Professor Peter Komisarczuk

  1. Book › Research
  2. Published

    Achieving context awareness and intelligence in cognitive radio networks using reinforcement learning for stateful applications

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, School of Engineering and Computer Science, Victoria University of Wellington.

    Research output: Book/ReportBook

  3. Commissioned report › Research
  4. Published

    Measurement Study on Malicious Web Servers in the. nz Domain: Final Report September 2009

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, InternetNZ. 1 p.

    Research output: Book/ReportCommissioned report

  5. Other report › Research
  6. Published

    Taxonomy of honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, Citeseer.

    Research output: Book/ReportOther report

  7. Article › Research › Peer-reviewed
  8. Published

    A Future Health Information Provider Architecture

    Komisarczuk, P., 2006, In : HIC 2006 and HINZ 2006: Proceedings. p. 471 1 p.

    Research output: Contribution to journalArticle

  9. Published

    A WEB-BASED BOARD GAME FOR TEACHING ASPECTS OF INTERNET ENGINEERING

    Komisarczuk, P. & Welch, I., 2007, In : Advanced Technology for Learning. 4, 4, p. 194-199 6 p.

    Research output: Contribution to journalArticle

  10. Published

    Broadband Island interconnection via satellite?performance analysis for the race II?catalyst project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, In : International journal of satellite communications. 12, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  11. Published

    Capture--A behavioral analysis tool for applications and documents

    Seifert, C., Steenson, R., Welch, I., Komisarczuk, P. & Endicott-Popovsky, B., 2007, In : digital investigation. 4, p. 23-30 8 p.

    Research output: Contribution to journalArticle

  12. Published

    Effectiveness of security by admonition: a case study of security warnings in a web browser setting

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, In : secure Magazine. 1, 9

    Research output: Contribution to journalArticle

  13. Published

    Ethernet Services-Service Definition and Market Potential

    Komisarczuk, P. P., 2002, In : Journal of the Communications Network. 1, 3, p. 20-28 9 p.

    Research output: Contribution to journalArticle

  14. Published

    Honeyc-the low-interaction client honeypot

    Seifert, C., Welch, I. & Komisarczuk, P., 2007, In : Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand.

    Research output: Contribution to journalArticle

  15. Published

    Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2012, In : Journal of Network and Computer Applications. 35, 1, p. 253-267 15 p.

    Research output: Contribution to journalArticle

  16. Published

    Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective

    Yau, K-L. A., Poh, G. S. & Komisarczuk, P., 2013, In : IJAHUC. 12, 3, p. 157-176 20 p.

    Research output: Contribution to journalArticle

  17. Chapter › Research
  18. Published

    Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns

    Amorim, R. C. & Komisarczuk, P., 2014, Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 223-233 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Quality of Service (QoS) Provisioning in Cognitive Wireless Ad Hoc Networks: Architecture, Open Issues and Design Approaches

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Quality of Service Architectures for Wireless Networks: Performance Metrics and Management. IGI Global, p. 575-594 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric

    de Amorim, R. C. & Komisarczuk, P., 2014, Case Studies in Secure Computing: Achievements and Trends. 1st ed. CRC Press, p. 295 1 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Conference contribution › Research
  22. Published

    A board game for teaching internet engineering

    Komisarczuk, P. & Welch, I., 2006, Proceedings of the 8th Australasian Conference on Computing Education-Volume 52. p. 117-123 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A Novel Scoring Model to Detect Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. p. 254-263 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Position Paper: Towards an Utility Computing and Communications Infrastructure

    Bubendorfer, K. & Komisarczuk, P., 2005, Proceedings of the 2005 International Conference on Communications in Computing, CIC 2005, Las Vegas, Nevada, USA. p. 47-53 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 210-215 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Achieving Efficient and Optimal Joint Action in Distributed Cognitive Radio Networks Using Payoff Propagation

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    An extensible, self contained, layered approach to context acquisition

    Kramer, D., Kocurova, A., Oussena, S., Clark, T. & Komisarczuk, P., 2011, Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform

    Ren, Y., Dmochowski, P. A. & Komisarczuk, P., 2010, 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2010, Cannes, France, June 9-11, 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Anatomy of Drive-by Download Attack

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. p. 49-58 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 Next