Nikolaj Goranin
Nikolaj Goranin
Vilnius Gediminas Technical University
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
A fuzzy WASPAS-based approach to determine critical information infrastructures of EU sustainable development
Z Turskis, N Goranin, A Nurusheva, S Boranbayev
Sustainability 11 (2), 424, 2019
Information security risk assessment in critical infrastructure: a hybrid MCDM approach
Z Turskis, N Goranin, A Nurusheva, S Boranbayev
Informatica 30 (1), 187-211, 2019
Security ontology for adaptive mapping of security standards
S Ramanauskaitė, D Olifer, N Goranin, A Čenys
International Journal of Computers, Communications & Control (IJCCC) 8 (6 …, 2013
Implementation of honeytoken module in dbms oracle 9ir2 enterprise edition for internal malicious activity detection
A Cenys, D Rainys, L Radvilavius, N Gotanin
IEEE Computer Society’s TC on Security and Privacy, 1-13, 2005
The methods and technologies of reliability and security of information systems and information and communication infrastructures
S Boranbayev, A Nurusheva, N Goranin
Journal of Theoretical and Applied Information Technology 96 (18), 6172-6188, 2018
High-level self-sustaining information security management framework
L Kauspadiene, A Cenys, N Goranin, S Tjoa, S Ramanauskaite
Baltic Journal of Modern Computing 5 (1), 107, 2017
Evolutionary Algorithms Application Analysis in Biometric Systems.
N Goranin, A Cenys
Journal of Engineering Science & Technology Review 3 (1), 2010
Controls-based approach for evaluation of information security standards implementation costs
D Olifer, N Goranin, A Kaceniauskas, A Cenys
Technological and Economic Development of Economy 23 (1), 196-219, 2017
Towards a robust method of dataset generation of malicious activity for anomaly-based HIDS training and presentation of AWSCTD dataset
D Čeponis, N Goranin
Baltic Journal of Modern Computing 6 (3), 217-234, 2018
Genetic algorithm based internet worm propagation strategy modeling
N Goranin, A Čenys
Information Technology and Control 37 (2), 2008
Investigation of dual-flow deep learning models LSTM-FCN and GRU-FCN efficiency against single-flow CNN models for the host-based intrusion and malware detection task on …
D Čeponis, N Goranin
Applied Sciences 10 (7), 2373, 2020
Enterprise architecture modeling based on cloud computing security ontology as a reference model
J Janulevičius, L Marozas, A Čenys, N Goranin, S Ramanauskaitė
2017 Open Conference of Electrical, Electronic and Information Sciences …, 2017
Modelling influence of Botnet features on effectiveness of DDoS attacks
S Ramanauskaitė, N Goranin, A Čenys, J Juknius
Security and Communication Networks 8 (12), 2090-2101, 2015
Genetic algorithm based Internet worm propagation strategy modeling under pressure of countermeasures.
N Goranin, A Cenys
Journal of Engineering Science & Technology Review 2 (1), 2009
Method for attack tree data transformation and import into it risk analysis expert systems
D Vitkus, J Salter, N Goranin, D Čeponis
Applied Sciences 10 (23), 8423, 2020
Automated expert system knowledge base development method for information security risk analysis
D Vitkus, Ž Steckevičius, N Goranin, D Kalibatienė, A Čenys
International Journal of Computers Communications & Control 14 (6), 743-758, 2020
Method for real time face recognition application in unmanned aerial vehicles
R Jurevičius, N Goranin, J Janulevičius, J Nugaras, I Suzdalev, ...
Aviation 23 (2), 65-70, 2019
Evaluation of deep learning methods efficiency for malicious and benign system calls classification on the AWSCTD
D Čeponis, N Goranin
Security and Communication Networks 2019, 2019
Malware propagation modeling by the means of genetic algorithms
N Goranin, A Čenys
Elektronika ir elektrotechnika 86 (6), 23-26, 2008
Genetic algorithm based palm recognition method for biometric authentication systems
A Cenys, D Gibavicius, N Goranin, L Marozas
Elektronika ir Elektrotechnika 19 (2), 69-74, 2013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20