Aleksandra Pawlicka

Orcid: 0000-0003-4380-014X

According to our database1, Aleksandra Pawlicka authored at least 31 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024

2023
Deep Learning for Combating Misinformation in Multicategorical Text Contents.
Sensors, December, 2023

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT.
Neurocomputing, September, 2023

First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions.
Pers. Ubiquitous Comput., April, 2023

Has the pandemic made us more digitally literate?: Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic.
J. Ambient Intell. Humaniz. Comput., 2023

What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics.
IEEE Access, 2023

How Explainable Is Explainability? Towards Better Metrics for Explainable AI.
Proceedings of the Research and Innovation Forum 2023 - Navigating Shocks and Crises in Uncertain Times, 2023

Explainable Artificial Intelligence 101: Techniques, Applications and Challenges.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Model Stitching Algorithm for Fake News Detection Problem.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

How to secure the IoT-based surveillance systems in an ELEGANT way.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems.
Proceedings of the Progress on Pattern Classification, Image Processing and Communications, 2023

SWAROG Project Approach to Fake News Detection Problem.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023

How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes.
Proceedings of the Computer Information Systems and Industrial Management, 2023

How to Navigate the Uncharted Waters of Cyberwar.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
How Machine Learning May Prevent the Breakdown of Democracy by Contributing to Fake News Detection.
IT Prof., 2022

Fake News and Threats to IoT - The Crucial Aspects of Cyberspace in the Times of Cyberwar.
Proceedings of the Research and Innovation Forum 2022: Rupture, 2022

The IoT Threat Landscape vs. Machine Learning, a.k.a. Who Attacks IoT, Why Do They Do It, and How to Prevent It?
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022

Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation.
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022

The cybersecurity-related ethical issues of cloud technology and how to avoid them.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
A Systematic Review of Recommender Systems and Their Applications in Cybersecurity.
Sensors, 2021

The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good.
Pers. Ubiquitous Comput., 2021

The Methods and Approaches of Explainable Artificial Intelligence.
Proceedings of the Computational Science - ICCS 2021, 2021

Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Extending Machine Learning-Based Intrusion Detection with the Imputation Method.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Why Do Law Enforcement Agencies Need AI for Analyzing Big Data?
Proceedings of the Computer Information Systems and Industrial Management, 2021

2020
Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance.
IEEE Technol. Soc. Mag., 2020

Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020


  Loading...