MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING OF ANDROID JAVA CODE M Kedziora, P Gawin, M Szczepanik, I Jozwiak International Journal of Network Security & Its Applications (IJNSA) Vol. 11 …, 2019 | 30 | 2019 |
Theoretical and practical aspects of encrypted containers detection-digital forensics approach I Jozwiak, M Kedziora, A Melinska Dependable Computer Systems, 75-85, 2011 | 24 | 2011 |
Analysis of blockchain selfish mining attacks M Kędziora, P Kozłowski, M Szczepanik, P Jóźwiak Information Systems Architecture and Technology: Proceedings of 40th …, 2020 | 23 | 2020 |
Secure decentralized application development of blockchain-based games N Trojanowska, M Kedziora, M Hanif, H Song 2020 IEEE 39th International Performance Computing and Communications …, 2020 | 13 | 2020 |
Security of blockchain distributed ledger consensus mechanism in context of the sybil attack M Kedziora, P Kozlowski, P Jozwiak Trends in Artificial Intelligence Theory and Applications. Artificial …, 2020 | 12 | 2020 |
Context-sensitive text mining with fitness leveling genetic algorithm M Huk, J Kwiatkowski, D Konieczny, M Kędziora, J Mizera-Pietraszko 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF), 342-347, 2015 | 12 | 2015 |
Performance and scalability evaluation of a permissioned Blockchain based on the Hyperledger Fabric, Sawtooth and Iroha A Woznica, M Kedziora Computer Science and Information Systems 19 (2), 659-678, 2022 | 11 | 2022 |
Analysis of segregated witness implementation for increasing efficiency and security of the Bitcoin cryptocurrency M Kedziora, D Pieprzka, I Jozwiak, Y Liu, H Song Journal of Information and Telecommunication 7 (1), 44-55, 2023 | 10 | 2023 |
Using simplified EEG-based brain computer interface and decision tree classifier for emotions detection R Chalupnik, K Bialas, Z Majewska, M Kedziora International Conference on Advanced Information Networking and Applications …, 2022 | 7 | 2022 |
Anti-Cheat tool for detecting unauthorized user interference in the unity engine using Blockchain M Kedziora, A Gorka, A Marianski, I Jozwiak Data-Centric Business and Applications: Towards Software Development (Volume …, 2020 | 7 | 2020 |
Defeating plausible deniability of VeraCrypt hidden operating systems M Kedziora, YW Chow, W Susilo Applications and Techniques in Information Security: 8th International …, 2017 | 7 | 2017 |
State Management and Software Architecture Approaches in Cross-platform Flutter Applications. M Szczepanik, M Kedziora ENASE, 407-414, 2020 | 6 | 2020 |
ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING M Kedziora, P Gawin, M Szczepanik, I Jozwiak | 6 | 2018 |
Methods for detecting and analyzing hidden FAT32 volumes created with the use of cryptographic tools I Jóźwiak, M Kędziora, A Melińska New Results in Dependability and Computer Systems: Proceedings of the 8th …, 2013 | 6 | 2013 |
Multifactor authentication system using simplified EEG brain–computer interface K Białas, M Kedziora, R Chałupnik, HH Song IEEE Transactions on Human-Machine Systems 52 (5), 867-876, 2022 | 5 | 2022 |
Service selection method with multiple probabilistic QoS attributes using probabilistic AHP I Jozwiak, M Kedziora, A Marianski INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY 18 (2), 33-38, 2018 | 5 | 2018 |
Analysis of solutions for a blockchain compliance with GDPR M Godyn, M Kedziora, Y Ren, Y Liu, HH Song Scientific Reports 12 (1), 15021, 2022 | 4 | 2022 |
Security and scalability in private permissionless blockchain: Problems and solutions leading to creating Consent-as-a-Service (CaaS) deployment H Grodzicka, M Kedziora, L Madeyski International Conference on Computational Collective Intelligence, 278-289, 2021 | 4 | 2021 |
Cloud Solutions for Private Permissionless Blockchain Deployment. H Grodzicka, M Kedziora, L Madeyski Computing & Informatics 40 (4), 2021 | 4 | 2021 |
Automated music generation using recurrent neural networks M Czyz, M Kedziora International Conference on Dependability and Complex Systems, 22-31, 2021 | 4 | 2021 |