Publications

(2022). Using Simplified EEG-Based Brain Computer Interface and Decision Tree Classifier for Emotions Detection. Advanced Information Networking and Applications : Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022). Vol. 2.

PDF Cite DOI

(2022). Performance and scalability evaluation of a permissioned Blockchain based on the Hyperledger Fabric, Sawtooth and Iroha. Computer Science and Information Systems.

PDF Cite DOI

(2022). Multiplatform comparative analysis of intelligent robots for communication efficiency in smart dialogs. Advanced Information Networking and Applications : Proceedings of the 36th International Conference on Advanced Information Networking and Applications (AINA-2022). Vol. 2.

PDF Cite DOI

(2021). Security and scalability in private permissionless blockchain: problems and solutions leading to creating consent-as-a-service (CaaS) deployment. Advances in Computational Collective Intelligence : 13th International Conference, ICCCI 2021, Kallithea, Rhodes, Greece, September 29 - October 1, 2021 : proceedings.

Cite DOI

(2021). Secure decentralized application development of Blockchain-based games. 2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) : 6-8 November 2020, Austin, TX, USA..

Cite DOI URL

(2021). Secure blockchain decentralized voting for verified users. International Journal of Network Security and Its Applications.

PDF Cite

(2021). Progressive mobile Web application subresource tampering during penetration testing. Advanced Information Networking and Applications : Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021). Vol. 1.

Cite DOI

(2021). Cloud solutions for private permissionless blockchain deployment. Computing and Informatics.

Cite DOI URL

(2021). Blockchain decentralized voting for verified users with a focus on anonymity. Computer Science & Information Technology.

Cite DOI

(2021). Automated music generation using recurrent neural networks. Theory and Engineering of Dependable Computer Systems and Networks : proceedings of the Sixteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 28-July 2, 2021, Wroclaw, Poland.

Cite DOI

(2021). Analyzing and improving tools for supporting fighting against COVID-19 based on prediction models and contact tracing. Bulletin of the Polish Academy of Sciences. Technical Sciences.

Cite DOI

(2021). Adversarial attacks on face detection algorithms using anti-facial recognition t-shirts. Advances in Computational Collective Intelligence : 13th International Conference, ICCCI 2021, Kallithea, Rhodes, Greece, September 29 - October 1, 2021 : proceedings.

Cite DOI

(2021). Acquiring and processing data using simplified eeg-based brain-computer interface for the purpose of detecting emotions. ACHI 2021 : The Fourteenth International Conference on Advances in Computer-Human Interactions, July 18-22, 2021 Nice, France.

PDF Cite

(2020). State management and software architecture approaches in cross-platform Flutter applications. ENASE 2020 : 15th International Conference on Evaluation of Novel Approaches to Software Engineering May 5-6, 2020, Prague, Czech Republic : proceedings. Vol. 1.

Cite DOI URL

(2020). Security of Blockchain distributed ledger consensus mechanism in context of the Sybil attack. Trends in artificial intelligence theory and applications : artificial intelligence practices : 33rd International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2020, Kitakyushu, Japan, September 22-25, 2020 : proceedings.

Cite DOI

(2020). Practical analysis of traceability problem in Monero’s Blockchain. ENASE 2020 : 15th International Conference on Evaluation of Novel Approaches to Software Engineering May 5-6, 2020, Prague, Czech Republic : proceedings. Vol. 1.

Cite DOI URL

(2020). On forming shortlists of attractive offers from large databases: the example of purchasing a flat. Proceedings of the 35th International Business Information Management Association Conference (IBIMA) : 1-2 April 2020, Seville, Spain.

Cite

(2020). Correspondent Sensitive Encryption Standard (CSES) Algorithm in insecure communication channel. Engineering in dependability of computer systems and networks : proceedings of the Fourteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, July 1-5, 2019, Brunow, Poland.

Cite DOI

(2020). Anti-cheat tool for detecting unauthorized user interference in the Unity engine using Blockchain. Data-centric business and applications. Vol. 4, Towards software development.

Cite DOI

(2020). Android methods hooking detection using Dalvik code and dynamic reverse engineering by stack trace analysis. Theory and Applications of Dependable Computer Systems : proceedings of the Fifteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, June 29 - July 3, 2020, Brunow, Poland.

Cite DOI URL

(2020). Android hook detection based on machine learning and dynamic analysis. Web, Artificial Intelligence and Network Applications : proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020).

Cite DOI URL

(2020). Analysis of segregated witness implementation for increasing efficiency and security of the Bitcoin cryptocurrency. Computational Collective Intelligence : 12th International Conference, ICCCI 2020, Da Nang, Vietnam, November 30 - December 3, 2020 : proceedings.

Cite DOI

(2020). Analysis of Exploration Testing Approach and Conclusions  from Implementation in Software Development. Zeszyty Naukowe Politechniki slaskiej. Organizacja i Zarzadzanie.

PDF Cite

(2020). Analysis of blockchain selfish mining attacks. Information Systems Architecture and Technology : Proceedings of 40th Anniversary International Conference on Information Systems Architecture and Technology, ISAT 2019. Pt. 1.

PDF Cite DOI

(2019). Malware detection using Machine Learning algorithms and Reverse Engineering of Android java code. International Journal of Network Security and Its Applications.

PDF Cite DOI

(2018). Service selection method with multiple probabilistic QoS attributes using probabilistic AHP. International Journal of Computer Science and Network Security.

PDF Cite

(2018). Novel scheme for multi criteria decision making method using probabilistic analytic hierarchy process. ICAI'18 : proceedings of the 2018 International Conference on Artificial Intelligence, July 30 - August 02 2018, Las Vegas, USA.

Cite URL

(2018). Improved Threat Models for the Security of Encrypted and Deniable File Systems. Mobile and Wireless Technologies, ICMWT 2017.

PDF Cite DOI

(2018). Android malware detection using machine learning and reverse engineering. Computer Science & Information Technology.

Cite DOI

(2018). A Comparative Study of an Improved pAHP Implementation in SOA Architecture. ACCSE 2018 : the Third International Conference on Advances in Computation, Communications and Services, July 22-26, 2018, Barcelona, Spain.

Cite URL

(2017). Threat models for analyzing plausible deniability of deniable file systems. Software Networking.

Cite DOI

(2017). Defeating plausible deniability of VeraCrypt hidden operating systems. Applications and Techniques in Information Sequrity 8th International Conference, ATIS 2017, Auckland, New Zeland, July 6-7, 2017 : proceedings.

Cite DOI

(2015). Context-sensitive text mining with fitness leveling genetic algorithm. 2015 IEEE 2nd International Conference on Cybernetics, CYBCONF 2015 : Gdynia, Poland, 24-26 June 2015.

Cite DOI

(2013). An example conference paper. In ICW.

PDF Cite Slides

(2013). Methods for detecting and analyzing hidden FAT32 volumes created with the use of cryptographic tools. New results in dependability and computer systems : proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9-13, 2013, Brunow, Poland.

Cite DOI

(2012). Analysis of using 2D data (X-ray images) to modelling tissue structures. Current trends in development of implantable tissue structures, Warsaw, April 2012.

Cite

(2011). Wykorzystanie algorytmow obnizajacych entropie w celu zmniejszenia efektywnosci metod wykrywajacych zaszyfrowane dane. Interdyscyplinarnosc badan naukowych 2011 : praca zbiorowa.

PDF Cite

(2011). Theoretical and practical aspects of encrypted containers detection :. Dependable computer systems.

Cite DOI

(2011). Efficient N-Byte slack space hashing in retrieving and identifying partially recovered data. ICSOFT 2011 : proceedings of the 6th International Conference on Software and Database Technologies, Seville, Spain, 18-21 July, 2011. Vol. 1.

Cite

(2009). Procesowe zabezpieczanie i analiza uruchomionych komputerow :. Przestepczosc informatyczna.

Cite