Michal Choras

According to our database1, Michal Choras authored at least 137 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Common Representational Model and Ontologies for Effective Law Enforcement Solutions.
Vietnam J. Computer Science, 2020

Progress in Features, Data, Patterns and Similarity Analysis.
J. UCS, 2020

Practical Applications of Data Analysis, Classification and Anomaly Detection.
J. UCS, 2020

Defending network intrusion detection systems against adversarial evasion attacks.
Future Gener. Comput. Syst., 2020

Measuring and Improving Agile Processes in a Small-Size Software Development Company.
IEEE Access, 2020

On the Impact of Network Data Balancing in Cybersecurity Applications.
Proceedings of the Computational Science - ICCS 2020, 2020

Sentiment Analysis for Fake News Detection by Means of Neural Networks.
Proceedings of the Computational Science - ICCS 2020, 2020

Machine Learning - The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness?
Proceedings of the Computational Science - ICCS 2020, 2020

Actionable Software Metrics: An Industrial Perspective.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020

Stegomalware detection through structural analysis of media files.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Real-time stream processing tool for detecting suspicious network patterns using machine learning.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Lightweight Verification Schema for Image-Based Palmprint Biometric Systems.
Mobile Information Systems, 2019

Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection.
J. UCS, 2019

Recent Advances, Emerging Methods and Applications of Pattern Recognition.
J. UCS, 2019

Q-Rapids framework for advanced data analysis to improve rapid software development.
J. Ambient Intell. Humaniz. Comput., 2019

Protecting the application layer in the public domain with machine learning methods.
Log. J. IGPL, 2019

Increasing product owners' cognition and decision-making capabilities by data analysis approach.
Cogn. Technol. Work., 2019

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.
Complexity, 2019

New solutions for exposing clustered applications deployed in the cloud.
Cluster Computing, 2019

Continuously Assessing and Improving Software Quality With Software Analytics Tools: A Case Study.
IEEE Access, 2019

Data-Driven Elicitation of Quality Requirements in Agile Companies.
Proceedings of the Quality of Information and Communications Technology, 2019

Gated Recurrent Units for Intrusion Detection.
Proceedings of the Image Processing and Communications, 2019

Towards Mobile Palmprint Biometric System with the New Palmprint Database.
Proceedings of the Image Processing and Communications, 2019

Machine Learning Methods for Fake News Classification.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection.
Proceedings of the Intelligent Computing Theories and Application, 2019

The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case.
Proceedings of the Computational Collective Intelligence - 11th International Conference, 2019

Recognizing Faults in Software Related Difficult Data.
Proceedings of the Computational Science - ICCS 2019, 2019

Fault-Prone Software Classes Recognition via Artificial Neural Network with Granular Dataset Balancing.
Proceedings of the Progress in Computer Recognition Systems, 2019

Evaluation of the Existing Tools for Fake News Detection.
Proceedings of the Computer Information Systems and Industrial Management, 2019

Software Development Metrics Prediction Using Time Series Methods.
Proceedings of the Computer Information Systems and Industrial Management, 2019

Binary Code for the Compact Palmprint Representation Using Texture Features.
Proceedings of the Computer Analysis of Images and Patterns, 2019

SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection.
Security and Communication Networks, 2018

Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity.
J. UCS, 2018

A scalable distributed machine learning approach for attack detection in edge computing environments.
J. Parallel Distributed Comput., 2018

Switching Network Protocols to Improve Communication Performance in Public Clouds.
Proceedings of the Image Processing and Communications Challenges 10, 2018

Sparse Autoencoders for Unsupervised Netflow Data Classification.
Proceedings of the Image Processing and Communications Challenges 10, 2018

Ten Years of Image Processing and Communications.
Proceedings of the Image Processing and Communications Challenges 10, 2018

Hybrid Feature Extraction for Palmprint-Based User Authentication.
Proceedings of the 2018 International Conference on High Performance Computing & Simulation, 2018

Platform for Software Quality and Dependability Data Analysis.
Proceedings of the Contemporary Complex Systems and Their Dependability, 2018

Pattern Recognition Solutions for Fake News Detection.
Proceedings of the Computer Information Systems and Industrial Management, 2018

Q-Rapids Tool Prototype: Supporting Decision-Makers in Managing Quality in Rapid Software Development.
Proceedings of the Information Systems in the Big Data Era, 2018

Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection.
Security and Communication Networks, 2017

5G Communications: Energy Efficiency.
Mobile Information Systems, 2017

Simulation platform for cyber-security and vulnerability analysis of critical infrastructures.
J. Comput. Sci., 2017

Packets tokenization methods for web layer cyber security.
Log. J. IGPL, 2017

Evaluation of the Pre-processing Methods in Image-Based Palmprint Biometrics.
Proceedings of the Image Processing and Communications Challenges 9, 2017

Running Sports Decision Aid Tool Based on Reinforcement Learning Approach.
Proceedings of the Image Processing and Communications Challenges 9, 2017

The Concept of Applying Lifelong Learning Paradigm to Cybersecurity.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

Recent Advances in Image Pre-processing Methods for Palmprint Biometrics.
Proceedings of the 10th International Conference on Computer Recognition Systems CORES 2017, 2017

Netflow-Based Malware Detection and Data Visualisation System.
Proceedings of the Computer Information Systems and Industrial Management, 2017

Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity.
Proceedings of the Advances in Cybersecurity, 2017

2016
DWT-based anomaly detection method for cyber security of wireless sensor networks.
Security and Communication Networks, 2016

Evolutionary-based packets classification for anomaly detection in web layer.
Security and Communication Networks, 2016

Proposal and comparison of network anomaly detection based on long-memory statistical models.
Log. J. IGPL, 2016

The HTTP Content Segmentation Method Combined with AdaBoost Classifier for Web-Layer Anomaly Detection System.
Proceedings of the International Joint Conference SOCO'16-CISIS'16-ICEUTE'16, 2016

Application "Pomoc" - Emergency Calls with Geo-location.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016

Considering Service Name Indication for Multi-tenancy Routing in Cloud Environments.
Proceedings of the Image Processing and Communications Challenges 8, 2016

Extreme Learning Machines for Web Layer Anomaly Detection.
Proceedings of the Image Processing and Communications Challenges 8, 2016

Solution to Data Imbalance Problem in Application Layer Anomaly Detection Systems.
Proceedings of the Hybrid Artificial Intelligent Systems - 11th International Conference, 2016

Cyber Security of the Application Layer of Mission Critical Industrial Systems.
Proceedings of the Computer Information Systems and Industrial Management, 2016

2015
Finger Knuckle Print Identification with Hierarchical Model of Local Gradient Features.
Proceedings of the New Trends in Intelligent Information and Database Systems, 2015

Ear Biometrics.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Advanced services for critical infrastructures protection.
J. Ambient Intell. Humaniz. Comput., 2015

Machine learning techniques applied to detect cyber attacks on web applications.
Log. J. IGPL, 2015

Local Statistic Embedding for Malware Behaviour Modelling.
Proceedings of the Image Processing and Communications Challenges 7, 2015

Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic.
Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015, 2015

Patterns Extraction Method for Anomaly Detection in HTTP Traffic.
Proceedings of the International Joint Conference, 2015

A Practical Framework and Guidelines to Enhance Cyber Security and Privacy.
Proceedings of the International Joint Conference, 2015

Comprehensive Approach to Increase Cyber Security and Resilience.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection System.
Proceedings of the 10th International Conference on P2P, 2015

2014
End-users needs and requirements for tools to support critical infrastructures protection.
CoRR, 2014

Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach.
Proceedings of the Image Processing and Communications Challenges 6, 2014

A Proposal of Algorithm for Web Applications Cyber Attack Detection.
Proceedings of the Computer Information Systems and Industrial Management, 2014

2013
Comprehensive Approach to Information Sharing for increased Network Security and Survivability.
Cybernetics and Systems, 2013

Machine Learning Techniques for Cyber Attacks Detection.
Proceedings of the Image Processing and Communications Challenges 5, 2013

Evaluation of Various Techniques for SQL Injection Attack Detection.
Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013, 2013

A Short Overview of Feature Extractors for Knuckle Biometrics.
Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013, 2013

2012
Contactless palmprint and knuckle biometrics for mobile devices.
Pattern Anal. Appl., 2012

Statistical and signal-based network traffic recognition for anomaly detection.
Expert Syst. J. Knowl. Eng., 2012

The human role in tools for improving robustness and resilience of critical infrastructures.
Cogn. Technol. Work., 2012

Information Exchange Mechanism between Federated Domains: P2P Approach.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Correlation Approach for SQL Injection Attacks Detection.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

Greedy Algorithms for Network Anomaly Detection.
Proceedings of the International Joint Conference CISIS'12-ICEUTE'12-SOCO'12 Special Sessions, 2012

A Concept of Unobtrusive Method for Complementary Emotive User Profiling and Personalization for IPTV Platforms.
Proceedings of the Image Processing and Communications Challenges 4, 2012

Online Social Networks: Emerging Security and Safety Applications.
Proceedings of the Image Processing and Communications Challenges 4, 2012

DDoS Attacks Detection by Means of Greedy Algorithms.
Proceedings of the Image Processing and Communications Challenges 4, 2012

2011
Knuckle Recognition for Human Identification.
Proceedings of the Computer Recognition Systems 4, 2011

Network Events Correlation for Federated Networks Protection System.
Proceedings of the Towards a Service-Based Internet - 4th European Conference, 2011

Innovative Man Machine Interfaces and Solutions to Support Totally Blind People.
Proceedings of the Image Processing and Communications Challenges 3, 2011

Fast Feature Extractors for Palmprint Biometrics.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

Network Event Correlation and Semantic Reasoning for Federated Networks Protection System.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

2010
The lip as a biometric.
Pattern Anal. Appl., 2010

Intersection Approach to Vulnerability Handling.
Proceedings of the WEBIST 2010, 2010

Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection.
Proceedings of the Mobile Lightweight Wireless Systems, 2010

Performance Evaluation of ADS System Based on Redundant Dictionary.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Knuckle Biometrics for Human Identification.
Proceedings of the Image Processing and Communications Challenges 2, 2010

Ontology Applied in Decision Support System for Critical Infrastructures Protection.
Proceedings of the Trends in Applied Intelligent Systems, 2010

Feature Extraction Method for Contactless Palmprint Biometrics.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services.
Proceedings of the Computer Vision and Graphics - International Conference, 2010

2009
Ear Biometrics Based on Geometrical Feature Extraction.
Proceedings of the Progress in Computer Vision and Image Analysis, 2009

Digital Analysis of 2D Code Images Based on Radon Transform.
Proceedings of the Computer Recognition Systems 3, 2009

Recognizing Anomalies/Intrusions in Heterogeneous Networks.
Proceedings of the Computer Recognition Systems 3, 2009

Ear Biometrics.
Proceedings of the Encyclopedia of Biometrics, 2009

Ontology-Based Decision Support for Security Management in Heterogeneous Networks.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009

Lips Recognition for Biometrics.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

A Novel Signal-Based Approach to Anomaly Detection in IDS Systems.
Proceedings of the Adaptive and Natural Computing Algorithms, 9th International Conference, 2009

Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis.
Proceedings of the Critical Information Infrastructures Security, 2009

2008
Human Lips Recognition.
Proceedings of the Computer Recognition Systems 2, 2008

A Novel Shape-Texture Approach to Palmprint Detection and Identification.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Human Lips as Emerging Biometrics Modality.
Proceedings of the Image Analysis and Recognition, 5th International Conference, 2008

Palmprint Recognition Enhanced by the Shape Features.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

2007
Integrated color, texture and shape information for content-based image retrieval.
Pattern Anal. Appl., 2007

Web Security Enhancement based on Keystroke Dynamics.
Proceedings of the WEBIST 2007, 2007

Intelligent Computing for Automated Biometrics, Criminal and Forensic Applications.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

Keystroke Dynamics for Biometrics Identification.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

Multimodal Hand-Palm Biometrics.
Proceedings of the Adaptive and Natural Computing Algorithms, 8th International Conference, 2007

Recognizing Individual Typing Patterns.
Proceedings of the Pattern Recognition and Image Analysis, Third Iberian Conference, 2007

Image Feature Extraction Methods for Ear Biometrics--A Survey.
Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications, 2007

Image Pre-classification for Biometrics Identification Systems.
Proceedings of the Advances in Information Processing and Protection., 2007

2006
Ear Biometrics in Passive Human Identification Systems.
Proceedings of the Pattern Recognition in Information Systems, 2006

Hand Shape Geometry and Palmprint Features for the Personal Identification.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Geometrical Algorithms of Ear Contour Shape Representation and Feature Extraction.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Stereo disparity estimation using discrete orthogonal moments.
Proceedings of the ICINCO 2006, 2006

Symmetry-Based Salient Points Detection in Face Images.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

Further Developments in Geometrical Algorithms for Ear Biometrics.
Proceedings of the Articulated Motion and Deformable Objects, 4th International Conference, 2006

Image Filtration and Feature Extraction for Face Recognition.
Proceedings of the Biometrics, 2006

2005
Content Based Image Retrieval Technique.
Proceedings of the Computer Recognition Systems, 2005

2004
Human Ear Identification Based on Image Analysis.
Proceedings of the Artificial Intelligence and Soft Computing, 2004

Ear Biometrics Based on Geometrical Method of Feature Extraction.
Proceedings of the Articulated Motion and Deformable Objects, Third International Workshop, 2004

2002
Computer Visual System Analyzing the Influence of Stimulants on Human Motion.
Proceedings of the Articulated Motion and Deformable Objects Second International Workshop, 2002


  Loading...