default search action
Michal Choras
Person information
- affiliation: University of Science and Technology (UTP), Bydgoszcz, Poland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j75]Pertti Karhapää, Woubshet Behutiye, Pertti Seppänen, Pilar Rodríguez, Markku Oivo, Xavier Franch, Silverio Martínez-Fernández, Lidia López, Michal Choras, Alessandra Bagnato, Sanja Aaramaa, Jari Partanen:
Evidence-Based Quality-Aware Agile Software Development Process: Design and Evaluation. IEEE Access 12: 86487-86512 (2024) - [j74]Marek Pawlicki, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
The survey on the dual nature of xAI challenges in intrusion detection and their potential for AI innovation. Artif. Intell. Rev. 57(12): 330 (2024) - [j73]Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri, Michal Choras:
When explainability turns into a threat - using xAI to fool a fake news detection method. Comput. Secur. 137: 103599 (2024) - [j72]Marek Pawlicki, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity. Neurocomputing 590: 127759 (2024) - [j71]Marek Pawlicki, Aleksandra Pawlicka, Federica Uccello, Sebastian Szelest, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination. Neurocomputing 602: 128282 (2024) - [j70]Rafal Kozik, Gracjan Katek, Marta Gackowska, Sebastian Kula, Joanna Komorniczak, Pawel Ksieniewicz, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras:
Towards explainable fake news detection and automated content credibility assessment: Polish internet and digital media use-case. Neurocomputing 608: 128450 (2024) - [j69]Aleksandra Pawlicka, Marek Pawlicki, Rafal Kozik, Agnieszka Andrychowicz-Trojanowska, Michal Choras:
AI vs linguistic-based human judgement: Bridging the gap in pursuit of truth for fake news detection. Inf. Sci. 679: 121097 (2024) - [j68]Rafal Kozik, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras, Wojciech Mazurczyk, Krzysztof Cabaj:
A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods. IEEE Trans. Comput. Soc. Syst. 11(4): 5219-5229 (2024) - [c156]Mikolaj Komisarek, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Aleksandra Pawlicka, Michal Choras:
Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis. ARES 2024: 93:1-93:8 - [c155]Marek Pawlicki, Damian Puchalski, Sebastian Szelest, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
Introducing a Multi-Perspective xAI Tool for Better Model Explainability. ARES 2024: 95:1-95:8 - [c154]Damian Puchalski, Marek Pawlicki, Rafal Kozik, Rafal Renk, Michal Choras:
Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics. ARES 2024: 97:1-97:8 - [c153]Rafal Kozik, Damian Puchalski, Aleksandra Pawlicka, Szymon Bus, Jakub Glówka, Krishna Chandramouli, Marco Tiemann, Marek Pawlicki, Rafal Renk, Michal Choras:
ULTIMATE Project Toolkit for Robotic AI-Based Data Analysis and Visualization. ACIIDS (2) 2024: 44-55 - [c152]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules. ACIIDS (1) 2024: 70-81 - [c151]Gracjan Katek, Marta Gackowska, Joanna Komorniczak, Pawel Ksieniewicz, Rafal Kozik, Marek Pawlicki, Michal Choras:
Involving Society to Protect Society from Fake News and Disinformation: Crowdsourced Datasets and Text Reliability Assessment. ACIIDS (2) 2024: 384-395 - [c150]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors. ACR 2024: 244-255 - [c149]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
An Innovative Approach to Real-Time Concept Drift Detection in Network Security. EIDWT 2024: 130-139 - [c148]Rafal Kozik, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras:
From Detection Through Display to Understanding: Bridging AI and UI in Disinformation and Fake News Analysis. ICCCI (CCIS Volume 1) 2024: 347-357 - [c147]Krzysztof Cabaj, Marcin Kowalczyk, Marcin Gregorczyk, Michal Choras, Rafal Kozik, Wojciech Mazurczyk:
Strategies to Use Harvesters in Trustworthy Fake News Detection Systems. ICCCI (CCIS Volume 1) 2024: 384-394 - [c146]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems. ICCSA (Workshops 2) 2024: 100-112 - [c145]Marek Pawlicki, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
Explainability versus Security: The Unintended Consequences of xAI in Cybersecurity. SecTL@AsiaCCS 2024: 1-7 - [e10]Joaquín García-Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas:
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14982, Springer 2024, ISBN 978-3-031-70878-7 [contents] - [e9]Joaquín García-Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas:
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14983, Springer 2024, ISBN 978-3-031-70889-3 [contents] - [e8]Joaquín García-Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas:
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14984, Springer 2024, ISBN 978-3-031-70895-4 [contents] - [e7]Joaquín García-Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas:
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 14985, Springer 2024, ISBN 978-3-031-70902-9 [contents] - [e6]Ilsun You, Michal Choras, Seonghan Shin, Hwankuk Kim, Philip Virgil Astillo:
Mobile Internet Security - 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers. Communications in Computer and Information Science 2095, Springer 2024, ISBN 978-981-97-4464-0 [contents] - 2023
- [j67]Aleksandra Pawlicka, Marek Pawlicki, Rafal Kozik, Michal Choras:
What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics. IEEE Access 11: 58796-58807 (2023) - [j66]Pawel Ksieniewicz, Pawel Zyblewski, Weronika Borek-Marciniec, Rafal Kozik, Michal Choras, Michal Wozniak:
Alphabet Flatting as a variant of n-gram feature extraction method in ensemble classification of fake news. Eng. Appl. Artif. Intell. 120: 105882 (2023) - [j65]Marek Pawlicki, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT. Neurocomputing 551: 126533 (2023) - [j64]Aleksandra Pawlicka, Renata Tomaszewska, Ewa Krause, Dagmara Jaroszewska-Choras, Marek Pawlicki, Michal Choras:
Has the pandemic made us more digitally literate?: Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic. J. Ambient Intell. Humaniz. Comput. 14(11): 14721-14731 (2023) - [j63]Aleksandra Pawlicka, Michal Choras, Rafal Kozik, Marek Pawlicki:
First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions. Pers. Ubiquitous Comput. 27(2): 193-202 (2023) - [j62]Rafal Kozik, Wojciech Mazurczyk, Krzysztof Cabaj, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras:
Deep Learning for Combating Misinformation in Multicategorical Text Contents. Sensors 23(24): 9666 (2023) - [j61]Mateusz Szczepanski, Marek Pawlicki, Rafal Kozik, Michal Choras:
The Application of Deep Learning Imputation and Other Advanced Methods for Handling Missing Values in Network Intrusion Detection. Vietnam. J. Comput. Sci. 10(1): 1-23 (2023) - [c144]Mikolaj Komisarek, Marek Pawlicki, Tomi Simic, David Kavcnik, Rafal Kozik, Michal Choras:
Modern NetFlow network dataset with labeled attacks and detection methods. ARES 2023: 47:1-47:8 - [c143]Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk, Helen C. Leligou, Marcin Przybyszewski, Rafal Kozik, Michal Choras:
Security Architecture in the SILVANUS project. ARES 2023: 49:1-49:9 - [c142]Michal Choras, Aleksandra Pawlicka, Marek Pawlicki, Rafal Kozik:
How to Navigate the Uncharted Waters of Cyberwar. AMCIS 2023 - [c141]Marek Pawlicki, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes. CISIM 2023: 283-297 - [c140]Rafal Kozik, Joanna Komorniczak, Pawel Ksieniewicz, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras:
SWAROG Project Approach to Fake News Detection Problem. CISIS-ICEUTE 2023: 79-88 - [c139]Joanna Komorniczak, Szymon Wojciechowski, Jakub Klikowski, Rafal Kozik, Michal Choras:
Analysis of Extractive Text Summarization Methods as a Binary Classification Problem. CISIS-ICEUTE 2023: 91-100 - [c138]Marek Pawlicki, Aleksandra Pawlicka, Mscislaw Srutek, Rafal Kozik, Michal Choras:
Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems. CORES/IP&C 2023: 45-53 - [c137]Marta Gackowska, Gracjan Katek, Mscislaw Srutek, Rafal Kozik, Michal Choras:
Document Annotation Tool for News Content Analysis. CORES/IP&C 2023: 211-217 - [c136]Michele Mastroianni, Francesco Palmieri, Massimo Ficco, Rafal Kozik, Michal Choras:
Privacy risk analysis and metrics in capturing and storing network traffic. CSCS 2023: 580-585 - [c135]Aleksandra Pawlicka, Damian Puchalski, Marek Pawlicki, Rafal Kozik, Michal Choras:
How to secure the IoT-based surveillance systems in an ELEGANT way. CSR 2023: 636-640 - [c134]Rafal Kozik, Wojciech Mazurczyk, Krzysztof Cabaj, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras:
Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models. DSAA 2023: 1-9 - [c133]Rafal Kozik, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras:
Model Stitching Algorithm for Fake News Detection Problem. DSAA 2023: 1-7 - [c132]Michal Choras, Aleksandra Pawlicka, Dagmara Jaroszewska-Choras, Marek Pawlicki:
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce. ESORICS Workshops (1) 2023: 167-181 - [c131]Federica Uccello, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Michal Choras:
Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach. ICAI (2) 2023: 236-246 - [c130]Aleksandra Pawlicka, Marek Pawlicki, Rafal Kozik, Michal Choras:
The Rise of AI-Powered Writing: How ChatGPT is Revolutionizing Scientific Communication for Better or for Worse. ICAI (1) 2023: 317-327 - [c129]Aleksandra Pawlicka, Marek Pawlicki, Rafal Kozik, Michal Choras:
The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems. ICDM (Workshops) 2023: 253-261 - [c128]Wiktor Kurek, Marek Pawlicki, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
Explainable Artificial Intelligence 101: Techniques, Applications and Challenges. ICIC (4) 2023: 310-318 - [c127]Marek Pawlicki, Rafal Kozik, Michal Choras:
Improving Siamese Neural Networks with Border Extraction Sampling for the use in Real-Time Network Intrusion Detection. IJCNN 2023: 1-8 - [c126]Marek Pawlicki, Rafal Kozik, Michal Choras:
The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks. MobiSec 2023: 197-208 - [c125]Aleksandra Pawlicka, Marek Pawlicki, Rafal Kozik, Wiktor Kurek, Michal Choras:
How Explainable Is Explainability? Towards Better Metrics for Explainable AI. RIIFORUM 2023: 685-695 - [e5]Robert Burduk, Michal Choras, Rafal Kozik, Pawel Ksieniewicz, Tomasz Marciniak, Pawel Trajdos:
Progress on Pattern Classification, Image Processing and Communications - Proceedings of the CORES and IP&C Conferences 2023, Wrocław, Poland. Lecture Notes in Networks and Systems 766, Springer 2023, ISBN 978-3-031-41629-3 [contents] - 2022
- [j60]Michal Choras, Michal Wozniak:
The double-edged sword of AI: Ethical Adversarial Attacks to counter artificial intelligence for crime. AI Ethics 2(4): 631-634 (2022) - [j59]Michal Choras, Robert Burduk, Agata Gielczyk, Rafal Kozik, Tomasz Marciniak:
Advances in Computer Recognition, Image Processing and Communications. Entropy 24(1): 108 (2022) - [j58]Vibekananda Dutta, Marek Pawlicki, Rafal Kozik, Michal Choras:
Unsupervised network traffic anomaly detection with deep autoencoders. Log. J. IGPL 30(6): 912-925 (2022) - [j57]Rafal Kozik, Marek Pawlicki, Sebastian Kula, Michal Choras:
Fake news detection platform - conceptual architecture and prototype. Log. J. IGPL 30(6): 1005-1016 (2022) - [j56]Marek Pawlicki, Rafal Kozik, Michal Choras:
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks. Neurocomputing 500: 1075-1087 (2022) - [j55]Michal Choras, Aleksandra Pawlicka, Rafal Kozik, Michal Wozniak:
How Machine Learning May Prevent the Breakdown of Democracy by Contributing to Fake News Detection. IT Prof. 24(2): 25-31 (2022) - [j54]Rafal Kozik, Sebastian Kula, Michal Choras, Michal Wozniak:
Technical solution to counter potential crime: Text analysis to detect fake news and disinformation. J. Comput. Sci. 60: 101576 (2022) - [j53]Mikolaj Komisarek, Marek Pawlicki, Mikolaj Kowalski, Adrian Marzecki, Rafal Kozik, Michal Choras:
Hunting cyberattacks: experience from the real backbone network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 128-146 (2022) - [j52]Michal Choras, Robert Burduk, Rafal Kozik, Jörg Keller:
Advances and Practical Applications of Deep and Shallow Machine Learning. J. Univers. Comput. Sci. 28(3): 225-226 (2022) - [j51]Sebastian Kula, Rafal Kozik, Michal Choras:
Implementation of the BERT-derived architectures to tackle disinformation challenges. Neural Comput. Appl. 34(23): 20449-20461 (2022) - [j50]Michal Choras, Rafal Kozik, Marek Pawlicki:
Sensors and Pattern Recognition Methods for Security and Industrial Applications. Sensors 22(16): 5968 (2022) - [c124]Mikolaj Komisarek, Marek Pawlicki, Maria-Elena Mihailescu, Darius Mihai, Mihai Carabas, Rafal Kozik, Michal Choras:
A novel, refined dataset for real-time Network Intrusion Detection. ARES 2022: 43:1-43:8 - [c123]Aleksandra Pawlicka, Marek Pawlicki, Rafal Renk, Rafal Kozik, Michal Choras:
The cybersecurity-related ethical issues of cloud technology and how to avoid them. ARES 2022: 56:1-56:7 - [c122]Marek Pawlicki, Rafal Kozik, Michal Choras:
Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection. ARES 2022: 58:1-58:6 - [c121]Mateusz Szczepanski, Marek Pawlicki, Rafal Kozik, Michal Choras:
Fast Hybrid Oracle-Explainer Approach to Explainability Using Optimized Search of Comprehensible Decision Trees. DSAA 2022: 1-10 - [c120]Marek Pawlicki, Rafal Kozik, Michal Choras:
Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach. EICC 2022: 53-56 - [c119]Marek Pawlicki, Martin Zádník, Rafal Kozik, Michal Choras:
Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques. ICAISC (1) 2022: 82-92 - [c118]Rafal Kozik, Marek Pawlicki, Mateusz Szczepanski, Rafal Renk, Michal Choras:
Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment. ICIC (3) 2022: 257-266 - [c117]Marek Pawlicki, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation. ISD 2022 - [c116]Marek Pawlicki, Aleksandra Pawlicka, Mikolaj Komisarek, Rafal Kozik, Michal Choras:
The IoT Threat Landscape vs. Machine Learning, a.k.a. Who Attacks IoT, Why Do They Do It, and How to Prevent It? ISD 2022 - [c115]Rafal Kozik, Krzysztof Samp, Michal Choras, Marek Pawlicki:
Parameters Transfer Framework for Multi-domain Fake News Detection. MobiSec 2022: 85-96 - [c114]Aleksandra Pawlicka, Marek Pawlicki, Rafal Kozik, Michal Choras:
Fake News and Threats to IoT - The Crucial Aspects of Cyberspace in the Times of Cyberwar. RIIFORUM 2022: 31-38 - [e4]Michal Choras, Ryszard S. Choras, Marek Kurzynski, Pawel Trajdos, Jerzy Pejas, Tomasz Hyla:
Progress in Image Processing, Pattern Recognition and Communication Systems - Proceedings of the Conference (CORES, IP&C, ACS), Virtual Event / Bydgoszcz, Poland, June 28-30, 2021. Lecture Notes in Networks and Systems 255, Springer 2022, ISBN 978-3-030-81522-6 [contents] - 2021
- [j49]Luca Caviglione, Michal Choras, Igino Corona, Artur Janicki, Wojciech Mazurczyk, Marek Pawlicki, Katarzyna Wasielewska:
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection. IEEE Access 9: 5371-5396 (2021) - [j48]Michal Choras, Konstantinos P. Demestichas, Agata Gielczyk, Álvaro Herrero, Pawel Ksieniewicz, Konstantina Remoundou, Daniel Urda, Michal Wozniak:
Advanced Machine Learning techniques for fake news (online disinformation) detection: A systematic mapping study. Appl. Soft Comput. 101: 107050 (2021) - [j47]Michal Choras, Konstantinos P. Demestichas, Álvaro Herrero, Michal Wozniak:
Editorial: Applying Machine Learning for Combating Fake News and Internet/Media Content Manipulation. Appl. Soft Comput. 110: 107779 (2021) - [j46]Bartosz Cwiklinski, Agata Gielczyk, Michal Choras:
Who Will Score? A Machine Learning Approach to Supporting Football Team Building and Transfers. Entropy 23(1): 90 (2021) - [j45]Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, Witold Holubowicz, Michal Choras:
How to Effectively Collect and Process Network Data for Intrusion Detection? Entropy 23(11): 1532 (2021) - [j44]Pertti Karhapää, Woubshet Behutiye, Pilar Rodríguez, Markku Oivo, Dolors Costal, Xavier Franch, Sanja Aaramaa, Michal Choras, Jari Partanen, Antonin Abherve:
Strategies to manage quality requirements in agile software development: a multiple case study. Empir. Softw. Eng. 26(2): 28 (2021) - [j43]Michal Choras, Marek Pawlicki:
Intrusion detection approach based on optimised artificial neural network. Neurocomputing 452: 705-715 (2021) - [j42]Sebastian Laskawiec, Michal Choras, Rafal Kozik, Vijayakumar Varadarajan:
Intelligent operator: Machine learning based decision support and explainer for human operators and service providers in the fog, cloud and edge networks. J. Inf. Secur. Appl. 56: 102685 (2021) - [j41]Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, Michal Choras:
Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(1): 3-19 (2021) - [j40]Francisco J. Pérez, Victor Garrido, Alberto García, Marcelo Zambrano, Rafal Kozik, Michal Choras, Dirk Mühlenberg, Dirk Pallmer, Wilmuth Müller:
Multimedia analysis platform for crime prevention and investigation. Multim. Tools Appl. 80(15): 23681-23700 (2021) - [j39]Rafal Kozik, Marek Pawlicki, Michal Choras:
A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment. Pattern Anal. Appl. 24(4): 1441-1449 (2021) - [j38]Aleksandra Pawlicka, Michal Choras, Marek Pawlicki:
The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good. Pers. Ubiquitous Comput. 25(5): 843-852 (2021) - [c113]Mikolaj Komisarek, Marek Pawlicki, Mikolaj Kowalski, Adrian Marzecki, Rafal Kozik, Michal Choras:
Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project. ARES 2021: 65:1-65:7 - [c112]Marek Pawlicki, Michal Choras, Rafal Kozik, Witold Holubowicz:
Missing and Incomplete Data Handling in Cybersecurity Applications. ACIIDS 2021: 413-426 - [c111]Aleksandra Pawlicka, Michal Choras, Marcin Przybyszewski, Laurent Belmon, Rafal Kozik, Konstantinos P. Demestichas:
Why Do Law Enforcement Agencies Need AI for Analyzing Big Data? CISIM 2021: 331-342 - [c110]Marcin Kuchczynski, Aleksandra Pawlicka, Marek Pawlicki, Michal Choras:
Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter. CORES/IP&C/ACS 2021: 210-218 - [c109]Pawel Zyblewski, Marek Pawlicki, Rafal Kozik, Michal Choras:
Cyber-Attack Detection from IoT Benchmark Considered as Data Streams. CORES/IP&C/ACS 2021: 230-239 - [c108]Mikolaj Komisarek, Marek Pawlicki, Piotr Sobonski, Aleksandra Pawlicka, Rafal Kozik, Michal Choras:
Extending Machine Learning-Based Intrusion Detection with the Imputation Method. CORES/IP&C/ACS 2021: 284-292 - [c107]Mateusz Szczepanski, Michal Choras, Marek Pawlicki, Aleksandra Pawlicka:
The Methods and Approaches of Explainable Artificial Intelligence. ICCS (4) 2021: 3-17 - [c106]Sebastian Kula, Rafal Kozik, Michal Choras, Michal Wozniak:
Transformer Based Models in Fake News Detection. ICCS (4) 2021: 28-38 - [c105]Mateusz Szczepanski, Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, Michal Choras:
The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data. ICCCI (CCIS Volume) 2021: 241-252 - [c104]Marek Pawlicki, Rafal Kozik, Damian Puchalski, Michal Choras:
Towards AI-Based Reaction and Mitigation for e-Commerce - the ENSURESEC Engine. ICIC (3) 2021: 24-31 - [i2]Michal Choras, Konstantinos P. Demestichas, Agata Gielczyk, Álvaro Herrero, Pawel Ksieniewicz, Konstantina Remoundou, Daniel Urda, Michal Wozniak:
Advanced Machine Learning Techniques for Fake News (Online Disinformation) Detection: A Systematic Mapping Study. CoRR abs/2101.01142 (2021) - 2020
- [j37]Michal Choras, Tomasz Springer, Rafal Kozik, Lidia López, Silverio Martínez-Fernández, Prabhat Ram, Pilar Rodríguez, Xavier Franch:
Measuring and Improving Agile Processes in a Small-Size Software Development Company. IEEE Access 8: 78452-78466 (2020) - [j36]Marek Pawlicki, Michal Choras, Rafal Kozik:
Defending network intrusion detection systems against adversarial evasion attacks. Future Gener. Comput. Syst. 110: 148-154 (2020) - [j35]Agata Gielczyk, Michal Choras:
Intelligent human-centred mobile authentication system based on palmprints. J. Intell. Fuzzy Syst. 39(6): 8217-8224 (2020) - [j34]Michal Choras, Salvatore D'Antonio, Jörg Keller, Rafal Kozik:
Practical Applications of Data Analysis, Classification and Anomaly Detection. J. Univers. Comput. Sci. 26(4): 432-433 (2020) - [j33]Michal Choras, Salvatore D'Antonio, Jörg Keller, Rafal Kozik:
Progress in Features, Data, Patterns and Similarity Analysis. J. Univers. Comput. Sci. 26(6): 647-648 (2020) - [j32]Vibekananda Dutta, Michal Choras, Marek Pawlicki, Rafal Kozik:
Detection of Cyberattacks Traces in IoT Data. J. Univers. Comput. Sci. 26(11): 1422-1434 (2020) - [j31]Vibekananda Dutta, Michal Choras, Marek Pawlicki, Rafal Kozik:
A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection. Sensors 20(16): 4583 (2020) - [j30]Marc Oriol, Silverio Martínez-Fernández, Woubshet Behutiye, Carles Farré, Rafal Kozik, Pertti Seppänen, Anna Maria Vollmer, Pilar Rodríguez, Xavier Franch, Sanja Aaramaa, Antonin Abhervé, Michal Choras, Jari Partanen:
Data-driven and tool-supported elicitation of quality requirements in agile companies. Softw. Qual. J. 28(3): 931-963 (2020) - [j29]Aleksandra Pawlicka, Dagmara Jaroszewska-Choras, Michal Choras, Marek Pawlicki:
Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance. IEEE Technol. Soc. Mag. 39(4): 60-70 (2020) - [j28]Rafal Kozik, Michal Choras, Marek Pawlicki, Witold Holubowicz, Dirk Pallmer, Wilmuth Müller, Ernst-Josef Behmer, Ioannis V. Loumiotis, Konstantinos P. Demestichas, Roxana Horincar, Claire Laudy, David Faure:
Common Representational Model and Ontologies for Effective Law Enforcement Solutions. Vietnam. J. Comput. Sci. 7(1): 1-18 (2020) - [c103]Aleksandra Pawlicka, Michal Choras, Marek Pawlicki:
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. ARES 2020: 55:1-55:11 - [c102]Mikolaj Komisarek, Michal Choras, Rafal Kozik, Marek Pawlicki:
Real-time stream processing tool for detecting suspicious network patterns using machine learning. ARES 2020: 60:1-60:7 - [c101]Damian Puchalski, Luca Caviglione, Rafal Kozik, Adrian Marzecki, Slawomir Krawczyk, Michal Choras:
Stegomalware detection through structural analysis of media files. ARES 2020: 73:1-73:6 - [c100]Rafal Kozik, Michal Choras, Marek Pawlicki, Aleksandra Pawlicka, Wojciech Warczak, Grzegorz Mazgaj:
Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation. CISIS 2020: 174-183 - [c99]Rafal Kozik, Michal Choras, Sebastian Kula, Marek Pawlicki:
Distributed Architecture for Fake News Detection. CISIS 2020: 208-217 - [c98]Sebastian Kula, Michal Choras, Rafal Kozik:
Application of the BERT-Based Architecture in Fake News Detection. CISIS 2020: 239-249 - [c97]Vibekananda Dutta, Michal Choras, Rafal Kozik, Marek Pawlicki:
Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection. CISIS 2020: 405-414 - [c96]Prabhat Ram, Pilar Rodríguez, Markku Oivo, Silverio Martínez-Fernández, Alessandra Bagnato, Michal Choras, Rafal Kozik, Sanja Aaramaa, Milla Ahola:
Actionable Software Metrics: An Industrial Perspective. EASE 2020: 240-249 - [c95]Marek Pawlicki, Michal Choras, Rafal Kozik, Witold Holubowicz:
On the Impact of Network Data Balancing in Cybersecurity Applications. ICCS (4) 2020: 196-210 - [c94]Michal Choras, Marek Pawlicki, Damian Puchalski, Rafal Kozik:
Machine Learning - The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness? ICCS (4) 2020: 615-628 - [c93]Sebastian Kula, Michal Choras, Rafal Kozik, Pawel Ksieniewicz, Michal Wozniak:
Sentiment Analysis for Fake News Detection by Means of Neural Networks. ICCS (4) 2020: 653-666 - [c92]Pawel Ksieniewicz, Pawel Zyblewski, Michal Choras, Rafal Kozik, Agata Gielczyk, Michal Wozniak:
Fake News Detection from Data Streams. IJCNN 2020: 1-8 - [c91]Mateusz Szczepanski, Michal Choras, Marek Pawlicki, Rafal Kozik:
Achieving Explainability of Intrusion Detection System by Hybrid Oracle-Explainer Approach. IJCNN 2020: 1-8 - [c90]Prabhat Ram, Pilar Rodríguez, Markku Oivo, Alessandra Bagnato, Antonin Abherve, Michal Choras, Rafal Kozik:
An Empirical Investigation into Industrial Use of Software Metrics Programs. PROFES 2020: 419-433 - [e3]Michal Choras, Ryszard S. Choras:
Image Processing and Communications - Techniques, Algorithms and Applications, IP&C'2019, Bydgoszcz, Poland, 11-13 September 2019, Proceedings. Advances in Intelligent Systems and Computing 1062, Springer 2020, ISBN 978-3-030-31253-4 [contents]
2010 – 2019
- 2019
- [j27]Silverio Martínez-Fernández, Anna Maria Vollmer, Andreas Jedlitschka, Xavier Franch, Lidia López, Prabhat Ram, Pilar Rodríguez, Sanja Aaramaa, Alessandra Bagnato, Michal Choras, Jari Partanen:
Continuously Assessing and Improving Software Quality With Software Analytics Tools: A Case Study. IEEE Access 7: 68219-68239 (2019) - [j26]Sebastian Laskawiec, Michal Choras, Rafal Kozik:
New solutions for exposing clustered applications deployed in the cloud. Clust. Comput. 22(3): 829-838 (2019) - [j25]Rafal Kozik, Marek Pawlicki, Michal Choras, Witold Pedrycz:
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection. Complex. 2019: 5826737:1-5826737:9 (2019) - [j24]Michal Choras, Rafal Kozik, Damian Puchalski, Rafal Renk:
Increasing product owners' cognition and decision-making capabilities by data analysis approach. Cogn. Technol. Work. 21(2): 191-200 (2019) - [j23]Rafal Kozik, Michal Choras:
Protecting the application layer in the public domain with machine learning methods. Log. J. IGPL 27(2): 149-159 (2019) - [j22]Rafal Kozik, Michal Choras, Damian Puchalski, Rafal Renk:
Q-Rapids framework for advanced data analysis to improve rapid software development. J. Ambient Intell. Humaniz. Comput. 10(5): 1927-1936 (2019) - [j21]Rafal Kozik, Michal Choras, Jörg Keller:
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection. J. Univers. Comput. Sci. 25(1): 2-15 (2019) - [j20]Jörg Keller, Manuel Graña, Rafal Kozik, Tomasz Andrysiak, Michal Choras:
Recent Advances, Emerging Methods and Applications of Pattern Recognition. J. Univers. Comput. Sci. 25(6): 569-570 (2019) - [j19]Agata Gielczyk, Michal Choras, Rafal Kozik:
Lightweight Verification Schema for Image-Based Palmprint Biometric Systems. Mob. Inf. Syst. 2019: 2325891:1-2325891:9 (2019) - [c89]Michal Choras, Marek Pawlicki, Rafal Kozik, Konstantinos P. Demestichas, Pavlos Kosmides, Manik Gupta:
SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation. ARES 2019: 68:1-68:10 - [c88]Agata Gielczyk, Gian Luca Marcialis, Michal Choras:
Binary Code for the Compact Palmprint Representation Using Texture Features. CAIP (2) 2019: 132-142 - [c87]Agata Gielczyk, Rafal Wawrzyniak, Michal Choras:
Evaluation of the Existing Tools for Fake News Detection. CISIM 2019: 144-151 - [c86]Michal Choras, Rafal Kozik, Marek Pawlicki, Witold Holubowicz, Xavier Franch:
Software Development Metrics Prediction Using Time Series Methods. CISIM 2019: 311-323 - [c85]Marek Pawlicki, Agata Gielczyk, Rafal Kozik, Michal Choras:
Fault-Prone Software Classes Recognition via Artificial Neural Network with Granular Dataset Balancing. CORES 2019: 130-140 - [c84]Michal Choras, Marek Pawlicki, Rafal Kozik:
Recognizing Faults in Software Related Difficult Data. ICCS (3) 2019: 263-272 - [c83]Rafal Kozik, Michal Choras, Marek Pawlicki, Witold Holubowicz, Dirk Pallmer, Wilmuth Müller, Ernst-Josef Behmer, Ioannis V. Loumiotis, Konstantinos P. Demestichas, Roxana Horincar, Claire Laudy, David Faure:
The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case. ICCCI (2) 2019: 335-345 - [c82]Marek Pawlicki, Rafal Kozik, Michal Choras:
Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection. ICIC (1) 2019: 749-760 - [c81]Pawel Ksieniewicz, Michal Choras, Rafal Kozik, Michal Wozniak:
Machine Learning Methods for Fake News Classification. IDEAL (2) 2019: 332-339 - [c80]Michal Choras, Marek Pawlicki, Rafal Kozik:
The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain. IDEAL (2) 2019: 353-360 - [c79]Agata Gielczyk, Michal Choras, Rafal Kozik:
The mobile palmprint-based verification based on three-value masks. HPCS 2019: 909-914 - [c78]Marek Pawlicki, Adam Marchewka, Michal Choras, Rafal Kozik:
Gated Recurrent Units for Intrusion Detection. IP&C 2019: 142-148 - [c77]Agata Gielczyk, Karolina Dembinska, Michal Choras, Rafal Kozik:
Towards Mobile Palmprint Biometric System with the New Palmprint Database. IP&C 2019: 149-157 - [c76]Marc Oriol, Pertti Seppänen, Woubshet Behutiye, Carles Farré, Rafal Kozik, Silverio Martínez-Fernández, Pilar Rodríguez, Xavier Franch, Sanja Aaramaa, Antonin Abhervé, Michal Choras, Jari Partanen:
Data-Driven Elicitation of Quality Requirements in Agile Companies. QUATIC 2019: 49-63 - [e2]Michal Choras, Ryszard S. Choras:
Image Processing and Communications Challenges 10 - 10th International Conference, IP&C'2018, Bydgoszcz, Poland, 14-16 November 2018, Proceedings. Advances in Intelligent Systems and Computing 892, Springer 2019, ISBN 978-3-030-03657-7 [contents] - 2018
- [j18]Rafal Kozik, Michal Choras, Massimo Ficco, Francesco Palmieri:
A scalable distributed machine learning approach for attack detection in edge computing environments. J. Parallel Distributed Comput. 119: 18-26 (2018) - [j17]Barbara Bobowska, Michal Choras, Michal Wozniak:
Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity. J. Univers. Comput. Sci. 24(5): 622-633 (2018) - [j16]Rafal Kozik, Marek Pawlicki, Michal Choras:
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection. Secur. Commun. Networks 2018: 8753870:1-8753870:8 (2018) - [c75]Marek Pawlicki, Michal Choras, Rafal Kozik:
Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain. ARES 2018: 61:1-61:6 - [c74]Lidia López, Silverio Martínez-Fernández, Cristina Gómez, Michal Choras, Rafal Kozik, Liliana Guzmán, Anna Maria Vollmer, Xavier Franch, Andreas Jedlitschka:
Q-Rapids Tool Prototype: Supporting Decision-Makers in Managing Quality in Rapid Software Development. CAiSE Forum 2018: 200-208 - [c73]Michal Choras, Agata Gielczyk, Konstantinos P. Demestichas, Damian Puchalski, Rafal Kozik:
Pattern Recognition Solutions for Fake News Detection. CISIM 2018: 130-139 - [c72]Rafal Kozik, Michal Choras, Damian Puchalski, Rafal Renk:
Platform for Software Quality and Dependability Data Analysis. DepCoS-RELCOMEX 2018: 306-315 - [c71]Agata Gielczyk, Michal Choras, Rafal Kozik:
Hybrid Feature Extraction for Palmprint-Based User Authentication. HPCS 2018: 629-633 - [c70]Ryszard S. Choras, Agata Gielczyk, Michal Choras:
Ten Years of Image Processing and Communications. IP&C 2018: 3-10 - [c69]Rafal Kozik, Marek Pawlicki, Michal Choras:
Sparse Autoencoders for Unsupervised Netflow Data Classification. IP&C 2018: 192-199 - [c68]Sebastian Laskawiec, Michal Choras, Rafal Kozik:
Switching Network Protocols to Improve Communication Performance in Public Clouds. IP&C 2018: 224-236 - [c67]Monika Büscher, Catherine Easton, Xaroula Charalampia Kerasidou, Maria Alejandra Lujan Escalante, Hayley Alter, Katrina Petersen, Marie-Christine Bonnamour, David Lund, Andreas Baur, Regina Ammicht Quinn, Jessica Heesen, Lina Jasmontaite, Gloria González Fuster, Alexander Boden, Britta Hofmann, Anna Stachowicz, Michal Choras, Rafal Kozik, Kees Boersma, Martina Comes, Nicole Föger:
The Is-IT-ethical? Responsible Research and Innovation for Disaster Risk Management. ISCRAM 2018 - [e1]Michal Choras, Ryszard S. Choras:
Image Processing and Communications Challenges 9 - 9th International Conference, IP&C'2017 Bydgoszcz, Poland, September 2017, Proceedings. Advances in Intelligent Systems and Computing 681, Springer 2018, ISBN 978-3-319-68719-3 [contents] - 2017
- [j15]Rafal Kozik, Michal Choras, Witold Holubowicz:
Packets tokenization methods for web layer cyber security. Log. J. IGPL 25(1): 103-113 (2017) - [j14]Massimo Ficco, Michal Choras, Rafal Kozik:
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. J. Comput. Sci. 22: 179-186 (2017) - [j13]Konstantinos P. Demestichas, Evgenia F. Adamopoulou, Michal Choras:
5G Communications: Energy Efficiency. Mob. Inf. Syst. 2017: 5121302:1-5121302:3 (2017) - [j12]Rafal Kozik, Michal Choras:
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection. Secur. Commun. Networks 2017: 6047053:1-6047053:10 (2017) - [c66]Michal Choras, Michal Wozniak:
Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity. CECC 2017: 35-42 - [c65]Rafal Kozik, Robert Mlodzikowski, Michal Choras:
Netflow-Based Malware Detection and Data Visualisation System. CISIM 2017: 652-660 - [c64]Agata Wojciechowska, Michal Choras, Rafal Kozik:
Recent Advances in Image Pre-processing Methods for Palmprint Biometrics. CORES 2017: 268-275 - [c63]Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
The Concept of Applying Lifelong Learning Paradigm to Cybersecurity. ICIC (3) 2017: 663-671 - [c62]Agata Wojciechowska, Michal Choras, Rafal Kozik:
Evaluation of the Pre-processing Methods in Image-Based Palmprint Biometrics. IP&C 2017: 43-48 - [c61]Rafal Kozik, Joanna Morzynska, Michal Choras:
Running Sports Decision Aid Tool Based on Reinforcement Learning Approach. IP&C 2017: 160-169 - 2016
- [j11]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:
Proposal and comparison of network anomaly detection based on long-memory statistical models. Log. J. IGPL 24(6): 944-956 (2016) - [j10]Rafal Kozik, Michal Choras, Witold Holubowicz:
Evolutionary-based packets classification for anomaly detection in web layer. Secur. Commun. Networks 9(15): 2901-2910 (2016) - [j9]Lukasz Saganowski, Tomasz Andrysiak, Rafal Kozik, Michal Choras:
DWT-based anomaly detection method for cyber security of wireless sensor networks. Secur. Commun. Networks 9(15): 2911-2922 (2016) - [c60]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Cyber Security of the Application Layer of Mission Critical Industrial Systems. CISIM 2016: 342-351 - [c59]Rafal Kozik, Michal Choras:
Solution to Data Imbalance Problem in Application Layer Anomaly Detection Systems. HAIS 2016: 441-450 - [c58]Rafal Kozik, Michal Choras, Witold Holubowicz, Rafal Renk:
Extreme Learning Machines for Web Layer Anomaly Detection. IP&C 2016: 226-233 - [c57]Sebastian Laskawiec, Michal Choras:
Considering Service Name Indication for Multi-tenancy Routing in Cloud Environments. IP&C 2016: 271-278 - [c56]Marcin Przybyszewski, Anna Stachowicz, Tomasz Olejniczak, Michal Choras, Jan Zych:
Application "Pomoc" - Emergency Calls with Geo-location. ISCRAM 2016 - [c55]Rafal Kozik, Michal Choras:
The HTTP Content Segmentation Method Combined with AdaBoost Classifier for Web-Layer Anomaly Detection System. SOCO-CISIS-ICEUTE 2016: 555-563 - 2015
- [j8]Michal Choras, Rafal Kozik:
Machine learning techniques applied to detect cyber attacks on web applications. Log. J. IGPL 23(1): 45-56 (2015) - [j7]Rafal Kozik, Michal Choras, Adam Flizikowski, Marianthi Theocharidou, Vittorio Rosato, Erich Rome:
Advanced services for critical infrastructures protection. J. Ambient Intell. Humaniz. Comput. 6(6): 783-795 (2015) - [c54]Rafal Kozik, Michal Choras:
Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection System. 3PGCIC 2015: 724-729 - [c53]Michal Choras, Rafal Kozik, Maria Pilar Torres Bruna, Artsiom Yautsiukhin, Andrew Churchill, Iwona Maciejewska, Irene Eguinoa, Adel Jomni:
Comprehensive Approach to Increase Cyber Security and Resilience. ARES 2015: 686-692 - [c52]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Patterns Extraction Method for Anomaly Detection in HTTP Traffic. CISIS-ICEUTE 2015: 227-236 - [c51]Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
A Practical Framework and Guidelines to Enhance Cyber Security and Privacy. CISIS-ICEUTE 2015: 485-495 - [c50]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic. CORES 2015: 767-775 - [c49]Constantinos Patsakis, Jeroen van Rest, Michal Choras, Mélanie Bouroche:
Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption. DPM/QASA@ESORICS 2015: 169-182 - [c48]Rafal Kozik, Michal Choras:
Local Statistic Embedding for Malware Behaviour Modelling. IP&C 2015: 267-273 - [p8]Rafal Kozik, Michal Choras:
Finger Knuckle Print Identification with Hierarchical Model of Local Gradient Features. New Trends in Intelligent Information and Database Systems 2015: 73-80 - [r2]Michal Choras:
Ear Biometrics. Encyclopedia of Biometrics 2015: 363-368 - 2014
- [c47]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
A Proposal of Algorithm for Web Applications Cyber Attack Detection. CISIM 2014: 680-687 - [c46]Rafal Kozik, Michal Choras, Witold Holubowicz:
Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach. IP&C 2014: 285-292 - [c45]Rafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz:
Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications. SOCO-CISIS-ICEUTE 2014: 527-535 - [c44]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras, Rafal Kozik:
Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model. SOCO-CISIS-ICEUTE 2014: 545-554 - [i1]Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
End-users needs and requirements for tools to support critical infrastructures protection. CoRR abs/1404.7564 (2014) - 2013
- [j6]Michal Choras:
Comprehensive Approach to Information Sharing for increased Network Security and Survivability. Cybern. Syst. 44(6-7): 550-568 (2013) - [c43]Michal Choras:
A Short Overview of Feature Extractors for Knuckle Biometrics. CORES 2013: 519-526 - [c42]Michal Choras, Rafal Kozik:
Evaluation of Various Techniques for SQL Injection Attack Detection. CORES 2013: 753-762 - [c41]Rafal Kozik, Michal Choras:
Machine Learning Techniques for Cyber Attacks Detection. IP&C 2013: 391-398 - 2012
- [j5]Aladino Amantini, Michal Choras, Salvatore D'Antonio, Elyoenai Egozcue, Daniel Germanus, Reinhard Hutter:
The human role in tools for improving robustness and resilience of critical infrastructures. Cogn. Technol. Work. 14(2): 143-155 (2012) - [j4]Michal Choras, Lukasz Saganowski, Rafal Renk, Witold Holubowicz:
Statistical and signal-based network traffic recognition for anomaly detection. Expert Syst. J. Knowl. Eng. 29(3): 232-245 (2012) - [j3]Michal Choras, Rafal Kozik:
Contactless palmprint and knuckle biometrics for mobile devices. Pattern Anal. Appl. 15(1): 73-85 (2012) - [c40]Adam Flizikowski, Mateusz Majewski, Damian Puchalski, Hassnaa Moustafa, Michal Choras:
A Concept of Unobtrusive Method for Complementary Emotive User Profiling and Personalization for IPTV Platforms. IP&C 2012: 269-281 - [c39]Michal Choras, Marco Manso, Damian Puchalski, Rafal Kozik, Krzysztof Samp:
Online Social Networks: Emerging Security and Safety Applications. IP&C 2012: 291-302 - [c38]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras:
DDoS Attacks Detection by Means of Greedy Algorithms. IP&C 2012: 303-310 - [c37]Michal Choras, Rafal Kozik, Damian Puchalski, Witold Holubowicz:
Correlation Approach for SQL Injection Attacks Detection. CISIS/ICEUTE/SOCO Special Sessions 2012: 177-185 - [c36]Michal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz:
Information Exchange Mechanism between Federated Domains: P2P Approach. CISIS/ICEUTE/SOCO Special Sessions 2012: 187-196 - [c35]Tomasz Andrysiak, Lukasz Saganowski, Michal Choras:
Greedy Algorithms for Network Anomaly Detection. CISIS/ICEUTE/SOCO Special Sessions 2012: 235-244 - 2011
- [c34]Michal Choras, Rafal Kozik:
Network Event Correlation and Semantic Reasoning for Federated Networks Protection System. CISIM 2011: 48-54 - [c33]Michal Choras, Rafal Kozik:
Fast Feature Extractors for Palmprint Biometrics. CISIM 2011: 121-127 - [c32]Michal Choras, Salvatore D'Antonio, Giulio Iannello, Andreas Jedlitschka, Rafal Kozik, Klaus Miesenberger, Adam Woloszczuk:
Innovative Man Machine Interfaces and Solutions to Support Totally Blind People. IP&C 2011: 437-444 - [c31]Michal Choras, Rafal Kozik, Rafal Piotrowski, Juliusz Brzostek, Witold Holubowicz:
Network Events Correlation for Federated Networks Protection System. ServiceWave 2011: 100-111 - [p7]Michal Choras, Rafal Kozik:
Knuckle Recognition for Human Identification. Computer Recognition Systems 4 2011: 61-70 - 2010
- [j2]Michal Choras:
The lip as a biometric. Pattern Anal. Appl. 13(1): 105-112 (2010) - [c30]Michal Choras, Adam Flizikowski, Rafal Kozik, Witold Holubowicz:
Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services. ICCVG (1) 2010: 275-282 - [c29]Michal Choras, Rafal Kozik:
Feature Extraction Method for Contactless Palmprint Biometrics. ICIC (3) 2010: 435-442 - [c28]Michal Choras, Rafal Kozik, Adam Flizikowski, Witold Holubowicz:
Ontology Applied in Decision Support System for Critical Infrastructures Protection. IEA/AIE (1) 2010: 671-680 - [c27]Michal Choras, Rafal Kozik:
Knuckle Biometrics for Human Identification. IP&C 2010: 91-98 - [c26]Rafal Renk, Lukasz Saganowski, Michal Choras, Witold Holubowicz:
Performance Evaluation of ADS System Based on Redundant Dictionary. IP&C 2010: 477-484 - [c25]Rafal Kozik, Michal Choras, Witold Holubowicz:
Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection. MOBILIGHT 2010: 451-463 - [c24]Michal Choras, Salvatore D'Antonio, Rafal Kozik, Witold Holubowicz:
Intersection Approach to Vulnerability Handling. WEBIST (1) 2010: 171-174
2000 – 2009
- 2009
- [c23]Michal Choras, Adam Flizikowski, Rafal Kozik, Witold Holubowicz:
Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis. CRITIS 2009: 98-110 - [c22]Lukasz Saganowski, Michal Choras, Rafal Renk, Witold Holubowicz:
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems. ICANNGA 2009: 527-536 - [c21]Michal Choras:
Lips Recognition for Biometrics. ICB 2009: 1260-1269 - [c20]Michal Choras, Rafal Kozik, Adam Flizikowski, Rafal Renk, Witold Holubowicz:
Ontology-Based Decision Support for Security Management in Heterogeneous Networks. ICIC (2) 2009: 920-927 - [p6]Rafal Tarlowski, Michal Choras:
Digital Analysis of 2D Code Images Based on Radon Transform. Computer Recognition Systems 3 2009: 143-150 - [p5]Michal Choras, Lukasz Saganowski, Rafal Renk, Rafal Kozik, Witold Holubowicz:
Recognizing Anomalies/Intrusions in Heterogeneous Networks. Computer Recognition Systems 3 2009: 577-584 - [p4]Michal Choras:
Ear Biometrics Based on Geometrical Feature Extraction. Progress in Computer Vision and Image Analysis 2009: 321-338 - [r1]Michal Choras:
Ear Biometrics. Encyclopedia of Biometrics 2009: 233-241 - 2008
- [c19]Rafal Kozik, Aleksandra Zelek, Michal Choras:
Palmprint Recognition Enhanced by the Shape Features. CISIM 2008: 214-215 - [c18]Michal Choras:
Human Lips as Emerging Biometrics Modality. ICIAR 2008: 993-1002 - [c17]Michal Choras, Rafal Kozik, Aleksandra Zelek:
A Novel Shape-Texture Approach to Palmprint Detection and Identification. ISDA (3) 2008: 638-643 - [p3]Michal Choras:
Human Lips Recognition. Computer Recognition Systems 2 2008: 838-843 - 2007
- [j1]Ryszard S. Choras, Tomasz Andrysiak, Michal Choras:
Integrated color, texture and shape information for content-based image retrieval. Pattern Anal. Appl. 10(4): 333-343 (2007) - [c16]Michal Choras:
Image Feature Extraction Methods for Ear Biometrics--A Survey. CISIM 2007: 261-265 - [c15]Michal Choras, Piotr Mroczkowski:
Recognizing Individual Typing Patterns. IbPRIA (2) 2007: 323-330 - [c14]Ryszard S. Choras, Michal Choras:
Multimodal Hand-Palm Biometrics. ICANNGA (2) 2007: 407-414 - [c13]Michal Choras, Piotr Mroczkowski:
Keystroke Dynamics for Biometrics Identification. ICANNGA (2) 2007: 424-431 - [c12]Michal Choras:
Intelligent Computing for Automated Biometrics, Criminal and Forensic Applications. ICIC (1) 2007: 1170-1181 - [c11]Michal Choras, Piotr Mroczkowski:
Web Security Enhancement based on Keystroke Dynamics. WEBIST (1) 2007: 337-340 - [p2]Michal Choras:
Image Pre-classification for Biometrics Identification Systems. Advances in Information Processing and Protection 2007: 361-370 - 2006
- [c10]Michal Choras:
Further Developments in Geometrical Algorithms for Ear Biometrics. AMDO 2006: 58-67 - [c9]Michal Choras, Tomasz Andrysiak:
Symmetry-Based Salient Points Detection in Face Images. ICAISC 2006: 758-767 - [c8]Tomasz Andrysiak, Michal Choras:
Stereo disparity estimation using discrete orthogonal moments. ICINCO-RA 2006: 504-507 - [c7]Michal Choras, Ryszard S. Choras:
Geometrical Algorithms of Ear Contour Shape Representation and Feature Extraction. ISDA (2) 2006: 451-456 - [c6]Ryszard S. Choras, Michal Choras:
Hand Shape Geometry and Palmprint Features for the Personal Identification. ISDA (2) 2006: 1085-1090 - [c5]Michal Choras:
Ear Biometrics in Passive Human Identification Systems. PRIS 2006: 169-174 - [p1]Tomasz Andrysiak, Michal Choras:
Image Filtration and Feature Extraction for Face Recognition. Biometrics, Computer Security Systems and Artificial Intelligence Applications 2006: 3-12 - 2005
- [c4]Ryszard S. Choras, Tomasz Andrysiak, Michal Choras:
Content Based Image Retrieval Technique. CORES 2005: 371-378 - 2004
- [c3]Michal Choras:
Ear Biometrics Based on Geometrical Method of Feature Extraction. AMDO 2004: 51-61 - [c2]Michal Choras:
Human Ear Identification Based on Image Analysis. ICAISC 2004: 688-693 - 2002
- [c1]Ryszard S. Choras, Michal Choras:
Computer Visual System Analyzing the Influence of Stimulants on Human Motion. AMDO 2002: 241-250
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint