This page has only limited features, please log in for full access.
This article describes proposal of the semantic model for context aware service provision in disadvantaged environment that is used to dynamically select adaptation actions performed on SOAP messages flowing from the service to the client entity.
Joanna Śliwa; Kamil Gleba. Semantic Description of the Context of the Service Call. Lecture Notes in Electrical Engineering 2015, 483 -489.
AMA StyleJoanna Śliwa, Kamil Gleba. Semantic Description of the Context of the Service Call. Lecture Notes in Electrical Engineering. 2015; ():483-489.
Chicago/Turabian StyleJoanna Śliwa; Kamil Gleba. 2015. "Semantic Description of the Context of the Service Call." Lecture Notes in Electrical Engineering , no. : 483-489.
We propose a formal modeling method of malicious software that support its detection and countermeasure. In order to detect malware there is a need to posses either digital signatures or behavioral models. As the obfuscation techniques makes the malware almost undetectable the classic signature-based anti-virus tools must be supported by behavioral analysis. A malware hunting tool we developed bases on the formal models in the form of Colored Petri nets and the attitude to modeling is presented in this article.
Bartosz Jasiul; Marcin Szpyrka; Joanna Śliwa. Formal Specification of Malware Models in the Form of Colored Petri Nets. Lecture Notes in Electrical Engineering 2015, 330, 475 -482.
AMA StyleBartosz Jasiul, Marcin Szpyrka, Joanna Śliwa. Formal Specification of Malware Models in the Form of Colored Petri Nets. Lecture Notes in Electrical Engineering. 2015; 330 ():475-482.
Chicago/Turabian StyleBartosz Jasiul; Marcin Szpyrka; Joanna Śliwa. 2015. "Formal Specification of Malware Models in the Form of Colored Petri Nets." Lecture Notes in Electrical Engineering 330, no. : 475-482.
The aim of this article is to present an approach to develop and verify a method of formal modeling of cyber threats directed at computer systems. Moreover, the goal is to prove that the method enables one to create models resembling the behavior of malware that support the detection process of selected cyber attacks and facilitate the application of countermeasures. The most common cyber threats targeting end users and terminals are caused by malicious software, called malware. The malware detection process can be performed either by matching their digital signatures or analyzing their behavioral models. As the obfuscation techniques make the malware almost undetectable, the classic signature-based anti-virus tools must be supported with behavioral analysis. The proposed approach to modeling of malware behavior is based on colored Petri nets. This article is addressed to cyber defense researchers, security architects and developers solving up-to-date problems regarding the detection and prevention of advanced persistent threats.
Bartosz Jasiul; Marcin Szpyrka; Joanna Sliwa. Detection and Modeling of Cyber Attacks with Petri Nets. Entropy 2014, 16, 6602 -6623.
AMA StyleBartosz Jasiul, Marcin Szpyrka, Joanna Sliwa. Detection and Modeling of Cyber Attacks with Petri Nets. Entropy. 2014; 16 (12):6602-6623.
Chicago/Turabian StyleBartosz Jasiul; Marcin Szpyrka; Joanna Sliwa. 2014. "Detection and Modeling of Cyber Attacks with Petri Nets." Entropy 16, no. 12: 6602-6623.
The paper presents IOEM, a methodology for ontology development elaborated for the INSIGMA project. Although prepared for a particular use, the methodology is quite general and can be used in a large variety of IT projects requiring ontology components. It is particularly suitable for large and geographically distributed software projects. The methodology is oriented towards applications of ontologies in various phases of a software lifecycle: development and run-time.
Joanna Sliwa; Kamil Gleba; Wojciech Chmiel; Piotr Szwed; Andrzej Glowacz. IOEM - Ontology Engineering Methodology for Large Systems. Computer Vision 2011, 6922, 602 -611.
AMA StyleJoanna Sliwa, Kamil Gleba, Wojciech Chmiel, Piotr Szwed, Andrzej Glowacz. IOEM - Ontology Engineering Methodology for Large Systems. Computer Vision. 2011; 6922 ():602-611.
Chicago/Turabian StyleJoanna Sliwa; Kamil Gleba; Wojciech Chmiel; Piotr Szwed; Andrzej Glowacz. 2011. "IOEM - Ontology Engineering Methodology for Large Systems." Computer Vision 6922, no. : 602-611.