Peter Komisarczuk
Peter Komisarczuk
Royal Holloway, University of London, Information Security Group (ISG)
Verified email at rhul.ac.uk
Title
Cited by
Cited by
Year
Identification of malicious web pages with static heuristics
C Seifert, I Welch, P Komisarczuk
2008 Australasian Telecommunication Networks and Applications Conference, 91-96, 2008
1682008
Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues
KLA Yau, P Komisarczuk, PD Teal
Journal of Network and Computer Applications 35 (1), 253-267, 2012
1392012
Honeyc-the low-interaction client honeypot
C Seifert, I Welch, P Komisarczuk
Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand 6, 2007
1152007
Cognitive radio-based wireless sensor networks: Conceptual design and open issues
KLA Yau, P Komisarczuk, PD Teal
2009 IEEE 34th Conference on Local Computer Networks, 955-962, 2009
842009
A survey on reinforcement learning models and algorithms for traffic signal control
KLA Yau, J Qadir, HL Khoo, MH Ling, P Komisarczuk
ACM Computing Surveys (CSUR) 50 (3), 1-38, 2017
772017
A context-aware and intelligent dynamic channel selection scheme for cognitive radio networks
KLA Yau, P Komisarczuk, PD Teal
2009 4th International Conference on Cognitive Radio Oriented Wireless …, 2009
692009
Capture–A behavioral analysis tool for applications and documents
C Seifert, R Steenson, I Welch, P Komisarczuk, B Endicott-Popovsky
digital investigation 4, 23-30, 2007
652007
Taxonomy of honeypots
C Seifert, I Welch, P Komisarczuk
522006
Applications of reinforcement learning to cognitive radio networks
KLA Yau, P Komisarczuk, PD Teal
2010 IEEE International Conference on Communications Workshops, 1-6, 2010
502010
On multi-channel MAC protocols in cognitive radio networks
AKL Yau, P Komisarczuk, PD Teal
2008 Australasian Telecommunication Networks and Applications Conference …, 2008
482008
Anatomy of drive-by download attack
VL Le, I Welch, X Gao, P Komisarczuk
Proceedings of the Eleventh Australasian Information Security Conference …, 2013
462013
Identification of malicious web pages through analysis of underlying dns and web server relationships
C Seifert, I Welch, P Komisarczuk, CU Aval, B Endicott-Popovsky
2008 33rd IEEE Conference on Local Computer Networks (LCN), 935-941, 2008
462008
An extensible, self contained, layered approach to context acquisition
D Kramer, A Kocurova, S Oussena, T Clark, P Komisarczuk
Proceedings of the Third International Workshop on Middleware for Pervasive …, 2011
392011
Enhancing network performance in distributed cognitive radio networks using single-agent and multi-agent reinforcement learning
KLA Yau, P Komisarczuk, DT Paul
IEEE Local Computer Network Conference, 152-159, 2010
392010
On initializations for the minkowski weighted k-means
RC de Amorim, P Komisarczuk
International Symposium on Intelligent Data Analysis, 45-55, 2012
322012
High occupancy resource allocation for grid and cloud systems, a study with drive
K Chard, K Bubendorfer, P Komisarczuk
Proceedings of the 19th ACM International Symposium on High Performance …, 2010
322010
Context-awareness and intelligence in distributed cognitive radio networks: A reinforcement learning approach
KLA Yau, P Komisarczuk, PD Teal
2010 Australian Communications Theory Workshop (AusCTW), 35-42, 2010
242010
Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots
C Seifert, I Welch, P Komisarczuk
Proceedings of the 2008 ACM symposium on Applied computing, 1426-1432, 2008
232008
Analysis and implementation of reinforcement learning on a GNU radio cognitive radio platform
Y Ren, P Dmochowski, P Komisarczuk
2010 Proceedings of the Fifth International Conference on Cognitive Radio …, 2010
202010
True positive cost curve: A cost-based evaluation method for high-interaction client honeypots
C Seifert, P Komisarczuk, I Welch
2009 Third International Conference on Emerging Security Information …, 2009
202009
The system can't perform the operation now. Try again later.
Articles 1–20