273 results on '"Pawlicki, Marek"'
Search Results
2. Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems
3. Involving Society to Protect Society from Fake News and Disinformation: Crowdsourced Datasets and Text Reliability Assessment
4. ULTIMATE Project Toolkit for Robotic AI-Based Data Analysis and Visualization
5. A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules
6. The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks
7. Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors
8. Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach
9. The Rise of AI-Powered Writing: How ChatGPT is Revolutionizing Scientific Communication for Better or for Worse
10. Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce
11. An Innovative Approach to Real-Time Concept Drift Detection in Network Security
12. How Explainable Is Explainability? Towards Better Metrics for Explainable AI
13. Has the pandemic made us more digitally literate?: Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic
14. Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors
15. An Innovative Approach to Real-Time Concept Drift Detection in Network Security
16. Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination
17. AI vs linguistic-based human judgement: Bridging the gap in pursuit of truth for fake news detection
18. Towards explainable fake news detection and automated content credibility assessment: Polish internet and digital media use-case
19. Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity
20. When explainability turns into a threat - using xAI to fool a fake news detection method
21. Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems
22. How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes
23. SWAROG Project Approach to Fake News Detection Problem
24. Explainable Artificial Intelligence 101: Techniques, Applications and Challenges
25. Parameters Transfer Framework for Multi-domain Fake News Detection
26. Fake News and Threats to IoT—The Crucial Aspects of Cyberspace in the Times of Cyberwar
27. Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques
28. First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions
29. Tech developers must respect equitable AI access
30. Human-driven and human-centred cybersecurity: policy-making implications
31. Fake News and Threats to IoT—The Crucial Aspects of Cyberspace in the Times of Cyberwar
32. How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes
33. Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques
34. Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment
35. Extending Machine Learning-Based Intrusion Detection with the Imputation Method
36. Cyber-Attack Detection from IoT Benchmark Considered as Data Streams
37. Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter
38. The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT
39. Reading Resistance in Damon Galgut’s The Promise : An Analysis of Narrative Perspective
40. A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
41. The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data
42. Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection
43. Distributed Architecture for Fake News Detection
44. Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation
45. Towards AI-Based Reaction and Mitigation for e-Commerce - the ENSURESEC Engine
46. The Methods and Approaches of Explainable Artificial Intelligence
47. Missing and Incomplete Data Handling in Cybersecurity Applications
48. A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment
49. The Influence of Surface Texture of Elements Made of PA6-Based Composites on Anti-Graffiti Effect of Paint Coating
50. A $10 million question and other cybersecurity-related ethical dilemmas amid the COVID-19 pandemic
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.