D-FOAF: Distributed identity management with access rights delegation SR Kruk, S Grzonkowski, A Gzella, T Woroniecki, HC Choi The Semantic Web–ASWC 2006: First Asian Semantic Web Conference, Beijing …, 2006 | 186 | 2006 |
Detecting DGA domains with recurrent neural networks and side information RR Curtin, AB Gardner, S Grzonkowski, A Kleymenov, A Mosquera Proceedings of the 14th international conference on availability …, 2019 | 89 | 2019 |
Sharing cloud services: user authentication for social enhancement of home networking S Grzonkowski, PM Corcoran IEEE Transactions on Consumer Electronics 57 (3), 1424-1432, 2011 | 82 | 2011 |
Security analysis of authentication protocols for next-generation mobile and CE cloud services S Grzonkowski, PM Corcoran, T Coughlin 2011 IEEE International Conference on Consumer Electronics-Berlin (ICCE …, 2011 | 75 | 2011 |
Trust models for community-aware identity management HC Choi, SR Kruk, S Grzonkowski, K Stankiewicz, B Davis, JG Breslin Proceedings of the Identity, Reference and Web Workshop, in conjunction with …, 2006 | 71* | 2006 |
Black box attacks on deep anomaly detectors A Kuppa, S Grzonkowski, MR Asghar, NA Le-Khac Proceedings of the 14th international conference on availability …, 2019 | 69 | 2019 |
Enabling trust in deep learning models: A digital forensics case study K Aditya, S Grzonkowski, NA Lekhac 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 42 | 2018 |
Extending web applications with a lightweight zero knowledge proof authentication S Grzonkowski, W Zaremba, M Zaremba, B McDaniel Proceedings of the 5th international conference on Soft computing as …, 2008 | 33 | 2008 |
D-FOAF-Security aspects in distributed user management system S Grzonkowski, A Gzella, SR Kruk, T Woroniecki IEEE, 2005 | 25 | 2005 |
Systems and methods for detecting anomalous behavior within computing sessions A Kuppa, S Grzonkowski, S Pipriya US Patent 11,178,170, 2021 | 23 | 2021 |
Smartphone security: An overview of emerging threats S Grzonkowski, A Mosquera, L Aouad, D Morss IEEE Consumer Electronics Magazine 3 (4), 40-44, 2014 | 23 | 2014 |
Finding rats in cats: Detecting stealthy attacks using group anomaly detection A Kuppa, S Grzonkowski, MR Asghar, NA Le-Khac 2019 18th IEEE International Conference on Trust, Security and Privacy in …, 2019 | 21 | 2019 |
Method and apparatus for authenticating a user S Grzonkowski, W Zaremba US Patent 8,411,854, 2013 | 21* | 2013 |
D-FOAF-Distributed Identity Management based on Social Networks SR Kruk, A Gzella, S Grzonkowski | 16 | 2006 |
Social semantic collaborative filtering for digital libraries SR Kruk, S Decker, A Gzella, S Grzonkowski, B McDaniel Journal of Digital Information, Special Issue on Personalization, 2006 | 14 | 2006 |
RiskWriter: Predicting Cyber Risk of an Enterprise K Aditya, S Grzonkowski, NA Le-Khac Information Systems Security: 14th International Conference, ICISS 2018 …, 2018 | 12 | 2018 |
Detecting electronic messaging threats by using metric trees and similarity hashes S Grzonkowski, AM Lopez, D Morss, L Aouad US Patent 9,565,209, 2017 | 12 | 2017 |
SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs. S Grzonkowski Financial Cryptography, 426, 2010 | 12 | 2010 |
A secure and efficient micropayment solution for online gaming S Grzonkowski, PM Corcoran 2009 International IEEE Consumer Electronics Society's Games Innovations …, 2009 | 12 | 2009 |
Search interface based on natural language query templates SR Kruk, K Samp, C O’Nuallain, B Davis, B McDaniel, S Grzonkowski Proceedings of IADIS International Conference WWW/Internet 2006, 2006 | 12 | 2006 |