Urszula Ogiela

Orcid: 0000-0002-6552-9920

According to our database1, Urszula Ogiela authored at least 77 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards User-Oriented Steganography.
Proceedings of the Advanced Information Networking and Applications, 2024

Transformative Intelligence in Data Analysis and Knowledge Exploration.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Linguistic methods in healthcare application and COVID-19 variants classification.
Neural Comput. Appl., July, 2023

Context-Aware Approaches in Cognitive Cloud and Cybersecurity.
Proceedings of the Advances in Networked-based Information Systems, 2023

Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

User-Oriented Cybersecurity Systems.
Proceedings of the Advanced Information Networking and Applications, 2023

Cybersecurity of Distributed Systems and Dispersed Computing.
Proceedings of the Advanced Information Networking and Applications, 2023

AI Cognitive - Based Systems Supporting Learning Processes.
Proceedings of the Artificial Intelligence in Education. Posters and Late Breaking Results, Workshops and Tutorials, Industry and Innovation Tracks, Practitioners, Doctoral Consortium and Blue Sky, 2023

2022
Predictive intelligence in evaluation of visual perception thresholds for visual pattern recognition and understanding.
Inf. Process. Manag., 2022

Human-AI Protocols for Cloud Data Management.
Proceedings of the Advances in Network-Based Information Systems, 2022

DNA-based Secret Sharing and Hiding in Dispersed Computing.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

Personalized Security Solutions in Dispersed Computing.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2022

Hybrid Intelligence Approaches for Distributed Information Management.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 16th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2022), June 29, 2022

Visual Authentication Codes Generated Using Predictive Intelligence.
Proceedings of the Advances in Internet, Data & Web Technologies, 2022

Steganographic Approaches for Carrier Related Information Hiding.
Proceedings of the Complex, Intelligent and Software Intensive Systems - Proceedings of the 16th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2022), June 29, 2022

Human-Centered Protocols for Secure Data Management in Distributed Systems.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2022

Semantic-Based Techniques for Efficient and Secure Data Management.
Proceedings of the Advanced Information Networking and Applications, 2022

Personalized Cryptography in Cybersecurity Systems.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2022

2021
Improved publicly verifiable auditing protocol for cloud storage.
Concurr. Comput. Pract. Exp., 2021

Transformative and cognitive approaches to information retrieval and security procedures.
Concurr. Comput. Pract. Exp., 2021

Customer-oriented sales modeling strategy in a big data environment.
Concurr. Comput. Pract. Exp., 2021

Personalized Cryptographic Protocols for Advanced Data Protection.
Proceedings of the Advances in Networked-Based Information Systems, 2021

Cognitive Approach for Creation of Visual Security Codes.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2021

Transformative Computing Based on Advanced Human Cognitive Processes.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2021

Predictive Intelligence Approaches for Security Technologies.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

Fusion Techniques for Strong Data Protection.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021

Human Centered Protocols in Transformative Computing.
Proceedings of the Advanced Information Networking and Applications, 2021

Modern Cognitive Solutions for Advanced Information Processing.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2021

2020
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation.
Inf. Process. Manag., 2020

Classification of cognitive algorithms for managing services used in cloud computing.
Int. J. Grid Util. Comput., 2020

Cognitive cryptography for data security in cloud computing.
Concurr. Comput. Pract. Exp., 2020

Secure Cognitive Protocols for Data Fusion in Transformative Computing.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Transformative Computing in Knowledge Extraction and Service Management Processes.
Proceedings of the Advances in Internet, 2020

Data Fusion Protocols for Cloud Infrastructures.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

Transformative Computing for Distributed Services Management Protocols.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Cognitive and biologically cryptographic protocols for data security.
Cogn. Syst. Res., 2019

User Oriented Protocols for Data Sharing and Services Management.
Proceedings of the Advances in Networked-based Information Systems, 2019

Cognitive CAPTCHA Based on Perceptual Abilities.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Linguistic-Based Security in Fog and Cloud Computing.
Proceedings of the Advances in Internet, 2019

Personalized Protocols for Data Division and Knowledge Management.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

Impact of Sharing Algorithms for Cloud Services Management.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Biometric-Based Linguistic Solutions for Data Encryption and Sharing.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Cognitive Approaches for Medicine in Cloud Computing.
J. Medical Syst., 2018

Visual CAPTCHA application in linguistic cryptography.
Concurr. Comput. Pract. Exp., 2018

Linguistic techniques for cryptographic data sharing algorithms.
Concurr. Comput. Pract. Exp., 2018

New paradigms of cognitive management extending computational intelligence approaches.
Ann. Oper. Res., 2018

Innovative Protocols for Data Sharing and Cyber Systems Security.
Proceedings of the Advances in Network-Based Information Systems, 2018

Service Management Protocols in Cloud Computing.
Proceedings of the Advances in Internet, 2018

Influence of Management and Sharing Protocols for Decision Making Processes in Cloud Computing.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Linguistic and Biometric Approaches for Data and Services Management in Cloud Computing.
Proceedings of the Advances on Broadband and Wireless Computing, 2018

Cognitive Systems for Service Management in Cloud Computing.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Security of Visual Captcha for Authentication Procedures.
Proceedings of the Advances in Network-Based Information Systems, 2017

Security of Selected Secret Sharing Schemes.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Classification of Cognitive Service Management Systems in Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

2016
Efficiency of Strategic Data Sharing and Management Protocols.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Comparison of Biometric and Linguistic Secret Sharing Protocols.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Biometric Methods for Advanced Strategic Data Sharing Protocols.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Information Security in Intelligent Data Management Processes.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Cognitive information systems in secure information management and personalized cryptography.
Proceedings of the 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS), 2014

Security and Privacy in Distributed Information Management.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Cryptographic Techniques in Advanced Information Management.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Advanced Techniques for Computer Sharing and Management of Strategic Data.
Proceedings of the Information and Communication Technology, 2014

Crypto-Biometric Models for Information Secrecy.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

Intelligent Bio-inspired Approach for Secrecy Management in the Cloud.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Secure Information Management Using Linguistic Threshold Approach.
Advanced Information and Knowledge Processing, Springer, ISBN: 978-1-4471-5015-2, 2014

2012
Strategic Information Splitting Using Biometric Patterns.
J. Internet Serv. Inf. Secur., 2012

DNA-like linguistic secret sharing for strategic information systems.
Int. J. Inf. Manag., 2012

Linguistic protocols for secure information management and sharing.
Comput. Math. Appl., 2012

Secure Information Sharing Using Personal Biometric Characteristics.
Proceedings of the Computer Applications for Bio-technology, Multimedia, and Ubiquitous City, 2012

2011
Secure Information Management Protocol Based on Linguistic Sharing Techniques.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
The use of mathematical linguistic methods in creating secret sharing threshold algorithms.
Comput. Math. Appl., 2010

Grammar Encoding in DNA-Like Secret Sharing Infrastructure.
Proceedings of the Advances in Computer Science and Information Technology, 2010

2009
Security of Linguistic Threshold Schemes in Multimedia Systems.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Secret Sharing Protocol for Linguistic Threshold Schemes.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Secure Information Splitting Using Grammar Schemes.
Proceedings of the New Challenges in Computational Collective Intelligence [selected papers from the 1st International Conference on Collective Intelligence, 2009

Shadow Generation Protocol in Linguistic Threshold Schemes.
Proceedings of the Security Technology, 2009

2008
Linguistic Approach to Cryptographic Data Sharing.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...