communications & Control (IJCCC) 8 (6 …, 2013 | 36 | 2013 |
Composite DoS attack model/Jungtinis DoS atakų modelis S Ramanauskaitė, A Čenys Mokslas–Lietuvos ateitis/Science–Future of Lithuania 4 (1), 20-26, 2012 | 12 | 2012 |
High-level self-sustaining information security management framework L Kauspadiene, A Cenys, N Goranin, S Tjoa, S Ramanauskaite Baltic Journal of Modern Computing 5 (1), 107, 2017 | 9 | 2017 |
Taxonomy of DoS attacks and their countermeasures S Ramanauskaite, A Cenys Open Computer Science 1 (3), 355-366, 2011 | 9 | 2011 |
Information security management framework suitability estimation for small and medium enterprise L Kaušpadienė, S Ramanauskaitė, A Čenys Infinite Study, 2019 | 8 | 2019 |
Enterprise architecture modeling based on cloud computing security ontology as a reference model J Janulevičius, L Marozas, A Čenys, N Goranin, S Ramanauskaitė 2017 Open Conference of Electrical, Electronic and Information Sciences …, 2017 | 8 | 2017 |
Modeling of SYN flooding attacks S Ramanauskaité Jaunujų moks lininkdarbai 26 (1), 331-335, 2010 | 6 | 2010 |
Modelling influence of Botnet features on effectiveness of DDoS attacks S Ramanauskaitė, N Goranin, A Čenys, J Juknius Security and Communication Networks 8 (12), 2090-2101, 2015 | 5 | 2015 |
Credulity to Phishing Attacks: A Real-World Study of Personnel with Higher Education J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys 2019 Open conference of electrical, electronic and information sciences …, 2019 | 4 | 2019 |
Modeling of enterprise management structure for data leakage evaluation L Kauspadiene, S Ramanauskaite, A Cenys, J Janulevicius, J Rastenis Information Security Journal: A Global Perspective 27 (1), 1-13, 2018 | 4 | 2018 |
E-mail-Based Phishing Attack Taxonomy J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys, A Slotkienė, ... Applied Sciences 10 (7), 2363, 2020 | 3 | 2020 |
Image steganography based on color palette transformation in color space E Margalikas, S Ramanauskaitė EURASIP Journal on Image and Video Processing 2019 (1), 1-13, 2019 | 3 | 2019 |
Efficiency of RSA key factorization by open-source libraries and distributed system architecture EJ Vuicik, D Šešok, S Ramanauskaitė Baltic Journal of Modern Computing 5 (3), 269, 2017 | 3 | 2017 |
Visualization of mapped security standards for analysis and use optimisation S Ramanauskaitė, D Olifer, N Goranin, A Čenys, L Radvilavičius Int. J. Comput. Theor. Eng 6 (5), 372-376, 2014 | 3 | 2014 |
Web mining taxonomy K Griazev, S Ramanauskaitè 2018 Open Conference of Electrical, Electronic and Information Sciences …, 2018 | 2 | 2018 |
Modelling and research of distributed denial of service attacks S Ramanauskaitė Vilnius Gediminas Technical University, 2012 | 2 | 2012 |
DoS atakų modeliavimas stochastiniais metodais S Ramanauskaitė, A Čenys Jaunųjų mokslininkų darbai, 97-101, 2009 | 2 | 2009 |
Use of ontologies in mapping of information security requirements/Ontologijos naudojimas informacijos saugumo reikalavimams susiet S Ramanauskaitė, E Radvilė, D Olifer Mokslas–Lietuvos ateitis/Science–Future of Lithuania 5 (2), 88-91, 2013 | 1 | 2013 |
Paieškos sistemų optimizavimo metodų analizė D Veikutis, S Ramanauskaitė Jaunųjų mokslininkų darbai, 128-133, 2012 | 1 | 2012 |
Botnet agentų naudojimo DDoS atakose strategijų modeliavimas S Ramanauskaitė, J Juknius Jaunųjų mokslininkų darbai, 114-119, 2010 | 1 | 2010 |