Michal Kedziora
Michal Kedziora
News
Research
Teaching
Supervision
Cybersecurity Lab
Contact
1
Defeating plausible deniability of VeraCrypt hidden operating systems
Michal Kedziora
,
Yang-Wai Chow
,
Willy Susilo
Cite
DOI
Context-sensitive text mining with fitness leveling genetic algorithm
Maciej Huk
,
Jan Kwiatkowski
,
Dariusz Konieczny
,
Michal Kedziora
,
Jolanta Mizera-Pietraszko
Cite
DOI
An example conference paper
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Duis posuere tellus ac convallis placerat. Proin tincidunt magna sed ex sollicitudin condimentum.
Michal Kedziora
,
Robert Ford
PDF
Cite
Slides
Methods for detecting and analyzing hidden FAT32 volumes created with the use of cryptographic tools
Ireneusz Jozwiak
,
Michal Kedziora
,
Aleksandra U. Melinska
Cite
DOI
Analysis of using 2D data (X-ray images) to modelling tissue structures
Aleksandra U. Melinska
,
Bartlomiej Antosik
,
Michal Kedziora
,
J. Wagel
,
Marek Sasiadek
,
Romuald Bedzinski
Cite
Efficient N-Byte slack space hashing in retrieving and identifying partially recovered data
Ireneusz Jozwiak
,
Michal Kedziora
Cite
«
Cite
×