Follow
Justinas Janulevicius
Justinas Janulevicius
Researcher of Information Security, Vilnius Gediminas Technical University
Verified email at vgtu.lt
Title
Cited by
Cited by
Year
E-mail-based phishing attack taxonomy
J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys, A Slotkienė, ...
Applied Sciences 10 (7), 2363, 2020
192020
Enterprise architecture modeling based on cloud computing security ontology as a reference model
J Janulevičius, L Marozas, A Čenys, N Goranin, S Ramanauskaitė
2017 Open Conference of Electrical, Electronic and Information Sciences …, 2017
122017
Multi-language spam/phishing classification by email body text: Toward automated security incident investigation
J Rastenis, S Ramanauskaitė, I Suzdalev, K Tunaitytė, J Janulevičius, ...
Electronics 10 (6), 668, 2021
82021
Credulity to Phishing Attacks: A Real-World Study of Personnel with Higher Education
J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys
2019 Open conference of electrical, electronic and information sciences …, 2019
52019
Defining the minimum security baseline in a multiple security standards environment by graph theory techniques
D Olifer, N Goranin, A Cenys, A Kaceniauskas, J Janulevicius
Applied Sciences 9 (4), 681, 2019
52019
Method for real time face recognition application in unmanned aerial vehicles
R Jurevičius, N Goranin, J Janulevičius, J Nugaras, I Suzdalev, ...
Aviation 23 (2), 65-70, 2019
42019
Improvement of security costs evaluation process by using data automatically captured from BPMN and EPC models
D Olifer, N Goranin, J Janulevicius, A Kaceniauskas, A Cenys
International Conference on Business Process Management, 698-709, 2017
42017
Modeling of enterprise management structure for data leakage evaluation
L Kauspadiene, S Ramanauskaite, A Cenys, J Janulevicius, J Rastenis
Information Security Journal: A Global Perspective 27 (1), 1-13, 2018
32018
Method of Information Security Risk Analysis for Virtualized System
J Janulevičius
VGTU leidykla „Technika “, 2016
32016
Assumptions to road pavement testing by non-destructive means
J Janulevičius, D Čygas, V Giniotis, A Aavik
The Baltic Journal of Road and Bridge Engineering 8 (4), 227-231, 2013
32013
Expert system for data security risk management for SMEs
J Janulevičius, N Goranin
Mokslas–Lietuvos ateitis/Science–Future of Lithuania 5 (2), 84-87, 2013
32013
The application of Hough transform and Canny edge detector methods for the visual detection of cumuliform clouds
A Lapušinskij, I Suzdalev, N Goranin, J Janulevičius, S Ramanauskaitė, ...
Sensors 21 (17), 5821, 2021
22021
Impact of Information Security Training on Recognition of Phishing Attacks: A Case Study of Vilnius Gediminas Technical University
J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys
International Baltic Conference on Databases and Information Systems, 311-324, 2020
22020
Modeling of two-tier DDoS by combining different type of DDoS models
S Ramanauskaitė, A Čenys, N Goranin, J Janulevicius
2017 Open Conference of Electrical, Electronic and Information Sciences …, 2017
22017
Development of a Risk Assessment Model for IT Risk Self-Assessment Expert System for SMEs
J Janulevicius
International Journal of Computer and Communication Engineering 3 (4), 306, 2014
22014
Detection and measurement of information system risks through adaptive management diagnostic expert systems
J Janulevičius, L Šiaudinytė, A Čenys, N Goranin
12th IMEKO TC10 Workshop on Technical Diagnostics. Italy, Florence, 45-49, 2013
22013
Elektroniniai duomenų mainai finansų įstaigose: standartų įvairovė
K Kiselytė, R Martinkutė-Kaulienė, J Janulevičius
22nd Conference for Young Researchers" Economics and Management", 2019
12019
ENTERPRISE ARCHITECTURE ANALYSIS FOR SECURITY ISSUE DIAGNOSTICS IN DISTRIBUTED SYSTEMS
J Janulevičius, L Šiaudinytė
12015
Mechatronic Elements for Measuring Systems
V Giniotis, M Rybokas, G Dmitrijev, D Sabaitis, L Šiaudinytė, ...
Solid State Phenomena 199, 332-337, 2013
12013
EXTENSION OF CYSEMOL FOR CLOUD COMPUTING INFORMATION SECURITY ASSESSMENT
J JANULEVIČIUS, A ČENYS, N Goranin
2016
The system can't perform the operation now. Try again later.
Articles 1–20