Follow
Rafal Kozik
Rafal Kozik
Department of Telecommunication Systems in the Institute of Telecommunications at University of Technology and Life Sciences (UT
Verified email at utp.edu.pl
Title
Cited by
Cited by
Year
A scalable distributed machine learning approach for attack detection in edge computing environments
R Kozik, M Choraś, M Ficco, F Palmieri
Journal of Parallel and Distributed Computing 119, 18-26, 2018
1372018
Defending network intrusion detection systems against adversarial evasion attacks
M Pawlicki, M Choraś, R Kozik
Future Generation Computer Systems 110, 148-154, 2020
1182020
A deep learning ensemble for network anomaly and cyber-attack detection
V Dutta, M Choraś, M Pawlicki, R Kozik
Sensors 20 (16), 4583, 2020
1072020
Contactless palmprint and knuckle biometrics for mobile devices
M Choraś, R Kozik
Pattern Analysis and Applications 15 (1), 73-85, 2012
1022012
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures
M Ficco, M Choraś, R Kozik
Journal of computational science 22, 179-186, 2017
682017
Machine learning techniques applied to detect cyber attacks on web applications
M Choraś, R Kozik
Logic Journal of IGPL 23 (1), 45-56, 2015
682015
New explainability method for BERT-based model in fake news detection
M Szczepański, M Pawlicki, R Kozik, M Choraś
Scientific reports 11 (1), 23705, 2021
632021
Sentiment analysis for fake news detection by means of neural networks
S Kula, M Choraś, R Kozik, P Ksieniewicz, M Woźniak
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
612020
Achieving explainability of intrusion detection system by hybrid oracle-explainer approach
M Szczepański, M Choraś, M Pawlicki, R Kozik
2020 International Joint Conference on neural networks (IJCNN), 1-8, 2020
582020
Machine Learning–the results are not the only thing that matters! What about security, explainability and fairness?
M Choraś, M Pawlicki, D Puchalski, R Kozik
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
562020
Application of the BERT-based architecture in fake news detection
S Kula, M Choraś, R Kozik
13th International Conference on Computational Intelligence in Security for …, 2021
552021
A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment
R Kozik, M Pawlicki, M Choraś
Pattern Analysis and Applications 24 (4), 1441-1449, 2021
522021
Measuring and improving agile processes in a small-size software development company
M Choraś, T Springer, R Kozik, L López, S Martínez-Fernández, P Ram, ...
IEEE access 8, 78452-78466, 2020
462020
Hybrid model for improving the classification effectiveness of network intrusion detection
V Dutta, M Choraś, R Kozik, M Pawlicki
13th International Conference on Computational Intelligence in Security for …, 2021
412021
Cyber threats impacting critical infrastructures
M Choraś, R Kozik, A Flizikowski, W Hołubowicz, R Renk
Managing the complexity of critical infrastructures: A modelling and …, 2016
402016
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
M Pawlicki, R Kozik, M Choraś
Neurocomputing 500, 1075-1087, 2022
382022
Machine learning methods for fake news classification
P Ksieniewicz, M Choraś, R Kozik, M Woźniak
Intelligent Data Engineering and Automated Learning–IDEAL 2019: 20th …, 2019
382019
Data-driven and tool-supported elicitation of quality requirements in agile companies
M Oriol, S Martínez-Fernández, W Behutiye, C Farré, R Kozik, ...
Software Quality Journal 28 (3), 931-963, 2020
372020
Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.
M Komisarek, M Pawlicki, R Kozik, M Choras
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (1), 3-19, 2021
352021
Network traffic prediction and anomaly detection based on ARFIMA model
T Andrysiak, Ł Saganowski, M Choraś, R Kozik
International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain …, 2014
342014
The system can't perform the operation now. Try again later.
Articles 1–20