Follow
Rafal Kozik
Rafal Kozik
Department of Telecommunication Systems in the Institute of Telecommunications at University of Technology and Life Sciences (UT
Verified email at utp.edu.pl
Title
Cited by
Cited by
Year
A scalable distributed machine learning approach for attack detection in edge computing environments
R Kozik, M Choraś, M Ficco, F Palmieri
Journal of Parallel and Distributed Computing 119, 18-26, 2018
1402018
Defending network intrusion detection systems against adversarial evasion attacks
M Pawlicki, M Choraś, R Kozik
Future Generation Computer Systems 110, 148-154, 2020
1212020
A deep learning ensemble for network anomaly and cyber-attack detection
V Dutta, M Choraś, M Pawlicki, R Kozik
Sensors 20 (16), 4583, 2020
1122020
Contactless palmprint and knuckle biometrics for mobile devices
M Choraś, R Kozik
Pattern Analysis and Applications 15 (1), 73-85, 2012
1022012
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures
M Ficco, M Choraś, R Kozik
Journal of computational science 22, 179-186, 2017
692017
Machine learning techniques applied to detect cyber attacks on web applications
M Choraś, R Kozik
Logic Journal of IGPL 23 (1), 45-56, 2015
682015
Sentiment analysis for fake news detection by means of neural networks
S Kula, M Choraś, R Kozik, P Ksieniewicz, M Woźniak
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
652020
New explainability method for BERT-based model in fake news detection
M Szczepański, M Pawlicki, R Kozik, M Choraś
Scientific reports 11 (1), 23705, 2021
642021
Achieving explainability of intrusion detection system by hybrid oracle-explainer approach
M Szczepański, M Choraś, M Pawlicki, R Kozik
2020 International Joint Conference on neural networks (IJCNN), 1-8, 2020
592020
Machine Learning–the results are not the only thing that matters! What about security, explainability and fairness?
M Choraś, M Pawlicki, D Puchalski, R Kozik
Computational Science–ICCS 2020: 20th International Conference, Amsterdam …, 2020
592020
Application of the BERT-based architecture in fake news detection
S Kula, M Choraś, R Kozik
13th International Conference on Computational Intelligence in Security for …, 2021
562021
A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment
R Kozik, M Pawlicki, M Choraś
Pattern Analysis and Applications 24 (4), 1441-1449, 2021
532021
Measuring and improving agile processes in a small-size software development company
M Choraś, T Springer, R Kozik, L López, S Martínez-Fernández, P Ram, ...
IEEE access 8, 78452-78466, 2020
462020
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
M Pawlicki, R Kozik, M Choraś
Neurocomputing 500, 1075-1087, 2022
422022
Hybrid model for improving the classification effectiveness of network intrusion detection
V Dutta, M Choraś, R Kozik, M Pawlicki
13th International Conference on Computational Intelligence in Security for …, 2021
412021
Cyber threats impacting critical infrastructures
M Choraś, R Kozik, A Flizikowski, W Hołubowicz, R Renk
Managing the complexity of critical infrastructures: A modelling and …, 2016
402016
Machine learning methods for fake news classification
P Ksieniewicz, M Choraś, R Kozik, M Woźniak
Intelligent Data Engineering and Automated Learning–IDEAL 2019: 20th …, 2019
392019
Data-driven and tool-supported elicitation of quality requirements in agile companies
M Oriol, S Martínez-Fernández, W Behutiye, C Farré, R Kozik, ...
Software Quality Journal 28 (3), 931-963, 2020
382020
Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.
M Komisarek, M Pawlicki, R Kozik, M Choras
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (1), 3-19, 2021
362021
Network traffic prediction and anomaly detection based on ARFIMA model
T Andrysiak, Ł Saganowski, M Choraś, R Kozik
International Joint Conference SOCO’14-CISIS’14-ICEUTE’14: Bilbao, Spain …, 2014
342014
The system can't perform the operation now. Try again later.
Articles 1–20