Search

Your search keyword '"Kozik, Rafał"' showing total 506 results

Search Constraints

Start Over You searched for: Author "Kozik, Rafał" Remove constraint Author: "Kozik, Rafał"
506 results on '"Kozik, Rafał"'

Search Results

1. Strategies to Use Harvesters in Trustworthy Fake News Detection Systems

3. Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems

4. Involving Society to Protect Society from Fake News and Disinformation: Crowdsourced Datasets and Text Reliability Assessment

5. ULTIMATE Project Toolkit for Robotic AI-Based Data Analysis and Visualization

6. A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules

7. The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks

8. Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors

9. Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach

18. Document Annotation Tool for News Content Analysis

19. Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems

22. How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes

23. Analysis of Extractive Text Summarization Methods as a Binary Classification Problem

24. SWAROG Project Approach to Fake News Detection Problem

25. Explainable Artificial Intelligence 101: Techniques, Applications and Challenges

26. Parameters Transfer Framework for Multi-domain Fake News Detection

28. Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques

36. Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment

37. Extending Machine Learning-Based Intrusion Detection with the Imputation Method

38. Cyber-Attack Detection from IoT Benchmark Considered as Data Streams

41. The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data

42. Evolving from Data to Knowledge Mining to Uncover Hidden Relationships

43. Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection

44. Application of the BERT-Based Architecture in Fake News Detection

45. Distributed Architecture for Fake News Detection

46. Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation

47. Towards AI-Based Reaction and Mitigation for e-Commerce - the ENSURESEC Engine

48. Why Do Law Enforcement Agencies Need AI for Analyzing Big Data?

49. Transformer Based Models in Fake News Detection

50. Missing and Incomplete Data Handling in Cybersecurity Applications

Catalog

Books, media, physical & digital resources