E-mail-based phishing attack taxonomy J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys, A Slotkienė, ... Applied sciences 10 (7), 2363, 2020 | 42 | 2020 |
Multi-language spam/phishing classification by email body text: Toward automated security incident investigation J Rastenis, S Ramanauskaitė, I Suzdalev, K Tunaitytė, J Janulevičius, ... Electronics 10 (6), 668, 2021 | 29 | 2021 |
Method for real time face recognition application in unmanned aerial vehicles R Jurevičius, N Goranin, J Janulevičius, J Nugaras, I Suzdalev, ... Aviation 23 (2), 65-70, 2019 | 15 | 2019 |
Enterprise architecture modeling based on cloud computing security ontology as a reference model J Janulevičius, L Marozas, A Čenys, N Goranin, S Ramanauskaitė 2017 open conference of electrical, electronic and information sciences …, 2017 | 15 | 2017 |
The application of Hough transform and Canny edge detector methods for the visual detection of cumuliform clouds A Lapušinskij, I Suzdalev, N Goranin, J Janulevičius, S Ramanauskaitė, ... Sensors 21 (17), 5821, 2021 | 14 | 2021 |
Credulity to phishing attacks: A real-world study of personnel with higher education J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys 2019 Open conference of electrical, electronic and information sciences …, 2019 | 9 | 2019 |
Defining the minimum security baseline in a multiple security standards environment by graph theory techniques D Olifer, N Goranin, A Cenys, A Kaceniauskas, J Janulevicius Applied Sciences 9 (4), 681, 2019 | 7 | 2019 |
Modeling of two-tier DDoS by combining different type of DDoS models S Ramanauskaitė, A Čenys, N Goranin, J Janulevicius 2017 Open Conference of Electrical, Electronic and Information Sciences …, 2017 | 7 | 2017 |
Expert system for data security risk management for SMEs J Janulevičius, N Goranin Mokslas–Lietuvos ateitis/Science–Future of Lithuania 5 (2), 84-87, 2013 | 6 | 2013 |
Modeling of enterprise management structure for data leakage evaluation L Kauspadiene, S Ramanauskaite, A Cenys, J Janulevicius, J Rastenis Information Security Journal: A Global Perspective 27 (1), 1-13, 2018 | 4 | 2018 |
Impact of information security training on recognition of phishing attacks: A case study of Vilnius Gediminas technical university J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys Databases and Information Systems: 14th International Baltic Conference, DB …, 2020 | 3 | 2020 |
Improvement of security costs evaluation process by using data automatically captured from BPMN and EPC models D Olifer, N Goranin, J Janulevicius, A Kaceniauskas, A Cenys Business Process Management Workshops: BPM 2017 International Workshops …, 2018 | 3 | 2018 |
Method of Information Security Risk Analysis for Virtualized System J Janulevičius Technika, 2016 | 3 | 2016 |
Assumptions to road pavement testing by non-destructive means J Janulevičius, D Čygas, V Giniotis, A Aavik The Baltic Journal of Road and Bridge Engineering 8 (4), 227-231, 2013 | 3 | 2013 |
Detection and measurement of information system risks through adaptive management diagnostic expert systems J Janulevičius, L Šiaudinytė, A Čenys, N Goranin 12th IMEKO TC10 Workshop on Technical Diagnostics. Italy, Florence, 45-49, 2013 | 2 | 2013 |
Elektroniniai duomenų mainai finansų įstaigose: standartų įvairovė K Kiselytė, R Martinkutė-Kaulienė, J Janulevičius VGTU leidykla Technika, 2019 | 1 | 2019 |
Enterprise architecture analysis for security issue diagnostics in distributed systems J Janulevičius, L Šiaudinytė Czech TU in Prague, 2015 | 1 | 2015 |
Development of a risk assessment model for IT risk self-assessment expert system for SMEs J Janulevicius International Journal of Computer and Communication Engineering 3 (4), 306, 2014 | 1 | 2014 |
Mechatronic elements for measuring systems V Giniotis, M Rybokas, G Dmitrijev, D Sabaitis, L Šiaudinytė, ... Solid State Phenomena 199, 332-337, 2013 | 1 | 2013 |
A deep-learning-based approach to keystroke-injection payload generation V Gurčinas, J Dautartas, J Janulevičius, N Goranin, A Čenys Electronics 12 (13), 2894, 2023 | | 2023 |