prof. Michal Choras - Publications

Media

(Cyberwar - Newsweek - interview )
(Cyberwar and disinformation - Gazeta Wyborcza - interview )
( TV Interview - Cyberthreats)
(Cyberthreats - interview )
(AI and fake news - interview )
(AI and fake news - interview/news )

Accepted

ACM AsiaCCS - SecTL (CORE A, Singapore)
ACIIDS (CORE B, Ras Al Khaimah, UAE)
ICCSA (Hanoi, Vietnam)

In Press

  1. Kozik R., Pawlicka A., Pawlicki M., Choras Michal, Mazurczyk W. and Cabaj K., A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods , IEEE Transactions on Computational Social Systems, Early Access, 2023. doi: 10.1109/TCSS.2023.3296627 (IF=5).

    2024

  2. Choras Michal, Pawlicki, M., Kozik, R., Pawlicka, A., Tech developers must respect equitable AI access , NATURE, vol. 625 (663), 2024. (IF=64,8).
  3. Pawlicki, M., Pawlicka, A., Kozik, R., Choras Michal, Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity , Neurocomputing, vol. 590, Elsevier, July 2024. (IF=6).
    (Open Access for download)
  4. Kozik R., Ficco M., Pawlicka A., Pawlicki M., Palmieri F., Choras Michal, When explainability turns into a threat - using xAI to fool a fake news detection method , Computers & Security, vol. 137, February 2024, Elsevier (IF=5,6).
    (Open Access for download)
  5. Choras Michal, Pawlicka A., Jaroszewska-Choras D., Pawlicki M., Not only Security and Privacy: the evolving ethical and legal challenges of E-Commerce , In: Katsikas, S., et al. Computer Security. ESORICS 2023 International Workshops. ESORICS 2023. Lecture Notes in Computer Science, vol 14398. 167-181, Springer, 2024. (CORE A).
  6. Uccello F., Pawlicki M., D'Antonio S., Kozik R., Choras Michal, Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors , In: Daimi, K., Al Sadoon, A. (eds) Proceedings of the Second International Conference on Advances in Computing Research (ACR’24). Lecture Notes in Networks and Systems, vol 956., 244-255, Madrid, Spain, 2024.
  7. Uccello F., Pawlicki M., D'Antonio S., Kozik R., Choras Michal, An Innovative Approach to Real-Time Concept Drift Detection in Network Security , In: Barolli, L. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2024. Lecture Notes on Data Engineering and Communications Technologies, vol 193, 130-139, Naples, Italy, 2024 (Springer).
  8. Pawlicka A., Pawlicki M., Kozik R., Choras Michal, The Rise of AI-Powered Writing: How ChatGPT is Revolutionizing Scientific Communication - For Better or For Worse , In: Huang, DS., Premaratne, P., Yuan, C. (eds) Applied Intelligence. ICAI 2023. Communications in Computer and Information Science, vol 2014, 317-327, December 8-12, 2023, Nanning, China Springer, 2024.
  9. Uccello F., Pawlicki M., D’Antonio S., Kozik R., Choras Michal, Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach , In: Huang, DS., Premaratne, P., Yuan, C. (eds) Applied Intelligence. ICAI 2023. Communications in Computer and Information Science, vol 2015, 236-246, Nanning, China, Springer, 2024.
  10. Pawlicka, A., Pawlicki, M., Kozik, R., Kurek, W., Choras Michal,, How Explainable Is Explainability? Towards Better Metrics for Explainable AI., In: Visvizi, A., Troisi, O., Corvello, V. (eds) Research and Innovation Forum 2023. RIIFORUM 2023. Springer Proceedings in Complexity. Springer, 2024.

    2023

  11. Pawlicki M., Pawlicka A., Kozik R., Choras Michal, The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT , Neurocomputing, vol. 551, 2023, https://doi.org/10.1016/j.neucom.2023.126533 (IF=6).
  12. Ksieniewicz P., Zyblewski P., Borek-Marciniec W., Kozik R., Choras Michal, Wozniak M., Alphabet Flatting as a variant of n-gram feature extraction method in ensemble classification of fake news , Engineering Applications of Artificial Intelligence, Elsevier, Vol. 120, April 2023.(IF=8)
  13. Kozik R., Mazurczyk W., Cabaj K., Pawlicka A., Pawlicki M., Choras Michal, Deep Learning for Combating Misinformation in Multicategorical Text Contents , Sensors, vol. 23(24), 9666, 2023. (IF=3,9).
    (Open Access for download)
  14. Pawlicka A., Pawlicki M., Kozik R, Choras Michal, What will the future of cybersecurity bring us, and will it be ethical? The hunt for the black swans of cybersecurity ethics, IEEE Access, vol. 11, 58796-58807, 2023. (IF=3,9)
    (Open Access for download)
  15. Pawlicka A., Choras Michal, Kozik R., Pawlicki M., First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions, Personal and Ubiquitous Computing, Springer, vol. 27, issue 2, 193-202, 2023 (IF=3,006).
  16. Pawlicka A., Tomaszewska R., Krause E., Jaroszewska-Choraś D., Pawlicki M., Choras Michal, Has the pandemic made us more digitally literate? Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic , Journal of Ambient Intelligence and Humanized Computing, Volume 14, pages 14721–14731, Springer, 2023.
    (Open Access for download)
  17. Pawlicka A., Pawlicki M., Kozik R, Choras Michal, The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems , 2023 IEEE International Conference on Data Mining Workshops (ICDMW) Proceedings, Shanghai, China, 2023. (CORE A*).
  18. Choras Michal, Pawlicka A., Pawlicki M., Kozik R, How to Navigate the Uncharted Waters of Cyberwar , AMCIS 2023 Proceedings, Panama City , Panama, 2023.
  19. Kozik R., Mazurczyk W., Cabaj K., Pawlicka A., Pawlicki M., Choras Michal, Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models , in Proc. of IEEE 10th International Conference on Data Science and Advanced Analytics (DSAA), Thessaloniki, Greece, October, 2023.
  20. Kozik R., Pawlicka A., Pawlicki M., Choras Michal, Model Stitching Algorithm for Fake News Detection Problem , in Proc. of IEEE 10th International Conference on Data Science and Advanced Analytics (DSAA), Thessaloniki, Greece, October, 2023.
  21. Szczepanski M., Pawlicki M., Kozik R., Choras Michal, The Application of Deep Learning Imputation and other advanced methods for handling missing values in network intrusion detection , Vietnam Journal of Computer Science, (World Scientific), vol. 10, no. 01, 1-23, 2023. (IF=0,900)
  22. Pawlicki M., Kozik R, Choras Michal, Improving Siamese Neural Networks with Border Extraction Sampling for the use in Real-Time Network Intrusion Detection , In Proc. of INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN 2023, Gold Coast, Quennsland, Australia, 2023.
  23. Burduk R., Choras Michal, Kozik R., Ksieniewicz P., Marciniak T., Trajdos P., Progress on Pattern Classification, Image Processing and Communications, Lecture Notes in Networks and Systems, vol. 766, Springer, 2023.
  24. Pawlicki M., Pawlicka A., Kozik R., Choras Michal, How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes , In: Saeed, K., Dvorský, J., Nishiuchi, N., Fukumoto, M. (eds) Computer Information Systems and Industrial Management. CISIM 2023. Lecture Notes in Computer Science, vol 14164, 283-297, Springer, Tokyo, Japan, 2023.
  25. Komorniczak J., Wojciechowski S., Klikowski J., Kozik R., Choras Michal, Analysis of Extractive Text Summarization Methods as a Binary Classification Problem, In: García Bringas, P., et al. International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), Lecture Notes in Networks and Systems, vol 748. Springer, Cham, 2023.
  26. Kozik R., Komorniczak J., Ksieniewicz P., Pawlicka A., Pawlicki M., Choras Michal, SWAROG Project Approach to Fake News Detection Problem, In: García Bringas, P., et al. International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), Lecture Notes in Networks and Systems, vol 748. Springer, Cham, 2023.
  27. Komisarek M., Pawlicki M., Simic T., Kavcnik D., Kozik R, Choras Michal, Modern NetFlow network dataset with labeled attacks and detection methods , In ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, Italy, August 2023.
  28. Orzechowski N., Rzepka K., Szary P., Cabaj K., Mazurczyk W., Leligou H.C., Przybyszewski M., Kozik R, Choras Michal, Security Architecture in the SILVANUS project , In ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, Italy, August 2023.
  29. Pawlicki M., Kozik R., Choras Michal, The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-based Network Intrusion Detection Systems for DoS Detection in IoT Networks , In: The 7th International Conference on Mobile Internet Security (MobiSec’23), Okinawa, Japan, 2023.
  30. Pawlicka A., Puchalski D., Pawlicki M., Kozik R., Choras Michal, How to secure the IoT-based surveillance systems in an ELEGANT way , In: Proc. of IEEE International Conference on Cyber Security and Resilience (CSR), Venice, Italy, 2023.
  31. Kurek W., Pawlicki M., Pawlicka A., Kozik R., Choras Michal, Explainable Artificial Intelligence 101: Techniques, Applications and Challenges , In: D.-S. Huang et al. (Eds): Advanced Intelligent Computing Technology and Applications, ICIC 2023, Zhengzhou, China, 310-318, LNCS 14089, Springer, 2023.
  32. Mastroianni M., Palmieri F., Ficco M., Kozik R, Choras Michal, Privacy risk analysis and metrics in capturing and storing network traffic , In Proc. of International Conference on Control Systems and Computer Science (CSCS), IEEE, Bucharest, Romania, May 2023.
  33. Kozik R, Samp K., Choras Michal, Pawlicki M., Parameters Transfer Framework for Multi-domain Fake News Detection , In: You, I., Kim, H., Angin, P. (eds) Mobile Internet Security. MobiSec 2022. Communications in Computer and Information Science, vol 1644. Springer, Singapore, 2023.
  34. Gackowska M., Katek G., Srutek M., Kozik R., Choras Michal, Document Annotation Tool for News Content Analysis , In: Burduk R. et al. (Eds.): Progress on Pattern Classification, Image Processing and Communications, Lecture Notes in Networks and Systems 766, 211-217, Springer, 2023.
  35. Pawlicki M., Pawlicka A., Srutek M., Kozik R., Choras Michal, Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems , In: Burduk R. et al. (Eds.): Progress on Pattern Classification, Image Processing and Communications, Lecture Notes in Networks and Systems 766, 45-53, Springer, 2023.
  36. Pawlicki, M., Zadnik, M., Kozik, R., Choras Michal, Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques, In: Rutkowski, L., Scherer, R., Korytkowski, M., Pedrycz, W., Tadeusiewicz, R., Zurada, J.M. (eds) Artificial Intelligence and Soft Computing. ICAISC 2022. Lecture Notes in Computer Science, vol 13588. Springer, 2023.
  37. Pawlicka, A., Pawlicki, M., Kozik, R., Choras Michal, Fake News and Threats to IoT—The Crucial Aspects of Cyberspace in the Times of Cyberwar. In: Visvizi, A., Troisi, O., Grimaldi, M. (eds) Research and Innovation Forum 2022. RIIFORUM 2022. Springer Proceedings in Complexity. Springer, Cham, 2023.

    2022

    ENISA Report

    Co-Editor of: RESEARCH AND INNOVATION BRIEF, Annual Report on Cybersecurity Research and Innovation Needs and Priorities , ENISA (European Union Agency for Cybersecurity) , May 2022. (https://www.enisa.europa.eu/publications/research-and-innovation-brief )
  38. Choras Michal, Wozniak, M., The double-edged sword of AI: Ethical Adversarial Attacks to counter artificial intelligence for crime , AI & Ethics, volume 2, pages 631–634, 2022.
    (Open Access for download)
  39. Kula S., Kozik R., Choras Michal, Implementation of the BERT-derived architectures to tackle disinformation challenges , Neural Computing and Applications, Springer, vol. 34, pages 20449–20461, December 2022. Open Access (IF=6,0).
    (Open Access for download)
  40. Pawlicki M., Kozik R., Choras Michal, A Survey on Neural Networks for (Cyber-) Security and (Cyber-) Security of Neural Networks , Neurocomputing, Volume 500, Pages 1075-1087, Elsevier, (Open Access for download), (IF = 6,000).
  41. Kozik R., Kula S., Pawlicki M., Choras Michal, Fake News Detection Platform—Conceptual Architecture and Prototype, Logic Journal of the IGPL, Oxford University Press, vol. 30, Issue 6, 1005-1016, 2022. (IF=1,0).
  42. Dutta V., Pawlicki M., Kozik R., Choras Michal, Unsupervised network traffic anomaly detection with deep autoencoders , Logic Journal of the IGPL, Oxford University Press, vol. 30, Issue 6, 912-925, 2022. (IF=1,0).
  43. Choras Michal, Pawlicka A., Kozik R., Wozniak M., How Machine Learning May Prevent the Breakdown of Democracy by Contributing to Fake News Detection , IEEE IT Professional, Volume: 24, Issue: 2, March-April, 2022, Page(s): 25 - 31, 2022 (IF=2,6).
  44. Kozik R., Kula S., Choras Michal, Wozniak, M., Technical solution to counter potential crime: Text analysis to detect fake news and disinformation , Journal of Computational Science, Volume 60, April 2022, 101576, Elsevier (IF=3,817).
  45. Pawlicka A., Pawlicki M., Kozik R., Choras Michal, Human-driven and human-centred cybersecurity: policy-making implications , Transforming Government: People, Process and Policy (TGPPP), Vol. 16 No. 4, pp. 478-487, Emerald, 2022.
  46. Komisarek M, Kozik R, Pawlicki M, Choras Michal, Towards Zero-Shot Flow-Based Cyber-Security Anomaly Detection Framework , Applied Sciences, 12(19):9636, 2022. (Open Access for download), (IF = 2,838).
  47. Pawlicka A., Choras Michal, Pawlicki M., Opening up a discussion on the native speaker myth in science , Accountability in Research: Policies and Quality Assurance, vol. 29, issue 7, 477-481, Taylor&Francis, 2022. (IF=3,057).
  48. Choras Michal, Kozik R., Pawlicki M., Sensors and Pattern Recognition Methods for Security and Industrial Applications, Sensors, 22(16), 2022. (IF=3,9).
  49. Komisarek M., Pawlicki M., Kowalski M., Marzecki A., Kozik R., and Choras Michal, Hunting cyberattacks: experience from the real backbone network , Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 13, No. 2, 128-146, June, 2022. (Open Access for download).
  50. Szczepanski, M., Pawlicki, M., Kozik, R., Choras Michal, Fast Hybrid Oracle-Explainer Approach to Explainability Using Optimized Search of Comprehensible Decision Trees , In Proc. of 2022 IEEE 9th International Conference on Data Science and Advanced Analytics (DSAA), IEEE. (CORE A).
  51. Pawlicka A., Choras Michal, Pawlicki M., Hackers, Hacktivistas, Trolls y Cibermilicias: El perfil de los actores ocultos del ciberspacio , Fronteras de la Ciencia, Volume 8, Pages 16-25. (printed and published in 2022).
  52. Choras Michal, Burduk R., Kozik R., Keller J., Advances and Practical Applications of Deep and Shallow Machine Learning , Journal of Universal Computer Science, 28(3), 2022. (IF=1,056).
  53. Choras Michal, Burduk R., Gielczyk A., Kozik R., Marciniak T., Advances in Computer Recognition, Image Processing and Communications, Entropy, 24(1):108, 2022. https://doi.org/10.3390/e24010108 (IF=2,7).
  54. Pawlicki M., Kozik R., Choras Michal, Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection , In Proc. of ARES 2022: 58:1-58:6, , Vienna, 2022 (CORE B).
  55. Komisarek M., Pawlicki M., Mihailescu M., Mihai D., Carabas M., Kozik R., Choras Michal, A novel, refined dataset for real-time Network Intrusion Detection, In Proc. of ARES 2022: 43:1-43:8, Vienna, 2022 (CORE B).
  56. Pawlicka A., Pawlicki M., Renk R., Kozik R., Choras Michal, The cybersecurity-related ethical issues of cloud technology and how to avoid them, In Proc. of ARES 2022: 56:1-56:7, Vienna, 2022 (CORE B).
  57. Pawlicki, M., Pawlicka, A., Kozik, R., Choras Michal, Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation , In R. A. Buchmann et al. (Eds.): Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania (2022).
  58. Pawlicki, M., Pawlicka, A., Komisarek, M., Kozik, R., Choras Michal, The IoT Threat Landscape vs. Machine Learning, a.k.a. Who Attacks IoT, Why Do They Do It, and How to Prevent It? , In R. A. Buchmannet al. (Eds.): Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania (2022).
  59. Pawlicki M., Kozik R., Choras Michal, Comparison of Neural Network Paradigms for Their Usefulness in a Real-World Network Intrusion Detection Deployment and a Proposed Optimised Approach , In Proc. of European Interdisciplinary Cybersecurity Conference, EICC 2022, 53-56, Barcelona, Spain, June 2022, ACM.
  60. Kozik R., Pawlicki M., Szczepanski M., Renk R., Choras Michal, Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment , in D.-S. Huang et al. (Eds.): Intelligent Computing Methodologies, ICIC 2022, LNAI 13395, pp. 257–266, Springer, 2022.
  61. Choras Michal, Kozik R., Ksieniewicz P., Wozniak M., SocialTruth - content verification for the digital society , In Proc. of the Basque Conference on Cyber-Physical Systems and Artificial Intelligence, 123-128, May 18-19, 2022, Palacio Miramar, San Sebastian, Spain, 2022.
  62. Pawlicka A., Pawlicki M., Kozik R, Choras Michal, SIMARGL - Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware , In Proc. of the Basque Conference on Cyber-Physical Systems and Artificial Intelligence, 55-62, May 18-19, 2022 Palacio Miramar, San Sebastian, Spain, 2022.

    2021

  63. Choras Michal, Pawlicki M., Intrusion Detection Approach based on Optimised Artificial Neural Network, Neurocomputing, Volume 452, 10 September 2021, Pages 705-715, 2021 (IF=5,779).
  64. Choras Michal, Demestichas K., Gielczyk A., Herrero A., Ksieniewicz P., Remoundou K., Urda D., Wozniak M., Advanced Machine Learning Techniques for Fake News (Online Disinformation) Detection: A Systematic Mapping Study, Applied Soft Computing Elsevier, vol. 101, March 2021 (IF=8,263).
  65. Pawlicka A., Choras Michal, Kozik R., Pawlicki M., A $10 million question and other cybersecurity-related ethical dilemmas in the times of the COVID-19 pandemic: The results of the first systematic horizon scanning , Business Horizons, vol. 64, issue 6, 729-734, Elsevier 2021 (IF=10,562).
  66. Szczepanski, M., Pawlicki, M., Kozik, R., Choras Michal, New explainability method for BERT-based model in fake news detection, Scientific Reports 11, 23705, Springer, 2021, https://doi.org/10.1038/s41598-021-03100-6. (IF=4,996).
  67. Choras Michal, Demestichas K., Herrero A., Wozniak M., Applying Machine Learning for Combating Fake News and Internet/Media Content Manipulation , Applied Soft Computing Elsevier, vol. 110, October 2021 (IF=8,263).
  68. Kozik R., Pawlicki M., Choras Michal, A New Method of Hybrid Time Window Embedding with Transformer-based Traffic Data Classification in IoT-networked Environment , Pattern Analysis and Applications, vol. 24, issue 4, 1441-1449, Springer, November 2021 (IF=2,307).
  69. Pawlicka A., Choras Michal, Pawlicki M., The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good , Personal and Ubiquitous Computing, Volume 25, issue 5, 843-852, Springer, October 2021 (IF=3,006).
  70. Komisarek M., Pawlicki M., Kozik R., Hołubowicz W., Choras Michal, How to Effectively Collect and Process Network Data for Intrusion Detection? Entropy, 23(11):1532, 2021, https://doi.org/10.3390/e23111532 (IF=2,738).
  71. Pawlicki M., Choras Michal, Kozik R., Holubowicz W. Missing and Incomplete Data Handling in Cybersecurity Applications In: Nguyen N.T., Chittayasothorn S., Niyato D., Trawiński B. (Eds.) Intelligent Information and Database Systems. ACIIDS 2021. Lecture Notes in Computer Science, vol 12672. Springer, 2021.
  72. Karhapaa P, Behutiye W., Rodríguez P., Oivo M., Costal D., Franch X., Aaramaa S., Choras Michal, Partanen J., Abherve A., Strategies to manage quality requirements in agile software development: a multiple case study , Empirical Software Engineering, volume 26, Article number: 28, Springer, 2021 (IF=3,762).
  73. Laskawiec S., Choras Michal, Kozik R., Varadarajan V., Intelligent operator: Machine learning based decision support and explainer for human operators and service providers in the fog, cloud and edge networks , Journal of Information Security and Applications, Volume 56, 2021 (IF=4,960).
  74. Komisarek M., Pawlicki M., Kozik R., Choras Michal, Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data , Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 12, No. 1, 3-19, March, 2021.
  75. Caviglione L., Choras Michal, Corona I., Janicki A., Mazurczyk W., Pawlicki M., Wasielewska K., Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection, IEEE Access, vol. 9, 5371 - 5396, 2021 (IF=3,476).
  76. Cwiklinski B., Gielczyk A., Choras Michal , Who Will Score? A Machine Learning Approach to Supporting Football Team Building and Transfers , Entropy 2021, 23(1), 90, 2021 (IF=2,738).
  77. Pérez F.J., Garrido V.J, Garcia A., Zambrano M., Kozik R., Choras Michal , Muhlenberg D., Pallmer D, Muller W., Multimedia analysis platform for crime prevention and investigation , Multimedia Tools and Applications, Vol. 80, June, pages 23681–23700, Springer, 2021, (IF=2,577).
  78. Szczepanski M., Choras Michal, Pawlicki M. and Pawlicka A., The Methods and Approaches of Explainable Artificial Intelligence , in: Paszynski M. et. al (Eds.): Computational Science – ICCS 2021, LNCS 12745, 3-17, Springer, May 2021 (CORE A).
  79. Kula S., Choras Michal, Kozik R. and Wozniak M., Transformer Based Models in Fake News Detection, in: Paszynski M. et. al (Eds.): Computational Science – ICCS 2021, LNCS 12745, 28038, Springer, May 2021 (CORE A).
  80. Komisarek M., Pawlicki M., Kowalski M., Marzecki A., Kozik R., Choras Michal, Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project , in: ARES 2021: 65:1-65:7 (CORE B).
  81. Kuchczynski M, Pawlicka A., Pawlicki M, Choras Michal, Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter , in: CORES/IP&C/ACS 2021, LNNS vol. 255, Springer, 2021.
  82. Zyblewski P., Pawlicki M, Kozik R., Choras Michal, Cyber-Attack Detection from IoT Benchmark Considered as Data Streams. , in: CORES/IP&C/ACS 2021, LNNS vol. 255, Springer, 2021.
  83. Komisarek M., Pawlicki M, Sobonski P., Pawlicka A., Kozik R., Choras Michal, Extending Machine Learning-Based Intrusion Detection with the Imputation Method , in: CORES/IP&C/ACS 2021, LNNS vol. 255, Springer, 2021.
  84. Pawlicki M, Kozik R., Puchalski D., Choras Michal, Towards AI-Based Reaction and Mitigation for e-Commerce - the ENSURESEC Engine , in: De-Shuang Huang et al. (Eds.): Intelligent Computing Theories and Application - 17th International Conference, ICIC 2021, Lecture Notes in Computer Science 12838, Springer, Shenzhen, China 2021.
  85. Szczepanski M., Komisarek M., Pawlicki M., Kozik R., Choras Michal, The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data., In: Wojtkiewicz K., Treur J., Pimenidis E., Maleszka M. (eds) Advances in Computational Collective Intelligence. ICCCI 2021. Communications in Computer and Information Science, vol 1463, 2021. (CORE B).
  86. Pawlicka A., Choras Michal, Przybyszewski M., Belmon L., Kozik R., Demestichas K. Why Do Law Enforcement Agencies Need AI for Analyzing Big Data? , In: Saeed K., Dvorský J. (eds) Computer Information Systems and Industrial Management. CISIM 2021. Lecture Notes in Computer Science, vol 12883. Springer, Cham, 2021. (CORE C).
  87. Choras Michal, Choraś R.S., Kurzyński M., Trajdos P., Pejas J., Hyla T., Progress in Image Processing, Pattern Recognition and Communication Systems. Proceedings of the Conference (CORES, IP&C, ACS) - June 28-30 2021 , Lecture Notes in Networks and Systems, LNNS vol. 255, Springer, 2021.

    2020

  88. Pawlicki M., Choras Michal, Kozik R., Defending network intrusion detection systems against adversarial evasion attacks , Future Generation Computer Systems, Volume 110, September 2020, Pages 148-154, 2020 (IF=7,187).
  89. Gielczyk A., Choras Michal, Intelligent human-centred mobile authentication system based on palmprints , Journal of Intelligent & Fuzzy Systems, IOS Press, vol. 39, no. 6, pp. 8217-8224, 2020 (IF=1,851).
  90. Pawlicka A., Jaroszewska-Choras D., Choras Michal, Pawlicki M., Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance, IEEE Technology in Society Magazine, vol. 39, Issue 4, 60-70, 2020. (IF=1,554)
  91. Choras Michal, Springer T., Kozik R., Lopez L., Martinez-Fernandez S., Ram P., Rodrigues P., Franch X., Measuring and Improving Agile Processes in a Small-Size Software Development Company, IEEE Access, vol. 8, 78452-78466, 2020. (IF=3,367)
  92. Dutta V., Choras Michal, Pawlicki M., Kozik R., Detection of Cyberattacks Traces in IoT Data , Journal of Universal Computer Science, vol. 26 (11), 1422-1434, 2020 (IF=1,139).
  93. Dutta V., Choras Michal, Pawlicki M., Kozik R., A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection , Sensors 2020, 20(16), 4583, 2020. (IF=3,576)
  94. Oriol M., Martínez S., Behutiye W., Farré C., Kozik R., Seppänen P., Vollmer A.M., Rodríguez P., Franch X., Aaramaa S., Abhervé A., Choras Michal and Partanen J., Data-driven and Tool-supported Elicitation of Quality Requirements in Agile Companies , Software Quality Journal, vol. 28, 931-963, Springer, 2020 (IF=1,460).
  95. Choras Michal, Jaroszewska-Choras D., The scrutinizing look on the impending proliferation of mandatory ORCID use from the perspective of data protection, privacy and freedom of science , Interdisciplinary Science Reviews, vol. 45, issue 4, 492-507, 2020, (IF=1,000).
  96. Choras Michal, D'Antonio S., Keller J., Kozik R., Progress in Features, Data, Patterns and Similarity Analysis, Journal of Universal Computer Science, vol. 26 (6), 647-648, 2020 (IF=1,139).
  97. Pawlicka A., Pawlicki M., Tomaszewska R., Choras Michal, Gerlach R., Innovative machine learning approach and evaluation campaign for predicting the subjective feeling of work-life balance among employees , PLoS ONE 15(5): e0232771. https://doi.org/10.1371/journal.pone.0232771 (IF=3,240).
  98. Choras Michal, D'Antonio S., Keller J., Kozik R., Practical Applications of Data Analysis, Classification and Anomaly Detection, Journal of Universal Computer Science, vol. 26 (4), 432-433, 2020 (IF=1,139).
  99. Choras Michal, Pawlicki M., Puchalski D., Kozik R., Machine Learning – The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness? , in Krzhizhanovskaya V.V. et al. (Eds.): Computational Science – ICCS 2020, LNCS vol. 12140, 615-628, Springer, Amsterdam, 2020 (CORE A).
  100. Szczepanski M., Choras Michal, Pawlicki M., Kozik R., Achieving Explainability of Intrusion Detection System by Hybrid Oracle-Explainer Approach , in Proc. of International Joint Conference on Neural Networks, IJCNN 2020, IEEE, Glasgow, 2020 (CORE A).
  101. Ksieniewicz P., Zyblewski P., Choras Michal, Kozik R., Gielczyk A., Wozniak M. Fake News Detection from Data Streams , in Proc. of International Joint Conference on Neural Networks, IJCNN 2020, IEEE, Glasgow, 2020 (CORE A).
  102. Pawlicki M., Choras Michal, Kozik R., Holubowicz W. On the Impact of Network Data Balancing in Cybersecurity Applications , in Krzhizhanovskaya V.V. et al. (Eds.): Computational Science – ICCS 2020, LNCS vol. 12140, 196-210, Springer, Amsterdam, 2020 (CORE A).
  103. Kula S.., Choras Michal, Kozik R., Ksieniewicz P., Wozniak M., Sentiment Analysis for Fake News Detection by Means of Neural Networks , in Krzhizhanovskaya V.V. et al. (Eds.): Computational Science – ICCS 2020, LNCS vol. 12140, 652-667, Springer, Amsterdam, 2020 (CORE A).
  104. Ram P., Rodríguez P., Oivo M., Martínez S., Bagnato A., Choras Michal, Kozik R., Aaramaa S., Ahola M., Actionable Software Metrics: An Industrial Perspective , EASE '20: Proceedings of the Evaluation and Assessment in Software Engineering, Pages 240–249, Trondheim, Norway, 2020 (CORE A).
  105. Komisarek M., Choras Michal, Kozik R., Pawlicki M., Real-time stream processing tool for detecting suspicious network patterns using machine learning , ARES'20: Proceedings of the 15th International Conference on Availability, Reliability and Security, Dublin, August 2020 (CORE B).
  106. Pawlicka A., Choras Michal, Pawlicki M., Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective , ARES'20: Proceedings of the 15th International Conference on Availability, Reliability and Security, Dublin, August 2020 (CORE B).
  107. Puchalski D, Caviglione L, Kozik R., Marzecki A., Krawczyk S. Choras Michal, Stegomalware detection through structural analysis of media files , ARES'20: Proceedings of the 15th International Conference on Availability, Reliability and Security, Dublin, August 2020 (CORE B).
  108. Kozik R., Choras Michal, Kula S., Pawlicki M., Distributed Architecture for Fake News Detection , CISIS'20: 13th International Conference on Computational Intelligence in Security for Information Systems, Advances in Intelligent Systems and Computing, vol. 1267, 208-217, Springer 2020 (CORE B).
  109. Kula S., Choras Michal, Kozik R., Application of the BERT-based Architecture in Fake News Detection , CISIS'20: 13th International Conference on Computational Intelligence in Security for Information Systems, Advances in Intelligent Systems and Computing, vol. 1267, 239-249, Springer 2020 (CORE B).
  110. Dutta V., Choras Michal, Kozik R., Pawlicki M., Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection , CISIS'20: 13th International Conference on Computational Intelligence in Security for Information Systems, Advances in Intelligent Systems and Computing, vol. 1267, 405-414, Springer 2020 (CORE B).
  111. Kozik R., Choras Michal, Pawlicki M., Pawlicka A., Warczak W., Mazgaj G., Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation , CISIS'20: 13th International Conference on Computational Intelligence in Security for Information Systems, Advances in Intelligent Systems and Computing, vol. 1267, 174-183, Springer 2020 (CORE B).
  112. Kozik R., Choras Michal, Pawlicki M., Holubowicz W., Pallmer D., Mueller W., Behmer E.-J., Loumiotis I., Demestichas K., Horincar R., Laudy C., Faure D. Common Representational Model and Ontologies for Effective Law Enforcement Solutions , Vietnam Journal of Computer Science, vol. 7, issue 1, 1-18, February, 2020.
  113. Ram P., Rodríguez P., Oivo M., Bagnato A., Abherve A., Choras Michal, Kozik R., An Empirical Investigation into Industrial Use of Software Metrics Programs , in: Morisio M. et al. (Eds.): Product-Focused Software Process Improvement, 21st International Conference, PROFES 2020, Turin, Italy, November 25–27, LNCS vol. 12562, 419-433, Springer, 2020 (CORE B).
  114. Pawlicka A., Pawlicki M., Choras Michal, The Top Emerging Job of 2020 - how to get it? , in: Tomaszewska R: Work and Career in the New Millenium. Implications for Education, 145-158, UKW Press, 2020 (In Polish).
  115. 2019

  116. Laskawiec S., Choras Michal, Kozik R., New solutions for exposing clustered applications deployed in the cloud , Cluster Computing, Volume 22, Issue 3, pp 829–838, Springer, 2019 (IF=1,851). (Open Access for download).
  117. Kozik R., Choras Michal , Puchalski D., Renk R., Q-Rapids framework for advanced data analysis to improve rapid software development , Journal of Ambient Intelligence and Humanized Computing, vol. 10, issue 5, 1927-1936, Springer, May 2019 (IF=4,594). (Open Access for download)
  118. Martinez-Fernandez S., Vollmer A. M., Jedlitschka A., Franch X., Lopez L., Ram P., Rodriguez P., Aaramaa S., Bagnato A., Choras Michal , and Partanen J., Continuously assessing and improving software quality with software analytics tools: a case study , IEEE Access, vol. 7, 68219-68239, 2019 (IF=4,098). (Open Access for download)
  119. Keller J., Grana M., Kozik R., Andrysiak T., Choras Michal , Recent Advances, Emerging Methods and Applications of Pattern Recognition , Journal of Universal Computer Science, vol. 25(6), 2019. (IF=0.910).
  120. Choras Michal , Kozik R., Puchalski D., Renk R., Increasing product owners’ cognition and decision-making capabilities by data analysis approach , Cognition, Technology & Work, vol. 21, issue 2, 191-200, Springer, May 2019 (IF=1,188). (Open Access for download)
  121. Kozik R., Choras Michal , Keller J., Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection , Journal of Universal Computer Science, vol. 25 (1), 2-15, 2019 (IF=0.910). (Open Access for download)
  122. Kozik R., Pawlicki M., Choras Michal , Pedrycz W., Practical Employment of Granular Computing to Complex Application Layer Cyber Attack Detection , Complexity, 2019 (IF=2,591). (Open Access for download)
  123. Kozik R., Choras Michal , Protecting the application layer in the public domain with machine learning methods , Logic Journal of the IGPL, Volume 27, Issue 2, 149–159, 2019. (IF=0,690).
  124. Gielczyk A., Choras Michal , Kozik R., Lightweight Verification Schema for Image-Based Palmprint Biometric Systems Mobile Information Systems, 2019 (IF=1,635). (Open Access for download)
  125. Choras Michal, Pawlicki M., Kozik R., The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain , in: Yin H., Camacho D., Tino P., Tallón-Ballesteros A., Menezes R., Allmendinger R. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2019. Lecture Notes in Computer Science, vol 11872, 353-360, Springer, 2019.
  126. Ksieniewicz P., Choras Michal, Kozik R., Wozniak M., Machine Learning Methods for Fake News Classification , in: Yin H., Camacho D., Tino P., Tallón-Ballesteros A., Menezes R., Allmendinger R. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2019. Lecture Notes in Computer Science, vol 11872, 332-339, Springer, 2019.
  127. Gielczyk A., Marcialis G.L., Choras Michal, Binary Code for the Compact Palmprint Representation Using Texture Features , in: Vento M., Percannella G. (Eds.): Computer Analysis of Images and Patterns, CAIP 2019, Salerno, Italy, September 3–5, LNCS 11679, 132-142, 2019. (CORE B).
  128. Choras Michal, Kozik R., Pawlicki M., Holubowicz W., Franch X., Software Development Metrics Prediction Using Time Series Methods , In: Saeed K. et al. (Eds.): Computer Information Systems and Industrial Management, CISIM 2019, Belgrade, Serbia, LNCS 11703, 311-323, Springer, 2019.
  129. Gielczyk A., Warzyniak R., Choras Michal Evaluation of the existing tools for fake news detection , In: Saeed K. et al. (Eds.): Computer Information Systems and Industrial Management, CISIM 2019, Belgrade, Serbia, LNCS 11703, 144-151, Springer, 2019.
  130. Kozik R., Choras Michal, Pawlicki M., Holubowicz W., Pallmer D., Mueller W., Behmer E.-J., Loumiotis I., Demestichas K., Horincar R., Laudy C., Faure D. The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions – MAGNETO Platform Use Case , In: N. T. Nguyen et al. (Eds.): Computational Collective Intelligence, ICCCI 2019, Hendaye, France, LNAI 11684, 335-345, Springer, 2019.
  131. Oriol Hilari M., Seppänen P., Behutiye W., Farré C., Kozik R., Martínez S., Rodríguez P., Franch X., Aaramaa S., Abhervé A., Choras Michal and Partanen J. Data-driven elicitation of quality requirements in agile companies , in: Piattini, M., Rupino da Cunha, P., Garcia Rodriguez de Guzman, I., Pérez-Castillo, R. (Eds.): Quality of Information and Communications Technology, QUATIC 2019, Ciudad Real, Spain, September 11–13, Communications in Computer and Information Science Series, vol. 1010, 49-63, Springer, 2019.
  132. Choras Michal, Choras S. Ryszard Image Processing and Communications. Techniques, Algorithms and Applications , Advances in Intelligent Systems and Computing, vol. 1062, Springer 2020.
  133. Choras Michal, Pawlicki M., Kozik R., Demestichas K.P, Kosmides P., Gupta M., SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation , In Proc. of Criminal Use of Information Hiding (CUING) Workshop, ARES 2019 Proceedings of the 14th International Conference on Availability, Reliability and Security, 68:1-68:10, August 2019, Canterbury, UK, 2019. (CORE B)
  134. Pawlicki M., Kozik R., Choras Michal, Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection , In D.-S. Huang et al. (Eds.): Intelligent Computing Theories and Application, ICIC 2019, Lecture Notes in Computer Science, Nanchang, China, LNCS 11643, 749-760, Springer, 2019.
  135. Gielczyk A., Choras Michal , Kozik R., The mobile palmprint-based verification based on three-value masks , In: W.W. Smari, K. Zine-Dine (Eds.): Proceedings 2019 International Conference on High Performance Computing & Simulation (HPCS), July, Dublin, 909-914, IEEE, 2019.
  136. Choras Michal , Pawlicki M., Kozik R., Recognizing Faults in Software Related Difficult Data in: Rodrigues J.M.F. et al. (Eds.): Computational Science – ICCS 2019, LNCS vol. 11538, Springer, Faro, Portugal, 2019 (CORE A).
  137. Pawlicki M., Gielczyk A., Kozik R., Choras Michal , Fault-Prone Software Classes Recognition via Artificial Neural Network with Granular Dataset Balancing in: Burduk R. et al. (Eds.): Progress in Computer Recognition Systems, Advances in Intelligent Systems and Computing, 130-140, vol. 977, Springer.
  138. Gielczyk A., Dembinska K., Choras Michal , Kozik R., Towards mobile palmprint biometric system with the new palmprint database , in: Image Processing and Communications. Techniques, Algorithms and Applications, Advances in Intelligent Systems and Computing, vol. 1062, 148-156, Springer 2019.
  139. Pawlicki M., Marchewka A., Choras Michal , Kozik R., Gated Recurrent Units for Intrusion Detection in: Image Processing and Communications. Techniques, Algorithms and Applications, Advances in Intelligent Systems and Computing, vol. 1062, 141-147, Springer 2019.
  140. Kozik R., Choras Michal , Towards nature-inspired machine-learning approach for cyber security , in: El-Sayed M. El-Alfy et al. (Eds.): Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications, 163 –179, IET, 2019.
  141. Choras Michal , Pawlicki M., Kozik R., SAFAIR: Secure and Fair AI Systems for Citizens in Conference Proceedings of PP-RAI 2019, 310, Wroc-love, 2019.
  142. Cwiklinski B., Gielczyk A., Choras Michal , Advanced model supporting football team building , in Conference Proceedings of PP-RAI 2019, 15-18, Wroc-love, 2019.
  143. Choras Michal, Choras S. Ryszard, (Editors) Image Processing and Communications Challenges 10 , Advances in Intelligent Systems and Computing, vol. 892, Springer 2019.

    2018

  144. Kozik R., Choras Michal, Ficco M., Palmieri F., A scalable distributed machine learning approach for attack detection in edge computing environments Journal of Parallel and Distributed Computing, vol. 119, 18-26, Elsevier (IF=1,93).
  145. Bobowska B., Choras Michal , Wozniak M., Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity, Journal of Universal Computer Science, vol. 24 (5), 622-633, 2018 (IF=1,066). (Open Access for download)
  146. Kozik R., Pawlicki M., Choras Michal , Cost-sensitive Distributed Machine Learning for NetFlow-based Botnet Activity Detection , Security and Communication Networks, 2018 (IF=1,067). (Open Access for download)
  147. Choras Michal, Gielczyk A., Demestichas K.P, Puchalski D., Kozik R., Pattern Recognition Solutions for Fake News Detection , in: Saeed K., Homenda W. (Eds.): Computer Information Systems and Industrial Management, LNCS 11127, 130-139, Springer, 2018.
  148. Pawlicki M., Choras Michal , Kozik R., Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain , In: ARES, Hamburg, Germany, 61:1-61:6, 2018. (CORE B)
  149. Gielczyk A., Choras Michal, Kozik R., Hybrid Feature Extraction for Palmprint-based User Authentication. In: 2018 International Conference on High Performance Computing & Simulation (HPCS), pp. 629–633, IEEE, Orleans, France, 2018.
  150. Kozik R., Pawlicki M. Choras Michal , Sparse Autoencoders for Unsupervised Netflow Data Classification , in: Image Processing and Communications Challenges 10, Advances in Intelligent Systems and Computing, vol. 892, 192-199, Springer.
  151. Choras R.S., Gielczyk A., Choras Michal , Ten Years of Image Processing and Communications , in: Image Processing and Communications Challenges 10, Advances in Intelligent Systems and Computing, vol. 892, 3-10 Springer.
  152. Laskawiec S., Choras Michal , Kozik R., Switching Network Protocols to Improve Communication Performance in Public Clouds , in: Image Processing and Communications Challenges 10, Advances in Intelligent Systems and Computing, vol. 892, 224-236, Springer.
  153. Gielczyk A., Choras Michal, Kozik R., Image-based palmprint biometrics as a part of the multi-factor user authentication system (In Polish) DOI: 10.15199/59.2018.8-9.9, Przeglad Telekomunikacyjny i Wiadomosci Telekomunikacyjne 8-9/2018, 593-596, 2018.
  154. Pawlicki M., Choras Michal , Kozik R., Recent granular computing implementation, its taxonomy and usefulness in cybersecurity (In Polish) DOI: 10.15199/59.2018.8-9.9, Przeglad Telekomunikacyjny i Wiadomosci Telekomunikacyjne 8-9/2018, 597-600, 2018.
  155. Kozik R., Choras Michal , Puchalski D., Renk R., Platform for Software Quality and Dependability Data Analysis, in: Zamojski, W. et al. (Eds.): Contemporary Complex Systems and Their Dependability, Proceedings of the Thirteenth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, 306-315, AISC, Springer, July 2-6, Brunów, Poland, 2018.
  156. Lopez L., Martínez-Fernández S., Gomez C., Choras Michal , Kozik R., Guzman L., Vollmer A.M., Franch X., Jedlitschka A., Q-Rapids Tool Prototype: Supporting Decision-Makers in Managing Quality in Rapid Software Development , in: J. Mendling and H. Mouratidis (Eds.): CAiSE Forum 2018, LNBIP 317, Talinn, Estonia, 2018. (CORE A).
  157. Buscher M., Easton C., Kerasidou Ch., Escalante M.A., Alter H., Petersen K., Bonnamour M-Ch., Lund D., Baur A., Quinn R.A., Heesen J., Jasmonaite L., Fuster G.G., Boden A., Hoffman B., Stachowicz A., Choras Michal, Kozik R., Boersma K., Comes M., Galdon Clavell G., Foger N., The IsITethical? Exchange Responsible Research and Innovation for Disaster Risk Management , in: Boersma K., Tomaszewski B., Proceedings of the 15th ISCRAM Conference, Rochester, NY, USA May 2018.

    2017

  158. Ficco M., Choras Michal, Kozik R., Simulation Platform for Cyber-Security and Vulnerability Analysis of Critical Infrastructures, Journal of Computational Science, vol.22, 179-186, Elsevier (IF=2,009).
  159. Kozik, R., Choras Michal, Pattern Extraction Algorithm for Netflow-Based Botnet Activities Detection, , Security and Communication Networks, vol. 2017, Hindawi, 2017 (IF=1,067).
  160. Choras Michal, Choras S. Ryszard, (Editors) Image Processing and Communications Challenges 9 , Advances in Intelligent Systems and Computing, vol. 681, Springer 2017.
  161. Kozik R., Choras Michal and Holubowicz W., Packets tokenization methods for web layer cyber security , Logic Journal of the IGPL, vol. 25, issue 1, 103-113, 2017 (IF=0,556).
  162. Demestichas K.P., Adamopoulou E.F., Choras Michal, 5G Communications: Energy Efficiency. Mobile Information Systems vol. 2017, 2017 (IF=0,849).
  163. Patrikakis Ch.Z.; Konstantas A.; Kogias D.; Choras Michal, TRILLION project approach on scenarios definition for citizen security services , Int. J. of Electronic Governance, Vol.9, No.3/4, 267-282, Inderscience, 2017.
  164. Choras Michal , Kozik R., Machine Learning Techniques for Threat Modelling and Detection in: Ficco M. and Palmieri F. (Eds): Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, Elsevier, 179-192, 2017.
  165. Choras Michal , Wozniak M., Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity in: Bernik I. et al. (Eds.): Advances in Cybersecurity 2017, 35-42, CECC 2017, Ljubljana, University of Maribor Press, 2017.
  166. Wojciechowska A., Choras Michal , Kozik R. The method and an examplary biometric system to verify users , Journal of Machine Construction and Maintenance, vol. 3, 97-101, 2017.
  167. Wojciechowska A., Choras Michal , Kozik R. The overview of trends and challenges in mobile biometrics , Journal of Applied Mathematics and Computational Mechanics, vol. 16, Issue 2, 173-185, 2017.
  168. Choras Michal , Kozik R., Renk R., Holubowicz W., The Concept of Applying Lifelong Learning Paradigm to Cybersecurity , in: Intelligent Computing Methodologies, ICIC 2017, Liverpool, UK, Lecture Notes in Computer Science, LNCS 10363, 663-671, Springer, 2017.
  169. Kozik R., Choras Michal , Puchalski D., Renk R., Data Analysis Tool Supporting Software Analysis Process , in Proc. of 14th IEEE International Scientific Conference on Informatics, 179-184, 14-16 November, Poprad, Slovakia, 2017.
  170. Wojciechowska A., Choras Michal , Kozik R. Evaluation of the Pre-Processing Methods in Image-Based Palmprint Biometrics , in: Image Processing and Communications Challenges 9, Advances in Intelligent Systems and Computing, vol. 681, 43-49, Springer 2017.
  171. Kozik R., Morzynska J., Choras Michal , Running Sports Decision Aid Tool Based on Reinforcement Learning Approach, , in: Image Processing and Communications Challenges 9, Advances in Intelligent Systems and Computing, vol. 681, 160-169, Springer 2017.
  172. Wojciechowska A., Choras Michal , Kozik R. Recent Advances in Image Pre-processing Methods for Palmprint Biometrics , in: Kurzynski M. et al.: Proc. of the 10th International Conference on Computer Recognition Systems CORES 2017, Advances in Intelligent Systems and Computing, AISC, vol. 579, 268-275, Springer, 2017.
  173. Kozik R., Mlodzikowski R., Choras Michal , Netflow-Based Malware Detection and Data Visualization System , in: Saeed K. et al.: Computer Information Systems and Industrial Management, CISIM 2017, Bialystok, Lecture Notes in Computer Science LNCS 10244, 652-660, Springer, 2017.
  174. Choras Michal , Kozik R., Flizikowski A., Renk R., Holubowicz W., Cyber Threats Impacting Critical Infrastructures , in: Setola R. et al.: Managing the Complexity of Critical Infrastructures, Studies in Systems, Decision and Control, vol. 90, 139-161, Springer, 2016 (printed in 2017). (Open Access paper/book for download)

    2016

  175. Kozik R., Choras Michal and Holubowicz W., Evolutionary-based packets classification for anomaly detection in web layer , Security and Communication Networks, vol. 9, Issue 15, 2901-2910, Wiley, 2016 (IF=1,067).
  176. Saganowski L., Andrysiak T., Kozik R. and Choras Michal, DWT-based anomaly detection method for cyber security of wireless sensor networks , Security and Communication Networks, vol. 9, Issue 15, 2911-2922, Wiley, 2016 (IF=1,067).
  177. Andrysiak T., Saganowski L., Choras Michal, Kozik R., Proposal and comparison of network anomaly detection based on long-memory statistical models , Logic Journal of the IGPL, vol. 24, issue 6, 944-956, 2016 (IF=0,556).
  178. Choras Michal, Emerging approaches and advances in biometric human identification , Int. J. Biometrics, vol. 8, no. 1, 2016.
  179. Kozik R., Choras Michal, Renk R., Holubowicz W., Cyber Security of the Application Layer of Mission Critical Industrial Systems , in: Saeed K. and Homenda W., Computer Information Systems and Industrial Management, CISIM 2016, Vilnius, Lecture Notes in Computer Science LNCS 9842, 342-351, Springer, 2016.
  180. Choras Michal, Kozik R., Puchalski D., Holubowicz W., Cybercrime in the European Projects DG HOME CIPHER and FP7 CAMINO , Internal Security, Semiannual Journal, vol.7, Issue 2, 2015 (printed in 2016).
  181. Choras Michal, Kozik R., Hammerli B., Cyber security landscape, challenges, initiatives and solutions (Editorial) , European CIIP Newsletter, Volume 10, Number 3, 5-7, 2016.
  182. Choras Michal, Kozik R., Maciejewska I., Emerging Cyber-Security: Bio-Inspired Techniques and MITM Detection in IoT, In: Akhgar B., Brewster B. (Eds.): Combatting Cybercrime and Cyberterrorism – Challenges, Trends and Priorities, pp. 193-207, Advanced Sciences and Technologies for Security Applications, Springer, Switzerland, 2016
  183. Akhgar B., Choras Michal, Brewster B., Bosco F., Vermeersch E., Puchalski D., Wells D., Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism , In: Akhgar B., Brewster B. (Eds.): Combatting Cybercrime and Cyberterrorism – Challenges, Trends and Priorities, pp. 295-321, Advanced Sciences and Technologies for Security Applications, Springer, Switzerland, 2016
  184. Choras Michal, Kozik R., Churchill A., Yautsiukhin A., Are We Doing All The Right Things To Counter Cybercrime? In: Akhgar B., Brewster B. (Eds.): Combatting Cybercrime and Cyberterrorism – Challenges, Trends and Priorities, pp. 279-294, Advanced Sciences and Technologies for Security Applications, Springer, Switzerland, 2016
  185. Kozik R., Choras Michal, The HTTP Content Segmentation Method Combined with AdaBoost Classifier for Web-Layer Anomaly Detection System , in Grana M. et al. (Eds.): International Joint Conference SOCO'16-CISIS'16-ICUETE'16, Advances in Intelligent Systems and Computing, vol. 527, 555-563, CISIS 2016, San Sebastian, Springer 2016.
  186. Kozik R., Choras Michal, Holubowicz W., Renk R., Extreme Learning Machines for Web Layer Anomaly Detection , in Image Processing and Communications Challenges 8, Advances in Intelligent Systems and Computing, vol. 525, 226-233, Springer 2016.
  187. Laskawiec S., Choras Michal Considering Service Name Indication for Multi-tenancy Routing in Cloud Environments , in Image Processing and Communications Challenges 8, Advances in Intelligent Systems and Computing, vol. 525, 271-278, Springer 2016.
  188. Choras Michal, Kozik R. Comprehensive roadmap (research agenda) for fight against cybercrime and cyber terrorism , FP7 CAMINO Project Deliverable published as a book, ISBN 978-83-64539-01-5, 2016.
  189. Przybyszewski M., Stachowicz A., Olejniczak T., Choras Michal, Zych J., Application Pomoc - Emergency Calls with Geo-location , In: In Tapia A. et al.(Eds.), ISCRAM 2016 Conference Proceedings; 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil.
  190. Kozik R., Choras Michal, Solution to Data Imbalance Problem in Application Layer Anomaly Detection systems , in Martinez-Alvarez F., Troncoso A., Quintian H., Corchado E. (Eds.): Hybrid Artificial Intelligent Systems, HAIS 2016, LNAI vol. 9648, 441-450,Springer 2016.
  191. Patsakis C., van Rest J., Choras Michal, Bouroche M., Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption , in: Garcia-Alfaro J. et al. (Eds.): Data Privacy Management and Security Assurance, Proc. of DPM/QASA 2015, Lecture Notes in Computer Science, LNCS 9481, 169-182, Springer, 2016.
  192. Kozik R., Choras Michal, Renk R., Holubowicz W., Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic , in Burduk R. (et al.): Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015, Advances in Intelligent Systems and Computing, vol. 403, 767-776, Springer 2016.
  193. Choras Michal, Mlynarek P. Smart grid networks: models and communities , European CIIP Newsletter, Volume 10, Number 1, 35-38, 2016.

    2015

  194. Kozik R., Choras Michal , Flizikowski A., Theocharidou M., Rosato V., Rome E., Advanced services for critical infrastructures protection , Journal of Ambient Intelligence and Humanized Computing, vol. 6(6), 783-795, Springer, 2015. (paper for download)
  195. Choras Michal, Kozik R., Machine learning techniques applied to detect cyber attacks on web applications , Logic Journal of the IGPL, vol. 23(1): 45-56, 2015.
  196. Choras Michal , Ear Biometrics , in: Li S.Z., Jain A.K: Encyclopedia of Biometrics, Second Edition, 363-368, Springer US, 2015.
  197. Puchalski D., Choras Michal , Kozik R., Holubowicz W., CAMINO Roadmap to Counter Cyber Crime and Cyber Terrorism (in Polish) , in: Kosinski J.: ICT Crime 2015 (Przestepczosc Teleinformatyczna 2015), 279-287, Szczytno 2015.
  198. Kozik R., Choras Michal , Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection System , in Proc. Of 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC, November, Cracow, 724-729, IEEE CPS, 2015.
  199. Choras Michal, Kozik R., Torres Bruna M.P., Yautsiukhin A., Churchill A., Maciejewska I., Eguinoa I., Jomni A., Comprehensive Approach to Increase Cyber Security and Resielience , in Proc. of ARES (International Conference on Availability, Reliability and Security), 686-692, Touluse, August 2015, IEEE.
  200. Kozik R., Choras Michal, Holubowicz W., Renk R., Increasing Protection and Resilience of Critical Infrastructures - Current challenges and approaches , Journal of the Polish Safety & Reliability Association, vol. 6, number 3, 79-84, 2015.
  201. Kozik R., Choras Michal, Local Statistic Embedding for Malware Behaviour Modelling , Image Processing and Communication Challenges 7, Advances in Intelligent Systems and Computing, vol. 389, 267-273, Springer 2015.
  202. Puchalski D., Choras Michal, FP7 CAMINO Roadmap , CIIP Focus, no. 10, 13-15, 2015.
  203. Kozik R., Choras Michal, Renk R., Holubowicz W., Patterns Extraction Method for Anomaly Detection in HTTP Traffic , in: Herrero A., Baruque B., Sedano J., Quintan H., Corchado E. (Eds.), International Joint Conference CISIS'15 and ICEUTE'15, Advances in Intelligent Systems and Computing, 227-236, ISBN 978-3-319-19712-8, Springer 2015.
  204. Choras Michal, Kozik R., Renk R., Holubowicz W., A Practical Framework and Guidelines to Enhance Cyber Security and Privacy , in: Herrero A., Baruque B., Sedano J., Quintan H., Corchado E. (Eds.), International Joint Conference CISIS'15 and ICEUTE'15, Advances in Intelligent Systems and Computing, 485-496, ISBN 978-3-319-19712-8, Springer 2015.
  205. Choras Michal, Kozik R., D’Antonio S., Iannello G., Jedlitschka A., Miesenberger K., Vollero L., Woloszczuk A., Innovative Solutions for Inclusion of Totally Blind People , in: Garcia N.M., Rodrigues J.J.P.C.: Ambient Assisted Living, Chapter 15, 401-431, CRC Press, 2015.
  206. Kozik R., Choras Michal, Renk R., Holubowicz W., Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic , in Burduk R. (et. al): Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015 (on USB).
  207. Choras Michal, Mlynarek P., Kosinski J., Kozik R., Research and activities of CAMINO Project in the area of countering cyber crime (in Polish) , in: Kosinski J.: ICT Crime 2014 (Przestepczosc Teleinformatyczna 2014), Szczytno 2015.
  208. Choras Michal, Kozik R., Holubowicz W., Flizikowski A., CIPHER Framework - a Methodology to protect personal data in computer systems (in Polish) , in: Kosinski J.: ICT Crime 2014 (Przestepczosc Teleinformatyczna 2014), Szczytno 2015.
  209. Kozik R., Choras Michal, Finger Knuckle Print Identification with Hierarchical Model of Local Gradient Features , in: Barabucha D. et al. (Eds.), New Trends in Intelligent Information and Database Systems, Studies in Computatiional Intelligence 598, Springer, 2015.

    2014

  210. BOOK: Choras Michal (Ed.), Methodological Framework for Enhancing Cyber Security, Data Protection, and the Privacy of the Users , CIPHER Project Report published as a book with ISBN, ISBN 978-83-64539-00-8, 2014.
  211. Kozik R., Choras Michal, Renk R., Holubowicz W., A Proposal of Algorithm for Web Applications Cyber Attacks Detection , in Saeed K. and Snasel V. (Eds.): Computer Information Systems and Industrial Management, CISIM 2014, November, Vietnam, Lecture Notes in Computer Science, vol. 8838, 680-687, Springer, 2014.
  212. Kozik R., Choras Michal, Renk R., Holubowicz W., Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications , in José Gaviria de la Puerta et al., Advances in Intelligent Systems and Computing, vol. 229, 527-536, Springer, 2014.
  213. Choras Michal, Kozik R., Flizikowski A., Holubowicz w., Critical Infrastructure Resilience as the Factor for Structural Homeland Security , (written in Polish), in: W. Bednarek and A. Ukleja (Eds.): Wartosciowanie bezpieczenstwa w dobie kryzysu, p. 19 – 33, ISBN 978-83-62753-36-9, Jozefów 2013 (published in 2014).
  214. Andrysiak T., Saganowski L., Choras Michal, Kozik R., Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model , in José Gaviria de la Puerta et al., Advances in Intelligent Systems and Computing, vol. 229, 545-554, Springer, 2014.
  215. Kozik R., Choras Michal, Holubowicz W., Hardening web applications against SQL Injection cyber attacks using anomaly detection approach , in Image Processing and Communications 6, Advances in Intelligent Systems and Computing, vol. 313, 289-296, Springer 2014.
  216. Choras Michal, Kozik R., Renk R., Holubowicz W., End-users needs and requirements for tools to support critical infrastructures protection , EDDC 2014, BIG4CIP 2014, arXiv:1404.7564.

    2013

  217. Choras Michal, Comprehensive Approach to Information Sharing for Increased Network Security and Survivability , Cybernetics and Systems, vol. 44, issue 6-7, 550-568, 2013.
  218. D’Antonio S., Coppolino L., Choras Michal, Kozik R., Distributed Framework for Cybersecurity of Critical Infrastructures , In: Flammini F. et al. (Eds.): Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, CRC PRess, 2013. (http://www.crcpress.com/product/isbn/9781439883242).
  219. Choras Michal, Kozik R., Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection , In: Snasel V. et al. (Eds.): Soft Computing in Industrial Applications, Advances in Intelligent Systems and Computing, 223, Springer, 2013.
  220. Kozik R., Choras Michal, Current Cyber Security Threats and Challenges in Critical Infrastructures Protection, In: The Second International Conference on Informatics and Applications (ICIA2013), 23-25.09.2013, Lodz, Poland, pp 93-97, IEEE, 2013.
  221. Choras Michal, A Short Overview of Feature Extractors for Knuckle Biometrics , In: Burduk R. et al. (Eds.): Proc. of the 8th International Conference on Computer Recognition systems (CORES 2013), Advances in Intelligent Systems and Computing, 226, 519-526, Springer, 2013.
  222. Choras Michal, Kozik R., Evaluation of Various Techniques for SQL Injection Attack Detection , In: Burduk R. et al. (Eds.): Proc. of the 8th International Conference on Computer Recognition systems (CORES 2013), Advances in Intelligent Systems and Computing, 226, 753-762, Springer, 2013.
  223. Renk R., Choras Michal, Gierszal H., Holubowicz W., Performance Evaluation of a Network Traffic Parameters Used for Detection of Anomalies (written in Polish), In: Kosinski J. (ed.) Computer Crimes, 37-52, WSPol Press, Szczytno, 2013.
  224. Kozik R., Choras Michal, Machine Learning Techniques for Cyber Attacks Detection , In: Image Processing and Communication Challanges 5, Advances in Intelligent Systems and Computing, 233, 391-397, Springer, 2013.

    2012

    Journals:

  225. Choras Michal, Saganowski L., Renk R., Holubowicz W., Statistical and signal-based network traffic recognition for anomaly detection , Expert Systems, vol. 29, issue 3, 232-245, 2012.
  226. Choras Michal, Kozik R., Contactless palmprint and knuckle biometrics for mobile devices , Pattern Analysis and Applications, vol. 15, no. 1, 73-85, Springer, 2012.
  227. Amantini A. , Choras Michal, D’Antonio S., Egozcue E., Germanus D., Hutter R., The human role in tools for improving robustness and resilience of critical infrastructures , Cognition, Technology & Work, Volume 14, Number 2 (2012), 143-155, 2012.
  228. Choras Michal, Kozik R., The PReliminary Results of the Intelligent Computer Vision System to Support Blind People , Journal of Medical Informatics & Technologies, vol. 21, 19-26, 2012.
  229. Choras Michal, Kozik R., Flizikowski A. INSPIRE Decision Aid Tool: a Support for Risk Management and Cyber Protection of Critical Infrastructures , Telecommunications Review, vol. 8-9, p. 1215-1221, 2012.
  230. Kozik R., Choras Michal, Information Exchange Between Domains in Federated Networks Protection System , Measurement Automation and Monitoring Journal (PAK), vol. 2/2012, 184-188, 2012.

    Books and conferences:

  231. Choras Michal, Kozik R., Puchalski D., Holubowicz W., Correlation Approach for SQL Injection Attacks Detection, In: Herrero A. et al (Eds.), Advances in Intelligent and Soft Computing, 189, 177-186, Springer, 2012.
  232. Andrysiak T., Saganowski L, Choras Michal, Greedy Algorithms for Network Anomaly Detection, In: Herrero A. et al (Eds.), Advances in Intelligent and Soft Computing, 189, 235-244, Springer, 2012.
  233. Choras Michal, Kozik R., Renk. R, Holubowicz W., Information Exchange Mechanism between Federated Domains: P2P Approach , In: Herrero A. et al (Eds.), Advances in Intelligent and Soft Computing, 189, 187-196, Springer, 2012.
  234. Jasiul B., Piotrowski R., Berezinski P., Choras Michal, Kozik R., Brzostek J., Federated Cyber Defence System - Applied Methods and Techniques , In: Amanowicz M. (Ed.), Military Communications and Information Technology: A Trusted Cooperation Enabler, 347-357, MUT Press, 2012.
  235. Choras Michal, Manso M., Puchalski D., Kozik R., Samp K., Online Social Networks: Emerging Security and Safety Applications , In: Image Processing and Communication Challenges 4, Advances in Intelligent and Soft Computing, AISC 184, 291-302, Springer, 2012.
  236. Andrysiak T., Saganowski L, Choras Michal, DDoS Attacks Detection by Means of Greedy Algorithms, In: Image Processing and Communication Challenges 4, Advances in Intelligent and Soft Computing, AISC 184, 303-310, Springer, 2012.
  237. Flizikowski A., Majewski M., Puchalski D., Hassnaa M., Choras Michal, A Concept of Unobtrusive Method for Complementary Emotive User Profiling and Personalization for IPTV Platforms, , In: Image Processing and Communication Challenges 4, Advances in Intelligent and Soft Computing, AISC 184, 269-282, Springer, 2012.
  238. Choras Michal, Kozik R, Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection , In. Proc. of WSC17 Online Conference on Soft Computing in Industrial Applications, 2012.
  239. Jasiul B., Piotrowski R., Berezinski P., Choras Michal, Kozik R., Brzostek J., Federated Cyber Defence System - Applied Methods and Techniques , In Proc. of MCC12 Military Communications and Information Systems Conference, Gdansk, Poland, IEEE Explore 2012.

    2011

    Journals:

  240. Choras Michal, Kozik R., Saganowski L., Renk R., Aspects of Deploying Synchrophasors in Energy Grids (written in Polish) , Energy Market (Rynek Energii), vol. 2(93)/2011, 2011.
  241. Choras Michal, Kozik R., Nowakowski W. Biometric Recognition based on Knuckles (written in Polish), Electronics (Elektronika), vol. 4, 92-95, 2011.

    Books and conferences:

  242. Choras Michal, Kozik R., Fast Feature Extractors for Palmprint Biometrics , In Chaki N. et al. (Eds.): Computer Information Systems – Analysis and Technologies, Communications in Computer and Information Science CCIS, 121-127, Springer, 2011.
  243. Choras Michal, Kozik R., Network Event Correlation and Semantic Reasoning for Federated Networks Protection System , In Chaki N. et al. (Eds.): Computer Information Systems – Analysis and Technologies, Communications in Computer and Information Science CCIS, 48-54, Springer, 2011.
  244. Choras Michal, Kozik R., Piotrowski R., Brzostek J., Holubowicz W., Network Events Correlation for Federated Networks Protection System , In: Abramowicz W. et al. (Eds.): Towards a Service-Based Internet, LNCS 6994, pp. 100–111, Springer 2011.
  245. Piotrowski R., Jasiul B., Sliwka M., Kantyka G., Podlasek T., Dalecki T., Choras Michal, Kozik R., Brzostek J., The Response to Cyber Threats in Federation of Systems Environment , In: Amanowicz M. (Ed.): Military Communications and Information Technology: A Comprehensive Approach Enabler, pp. 325-335, MUT Press 2011. ,
  246. Choras Michal, D'Antonio S., Iannello G., Jedlitschka A., Kozik R., Miesenberger K., Woloszczuk A., Innovative man machine interfaces and solutions to support totally blind people , In: Image Processing and Communication Challenges 3, Advances in Soft Computing, AISC 102, 437-444, Springer, 2011.
  247. Choras Michal, Kozik R., Knuckle Recognition for Human Identification , In Burduk R. et al. (Eds.): Computer Recognition Systems 4, AISC 95, 61-70, Springer-Verlag, 2011.
  248. Saganowski £., Andrysiak T., Choras Michal, Renk R., Expansion of Matching Pursuit Methodology for Anomaly Detection in Computer Networks , In: Burduk R. et al. (Eds.): Computer Recognition Systems 4, AISC 95, 727-736, Springer-Verlag, 2011.
  249. Renk R., Choras Michal, Saganowski £., Holubowicz W., Signal Processing Methodology for Network Anomaly Detection, in: Intrusion Detection Systems, Pawel Skrobanek (Ed.), ISBN: 978-953-307-167-1, InTech, 2011, Available from: http://www.intechweb.org/books/show/title/intrusion-detection-systems

    2010

    Journals:

  250. Choras Michal, The lip as a biometric , Pattern Analysis and Applications, PAA, vol. 13, no. 1, 105-112, Springer, 2010.
  251. Renk R., Saganowski L., Choras Michal, Holubowicz W., Comprehensive Approach to Anomaly Detection System Evaluation , Image Processing & Communications, vol. 15, no. 1, 69-78, 2010.
  252. Choras Michal, Renk Rafal, Power Grid Protection through Increasing Cyber Security of ICT-SCADA Systems Interconnection (written in Polish) , Energy Market (Rynek Energii), vol. 2(86)/2010, 35-39, 2010.
  253. Kozik Rafal, Choras Michal Combined Shape and Texture Information for Palmprint Biometrics , Journal of Information Assurance and Security, vol. 5, issue 1, 58-63, 2010.

    Books and conferences:

  254. Choras Michal, Holubowicz W., Renk R, Samp K., Ontology of Network Threats and Vulnerabilities in the context of NATO Network Enabled Capabilities (NNEC), In: Concept and Implementations for Innovative Military Communications and Information Technologies, 267-276, MUT Press 2010.
  255. Choras Michal, Kozik R., Feature Extraction Method for Contactless Palmprint Biometrics , In D.-S. Huang et al. (Eds.): Advanced Intelligent Computing Theories and Applications, Communications in Computer and Information Science 93, pp. 435–442, Springer, 2010.
  256. Renk R., Saganowski £., Choras Michal, Holubowicz W., Performance Evaluation of ADS System Based on Redundant Dictionary, In: Choras (Ed.): Image Processing and Communication Challenges 2, Advances in Soft Computing, 468-476, Springer, 2010.
  257. Choras Michal, Kozik R., Knuckle Biometrics for Human Identification, In: Choras (Ed.): Image Processing and Communication Challenges 2, Advances in Soft Computing, 95-102, Springer, 2010.
  258. Choras Michal, Kozik R., Flizikowski A., Holubowicz W., Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services , In L. Bolc et al. (Eds.): Computer Vision and Graphics, Part I, LNCS 6374, pp. 275–282, Springer, 2010.
  259. Kozik R., Choras Michal, Ho³ubowicz W., Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection, In J. Alonso-Zarate and O. Hoffmann (Eds.): Mobile Lightweight Wireless Systems, LNICST 45, pp. 451–463, 2010.
  260. Choras Michal, Kozik R., Flizikowski A., Holubowicz W., Ontology Applied in Decision Support System for Critical Infrastructures Protection , In N. Garcia-Pedrajas et al. (Eds.): Trends in Applied Intelligent Systems, IEA/AIE 2010, Part I, LNAI 6096, pp. 671-680, 2010.
  261. Choras Michal, Flizikowski A., Kozik R., Holubowicz W., Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis , In E. Rome and R. Bloomfield (Eds.): Critical Information Infrastructures Security, LNCS 6027, pp. 98–110, 2010
  262. Choras Michal, Kozik R, Knuckle Biometrics Based on Texture Features, In. Proc. of International Workshop on Emerging Techniques and Challenges for Hand-based Biometrics (ETCHB2010), Stambul, IEEE CS Press, August 2010.
  263. Kozik R., Choras Michal, Holubowicz W., Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection, In Proc. of MOBILIGHT (Mobile Lightweight Wireless Systems), Barcelona, May, 2010.
  264. Choras Michal, Stachowicz A., Kozik R., Semantic Description of Cyber Threats , In Proc. of Multimedia Communication, Services and Security, MCSS 2010, 20-24, Cracow, May, 2010.
  265. Choras Michal, D'Antonio Salvatore, Kozik R., Holubowicz W., INTERSECTION Approach to Vulnerability Handling , In Proc. of 6th International Conference on Web Information Systems and Technologies, WEBIST 2010, vol. 1, 171-174, INSTICC Press, Valencia, Spain, April 2010.

    2009

    Journals:

  266. Choras Michal, Stachowicz Anna, Kozik Rafal, Flizikowski Adam, Renk Rafal Ontology-based approach to SCADA systems vulnerabilities representation for CIP , Electronics, vol. 11/2009, 35-38, November 2009.
  267. Flizikowski A., Choras Michal, Wachowiak M., Holubowicz W., A Method for Semi-automated Assessment of User Satisfaction When Using WWW Services with Mobile Terminals , Image Processing & Communications, vol. 14, no. 2-3, 69-80, 2009.
  268. Saganowski Lukasz, Choras Michal, Renk Rafal, Holubowicz Witold, On Tuning Redundant Dictionary Parameters in Signal-based Anomaly Detection System , Image Processing & Communications, vol. 14, no. 4, 29-34, 2009.
  269. Choras Michal, Stachowicz Anna, Flizikowski Adam, Renk Rafal, Holubowicz Witold, Solutions for securing SCADA interconnection with telecommunications networks in critical infrastructure protection (written in Polish) , Telecommunications Review, vol. 8-9, 1408-1416, 2009.
  270. Choras Michal, Flizikowski Adam, Energy sector protection - securing SCADA interconnection with telecommunications networks (written in Polish), New Energy, vol. 3/2009, 82-85, 2009.
  271. Choras Michal, Novel techniques applied to biometric human identification , Electronics, vol. 3/2009, March 2009.
  272. Flizikowski Adam, Choras Michal, Critical Infrastructures - Security Aspects (written in Polish) , Boston IT Security Review, vol. 2/2009, 35-39, 2009.

    Books and conferences:

  273. Choras Michal, Ear Biometrics , In: Li S. (Ed.) Encyclopedia of Biometrics , 233-240, Springer, 2009.
  274. Choras Michal, Ear Biometrics based on Geometrical Feature Extraction , In: Bunke H. et al. (Eds.) Progress in Computer Vision and Image Analysis , 321-338, World Scientific, 2009.
  275. Saganowski L., Choras Michal, Renk R., Holubowicz W., A Novel Signal-Based Approach to Anomaly Detection in IDS Systems , M. Kolehmainen et al. (Eds.): Adaptive and Natural Computing Algorithms, ICANNGA 2009, LNCS 5495, pp. 527–536, Springer 2009.
  276. Choras Michal, Kozik R., Flizikowski A., Renk R., Holubowicz W., Ontology-based Decision Support for Security Management in Heterogeneous Networks , In: Huang, D.-S. et al. (Eds.): Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, LNAI 5755, 920-927, Springer 2009.
  277. Kozik R., Choras Michal, Palmprint Biometrics for Human Identification , In: Image Processing & Communications Challenges, 271-277, EXIT, 2009.
  278. Saganowski L., Choras Michal, Renk R., Holubowicz W., Anomaly Detection System based on Redundant Dictionary of Base Functions , In: Image Processing & Communications Challenges, 443-449, EXIT, 2009.
  279. Flizikowski A., Choras Michal, Wachowiak M., Holubowicz W., Video Profiling for Automated Assessment of QoS/QoE in Mobile WWW Services , In: Image Processing & Communications Challenges, 450-457, EXIT, 2009.
  280. Choras Michal, Lips Recognition for Biometrics , In: Massimo Tistarelli, Mark S. Nixon (Eds.): Advances in Biometrics. LNCS 5558, 1260-1269, Springer 2009.
  281. Choras Michal, Saganowski L., Renk R., Kozik R., Holubowicz W., Recognizing Anomalies/Intrusions in Heterogeneous Networks , in M.Kurzynski and M.Wozniak (Eds.): Computer Recognition Sys. 3, AISC 57, pp. 619-627, Springer-Verlag, 2009.
  282. Tarlowski R., Choras Michal, Digital Analysis of 2D Code Images Based on Radon Transform , in M.Kurzynski and M.Wozniak (Eds.): Computer Recognition Sys. 3, AISC 57, pp. 155–162, Springer-Verlag, 2009.
  283. Choras Michal, Flizikowski A., Kozik R., Renk R., Holubowicz W., Ontology-Based Reasoning Combined with Inference Engine for SCADA-ICT Interdependencies, Vulnerabilities and Threats Analysis , In Pre-Proc. of 4th International Workshop on Critical Information Infrastructures Security, CRITIS'09, Bonn, Germany, 203-214, Fraunhofer IAIS, 2009.

    2008

    Journals:

  284. Saganowski Lukasz , Choras Michal, Renk Rafal, Holubowicz Witold, Signal-based Approach to Anomaly Detection in IDS Systems , International Journal of Intelligent Engineering and Systems, vol. 1 (4), 18-24, 2008.
  285. Choras Michal, Flizikowski Adam, Anna Stachowicz, Marta Redo, Renk Rafal, Holubowicz Witold, Ontology Notation and Description of Vulnerabilities in Heterogeneous Networks and Critical Infrastructures , Methods of Applied Informatics of Polish Academy of Sciences, vol. 4, 2008.
  286. Choras Michal, Renk Rafal, Flizikowski Adam, Holubowicz Witold, Ontology-based description of networks vulnerabilities , Polish Journal of Environmental Studies, vol. 5c, 2008.
  287. Tarlowski Rafal, Choras Michal, Analysis of 2D Code Images based on Radon Transform (written in Polish), Telecommunication Review (Przeglad Telekomunikacyjny), vol.8-9, 1014-1021, 2008.
  288. Dabrowski Rafal, Renk Rafal, Choras Michal, Holubowicz Witold, Security Subsystem Architecture for Heterogeneous Networks (written in Polish), Telecommunication Review (Przeglad Telekomunikacyjny), vol.8-9, 1339-1346, 2008.
  289. Choras Michal, Perspective methods of human identification: Ear Biometrics , Opto-Electronics Review, vol. 16, no.1, 85-96, 2008. (http://www.springerlink.com/content/yj27m7151633535n/).

    Books and conferences:

  290. Choras Michal, Saganowski L., Renk R, Holubowicz W., Signal Processing Methods Applied to Innovative Intrusion Detection Systems , in Adam Grzech et al. (Eds.): Information Systems Architecture and Technology - Information Systems and Computer Communications Network, 139-150, ISBN 978-83-7493-416-9, 2008.
  291. Flizikowski A., Choras Michal, Renk R., Holubowicz W., On Applying Ontologies to Security and QoS Management in Heterogeneous Networks , in Adam Grzech et al. (Eds.): Information Systems Architecture and Technology - Information Systems and Computer Communications Network, 189-200, ISBN 978-83-7493-416-9, 2008.
  292. Choras Michal, Human Lips as Emerging Biometrics Modality, in A. Campilho and M. Kamel (Eds.): Image Analysis and Recognition, ICIAR 2008, LNCS 5112, 994-1003, Springer-Verlag, 2008. (doi:10.1007/978-3-540-69812-8).
  293. Rafal Kozik, Aleksandra Zelek, Choras Michal, Palmprint Segmentation and Feature Extraction Methods, in L. Rutkowski et al. (Eds.): Computational Intelligence: Methods and Applications, 377-388, Academic Publishing House EXIT, 2008.
  294. Rafal Kozik, Aleksandra Zelek, Choras Michal, A Novel Shape-Texture Approach to Palmprint Detection and Identification , in Proc. Intelligent Systems Design and Applications, ISDA '08, 638-643, IEEE CS Press, Kaohsiung, Taiwan, 2008.
  295. Renk R, Saganowski L., Holubowicz W.,Choras Michal, Intrusion Detection System Based on Matching Pursuit , in Proc. Intelligent Networks and Intelligent Systems, ICINIS '08, 213-216, IEEE CS Press, Wuhan, China, 2008.
  296. Choras Michal, Perspective Methods of Biometric Human Identification , In Proc of NTAV/SPA (New Trends in Audio and Video/ Signal Processing), 195-200, Poznan, September 2008.
  297. Rafal Kozik, Aleksandra Zelek, Choras Michal, Palmprint Recognition Enhanced by the Shape Features, Proc. of 7th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07), IEEE CS Press, 214-215, Ostrava, June 2008.

    2007

    Journals:

  298. Andrysiak Tomasz, Choras Michal, Algorithms for Stereovision Disparity Calculation in the Moments Space, Machine Graphics & Vision, MGV, vol. 15, no. 3/4, 255-264, 2006 (printed in October 2007).
  299. Choras S. Ryszard, Andrysiak Tomasz, Choras Michal, Integrated Color, Texture and Shape Information for Content-Based Image Retrieval, Pattern Analysis and Applications, PAA, vol. 10,no. 4, 333-343, October 2007. (doi:10.1007/s10044-007-0071-0).

    Books and conferences:

  300. Choras Michal, Human Lips Recognition , in M. Kurzyñski et al. (Eds): Computer Recognition Systems 2, Advances in Soft Computing, 838-843, Springer, 2007. (doi:10.1007/978-3-540-75175-5_104).
  301. Choras Michal, Image Pre-classification for Biometrics Identification Systems , in J. Pejas and K. Saeed (Eds): Advances in Information Processing and Protection, 361-370, Springer NY, 2007.(doi:10.1007/978-0-387-73137-7_32).
  302. Choras Michal, Intelligent Computing for Automated Biometrics, Criminal and Forensic Applications, in D.-S. Huang et al. (Eds.): Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,1170-1181, LNCS 4681, Springer Berlin, 2007. (doi:10.1007/978-3-540-74171-8).
  303. Choras Michal, Mroczkowski Piotr, Recognizing Individual Typing Patterns, , in Marti J. et al. (Eds.): Pattern Recognition and Image Analysis, IbPRIA – Part II, 323-330, LNCS 4478, Springer Berlin, 2007.(doi:10.1007/978-3-540-72849-8_41).
  304. Choras S. Ryszard, Choras Michal, Multimodal Hand-Palm Biometrics, in B. Beliczynski et al. (Eds.): Adaptive and Natural Computing Algorithms - ICANNGA (part II), 407-414, LNCS 4432, Springer Berlin, 2007.(doi:10.1007/978-3-540-71629-7_46).
  305. Choras Michal, Mroczkowski Piotr, Keystroke Dynamics for Biometrics Identification, in B. Beliczynski et al. (Eds.): Adaptive and Natural Computing Algorithms - ICANNGA (part II), 424-431, LNCS 4432, Springer Berlin, 2007.(doi:10.1007/978-3-540-71629-7_48).
  306. Choras Michal, Emerging Methods of Biometrics Human Identification , Proc. of 2nd International Conference on Innovative Computing, Information and Control (ICICIC'07), p. 365, IEEE CS Press, Kumamoto, Japan, September 2007.
  307. Choras Michal, Image Feature Extraction Methods for Ear Biometrics - A Survey , Proc. of 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07), IEEE CS Press, 261-265, Elk, June 2007.
  308. Choras Michal, Mroczkowski Piotr, Web Security Enhancement Based on Keystroke Dynamics , Proc. of Web Information systems and Technologies (WEBIST), INSTICC Press, 337-340, Barcelona, March 2007.

    2006

  309. Choras Michal, Ear biometrics: feature extraction methods based on geometrical parameters (written in Polish), Przegl¹d Elektrotechniczny (Electrotechnical Review) no. 12/2006, 5-10, 2006.
  310. Andrysiak Tomasz, Choras Michal, Image Filtration and Feature Extraction for Face Recognition, in K. Saeed et al. (Eds): Biometrics, Computer Security Systems and Artificial Intelligence Applications, chapter 1, pages 3-12, Springer NY, 2006.(doi:10.1007/978-0-387-36503-9_1).
  311. Choras Michal, Further Developments in Geometrical Algorithms for Ear Biometrics, in F.J Perales and B. Fisher (Eds.): Articulated Motion and Deformable Objects - AMDO 2006, 58-67, LNCS 4069, Springer-Verlag 2006.(doi:10.1007/11789239_7).
  312. Choras Michal, Andrysiak Tomasz, Symmetry-based Salient Points Detection in Face Images, in L. Rutkowski et al. (Eds): Artificial Intelligence and Soft Computing - ICAISC 2006, 758-767, LNCS 4029, Springer-Verlag 2006.(doi:10.1007/11785231_79).
  313. Choras Michal, Biometric Images Pre-classification: Original Solution for Ear Biometrics, Proc. of Advanced Computer Systems (ACS), vol. II, 139-146, Miedzyzdroje, Poland, October 2006.
  314. Mroczkowski Piotr, Choras Michal, Keystroke Dynamics in Biometrics Client-Server Password Hardening System, Proc. of Advanced Computer Systems (ACS), vol. II, 75-82, Miedzyzdroje, Poland, October 2006.
  315. Choras Michal, Choras S. Ryszard, Geometrical Algorithms of Ear Contour Shape Representation and Feature Extraction , Proc. of ISDA (Intelligent Systems Design and Applications), vol. II, 451-456, IEEE CS Press, Jinan, China, October 2006.
  316. Choras S. Ryszard, Choras Michal, Hand Shape Geometry and Palmprint Features for the Personal Identification , Proc. of ISDA (Intelligent Systems Design and Applications), vol. II, 1085-1090, IEEE CS Press, Jinan, China, October 2006.
  317. Andrysiak Tomasz, Choras Michal, Stereo Disparity Estimation Using Orthogonal Discrete Moments, Proc. of ICINCO 2006 Conference, INSTICC Press, 504-507, Setubal, Portugal, August 2006.
  318. Choras Michal, Ear Biometrics in Passive Human Identification Systems, Proc. of Pattern Recognition in Information Society (ICEIS-PRIS), INSTICC Press, 169-175, Paphos, Cyprus, May 2006.

    2005

    Journals:

  319. Andrysiak Tomasz, Choras Michal, Multiresolution Matching and Disparity Calculation of Stereo Images in Frequency Domain, Information Extraction and Processing, no. 23 (99), 106-111, 2005.
  320. Andrysiak Tomasz, Choras Michal, Image Retrieval Based on Hierarchical Gabor Filters, International Journal Applied Mathematics and Computer Science (AMCS), vol. 15, no. 4, 471-480, 2005.(http://www.amcs.uz.zgora.pl./images/articles/vol15no4/vol15no4_5.pdf).
  321. Choras Michal, Ear Biometrics Based on Geometrical Feature Extraction, Electronic Letters on Computer Vision and Image Analysis (Journal ELCVIA), vol. 5, no. 3, 85-95, 2005. (elcvia.cvc.uab.es/journal/publish.php?art=a2004085-1).
  322. Choras Michal, Image Processing Methods in Person Identification Applications - Ear Biometrics, Electrotechnical Review (Przegl¹d Elektrotechniczny) no. 4/81, 38-41, 2005.

    Books and conferences:

  323. Choras Ryszard, Andrysiak Tomasz, Choras Michal, Content Based Image Retrieval Technique, in M. Kurzyñski et al. (Eds): Computer Recognition Systems, Advances in Soft Computing, 371-379, Springer, 2005.
  324. Andrysiak Tomasz, Choras Michal, Stereo Matching for Robotics Vision, Proc. of International Conference PELINCEC 2005 (10 pages).
  325. Andrysiak Tomasz, Choras Michal, Face Feature Extraction and Representation, Proc. of ACS-CISIM, vol. 1: Image Analysis, Computer Graphics, Security Systems and Artificial Intelligence Applications, 297-306, University of Finance and Management in Bialystok, 2005.
  326. Andrysiak Tomasz, Choras Michal, LPT and DST for Face Feature Extraction and Representation, Proc. of IAPR Conference on Pattern Recognition and Image Processing - PRIP, 148-151, Minsk 2005.

    2004

  327. Choras Michal, Ear Biometrics Based on Geometrical Method of Feature Extraction, in F.J Perales and B.A. Draper (Eds.): Articulated Motion and Deformable Objects, LNCS 3179, 51-61, Springer-Verlag 2004.
  328. Choras Michal, Human Ear Identification Based on Image Anlysis, in L. Rutkowski et al. (Eds): Artificial Intelligence and Soft Computing, LNAI 3070, 688-693, Springer-Verlag 2004.
  329. Choras Michal, Feature Extraction Based on Contour Processing in Ear Biometrics, IEEE Workshop on Multimedia Communications and Services, MCS 2004, 15-19, Cracow.
  330. Choras Michal, Biometrics Human Identification Methods Based on Ear Image Analysis (in Polish), Biuletyn Informacyjny Techniki Komputerowe no 1/2004, ISSN 0239-8044, 59-69, 2004.

    2003

  331. Choras Michal, Human Identification Based on Image Analysis - New Trends, IEEE Workshop on Signal Processing , 111-116, Poznan, 2003.
  332. Andrysiak Tomasz, Choras Michal, Hierarchical Object Recognition Using Gabor Wavelets, Komputerowe Systemy Rozpoznawania KOSYR 2003, 271-278, Milkow.

    2002

  333. Choras S. Ryszard, Choras Michal, Computer Visual System Analyzing the Influence of Stimulants on Human Motion, in F.J Perales and E.R. Hancock (Eds.): Articulated Motion and Deformable Objects, LNCS 2492, 241-250, Springer-Verlag 2002.
  334. Choras S. Ryszard, Choras Michal, Feature Extraction Methods in Fingerprint Recognition, IEEE Workshop on Signal Processing 2002, 21-26, Poznañ.

    Conference Papers written in Polish language:

  335. Choras Michal, Renk R., Kozik R., Holubowicz W. Intelligent Energy Grids , Proc. of Intelligent Systems in Energy, SIWE'10, Wisla, Poland, November 2010.
  336. Choras Michal, Perspective methods of human identification based on image content, Proc. of Image Processing Techniques TPO 2006 - Serock, Warsaw University of Technology Press, 413-422, 2006.
  337. Choras Michal, Andrysiak Tomasz, Automated method of characteristic points localization in face images, Proc. of Image Processing Techniques TPO 2006 - Serock, Warsaw University of Technology Press, 321-326, 2006.
  338. Choras Michal, Complex Transformations for Fingerprint Recognition, Proc. of Image Processing Techniques TPO 2002, 274-279, Serock.
  339. Choras S. Ryszard, Choras Michal, Automated Localization and Detection of Faces in 2D Images, Proc. of Image Processing Techniques TPO 2002, 262-267, Serock.
  340. Choras Michal, Human Identification with the Use of Image Analysis, Proc. of Artifficial Intelligence 2002, Sztuczna Inteligencja 2002, 223-231, Siedlce.
  341. Choras Michal, MHT and HAARCOS Transformations for Videotelephony Image Coding, Proc. of KST 2002, vol. B, 68-74, Bydgoszcz.

    Contributor to:

  342. Manso M., Manso B., The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts , In Proc. of International Command and Control Research and Technology Symposium, ICCRTS, Fairfax, VA, USA, 2012. (ICCRTS Best Paper Award)

Acknowledged by:

  1. Protecting Industrial Control Systems, Recommendations for Europe and Member States, ENISA Report, December 2011.
  2. van Hengst M., Warnier M., Cyber Crime in Privately Held Information Systems – Personal data at stake, In Proc. of IEEE European Intelligence and Security Informatics Conference, Uppsala, Sweden, 2013.

Plagiarized by:

  1. RAMESH KUMAR, K.NAGESWARA RAO, Pattern Recognition Algorithms for Ear Biometrics, Journal of Theoretical and Applied Information Technology, Vol 8. No. 1, 2009.
  2. Ramesh, K.P., Rao, K.N., Pattern extraction methods for ear biometrics - A survey, Proc. of Nature & Biologically Inspired Computing, 1657 - 1660, NaBIC 2009.

Theses:

  1. Doctor of Science (habilitation) : Selected solutions to enhance digital security and safety , AGH Cracow, 2014.
  2. Ph.D. Thesis with distinction, Human Identification Based on Ear Image Analysis, 2005.
  3. M.Sc. Thesis with distinction, Static and Moving Image Coding, 2001

Guest Editor/Special Sessions:

    Current

  1. General Co-Chair of ESORICS 2024: European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 2024 (CORE A).
    https://esorics2024.org/
  2. Program Committee Co-Chair at MobiSec 2023: The 7th International Conference on Mobile Internet Security, Okinawa, Japan, December 19-21, 2023
    https://isyou.biz/conf/mobisec23/
  3. Special Session Co-Chair at DSAA 2023: Computational methods for emerging problems in disinformation analysis (DISA), Thessaloniki, Greece, October 2023 (CORE A)
    http://disa.kssk.pwr.edu.pl/
  4. Award Committee Chair at ICAI 2023: International Conference on Applied Intelligence, Nanning, Guangxi, China, December 8-12, 2023
    http://www.icai.org.cn/2023/index.htm
  5. Guest-Editor: Special Issue in ENTROPY (IF=2,494): "Advances in Computer Recognition, Image Processing and Communications, Selected Papers from CORES 2023 and IP&C 2023"
    https://www.mdpi.com/journal/entropy/special_issues/Q8W90223KC
  6. Past

  7. CONFERENCE CHAIR: Image Processing and Communications IP&C 2023. Poland.
    https://ipc.pwr.edu.pl/
  8. Special Session CO-CHAIR: Lifelong Learning: recent advances and challenges (L3-RAC) 2023, @ IJCNN, June 18 - June 23, 2023, Gold Coast, Queensland, Australia. (CORE A)
    https://sites.google.com/view/ijcnn2023-l3rac
  9. Award Committee Co-Chair: International Conference on Intelligent Computing - ICIC 2023, August 10-13, 2023, Zhengzhou, China
    http://www.ic-icc.cn/2023/index.htm
  10. Guest-editor: Special Issue in Applied Soft Computing journal (IF=5.472): Applying Machine Learning for Combating Fake News and Internet/Media Content Manipulation
    https://www.journals.elsevier.com/applied-soft-computing/call-for-papers/applying-machine-learning-for-combating-fake-news
  11. Guest-editor: Special Issue in Sensors, MDPI (IF=3.275): Sensors and Pattern Recognition Methods for Security and Industrial Applications (SPR-SIA)
    https://www.mdpi.com/journal/sensors/special_issues/SPR-SIA
  12. Special Session CO-CHAIR: Life-Long Learning in Practical Applications - L3-IPA 2022, @ IJCNN/WCCI, July 2022, Padova, Italy. (CORE B)
    http://l3ipa.kssk.pwr.edu.pl/
  13. Workshop TPC CO-CHAIR: Cyber-Security in Software-defined and Virtualized Infrastructures (SecSoft) - SecSoft 2022, @Netsoft, July 2022, Milan, Italy.
    https://www.fvv.um.si/eicc2022/detonator.html
  14. Special Session CO-CHAIR: ADVANCED AND RELIABLE SOLUTIONS TO COUNTER MALWARE AND STEGOMALWARE - DETONATOR 2022, @ EICC, June 2022, Barcelona, Spain.
    https://www.fvv.um.si/eicc2022/detonator.html
  15. Conference Publication Co-Chair: International Conference on Intelligent Computing - ICIC 2022, August 7-11, 2022, Xi'an, China
    http://www.ic-icc.cn/2022/index.htm
  16. Guest-editor: Special Issue in Symmetry, MDPI (IF=2.713): Asymmetry and Symmetry to Pattern Recognition in Multi-modal Signals
    https://www.mdpi.com/journal/symmetry/special_issues/Asymmetry_Symmetry_Pattern_Recognition_Multimodal_Signals
  17. Guest-editor: Special Issue in Sensors, MDPI (IF=3.275): Security Threats in Agriculture 4.0
    https://www.mdpi.com/journal/sensors/special_issues/Security_Agriculture
  18. Guest-Editor: Special Issue in ENTROPY (IF=2,494): "Advances in Computer Recognition, Image Processing and Communications, Selected Papers from CORES 2021 and IP&C 2021"
    https://www.mdpi.com/journal/entropy/special_issues/CR_IPC
  19. Special Session CO-CHAIR: Intelligent Computing for Cybersecurity: Detection, Mitigation and Response, ICIC August 2021, Shenzen, China.
    http://www.ic-icc.cn/2021/Special%20Session.htm#ss7
  20. Special Session CO-CHAIR: ADVANCED AND RELIABLE SOLUTIONS TO COUNTER MALWARE AND STEGOMALWARE - DETONATOR 2021, EICC, November 2021, Targu Mures, Romania.
    https://www.fvv.um.si/eicc2021/detonator.html
  21. Workshop TPC CO-CHAIR: SecSoft: 3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), Tokio, Japan, 2nd July 2021.
    https://www.astrid-project.eu/secsoft/
  22. CONFERENCE CHAIR: Image Processing and Communications 2021. Bydgoszcz. Poland (with CORES 2021).
    http://ipc-conference.utp.edu.pl/
  23. Workshop CO-CHAIR: Computational Methods for Emerging Problems in (dis-)Information Analysis – DisA, ICCS 2021. Cracow, Poland (CORE A).
    http://disa.kssk.pwr.edu.pl/

  24. Special Session CO-CHAIR: Fake News Detection and Prevention, CISIS 2020. Burgos, Spain (CORE B).
    2020.cisisconference.eu/ss01-special-session-on-fake-news-detection-and-prevention/

  25. Exhibition Contact CO-CHAIR: International Conference on Intelligent Computing, ICIC 2020. Bari, Italy.
  26. Special Issue Guest Editor: Future Internet (MDPI): Future and Emerging topics in Security for Cyber-Physical Systems,
    link: https://www.mdpi.com/journal/futureinternet/special_issues/Security_for_Cyber_Physical_Systems
  27. CONFERENCE CHAIR: Image Processing and Communications 2020. Bydgoszcz. Poland. (CANCELLED DUE TO COVID-19)
  28. Workshop CO-CHAIR: Computational Methods for Emerging Problems in (dis-)Information Analysis – DisA, ICCS 2020. Amsterdam, the Netherlands (CORE A).
    2020.cisisconference.eu/ss01-special-session-on-fake-news-detection-and-prevention/
  29. Workshop CO-CHAIR: SecSoft: 2nd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft), Ghent, Belgium, 3rd July 2020.
    https://www.astrid-project.eu/secsoft/

  30. Special Issue Guest Editor: Journal of Universal Computer Science, Pattern Recognition and Artificial Intelligence - Current Challenges, Novel Solutions and Emerging Applications. link: http://www.jucs.org/ujs/jucs/info/special_issues/JUCS_Pattern_Recognition_and_Artificial_Intelligence_2020_CfP.pdf
  31. CONFERENCE CHAIR: Image Processing and Communications IP&C 2019. September, Bydgoszcz. Poland.
  32. Workshop CO-CHAIR: International Conference on Intelligent Computing, ICIC 2019. Nangchang, China.
  33. Security and Privacy for Distributed Systems Track CO-CHAIR @ The 14th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, November 7-9, University of Antwerp, Antwerp, Belgium
  34. WORKSHOP CHAIR: International Workshop on Security Assurance in Emerging EDGE/FOG-Computing and IoT Applications (SAEEFCIA-2018), October 27-29, Taiwan. (http://voyager.ce.fit.ac.jp/conf/3pgcic/2018/workshops.php)
  35. CONFERENCE CHAIR: Image Processing and Communications IP&C 2018. Bydgoszcz. Poland.
  36. PUBLICITY CO-CHAIR: International Conference on Intelligent Computing, ICIC 2018. Wuhan, China.
  37. CONFERENCE CHAIR: Image Processing and Communications IP&C 2017. Bydgoszcz. Poland.
  38. WORKSHOP CO-CHAIR: International Workshop on Challenges and Solutions for Critical Infrastructure Protection - CSCIP 2017. In conjunction with 10th IEEE International Conference on Cyber, Physical and Social Computing, IEEE CPSCom-2017, 21-23 June, 2017, Exeter, UK.
  39. Special Issue on: Advanced and Emerging Methods of Computer Science Applied to Cyber Security, Applied Mathematics and Compter Science (AMCS)
    http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=58940&copyownerid=93578
  40. Special Issue on: 5G Communications - Energy Efficiency, Mobile Information systems (2016) - PUBLISHED
    http://www.hindawi.com/journals/misy/si/478121
  41. Special Issue on: Emerging Biometric Modalities – International Journal of Biometrics, Inderscience (2015) - PUBLISHED
    http://www.inderscience.com/info/inarticletoc.php?jcode=ijbm&year=2016&vol=8&issue=1
  42. RAI-BHI - Recent Advances In Biometric Human Identification at IP&C Conference, 2015 (with Dr J.Bobulski). - PUBLISHED. Proceedings published with AISC Springer.
  43. Special Issue on: Critical Infrastructure Protection Technologies: Advances, Trends, and Open Issues (CIPT), International Journal of Distributed Sensor Networks, Hindawi (2015).
    http://www.hindawi.com/journals/ijdsn/si/912803/cfp/ - SI CANCELLED
  44. Special Issue on: Real-time Big Data Analytics for Critical Infrastructure Protection - International Journal of Critical Computer-Based Systems, Inderscience (2015) - SI CANCELLED.

Invited talks, seminars and tutorials, speaker at:

  1. Practical applications of trustworthy AI in security: detection of cyberattacks and fake news , Joint CyberISPS, SECPRE, DPM, CBT workshops at ESORICS 2023, 28th September 2023, the Hague, the Netherlands.
  2. Trustworthy and Explainable AI (xAI) in Emerging Network Security Applications , ENS @ ARES (18th International Conference on Availability, Reliability and Security) Conference, 29th August 2023, Benevento, Italy.
  3. AI for text-based disinformation detection: challenges, solutions and perspectives , 2nd NOTIONES Conference “Generative AI and other related challenges for LEAs”, Paris, 12 May 2023.
  4. Detecting fake news using artificial intelligence methods – the H2020 SocialTruth project , (with Rafal Kozik), EU-HYBNET Seminar on Hybrid Threats, 08.12.2021 (online).
  5. Machine Learning to combat Fake News and Media Manipulation , Elsevier E-minisymposium, 20.04.2021.
  6. Artificial Intelligence in Security: selected applications and current challenges , Seminar at RD ITiT Wroclaw University of Science and Technology (PWr), 17.03.2021.
  7. Artificial Intelligence in Security and Security of AI , Polish Academy of Sciences Seminar, 26.11.2020 (online)
  8. Artificial Intelligence: Selected Applications and Current Challenges, Inaugural Lecture to start New Jubilee 70th Academic Year at UTP Bydgoszcz, 07.10.2020.
  9. Secure and Fair AI for Citizens , Together for European Strategic Autonomy, IEEE European Symposium on Security and Privacy, Euro S&P, Genova, Italy (virtual), 10.09.2020.
  10. Intelligent Methods to Detect Current Cyber Threats , invited talk at CUING, ARES 2020, Dublin, August 2020.
  11. Current challenges in ML/AI: security, explainability and fairness, plenary talk at ICCS 2020 (INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE), Amsterdam, June 2020.
  12. Secure, Explainable and Fair AI, Sparta Day, Brussels (virtual), 22.06.2020.
  13. Secure and Fair AI for Citizens (SAFAIR), Sparta Day, CyberTechEurope, 24-25.09.2019, Rome, Italy.
  14. Data analysis and patern extraction techniques for improving web and application cyber security , (with R.Kozik) Warsaw University of Technology, 09.01.2018, Warsaw.
  15. Cyber security and CIP - challenges and solutions , (with R.Kozik) CIPRNet Training Lecture at University of Cyprus, UCY, Nicosia, Cyprus, 2017.
  16. Cyber Security and Critical Infrastructure Protection , Opening Talk, PAN Seminar, UTP Bydgoszcz, 21 October 2016.
  17. Cyber Security - Comprehensive Approach , Visiting Erasmus Professor Lecture, University of Naples Parthenope, Naples, Italy, September, 2016.
  18. How to Counter Cybercrime in the Coming Years , Cybercrime and Cyberterrorism Research Summit, 3rd March, San Sebastian, Spain, 2016.
  19. Solutions for the Future, COURAGE-CAMINO-CyberRoad Ideas , COURAGE-CAMINO-CyberRoad Joint Conference, Emerging and Current Challenges in Cybercrime and Cyberterrorism, 9-10 March, the Hague, the Netherlands, 2016.
  20. Cyber-physical security solutions for critical infrastructure protection , (with R.Kozik) CIPRNet Training Lecture at Department of Electrical and Electronic Engineering, University of Cagliari, 16 February, Cagliari, 2016.
  21. Which technologies should be developed to counter cyber crime - an European perspective , presentation at SECURE 2015 (with J.Kosinski), October, Warsaw, 2015.
  22. Comprehensive Approach to Increase Cyber Security and Resilience Against Cyber Crime and Cyber Terrorism - presentation at workshop Parameters for Guidance & Roadmap for the Prosecution of Cyber Crime in Civil, Criminal & Common Law, 15 June, Royal Halloway University London, UK, 2015.
  23. How to improve resilience against cybercrime and cyberterrorism? - presentation/panelist at Innovation and cybercrime: Challenges of the digital transformation in Europe, 8 April, Montpellier, France, 2015.
  24. Comprehensive Approach to Cyber Roadmap Coordination and Development - presentation at Cyber Attacks 2015, 24 March, Torun, Poland, 2015.
  25. Cyber Crime - panelist at Cyber crime Conference at AON (National Defence University), 13 February, Warsaw, Poland, 2015.
  26. Methods for increasing protection and resilience of critical infrastructures , CIPRNet Training Lecture, 22 January, UTP Bydgoszcz, 2015.
  27. Technologies and means to protect privacy and personal data from cyber crime , panelist at cybersecurity panel at CPEXPO 2014 / Security Research Conference, 8-11 December, Genova, Italy, 2014.
  28. Convergent Cyber-Physical Security Techniques for Critical Infrastructure Protection and Resilience, EIT ICTLabs Future Networking Solutions Outreach Workshop, Budapest, Hungary, 5 December 2014.
  29. CAMINO - Project Introduction 1st CAMINO Experts Workshop, ReESRA 2016-2017: Reshaping the European Security Research Agenda for 2016-2017, Bern, September 2014.
  30. Workshop Summary 1st CAMINO Experts Workshop, ReESRA 2016-2017: Reshaping the European Security Research Agenda for 2016-2017, Bern, September 2014.
  31. Selected aspects of convergent security: biometric human identification and cyber security , Seminar at AGH Cracow, Cracow, April 2014.
  32. Offline security framework , Workshop: Protecting Critical Infrastructures, Rome, January 2011.
  33. Human identification based on knuckle biometrics , Biometrics 2010, IMM and Ministry of Economy, Warsaw, December 2010.
  34. Practical application of biometric identification methods , Invited Talk at PROTECH Congress, Wroclaw, October 2010.
  35. Biometric identification - emerging methods , Seminar at Biometric Labs NASK, WUT, Warsaw, June 2010.
  36. Methods of Biometric Human Identification , Seminar at IPI PAN, Warsaw, May 2010.
  37. Biometric Identification Systems: Challenges and Trends , Invited Talk at Polish BioCybernetics Society, Bydgoszcz, April 2010.
  38. Modelling and protecting interdependencies between critical infrastructures and telecommunication information systems , Safety, Security & Information Technology Seminar, INTERTELECOM 2009.
  39. Perspective Methods of Human Identification , Invited Tutorial at NTA/SPA 2008 Conference in Poznan, September 2008.
  40. Emerging Methods of Biometric Human Identification , Invited Talk at Polish BioCybernetics Society, Bydgoszcz, June 2008.
  41. Biometric Human Identification: Perspective Methods and Applications , seminar at Computer Graphics, Image Processing and Recognition, Warsaw University of Technology, April 2008.
  42. Model Based Image Coding , seminar at Image Processing and Multimedia, Poznan, 2002.