Michal Kedziora

Orcid: 0000-0002-7764-1303

According to our database1, Michal Kedziora authored at least 25 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Analysis of segregated witness implementation for increasing efficiency and security of the Bitcoin cryptocurrency.
J. Inf. Telecommun., January, 2023

2022
Multifactor Authentication System Using Simplified EEG Brain-Computer Interface.
IEEE Trans. Hum. Mach. Syst., 2022

Guest Editorial Special Issue on Graph-Powered Machine Learning for Internet of Things.
IEEE Internet Things J., 2022

Performance and scalability evaluation of a permissioned Blockchain based on the Hyperledger Fabric, Sawtooth and Iroha.
Comput. Sci. Inf. Syst., 2022

Detecting Attacks on Computer Networks Using Artificial Intelligence Algorithms.
Proceedings of the 14th International Conference on Management of Digital EcoSystems, 2022

Multiplatform Comparative Analysis of Intelligent Robots for Communication Efficiency in Smart Dialogs.
Proceedings of the Advanced Information Networking and Applications, 2022

Using Simplified EEG-Based Brain Computer Interface and Decision Tree Classifier for Emotions Detection.
Proceedings of the Advanced Information Networking and Applications, 2022

An Empirical Comparison of Steganography and Steganalysis Solutions.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2022

Using Brain-Computer Interface (BCI) and Artificial Intelligence for EEG Signal Analysis.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2022

2021
Cloud Solutions for Private Permissionless Blockchain Deployment.
Comput. Informatics, 2021

Adversarial Attacks on Face Detection Algorithms Using Anti-facial Recognition T-Shirts.
Proceedings of the Advances in Computational Collective Intelligence, 2021

Security and Scalability in Private Permissionless Blockchain: Problems and Solutions Leading to Creating Consent-as-a-Service (CaaS) Deployment.
Proceedings of the Advances in Computational Collective Intelligence, 2021

Progressive Mobile Web Application Subresource Tampering During Penetration Testing.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain.
Data-Centric Business and Applications, 2020

Secure Decentralized Application Development of Blockchain-based Games.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

Security of Blockchain Distributed Ledger Consensus Mechanism in Context of the Sybil Attack.
Proceedings of the Trends in Artificial Intelligence Theory and Applications. Artificial Intelligence Practices, 2020

State Management and Software Architecture Approaches in Cross-platform Flutter Applications.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

Practical Analysis of Traceability Problem in Monero's Blockchain.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

Android Hook Detection Based on Machine Learning and Dynamic Analysis.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Analysis of Blockchain Selfish Mining Attacks.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology - ISAT 2019, 2019

Correspondent Sensitive Encryption Standard (CSES) Algorithm in Insecure Communication Channel.
Proceedings of the Engineering in Dependability of Computer Systems and Networks, 2019

2017
Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems.
Proceedings of the Applications and Techniques in Information Security, 2017

2015
Context-sensitive text mining with fitness leveling Genetic Algorithm.
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015

2013
Methods for Detecting and Analyzing Hidden FAT32 Volumes Created with the Use of Cryptographic Tools.
Proceedings of the New Results in Dependability and Computer Systems, 2013

2011
Efficient N-Byte Slack Space Hashing in Retrieving and Identifying Partially Recovered Data.
Proceedings of the ICSOFT 2011, 2011


  Loading...