Marek Pawlicki

Orcid: 0000-0001-5881-6406

According to our database1, Marek Pawlicki authored at least 80 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024

An Innovative Approach to Real-Time Concept Drift Detection in Network Security.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

2023
Deep Learning for Combating Misinformation in Multicategorical Text Contents.
Sensors, December, 2023

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT.
Neurocomputing, September, 2023

First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions.
Pers. Ubiquitous Comput., April, 2023

The Application of Deep Learning Imputation and Other Advanced Methods for Handling Missing Values in Network Intrusion Detection.
Vietnam. J. Comput. Sci., February, 2023

Has the pandemic made us more digitally literate?: Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic.
J. Ambient Intell. Humaniz. Comput., 2023

What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics.
IEEE Access, 2023

How Explainable Is Explainability? Towards Better Metrics for Explainable AI.
Proceedings of the Research and Innovation Forum 2023 - Navigating Shocks and Crises in Uncertain Times, 2023

Improving Siamese Neural Networks with Border Extraction Sampling for the use in Real-Time Network Intrusion Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

Explainable Artificial Intelligence 101: Techniques, Applications and Challenges.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Towards Quality Measures for xAI algorithms: Explanation Stability.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Model Stitching Algorithm for Fake News Detection Problem.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

How to secure the IoT-based surveillance systems in an ELEGANT way.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems.
Proceedings of the Progress on Pattern Classification, Image Processing and Communications, 2023

SWAROG Project Approach to Fake News Detection Problem.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023

How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes.
Proceedings of the Computer Information Systems and Industrial Management, 2023

How to Navigate the Uncharted Waters of Cyberwar.
Proceedings of the 29th Americas Conference on Information Systems, 2023

Modern NetFlow network dataset with labeled attacks and detection methods.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Sensors and Pattern Recognition Methods for Security and Industrial Applications.
Sensors, 2022

Hunting cyberattacks: experience from the real backbone network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

A survey on neural networks for (cyber-) security and (cyber-) security of neural networks.
Neurocomputing, 2022

Fake news detection platform - conceptual architecture and prototype.
Log. J. IGPL, 2022

Unsupervised network traffic anomaly detection with deep autoencoders.
Log. J. IGPL, 2022

Fake News and Threats to IoT - The Crucial Aspects of Cyberspace in the Times of Cyberwar.
Proceedings of the Research and Innovation Forum 2022: Rupture, 2022

Parameters Transfer Framework for Multi-domain Fake News Detection.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

The IoT Threat Landscape vs. Machine Learning, a.k.a. Who Attacks IoT, Why Do They Do It, and How to Prevent It?
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022

Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation.
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022

Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment.
Proceedings of the Intelligent Computing Methodologies - 18th International Conference, 2022

Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques.
Proceedings of the Artificial Intelligence and Soft Computing, 2022

Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

Fast Hybrid Oracle-Explainer Approach to Explainability Using Optimized Search of Comprehensible Decision Trees.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

The cybersecurity-related ethical issues of cloud technology and how to avoid them.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

A novel, refined dataset for real-time Network Intrusion Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
A Systematic Review of Recommender Systems and Their Applications in Cybersecurity.
Sensors, 2021

The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset.
Sensors, 2021

The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good.
Pers. Ubiquitous Comput., 2021

A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment.
Pattern Anal. Appl., 2021

Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Intrusion detection approach based on optimised artificial neural network.
Neurocomputing, 2021

Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks.
Entropy, 2021

How to Effectively Collect and Process Network Data for Intrusion Detection?
Entropy, 2021

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection.
IEEE Access, 2021

Towards AI-Based Reaction and Mitigation for e-Commerce - the ENSURESEC Engine.
Proceedings of the Intelligent Computing Theories and Application, 2021

The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data.
Proceedings of the Advances in Computational Collective Intelligence, 2021

The Methods and Approaches of Explainable Artificial Intelligence.
Proceedings of the Computational Science - ICCS 2021, 2021

Cyber-Attack Detection from IoT Benchmark Considered as Data Streams.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Extending Machine Learning-Based Intrusion Detection with the Imputation Method.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Missing and Incomplete Data Handling in Cybersecurity Applications.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021

Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Common Representational Model and Ontologies for Effective Law Enforcement Solutions.
Vietnam. J. Comput. Sci., 2020

Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance.
IEEE Technol. Soc. Mag., 2020

A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection.
Sensors, 2020

Detection of Cyberattacks Traces in IoT Data.
J. Univers. Comput. Sci., 2020

Defending network intrusion detection systems against adversarial evasion attacks.
Future Gener. Comput. Syst., 2020

Achieving Explainability of Intrusion Detection System by Hybrid Oracle-Explainer Approach.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

On the Impact of Network Data Balancing in Cybersecurity Applications.
Proceedings of the Computational Science - ICCS 2020, 2020

Machine Learning - The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness?
Proceedings of the Computational Science - ICCS 2020, 2020

Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Distributed Architecture for Fake News Detection.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Real-time stream processing tool for detecting suspicious network patterns using machine learning.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.
Complex., 2019

Gated Recurrent Units for Intrusion Detection.
Proceedings of the Image Processing and Communications, 2019

The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection.
Proceedings of the Intelligent Computing Theories and Application, 2019

The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case.
Proceedings of the Computational Collective Intelligence - 11th International Conference, 2019

Recognizing Faults in Software Related Difficult Data.
Proceedings of the Computational Science - ICCS 2019, 2019

Fault-Prone Software Classes Recognition via Artificial Neural Network with Granular Dataset Balancing.
Proceedings of the Progress in Computer Recognition Systems, 2019

Software Development Metrics Prediction Using Time Series Methods.
Proceedings of the Computer Information Systems and Industrial Management, 2019

SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection.
Secur. Commun. Networks, 2018

Sparse Autoencoders for Unsupervised Netflow Data Classification.
Proceedings of the Image Processing and Communications Challenges 10, 2018

Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018


  Loading...