Algimantas Venčkauskas

Algimantas Venčkauskas
  • Professor PhD
  • Head of Department at Kaunas University of Technology

About

71
Publications
43,015
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
984
Citations
Current institution
Kaunas University of Technology
Current position
  • Head of Department

Publications

Publications (71)
Article
Full-text available
Cyber threat intelligence (CTI) has emerged as a promising approach to mitigating the effect of malicious activities. However, the potential usability of CTI data depends largely on their quality. The available CTI data quality assessment methods are either not fully automatic or deliver just a few dimensions. In this paper, we propose an automated...
Article
Full-text available
Federated learning (FL) makes it possible for users to share trained models with one another, thereby removing the necessity of publicly centralizing training data. One of the best and most cost-effective ways to connect users is through email. To steal sensitive information, spam emails might trick users into visiting malicious websites or perform...
Article
Full-text available
Layering through cryptocurrency transactions represents a sophisticated mechanism for laundering money within cybercrime circles. This process methodically merges illegal funds into the legitimate financial system. Blockchain technology plays a crucial role in this integration by facilitating the quick and automated dispersal of assets across vario...
Article
Full-text available
Sharing cyber threat intelligence (CTI) can significantly improve the security of information technology (IT) in organizations. However, stakeholders and practitioners are not keen on sharing CTI data due to the risk of exposing their private data and possibly losing value as an organization on the market. We present a model for CTI data sharing th...
Article
Full-text available
Fog computing as a paradigm was offered more than a decade ago to solve Cloud Computing issues. Long transmission distances, higher data flow, data loss, latency, and energy consumption lead to providing services at the edge of the network. But, fog devices are known for being mobile and heterogenous. Their resources can be limited, and their avail...
Article
Full-text available
Email is an excellent technique for connecting users at low cost. Spam emails pose the risk of collecting a user’s personal information by fooling them into clicking on a link or engaging in other fraudulent activities. Furthermore, when a spam message is delivered, the user may read the entire message before deciding it is spam and deleting it. Mo...
Article
Full-text available
This paper addresses the scientific problem of enhancing the security and capacity of steganographic methods for protecting digital media. The primary aim is to develop an advanced steganographic technique that optimizes quantization tables to surpass the traditional F5 algorithm in terms of security, capacity, and robustness. The novelty of this r...
Book
Virtualizacija yra viena svarbiausių ir sparčiausiai besivystančių informacinių technologijų (IT) sričių, kuri pastaraisiais metais tapo pagrindu įvairiems debesų kompiuterijos ir interneto paslaugų sprendimams, be kurių sunkiai įsivaizduotume šiuolaikinį gyvenimą. Virtualizacijos sprendimai leidžia efektyviau išnaudoti turimą fizinę kompiuterinę į...
Article
Full-text available
Confronting the challenges of securing communication in-vehicle wireless sensor networks demands innovative solutions, particularly as vehicles become more interconnected. This paper proposes a tailored communication security framework for in-vehicle wireless sensor networks, addressing both scientific and technical challenges through effective enc...
Article
Full-text available
Microservices are compact, independent services that work together with other microservices to support a single application function. Organizations may quickly deliver high-quality applications using the effective design pattern of the application function. Microservices allow for the alteration of one service in an application without affecting th...
Article
Full-text available
IoT systems can successfully employ wireless sensor networks (WSNs) for data gathering and fog/edge computing for processing collected data and providing services. The proximity of edge devices to sensors improves latency, whereas cloud assets provide higher computational power when needed. Fog networks include various heterogeneous fog nodes and e...
Article
Full-text available
Industry X.0 is the new age of digitization, when information and communication systems are strongly linked to other systems and processes and are accessed remotely from anywhere at any time. The existing information systems’ security methods are ineffective because they should focus on and assess a broader range of factors in physical and digital...
Article
Full-text available
In an era in which social media platforms are proliferating and becoming primary communication channels, the identification of evidence for crimes from such platforms is crucial for digital forensics and legal proceedings. This paper presents a novel approach for systematically structuring and categorising digital attributes that are interlinked ac...
Article
Full-text available
The intrusion detection system (IDS) must be able to handle the increase in attack volume, increasing Internet traffic, and accelerating detection speeds. Network flow feature (NTF) records are the input of flow-based IDSs that are used to determine whether network traffic is normal or malicious in order to avoid IDS from difficult and time-consumi...
Article
Full-text available
Fog computing is an extension of cloud computing that provides computing services closer to user end-devices at the network edge. One of the challenging topics in fog networks is the placement of tasks on fog nodes to obtain the best performance and resource usage. The process of mapping tasks for resource-constrained devices is known as the servic...
Article
Full-text available
The COVID-19 pandemic has forced much education to move into a distance learning (DL) model. The problem addressed in the paper is related to the increased necessity for the capacity of data, secure infrastructure, Wi-Fi possibilities, and equipment, learning resources which are needed when students connect to systems managed by institutional, nati...
Article
Full-text available
During the pandemic, distance learning gained its necessity. Most schools and universities were forced to use e-learning tools. The fast transition to distance learning increased the digitalization of the educational system and influenced the increase of security incident numbers as there was no time to estimate the security level change by incorpo...
Article
The current rise in hacking and computer network attacks throughout the world has heightened the demand for improved intrusion detection and prevention solutions. The intrusion detection system (IDS) is critical in identifying abnormalities and assaults on the network, which have grown in size and pervasiveness. The paper proposes a novel approach...
Article
Full-text available
Fog computing is meant to deal with the problems which cloud computing cannot solve alone. As the fog is closer to a user, it can improve some very important QoS characteristics, such as a latency and availability. One of the challenges in the fog architecture is heterogeneous constrained devices and the dynamic nature of the end devices, which req...
Article
Full-text available
Lack of guidelines for implementing distance learning, lack of infrastructure, lack of competencies, and security-related problems were the challenges met during the pandemic. These challenges firstly fall on the administration of a higher education institution. To assist in solving the challenges of the pandemic for the administration of a higher...
Article
The security of information is among the greatest challenges facing organizations and institutions. Cybercrime has risen in frequency and magnitude in recent years, with new ways to steal, change and destroy information or disable information systems appearing every day. Among the types of penetration into the information systems where confidential...
Chapter
Fog Computing is a new paradigm which is meant to solve some new challenges in IoT like a wide-spread geographical distribution and mobility of the devices, multiple nodes, heterogeneity of the hardware capabilities and communication technologies. A Fog Computing Orchestration enables the control of multiple devices connected to the Fog Computing n...
Article
The aim of a forensic investigation is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. Digital forensic investigation is a process of collecting, examining and analyzing digital data from vari...
Conference Paper
Visual Analytics uses data visualization techniques for enabling compelling data analysis by engaging graphical and visual portrayal. In the domain of cybersecurity, convincing visual representation of data enables to ascertain valuable observations that allow the domain experts to construct efficient cyberattack mitigation strategies and provide u...
Article
Full-text available
Network intrusion detection is one of the main problems in ensuring the security of modern computer networks, Wireless Sensor Networks (WSN), and the Internet-of-Things (IoT). In order to develop efficient network-intrusion-detection methods, realistic and up-to-date network flow datasets are required. Despite several recent efforts, there is still...
Chapter
Visual Analytics is a complex sub-field of data analytics that concentrates on the use of the information visualization methods for facilitating effective analysis of data by employing visual and graphical representation. In cyber security domain, Effective visualization of the data allows to infer valuable insights that enable domain analysts to c...
Article
Full-text available
Development of the Internet of Things (IoT) opens many new challenges. As IoT devices are getting smaller and smaller, the problems of so-called “constrained devices” arise. The traditional Internet protocols are not very well suited for constrained devices comprising localized network nodes with tens of devices primarily communicating with each ot...
Article
Full-text available
The ability to precisely locate and navigate a partially impaired or a blind person within a building is increasingly important for a wide variety of public safety and localization services. In this paper, we explore indoor localization algorithms using Bluetooth Low Energy (BLE) beacons. We propose using the BLE beacon’s received signal strength i...
Conference Paper
Full-text available
Efficient and secure IoT device network communication with Cloud and security aspects of IoT devices management is an ongoing issue for quite some time. In this article we cover: a) The concept of Fog network and why we need it for efficient IoT connectivity; b) Inherent security threats of IoT networks and devices; c) Existing security implementat...
Article
Full-text available
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point...
Article
A distributed algorithm for node and user localization for Internet-of-Things (IoT) Ad-Hoc networks is presented. Proposed algorithm is independent of specific wireless communication technologies and protocols. Expected 0,3 m accuracy of ranging measurements are used as representation of 1ns timing resolution within Time-of-Arrival (ToA) ranging me...
Conference Paper
This paper reports comparative authorship attribution results obtained on the Internet comments of the morphologically complex Lithuanian language. We have explored the impact of machine learning and similarity-based approaches on the different author set sizes (containing 10, 100, and 1,000 candidate authors), feature types (lexical, morphological...
Conference Paper
Full-text available
Internet can be misused by cyber criminals as a plat-form to conduct illegitimate activities (such as harassment, cyberbullying, and incitement of hate or violence) anonymously. As a result, authorship analysis of anonymous texts in Internet (such as emails, forum comments) has attracted significant attention in the digital forensic and text mining...
Article
Full-text available
The creation of an ontology makes it possible to form common information structures, to reuse knowledge, to make assumptions within a domain and to analyse every piece of knowledge. In this paper, we aim to create an ontologybased transformation model and a framework to develop an ontology-based transformation system in the digital forensics domain...
Article
Full-text available
The improved version of the author’s previously declared asymmetric cipher protocol based on matrix power function (MPF) is presented. Proposed modification avoids discrete logarithm attack (DLA) which could be applied to the previously declared protocol. This attack allows us to transform the initial system of MPF equations to so-called matrix mul...
Article
Full-text available
Smartphone-based biometrics offers a wide range of possible solutions, which could be used to authenticate users and thus to provide an extra level of security and theft prevention. We propose a method for positive identification of smartphone user’s identity using user’s gait characteristics captured by embedded smartphone sensors (gyroscopes, acc...
Article
Full-text available
Both distributed healthcare systems and the Internet of Things (IoT) are currently hot topics. The latter is a new computing paradigm to enable advanced capabilities in engineering various applications, including those for healthcare. For such systems, the core social requirement is the privacy/security of the patient information along with the tec...
Article
Complexity of Internet of Things (IoT) applications and difficulty to predict their behaviour in wireless communications make modelling of IoT units an important research topic. The IoT unit is considered here as the two-node IoT model that supports bi-directional wireless communications. There are many approaches to model security and energy aware...
Article
Full-text available
The BitTorrent client application is a popular utility for sharing large files over the Internet. Sometimes, this powerful utility is used to commit cybercrimes, like sharing of illegal material or illegal sharing of legal material. In order to help forensics investigators to fight against these cybercrimes, we carried out an investigation of the a...
Article
Full-text available
This paper introduces the sensor-networked IoT model as a prototype to support the design of Body Area Network (BAN) applications for healthcare. Using the model, we analyze the synergistic effect of the functional requirements (data collection from the human body and transferring it to the top level) and non-functional requirements (trade-offs bet...
Article
This paper focuses on static code analysis tools for .NET platform. Static code analysis tools typically use a certain set of rules. In this paper, we propose to implement four rules, which we consider important from our practical experience of software development. We analyze the existing popular static analysis tools for .NET platform in order to...
Article
Full-text available
The BitTorrent Sync client application is the most progressive development in the BitTorrent family. Nevertheless, it can be used for the activities that draw the attention of the forensics invetigators. The BitTorrent Sync client application employs quite largely the encryption for sending data packages. The initiation of the activity is carried o...
Article
Full-text available
The BitTorrent client application is a popular tool to distribute the large files over the Internet. However, the utility can be used for the illegal distribution of some files. Such an activity is considered as a cybercrime. In order to aid the forensics investigator to fight against the cybercrimes we carried out the research, during which we inv...
Article
The Internet of Things (IoT) is a novel design paradigm, which allows communication among different kinds of physical objects over the common Internet infrastructure. Operations and application models of the IoT, which differ from the traditional networks, have brought great challenges and opportunities to digital forensic technology. In this paper...
Conference Paper
The Internet of Things and Services (IoT&S) is a novel-networking paradigm, which allows the communication among various types of physical objects and people over the Internet. Operations and application models of IoT&S are different from the traditional networks have brought great challenges and opportunities to digital forensic technology. In thi...
Conference Paper
The paper presents a comprehensive overview and analysis of the authorship identification methods in the national language electronic discourse. First, an overview and analysis of methods for English language is presented. Next, adaptations of general methods and well as language specific methods for national languages are considered. Challenges of...
Article
Full-text available
The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the ap...
Article
BitTorrent client application is a popular tool to download large files from Internet, but this application is quite frequently used for illegal purposes that are one of the types of cybercrimes. If order to fight against this type of cybercrime we carried out the research, during which we investigated the evidences left by BitTorrent client applic...
Article
Full-text available
In order to ensure comfortable life human computer interaction (HCI) systems are widely used in the smart home. It is important to detect and respond to the smart home residents' emotional state and reduce stress levels. The HCI system for emotional state recognition is developed. This paper deals with stressful state recognition by means of the he...
Conference Paper
The Internet of Things is a rapidly evolving technology, which creates new challenges to security and energy consumption of devices at the various environmental conditions. Wireless communication technologies are one of the bases of IoT. In this paper, we proposed the security requirements of IoT applications to relate with the operating modes of w...
Article
Full-text available
In this paper, we present an approach to design the prototype module for the Internet of Things (IoT), which is based on using the Wi-Fi protocol. The aim is to investigate and identify some properties of the module such as dependency among energy consumption and security levels. The contribution of the paper is the configurable IoT prototype modul...
Article
Full-text available
Modern business information technologies, such as Cloud computing and Bring Your Own Device (BYOD) raise new requirements for end node security. Cryptographic algorithms must be used to ensure security of business data and communications. However, data encryption decreases battery lifetime on mobile devices such as smartphones or tablet PCs. In thi...
Article
The efficiency of realization of a new asymmetric cipher in microprocessors is presented. The cipher is based on the matrix power function and therefore to the contrary of traditional asymmetric ciphers the computation with large numbers is avoided. Since microprocessors are widely used in embedded systems such as smart-cards and have restricted co...
Conference Paper
Web protection against XSS attacks is an indispensable tool for implementing reliable online systems. XSS attacks can be used for various malicious actions and stealing important information. Protection may be implemented both on user computer and on server side. In this work we have analyzed the server side protection solutions. These solutions mu...
Article
Problems of sensitive information hiding in disk drives using cluster-based file systems are analyzed in this study. A new covert channel method for information hiding in disk drives is proposed and discussed. The method uses multiple cover files and is based on relative allocation of clusters of cover files in relation to one another. The experime...
Article
Program protection, programming code integrity and intellectual property protection are important problems in embedded systems. Security mechanisms for embedded systems have some specific restrictions related to limited resources, bandwidth requirements and security. In this paper we develop a secret encryption key generation algorithm by using the...
Conference Paper
Full-text available
Information and communication technologies are an integral part of modern society. The need of highly qualified professionals with a master's degree is growing. Universities are faced with major challenges in organizing postgraduate studies. For a variety of reasons, very high percentage of postgraduate studies isn't completed. The obvious forces t...
Article
Full-text available
A. Mikuckas, A. Venckauskas, I. Mikuckiene. Dynamic Extension of Starling Resistor Model // Electronics and Electrical Engineering. - Kaunas: Technologija, 2012.- No. 6(122). - P. 7-10. The development of intelligent medical systems, electronic monitoring systems required for physiological models. The proposed model of venous blood flow realized on...
Article
In this study problems of using biometric authentication methods for physical access systems are analyzed. Possibilities for applying biometric authentication methods are also examined. It is suggested that fingerprint recognition methods could be applied to finger vein recognition. The experiment shows that method for fingerprint matching using hy...
Article
Full-text available
This paper proposes embedded software of mechatronic system protection method based on encryption and decryption code of critical program modules during runtime. Secret keys are not stored, but generated by the signature of mechatronic system components. This paper experimentally researches the application of symmetric cryptographic algorithms and...
Article
E. Kazanavicius, V. Kazanavicius, A. Venckauskas, R. Paskevicius. Securing Web Application by Embedded Firewall // Electronics and Electrical Engineering. - Kaunas: Technologija, 2012. - No. 3(119). - P. 65-68. The paper addressed the problem of protection of Web applications. Classifications of Web application vulnerabilities and existing protecti...
Article
Full-text available
K. Luksys, E. Sakalauskas, A. Venckauskas. Implementation Analysis of Matrix Power Cipher in Embedded Systems // Electronics and Electrical Engineering. - Kaunas: Technologija, 2012. - No. 2(118). - P. 95-98. In this paper we present a theoretical implementation analysis of new matrix power cipher in embedded systems. This cipher is based on the ma...
Article
Full-text available
Informacinės technologijos turi tinkamai atlikti kontrolę, užtikrinančią informacijos saugą nuo įvairių pavojų – nepageidaujamo ar nesankcionuoto informacijos skleidimo, pakeitimo ar netekimo ir panašiai. Tarptautinių ir Lietuvos institucijų, tiriančių kompiuterių saugos incidentus, duomenimis, informacijos saugos pažeidimų skaičius nemažėja. Įvair...
Article
Full-text available
Korporacinių įmonių kompiuterinių sistemų informacinės saugos užtikrinimas yra viena iš svarbiausių informacinių technologijų problemų. Augant ir plečiantis verslui iškyla nutolusių įmonės padalinių, partnerių, darbuotojų saugaus pasikeitimo duomenimis ir lokalių tinklų saugumo problema. Verslo ir valdymo procesuose informacinės technologijos tampa...
Article
Full-text available
. This paper examines the application domains of the experimental scripting language Open PROMOL and its processor. The language processor EREBUS is an experimental tool aiming to support developing generic (reusable) components and building domain-specific program generators. Developing of generic VHDL components, data and program specialization f...

Network

Cited By