Follow
Simona Ramanauskaite
Simona Ramanauskaite
Verified email at vgtu.lt
Title
Cited by
Cited by
Year
Security ontology for adaptive mapping of security standards
S Ramanauskaitė, D Olifer, N Goranin, A Čenys
Agora University Editing House, 2013
472013
E-mail-based phishing attack taxonomy
J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys, A Slotkienė, ...
Applied sciences 10 (7), 2363, 2020
422020
Information security management framework suitability estimation for small and medium enterprise
L Kaušpadienė, S Ramanauskaitė, A Čenys
Infinite Study, 2019
302019
Composite DoS attack model
S Ramanauskaitė, A Čenys
Mokslas–Lietuvos ateitis/Science–Future of Lithuania 4 (1), 20-26, 2012
232012
Investigation of YOLOv5 Efficiency in iPhone Supported Systems.
D Dlužnevskij, P Stefanovič, S Ramanauskaite
Baltic Journal of Modern Computing 9 (3), 2021
212021
Taxonomy of DoS attacks and their countermeasures
S Ramanauskaite, A Cenys
Central European Journal of Computer Science 1, 355-366, 2011
202011
High-Level Self-Sustaining Information Security Management Framework.
L Kauspadiene, A Cenys, N Goranin, S Tjoa, S Ramanauskaite
Baltic Journal of Modern Computing 5 (1), 2017
182017
Enterprise architecture modeling based on cloud computing security ontology as a reference model
J Janulevičius, L Marozas, A Čenys, N Goranin, S Ramanauskaitė
2017 open conference of electrical, electronic and information sciences …, 2017
152017
Modelling influence of Botnet features on effectiveness of DDoS attacks
S Ramanauskaitė, N Goranin, A Čenys, J Juknius
Security and Communication Networks 8 (12), 2090-2101, 2015
112015
Credulity to phishing attacks: A real-world study of personnel with higher education
J Rastenis, S Ramanauskaitė, J Janulevičius, A Čenys
2019 Open conference of electrical, electronic and information sciences …, 2019
92019
Image steganography based on color palette transformation in color space
E Margalikas, S Ramanauskaitė
EURASIP Journal on Image and Video Processing 2019 (1), 82, 2019
82019
Hierarchy-based competency structure and its application in e-evaluation
S Ramanauskaitė, A Slotkienė
Applied Sciences 9 (17), 3478, 2019
82019
Modeling of SYN flooding attacks
S Ramanauskaité
Jaunujų moks lininkdarbai 26 (1), 331-335, 2010
82010
Modeling of two-tier DDoS by combining different type of DDoS models
S Ramanauskaitė, A Čenys, N Goranin, J Janulevicius
2017 Open Conference of Electrical, Electronic and Information Sciences …, 2017
72017
Web mining taxonomy
K Griazev, S Ramanauskaitè
2018 Open Conference of Electrical, Electronic and Information Sciences …, 2018
52018
Time saving students’ formative assessment: algorithm to balance number of tasks and result reliability
J Melesko, S Ramanauskaite
Applied Sciences 11 (13), 6048, 2021
42021
Modeling of enterprise management structure for data leakage evaluation
L Kauspadiene, S Ramanauskaite, A Cenys, J Janulevicius, J Rastenis
Information Security Journal: A Global Perspective 27 (1), 1-13, 2018
42018
Efficiency of RSA key factorization by open-source libraries and distributed system architecture
EJ Vuicik, D Šešok, S Ramanauskaitė
Baltic Journal of Modern Computing 5 (3), 269, 2017
42017
Automated e-assessment: students’ needs and e-evaluation solution possibilities
A Margiene, S Ramanauskaite
International Journal of Information and Education Technology 12 (3), 2022
32022
Trends and challenges of multimodal user interfaces
A Margienė, S Ramanauskaitė
2019 Open Conference of Electrical, Electronic and Information Sciences …, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20