Michal Choras

Orcid: 0000-0003-1405-9911

Affiliations:
  • University of Science and Technology (UTP), Bydgoszcz, Poland


According to our database1, Michal Choras authored at least 221 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024

An Innovative Approach to Real-Time Concept Drift Detection in Network Security.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

2023
Deep Learning for Combating Misinformation in Multicategorical Text Contents.
Sensors, December, 2023

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT.
Neurocomputing, September, 2023

First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions.
Pers. Ubiquitous Comput., April, 2023

<i>Alphabet Flatting</i> as a variant of n-gram feature extraction method in ensemble classification of fake news.
Eng. Appl. Artif. Intell., April, 2023

The Application of Deep Learning Imputation and Other Advanced Methods for Handling Missing Values in Network Intrusion Detection.
Vietnam. J. Comput. Sci., February, 2023

Has the pandemic made us more digitally literate?: Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic.
J. Ambient Intell. Humaniz. Comput., 2023

What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics.
IEEE Access, 2023

How Explainable Is Explainability? Towards Better Metrics for Explainable AI.
Proceedings of the Research and Innovation Forum 2023 - Navigating Shocks and Crises in Uncertain Times, 2023

Improving Siamese Neural Networks with Border Extraction Sampling for the use in Real-Time Network Intrusion Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

Explainable Artificial Intelligence 101: Techniques, Applications and Challenges.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Model Stitching Algorithm for Fake News Detection Problem.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

How to secure the IoT-based surveillance systems in an ELEGANT way.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Privacy risk analysis and metrics in capturing and storing network traffic.
Proceedings of the 24th International Conference on Control Systems and Computer Science, 2023

Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems.
Proceedings of the Progress on Pattern Classification, Image Processing and Communications, 2023

Document Annotation Tool for News Content Analysis.
Proceedings of the Progress on Pattern Classification, Image Processing and Communications, 2023

SWAROG Project Approach to Fake News Detection Problem.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023

Analysis of Extractive Text Summarization Methods as a Binary Classification Problem.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023

How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes.
Proceedings of the Computer Information Systems and Industrial Management, 2023

How to Navigate the Uncharted Waters of Cyberwar.
Proceedings of the 29th Americas Conference on Information Systems, 2023

Security Architecture in the SILVANUS project.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Modern NetFlow network dataset with labeled attacks and detection methods.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Sensors and Pattern Recognition Methods for Security and Industrial Applications.
Sensors, 2022

Implementation of the BERT-derived architectures to tackle disinformation challenges.
Neural Comput. Appl., 2022

Advances and Practical Applications of Deep and Shallow Machine Learning.
J. Univers. Comput. Sci., 2022

Hunting cyberattacks: experience from the real backbone network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Technical solution to counter potential crime: Text analysis to detect fake news and disinformation.
J. Comput. Sci., 2022

How Machine Learning May Prevent the Breakdown of Democracy by Contributing to Fake News Detection.
IT Prof., 2022

A survey on neural networks for (cyber-) security and (cyber-) security of neural networks.
Neurocomputing, 2022

Fake news detection platform - conceptual architecture and prototype.
Log. J. IGPL, 2022

Unsupervised network traffic anomaly detection with deep autoencoders.
Log. J. IGPL, 2022

Advances in Computer Recognition, Image Processing and Communications.
Entropy, 2022

The double-edged sword of AI: Ethical Adversarial Attacks to counter artificial intelligence for crime.
AI Ethics, 2022

Fake News and Threats to IoT - The Crucial Aspects of Cyberspace in the Times of Cyberwar.
Proceedings of the Research and Innovation Forum 2022: Rupture, 2022

Parameters Transfer Framework for Multi-domain Fake News Detection.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

The IoT Threat Landscape vs. Machine Learning, a.k.a. Who Attacks IoT, Why Do They Do It, and How to Prevent It?
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022

Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation.
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022

Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment.
Proceedings of the Intelligent Computing Methodologies - 18th International Conference, 2022

Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques.
Proceedings of the Artificial Intelligence and Soft Computing, 2022

Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

Fast Hybrid Oracle-Explainer Approach to Explainability Using Optimized Search of Comprehensible Decision Trees.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

The cybersecurity-related ethical issues of cloud technology and how to avoid them.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

A novel, refined dataset for real-time Network Intrusion Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good.
Pers. Ubiquitous Comput., 2021

A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment.
Pattern Anal. Appl., 2021

Multimedia analysis platform for crime prevention and investigation.
Multim. Tools Appl., 2021

Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Intelligent operator: Machine learning based decision support and explainer for human operators and service providers in the fog, cloud and edge networks.
J. Inf. Secur. Appl., 2021

Intrusion detection approach based on optimised artificial neural network.
Neurocomputing, 2021

Strategies to manage quality requirements in agile software development: a multiple case study.
Empir. Softw. Eng., 2021

How to Effectively Collect and Process Network Data for Intrusion Detection?
Entropy, 2021

Who Will Score? A Machine Learning Approach to Supporting Football Team Building and Transfers.
Entropy, 2021

Editorial: Applying Machine Learning for Combating Fake News and Internet/Media Content Manipulation.
Appl. Soft Comput., 2021

Advanced Machine Learning techniques for fake news (online disinformation) detection: A systematic mapping study.
Appl. Soft Comput., 2021

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection.
IEEE Access, 2021

Towards AI-Based Reaction and Mitigation for e-Commerce - the ENSURESEC Engine.
Proceedings of the Intelligent Computing Theories and Application, 2021

The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data.
Proceedings of the Advances in Computational Collective Intelligence, 2021

The Methods and Approaches of Explainable Artificial Intelligence.
Proceedings of the Computational Science - ICCS 2021, 2021

Transformer Based Models in Fake News Detection.
Proceedings of the Computational Science - ICCS 2021, 2021

Cyber-Attack Detection from IoT Benchmark Considered as Data Streams.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Extending Machine Learning-Based Intrusion Detection with the Imputation Method.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Why Do Law Enforcement Agencies Need AI for Analyzing Big Data?
Proceedings of the Computer Information Systems and Industrial Management, 2021

Missing and Incomplete Data Handling in Cybersecurity Applications.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021

Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Common Representational Model and Ontologies for Effective Law Enforcement Solutions.
Vietnam. J. Comput. Sci., 2020

Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance.
IEEE Technol. Soc. Mag., 2020

Data-driven and tool-supported elicitation of quality requirements in agile companies.
Softw. Qual. J., 2020

A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection.
Sensors, 2020

Detection of Cyberattacks Traces in IoT Data.
J. Univers. Comput. Sci., 2020

Progress in Features, Data, Patterns and Similarity Analysis.
J. Univers. Comput. Sci., 2020

Practical Applications of Data Analysis, Classification and Anomaly Detection.
J. Univers. Comput. Sci., 2020

Intelligent human-centred mobile authentication system based on palmprints.
J. Intell. Fuzzy Syst., 2020

Defending network intrusion detection systems against adversarial evasion attacks.
Future Gener. Comput. Syst., 2020

Measuring and Improving Agile Processes in a Small-Size Software Development Company.
IEEE Access, 2020

An Empirical Investigation into Industrial Use of Software Metrics Programs.
Proceedings of the Product-Focused Software Process Improvement, 2020

Achieving Explainability of Intrusion Detection System by Hybrid Oracle-Explainer Approach.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Fake News Detection from Data Streams.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

On the Impact of Network Data Balancing in Cybersecurity Applications.
Proceedings of the Computational Science - ICCS 2020, 2020

Sentiment Analysis for Fake News Detection by Means of Neural Networks.
Proceedings of the Computational Science - ICCS 2020, 2020

Machine Learning - The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness?
Proceedings of the Computational Science - ICCS 2020, 2020

Actionable Software Metrics: An Industrial Perspective.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

Application of the BERT-Based Architecture in Fake News Detection.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Distributed Architecture for Fake News Detection.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Stegomalware detection through structural analysis of media files.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Real-time stream processing tool for detecting suspicious network patterns using machine learning.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Lightweight Verification Schema for Image-Based Palmprint Biometric Systems.
Mob. Inf. Syst., 2019

Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection.
J. Univers. Comput. Sci., 2019

Recent Advances, Emerging Methods and Applications of Pattern Recognition.
J. Univers. Comput. Sci., 2019

Q-Rapids framework for advanced data analysis to improve rapid software development.
J. Ambient Intell. Humaniz. Comput., 2019

Protecting the application layer in the public domain with machine learning methods.
Log. J. IGPL, 2019

Increasing product owners' cognition and decision-making capabilities by data analysis approach.
Cogn. Technol. Work., 2019

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.
Complex., 2019

New solutions for exposing clustered applications deployed in the cloud.
Clust. Comput., 2019

Continuously Assessing and Improving Software Quality With Software Analytics Tools: A Case Study.
IEEE Access, 2019

Data-Driven Elicitation of Quality Requirements in Agile Companies.
Proceedings of the Quality of Information and Communications Technology, 2019

Gated Recurrent Units for Intrusion Detection.
Proceedings of the Image Processing and Communications, 2019

Towards Mobile Palmprint Biometric System with the New Palmprint Database.
Proceedings of the Image Processing and Communications, 2019

The mobile palmprint-based verification based on three-value masks.
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019

Machine Learning Methods for Fake News Classification.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection.
Proceedings of the Intelligent Computing Theories and Application, 2019

The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case.
Proceedings of the Computational Collective Intelligence - 11th International Conference, 2019

Recognizing Faults in Software Related Difficult Data.
Proceedings of the Computational Science - ICCS 2019, 2019

Fault-Prone Software Classes Recognition via Artificial Neural Network with Granular Dataset Balancing.
Proceedings of the Progress in Computer Recognition Systems, 2019

Evaluation of the Existing Tools for Fake News Detection.
Proceedings of the Computer Information Systems and Industrial Management, 2019

Software Development Metrics Prediction Using Time Series Methods.
Proceedings of the Computer Information Systems and Industrial Management, 2019

Binary Code for the Compact Palmprint Representation Using Texture Features.
Proceedings of the Computer Analysis of Images and Patterns, 2019

SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection.
Secur. Commun. Networks, 2018

Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity.
J. Univers. Comput. Sci., 2018

A scalable distributed machine learning approach for attack detection in edge computing environments.
J. Parallel Distributed Comput., 2018

The Is-IT-ethical? Responsible Research and Innovation for Disaster Risk Management.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018

Switching Network Protocols to Improve Communication Performance in Public Clouds.
Proceedings of the Image Processing and Communications Challenges 10, 2018

Sparse Autoencoders for Unsupervised Netflow Data Classification.
Proceedings of the Image Processing and Communications Challenges 10, 2018

Ten Years of Image Processing and Communications.
Proceedings of the Image Processing and Communications Challenges 10, 2018

Hybrid Feature Extraction for Palmprint-Based User Authentication.
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

Platform for Software Quality and Dependability Data Analysis.
Proceedings of the Contemporary Complex Systems and Their Dependability, 2018

Pattern Recognition Solutions for Fake News Detection.
Proceedings of the Computer Information Systems and Industrial Management, 2018

Q-Rapids Tool Prototype: Supporting Decision-Makers in Managing Quality in Rapid Software Development.
Proceedings of the Information Systems in the Big Data Era, 2018

Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection.
Secur. Commun. Networks, 2017

5G Communications: Energy Efficiency.
Mob. Inf. Syst., 2017

Simulation platform for cyber-security and vulnerability analysis of critical infrastructures.
J. Comput. Sci., 2017

Packets tokenization methods for web layer cyber security.
Log. J. IGPL, 2017

Evaluation of the Pre-processing Methods in Image-Based Palmprint Biometrics.
Proceedings of the Image Processing and Communications Challenges 9, 2017

Running Sports Decision Aid Tool Based on Reinforcement Learning Approach.
Proceedings of the Image Processing and Communications Challenges 9, 2017

The Concept of Applying Lifelong Learning Paradigm to Cybersecurity.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

Recent Advances in Image Pre-processing Methods for Palmprint Biometrics.
Proceedings of the 10th International Conference on Computer Recognition Systems CORES 2017, 2017

Netflow-Based Malware Detection and Data Visualisation System.
Proceedings of the Computer Information Systems and Industrial Management, 2017

Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity.
Proceedings of the Advances in Cybersecurity, 2017

2016
DWT-based anomaly detection method for cyber security of wireless sensor networks.
Secur. Commun. Networks, 2016

Evolutionary-based packets classification for anomaly detection in web layer.
Secur. Commun. Networks, 2016

Proposal and comparison of network anomaly detection based on long-memory statistical models.
Log. J. IGPL, 2016

The HTTP Content Segmentation Method Combined with AdaBoost Classifier for Web-Layer Anomaly Detection System.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

Application "Pomoc" - Emergency Calls with Geo-location.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

Considering Service Name Indication for Multi-tenancy Routing in Cloud Environments.
Proceedings of the Image Processing and Communications Challenges 8, 2016

Extreme Learning Machines for Web Layer Anomaly Detection.
Proceedings of the Image Processing and Communications Challenges 8, 2016

Solution to Data Imbalance Problem in Application Layer Anomaly Detection Systems.
Proceedings of the Hybrid Artificial Intelligent Systems - 11th International Conference, 2016

Cyber Security of the Application Layer of Mission Critical Industrial Systems.
Proceedings of the Computer Information Systems and Industrial Management, 2016

2015
Finger Knuckle Print Identification with Hierarchical Model of Local Gradient Features.
Proceedings of the New Trends in Intelligent Information and Database Systems, 2015

Ear Biometrics.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Advanced services for critical infrastructures protection.
J. Ambient Intell. Humaniz. Comput., 2015

Machine learning techniques applied to detect cyber attacks on web applications.
Log. J. IGPL, 2015

Local Statistic Embedding for Malware Behaviour Modelling.
Proceedings of the Image Processing and Communications Challenges 7, 2015

Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic.
Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015, 2015

Patterns Extraction Method for Anomaly Detection in HTTP Traffic.
Proceedings of the International Joint Conference, 2015

A Practical Framework and Guidelines to Enhance Cyber Security and Privacy.
Proceedings of the International Joint Conference, 2015

Comprehensive Approach to Increase Cyber Security and Resilience.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection System.
Proceedings of the 10th International Conference on P2P, 2015

2014
End-users needs and requirements for tools to support critical infrastructures protection.
CoRR, 2014

Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach.
Proceedings of the Image Processing and Communications Challenges 6, 2014

A Proposal of Algorithm for Web Applications Cyber Attack Detection.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2013
Comprehensive Approach to Information Sharing for increased Network Security and Survivability.
Cybern. Syst., 2013

Machine Learning Techniques for Cyber Attacks Detection.
Proceedings of the Image Processing and Communications Challenges 5, 2013

Evaluation of Various Techniques for SQL Injection Attack Detection.
Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013, 2013

A Short Overview of Feature Extractors for Knuckle Biometrics.
Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013, 2013

2012
Contactless palmprint and knuckle biometrics for mobile devices.
Pattern Anal. Appl., 2012

Statistical and signal-based network traffic recognition for anomaly detection.
Expert Syst. J. Knowl. Eng., 2012

The human role in tools for improving robustness and resilience of critical infrastructures.
Cogn. Technol. Work., 2012

Information Exchange Mechanism between Federated Domains: P2P Approach.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Correlation Approach for SQL Injection Attacks Detection.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Greedy Algorithms for Network Anomaly Detection.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

A Concept of Unobtrusive Method for Complementary Emotive User Profiling and Personalization for IPTV Platforms.
Proceedings of the Image Processing and Communications Challenges 4, 2012

Online Social Networks: Emerging Security and Safety Applications.
Proceedings of the Image Processing and Communications Challenges 4, 2012

DDoS Attacks Detection by Means of Greedy Algorithms.
Proceedings of the Image Processing and Communications Challenges 4, 2012

2011
Knuckle Recognition for Human Identification.
Proceedings of the Computer Recognition Systems 4, 2011

Network Events Correlation for Federated Networks Protection System.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Innovative Man Machine Interfaces and Solutions to Support Totally Blind People.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Fast Feature Extractors for Palmprint Biometrics.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

Network Event Correlation and Semantic Reasoning for Federated Networks Protection System.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

2010
The lip as a biometric.
Pattern Anal. Appl., 2010

Intersection Approach to Vulnerability Handling.
Proceedings of the WEBIST 2010, 2010

Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Performance Evaluation of ADS System Based on Redundant Dictionary.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Knuckle Biometrics for Human Identification.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Ontology Applied in Decision Support System for Critical Infrastructures Protection.
Proceedings of the Trends in Applied Intelligent Systems, 2010

Feature Extraction Method for Contactless Palmprint Biometrics.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services.
Proceedings of the Computer Vision and Graphics - International Conference, 2010

2009
Ear Biometrics Based on Geometrical Feature Extraction.
Proceedings of the Progress in Computer Vision and Image Analysis, 2009

Digital Analysis of 2D Code Images Based on Radon Transform.
Proceedings of the Computer Recognition Systems 3, 2009

Recognizing Anomalies/Intrusions in Heterogeneous Networks.
Proceedings of the Computer Recognition Systems 3, 2009

Ear Biometrics.
Proceedings of the Encyclopedia of Biometrics, 2009

Ontology-Based Decision Support for Security Management in Heterogeneous Networks.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009

Lips Recognition for Biometrics.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

A Novel Signal-Based Approach to Anomaly Detection in IDS Systems.
Proceedings of the Adaptive and Natural Computing Algorithms, 9th International Conference, 2009

Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
Human Lips Recognition.
Proceedings of the Computer Recognition Systems 2, 2008

A Novel Shape-Texture Approach to Palmprint Detection and Identification.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Human Lips as Emerging Biometrics Modality.
Proceedings of the Image Analysis and Recognition, 5th International Conference, 2008

Palmprint Recognition Enhanced by the Shape Features.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

2007
Integrated color, texture and shape information for content-based image retrieval.
Pattern Anal. Appl., 2007

Web Security Enhancement based on Keystroke Dynamics.
Proceedings of the WEBIST 2007, 2007

Intelligent Computing for Automated Biometrics, Criminal and Forensic Applications.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Keystroke Dynamics for Biometrics Identification.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

Multimodal Hand-Palm Biometrics.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

Recognizing Individual Typing Patterns.
Proceedings of the Pattern Recognition and Image Analysis, Third Iberian Conference, 2007

Image Feature Extraction Methods for Ear Biometrics--A Survey.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007

Image Pre-classification for Biometrics Identification Systems.
Proceedings of the Advances in Information Processing and Protection., 2007

2006
Ear Biometrics in Passive Human Identification Systems.
Proceedings of the Pattern Recognition in Information Systems, 2006

Hand Shape Geometry and Palmprint Features for the Personal Identification.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Geometrical Algorithms of Ear Contour Shape Representation and Feature Extraction.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Stereo disparity estimation using discrete orthogonal moments.
Proceedings of the ICINCO 2006, 2006

Symmetry-Based Salient Points Detection in Face Images.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

Further Developments in Geometrical Algorithms for Ear Biometrics.
Proceedings of the Articulated Motion and Deformable Objects, 4th International Conference, 2006

Image Filtration and Feature Extraction for Face Recognition.
Proceedings of the Biometrics, 2006

2005
Content Based Image Retrieval Technique.
Proceedings of the Computer Recognition Systems, 2005

2004
Human Ear Identification Based on Image Analysis.
Proceedings of the Artificial Intelligence and Soft Computing, 2004

Ear Biometrics Based on Geometrical Method of Feature Extraction.
Proceedings of the Articulated Motion and Deformable Objects, Third International Workshop, 2004

2002
Computer Visual System Analyzing the Influence of Stimulants on Human Motion.
Proceedings of the Articulated Motion and Deformable Objects Second International Workshop, 2002


  Loading...