Michal Szczepanik

Orcid: 0000-0001-9801-992X

According to our database1, Michal Szczepanik authored at least 15 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Learning about threat from friends and strangers is equally effective: An fMRI study on observational fear conditioning.
NeuroImage, 2022

Computer Diagnosis of Color Vision Deficiencies Using a Mobile Device.
Proceedings of the Intelligent and Safe Computer Systems in Control and Diagnostics, 2022

2021
Functional reorganization of the reading network in the course of foreign language acquisition.
NeuroImage, 2021

Progressive Mobile Web Application Subresource Tampering During Penetration Testing.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
State Management and Software Architecture Approaches in Cross-platform Flutter Applications.
Proceedings of the 15th International Conference on Evaluation of Novel Approaches to Software Engineering, 2020

Android Hook Detection Based on Machine Learning and Dynamic Analysis.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Functional hierarchy for tactile processing in the visual cortex of sighted adults.
NeuroImage, 2019

Analysis of Blockchain Selfish Mining Attacks.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology - ISAT 2019, 2019

2017
Security of Mobile Banking Applications.
Proceedings of the Advanced Solutions in Diagnostics and Fault Tolerant Control, 2017

2016
Analysis of the Minutia Groups Base of Currents Algorithms 'Pasterns' Database.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016

2015
Security Lock System for Mobile Devices Based on Fingerprint Recognition Algorithm.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology - ISAT 2015, 2015

2012
Fingerprint Recognition Based on Minutes Groups Using Directing Attention Algorithms.
Proceedings of the Artificial Intelligence and Soft Computing, 2012

Data Management for Fingerprint Recognition Algorithm Based on Characteristic Points' Groups.
Proceedings of the New Trends in Databases and Information Systems, 2012

2010
Detecting Malwares in Honeynet Using a Multi-agent System.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Detecting New and Unknown Malwares Using Honeynet.
Proceedings of the Advances in Multimedia and Network Information System Technologies, 2010


  Loading...