Security ontology for adaptive mapping of security standards S Ramanauskaitė, D Olifer, N Goranin, A Čenys Agora University Editing House, 2013 | 49 | 2013 |
E-mail-based phishing attack taxonomy J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys, A Slotkienė, ... Applied sciences 10 (7), 2363, 2020 | 43 | 2020 |
Information security management framework suitability estimation for small and medium enterprise L Kaušpadienė, S Ramanauskaitė, A Čenys Infinite Study, 2019 | 30 | 2019 |
Investigation of YOLOv5 Efficiency in iPhone Supported Systems. D Dlužnevskij, P Stefanovič, S Ramanauskaite Baltic Journal of Modern Computing 9 (3), 2021 | 24 | 2021 |
Composite DoS attack model S Ramanauskaitė, A Čenys Mokslas–Lietuvos ateitis/Science–Future of Lithuania 4 (1), 20-26, 2012 | 23 | 2012 |
Taxonomy of DoS attacks and their countermeasures S Ramanauskaite, A Cenys Central European Journal of Computer Science 1, 355-366, 2011 | 20 | 2011 |
High-Level Self-Sustaining Information Security Management Framework. L Kauspadiene, A Cenys, N Goranin, S Tjoa, S Ramanauskaite Baltic Journal of Modern Computing 5 (1), 2017 | 18 | 2017 |
Enterprise architecture modeling based on cloud computing security ontology as a reference model J Janulevičius, L Marozas, A Čenys, N Goranin, S Ramanauskaitė 2017 open conference of electrical, electronic and information sciences …, 2017 | 15 | 2017 |
Modelling influence of Botnet features on effectiveness of DDoS attacks S Ramanauskaitė, N Goranin, A Čenys, J Juknius Security and Communication Networks 8 (12), 2090-2101, 2015 | 11 | 2015 |
Credulity to phishing attacks: A real-world study of personnel with higher education J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys 2019 Open conference of electrical, electronic and information sciences …, 2019 | 9 | 2019 |
Image steganography based on color palette transformation in color space E Margalikas, S Ramanauskaitė EURASIP Journal on Image and Video Processing 2019 (1), 82, 2019 | 8 | 2019 |
Hierarchy-based competency structure and its application in e-evaluation S Ramanauskaitė, A Slotkienė Applied Sciences 9 (17), 3478, 2019 | 8 | 2019 |
Modeling of SYN flooding attacks S Ramanauskaité Jaunujų moks lininkdarbai 26 (1), 331-335, 2010 | 8 | 2010 |
Modeling of two-tier DDoS by combining different type of DDoS models S Ramanauskaitė, A Čenys, N Goranin, J Janulevicius 2017 Open Conference of Electrical, Electronic and Information Sciences …, 2017 | 7 | 2017 |
Web mining taxonomy K Griazev, S Ramanauskaitè 2018 Open Conference of Electrical, Electronic and Information Sciences …, 2018 | 6 | 2018 |
Time saving students’ formative assessment: algorithm to balance number of tasks and result reliability J Melesko, S Ramanauskaite Applied Sciences 11 (13), 6048, 2021 | 4 | 2021 |
Modeling of enterprise management structure for data leakage evaluation L Kauspadiene, S Ramanauskaite, A Cenys, J Janulevicius, J Rastenis Information Security Journal: A Global Perspective 27 (1), 1-13, 2018 | 4 | 2018 |
Efficiency of RSA key factorization by open-source libraries and distributed system architecture EJ Vuicik, D Šešok, S Ramanauskaitė Baltic Journal of Modern Computing 5 (3), 269, 2017 | 4 | 2017 |
Automated e-assessment: students’ needs and e-evaluation solution possibilities A Margiene, S Ramanauskaite International Journal of Information and Education Technology 12 (3), 2022 | 3 | 2022 |
Trends and challenges of multimodal user interfaces A Margienė, S Ramanauskaitė 2019 Open Conference of Electrical, Electronic and Information Sciences …, 2019 | 3 | 2019 |