This page has only limited features, please log in for full access.

Unclaimed
Joanna Śliwa
C4I Systems' Department, Military Communication Institute, ul. Warszawska 22A, 05-130 Zegrze, Poland

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Book chapter
Published: 01 January 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

This article describes proposal of the semantic model for context aware service provision in disadvantaged environment that is used to dynamically select adaptation actions performed on SOAP messages flowing from the service to the client entity.

ACS Style

Joanna Śliwa; Kamil Gleba. Semantic Description of the Context of the Service Call. Lecture Notes in Electrical Engineering 2015, 483 -489.

AMA Style

Joanna Śliwa, Kamil Gleba. Semantic Description of the Context of the Service Call. Lecture Notes in Electrical Engineering. 2015; ():483-489.

Chicago/Turabian Style

Joanna Śliwa; Kamil Gleba. 2015. "Semantic Description of the Context of the Service Call." Lecture Notes in Electrical Engineering , no. : 483-489.

Book chapter
Published: 01 January 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

We propose a formal modeling method of malicious software that support its detection and countermeasure. In order to detect malware there is a need to posses either digital signatures or behavioral models. As the obfuscation techniques makes the malware almost undetectable the classic signature-based anti-virus tools must be supported by behavioral analysis. A malware hunting tool we developed bases on the formal models in the form of Colored Petri nets and the attitude to modeling is presented in this article.

ACS Style

Bartosz Jasiul; Marcin Szpyrka; Joanna Śliwa. Formal Specification of Malware Models in the Form of Colored Petri Nets. Lecture Notes in Electrical Engineering 2015, 330, 475 -482.

AMA Style

Bartosz Jasiul, Marcin Szpyrka, Joanna Śliwa. Formal Specification of Malware Models in the Form of Colored Petri Nets. Lecture Notes in Electrical Engineering. 2015; 330 ():475-482.

Chicago/Turabian Style

Bartosz Jasiul; Marcin Szpyrka; Joanna Śliwa. 2015. "Formal Specification of Malware Models in the Form of Colored Petri Nets." Lecture Notes in Electrical Engineering 330, no. : 475-482.

Journal article
Published: 19 December 2014 in Entropy
Reads 0
Downloads 0

The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with behavioral analysis. The proposed approach to modeling of malware behavior is based on colored Petri nets. This article is addressed to cyber defense researchers, security architects and developers solving up-to-date problems regarding the detection and prevention of advanced persistent threats.

ACS Style

Bartosz Jasiul; Marcin Szpyrka; Joanna Sliwa. Detection and Modeling of Cyber Attacks with Petri Nets. Entropy 2014, 16, 6602 -6623.

AMA Style

Bartosz Jasiul, Marcin Szpyrka, Joanna Sliwa. Detection and Modeling of Cyber Attacks with Petri Nets. Entropy. 2014; 16 (12):6602-6623.

Chicago/Turabian Style

Bartosz Jasiul; Marcin Szpyrka; Joanna Sliwa. 2014. "Detection and Modeling of Cyber Attacks with Petri Nets." Entropy 16, no. 12: 6602-6623.

Conference paper
Published: 01 January 2011 in Computer Vision
Reads 0
Downloads 0

The paper presents IOEM, a methodology for ontology development elaborated for the INSIGMA project. Although prepared for a particular use, the methodology is quite general and can be used in a large variety of IT projects requiring ontology components. It is particularly suitable for large and geographically distributed software projects. The methodology is oriented towards applications of ontologies in various phases of a software lifecycle: development and run-time.

ACS Style

Joanna Sliwa; Kamil Gleba; Wojciech Chmiel; Piotr Szwed; Andrzej Glowacz. IOEM - Ontology Engineering Methodology for Large Systems. Computer Vision 2011, 6922, 602 -611.

AMA Style

Joanna Sliwa, Kamil Gleba, Wojciech Chmiel, Piotr Szwed, Andrzej Glowacz. IOEM - Ontology Engineering Methodology for Large Systems. Computer Vision. 2011; 6922 ():602-611.

Chicago/Turabian Style

Joanna Sliwa; Kamil Gleba; Wojciech Chmiel; Piotr Szwed; Andrzej Glowacz. 2011. "IOEM - Ontology Engineering Methodology for Large Systems." Computer Vision 6922, no. : 602-611.