Search

Your search keyword '"Pawlicki, Marek"' showing total 273 results

Search Constraints

Start Over You searched for: Author "Pawlicki, Marek" Remove constraint Author: "Pawlicki, Marek"
273 results on '"Pawlicki, Marek"'

Search Results

2. Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems

3. Involving Society to Protect Society from Fake News and Disinformation: Crowdsourced Datasets and Text Reliability Assessment

4. ULTIMATE Project Toolkit for Robotic AI-Based Data Analysis and Visualization

5. A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules

6. The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks

7. Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors

8. Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach

10. Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce

21. Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems

22. How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes

23. SWAROG Project Approach to Fake News Detection Problem

24. Explainable Artificial Intelligence 101: Techniques, Applications and Challenges

25. Parameters Transfer Framework for Multi-domain Fake News Detection

27. Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques

34. Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment

35. Extending Machine Learning-Based Intrusion Detection with the Imputation Method

36. Cyber-Attack Detection from IoT Benchmark Considered as Data Streams

37. Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter

41. The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data

42. Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection

43. Distributed Architecture for Fake News Detection

44. Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation

45. Towards AI-Based Reaction and Mitigation for e-Commerce - the ENSURESEC Engine

46. The Methods and Approaches of Explainable Artificial Intelligence

47. Missing and Incomplete Data Handling in Cybersecurity Applications

Catalog

Books, media, physical & digital resources