A scalable distributed machine learning approach for attack detection in edge computing environments R Kozik, M Choraś, M Ficco, F Palmieri Journal of Parallel and Distributed Computing 119, 18-26, 2018 | 143 | 2018 |
Defending network intrusion detection systems against adversarial evasion attacks M Pawlicki, M Choraś, R Kozik Future Generation Computer Systems 110, 148-154, 2020 | 128 | 2020 |
A deep learning ensemble for network anomaly and cyber-attack detection V Dutta, M Choraś, M Pawlicki, R Kozik Sensors 20 (16), 4583, 2020 | 116 | 2020 |
Contactless palmprint and knuckle biometrics for mobile devices M Choraś, R Kozik Pattern Analysis and Applications 15 (1), 73-85, 2012 | 103 | 2012 |
New explainability method for BERT-based model in fake news detection M Szczepański, M Pawlicki, R Kozik, M Choraś Scientific reports 11 (1), 23705, 2021 | 71 | 2021 |
Machine learning techniques applied to detect cyber attacks on web applications M Choraś, R Kozik Logic Journal of IGPL 23 (1), 45-56, 2015 | 71 | 2015 |
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures M Ficco, M Choraś, R Kozik Journal of computational science 22, 179-186, 2017 | 70 | 2017 |
Sentiment analysis for fake news detection by means of neural networks S Kula, M Choraś, R Kozik, P Ksieniewicz, M Woźniak Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020 | 67 | 2020 |
Achieving explainability of intrusion detection system by hybrid oracle-explainer approach M Szczepański, M Choraś, M Pawlicki, R Kozik 2020 International Joint Conference on neural networks (IJCNN), 1-8, 2020 | 60 | 2020 |
Machine Learning–the results are not the only thing that matters! What about security, explainability and fairness? M Choraś, M Pawlicki, D Puchalski, R Kozik Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020 | 60 | 2020 |
Application of the BERT-based architecture in fake news detection S Kula, M Choraś, R Kozik 13th International Conference on Computational Intelligence in Security for …, 2021 | 56 | 2021 |
A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment R Kozik, M Pawlicki, M Choraś Pattern Analysis and Applications 24 (4), 1441-1449, 2021 | 53 | 2021 |
Measuring and improving agile processes in a small-size software development company M Choraś, T Springer, R Kozik, L López, S Martínez-Fernández, P Ram, ... IEEE access 8, 78452-78466, 2020 | 47 | 2020 |
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks M Pawlicki, R Kozik, M Choraś Neurocomputing 500, 1075-1087, 2022 | 44 | 2022 |
Hybrid model for improving the classification effectiveness of network intrusion detection V Dutta, M Choraś, R Kozik, M Pawlicki 13th International Conference on Computational Intelligence in Security for …, 2021 | 43 | 2021 |
Cyber threats impacting critical infrastructures M Choraś, R Kozik, A Flizikowski, W Hołubowicz, R Renk Managing the complexity of critical infrastructures: A modelling and …, 2016 | 42 | 2016 |
Data-driven and tool-supported elicitation of quality requirements in agile companies M Oriol, S Martínez-Fernández, W Behutiye, C Farré, R Kozik, ... Software Quality Journal 28 (3), 931-963, 2020 | 40 | 2020 |
Machine learning methods for fake news classification P Ksieniewicz, M Choraś, R Kozik, M Woźniak Intelligent Data Engineering and Automated Learning–IDEAL 2019: 20th …, 2019 | 39 | 2019 |
Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data. M Komisarek, M Pawlicki, R Kozik, M Choras J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (1), 3-19, 2021 | 38 | 2021 |
Current cyber security threats and challenges in critical infrastructures protection R Kozik, M Choraś 2013 Second International Conference on Informatics & Applications (ICIA), 93-97, 2013 | 35 | 2013 |