Advanced search    

Search: authors:"Michał Choraś"

17 papers found.
Use AND, OR, NOT, +word, -word, "long phrase", (parentheses) to fine-tune your search.

A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment

The Internet of Things (IoT) appliances often expose sensitive data, either directly or indirectly. They may, for instance, tell whether you are at home right now or what your long or short-term habits are. Therefore, it is crucial to protect such devices against adversaries and has in place an early warning system which indicates compromised devices in a quick and efficient...

The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good

The development of cyberspace has brought about innumerable advantages for the mankind. However, it also came with several serious drawbacks; as cyberspace evolves, so does cybercrime. Since the birth of cyberspace, individuals, groups and whole nations have been engaging in computer-related offences of various significance and impact, trying to exploit systems’ vulnerabilities...

Lightweight Verification Schema for Image-Based Palmprint Biometric Systems

Palmprint biometrics is a promising modality that enables efficient human identification, also in a mobile scenario. In this paper, a novel approach to feature extraction for palmprint verification is presented. The features are extracted from hand geometry and palmprint texture and fused. The use of a fusion of features facilitates obtaining a higher accuracy and, at the same...

Lightweight Verification Schema for Image-Based Palmprint Biometric Systems

Palmprint biometrics is a promising modality that enables efficient human identification, also in a mobile scenario. In this paper, a novel approach to feature extraction for palmprint verification is presented. The features are extracted from hand geometry and palmprint texture and fused. The use of a fusion of features facilitates obtaining a higher accuracy and, at the same...

Strategies to manage quality requirements in agile software development: a multiple case study

Agile methods can deliver software that fulfills customer needs rapidly and continuously. Quality requirements (QRs) are important in this regard; however, detailed studies on how companies applying agile methods to manage QRs are limited, as are studies on the rationale for choosing specific QR management practices and related challenges. The aim of this study was to address why...

New solutions for exposing clustered applications deployed in the cloud

Hosting applications in the cloud has become very popular. In this context, automatic application scaling, health checking and bootstrapping required services has never been easier. However, there are some types of services that require direct communication between a server and a client, bypassing the cloud. Popular examples include data grids (distributed caching solutions) and...

Multimedia analysis platform for crime prevention and investigation

Nowadays,the use of digital technologies is promoting three main characteristics of information, i.e. the volume, the modality and the frequency. Due to the amount of information generated by tools and individuals, it has been identified a critical need for the Law Enforcement Agencies to exploit this information and carry out criminal investigations in an effective way. To...

Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection

As computer and network technologies evolve, the complexity of cybersecurity has dramatically increased. Advanced cyber threats have led to current approaches to cyber-attack detection becoming ineffective. Many currently used computer systems and applications have never been deeply tested from a cybersecurity point of view and are an easy target for cyber criminals. The paradigm...

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection

Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. Innovative approaches to handle this challenge are undertaken by the scientific community, proposing the utilization of the emerging, advanced machine learning methods...

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection

Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. Innovative approaches to handle this challenge are undertaken by the scientific community, proposing the utilization of the emerging, advanced machine learning methods...

Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection

Network and information security are regarded as some of the most pressing problems of contemporary economy, affecting both individual citizens and entire societies, making them a highlight for homeland security. Innovative approaches to handle this challenge are undertaken by the scientific community, proposing the utilization of the emerging, advanced machine learning methods...

Increasing product owners’ cognition and decision-making capabilities by data analysis approach

In this paper, we focus on the innovative advanced data analysis dedicated for product owners in software development teams. The goal of our novel solutions is to increase cognition and decision making in rapid software development process. The major contribution of this work is the methodology and the tool that gathers the input raw data from the tools such as GitLab or...

Q-Rapids framework for advanced data analysis to improve rapid software development

The quality of software, in particular developed rapidly, is quite a challenge for businesses and IT-dependent societies. Therefore, the H2020 Q-Rapids project consortium develops processes and tools to meet this challenge and improve the quality of the software to meet end-users requirements and needs. In this paper, we focus on data analytics that helps software development...

Contactless palmprint and knuckle biometrics for mobile devices

In this paper, biometric methods for contactless and unrestricted access control for mobile devices are proposed. The major contribution of this paper are palmprint and knuckles feature extraction methods dedicated for the mobile contactless biometrics. We use texture mask-based features for the palmprint. For the knuckles, we use Probabilistic Hough Transform and Speeded Up...

Advanced services for critical infrastructures protection

In this paper an overview of the first results of FP7 CIPRNet project is presented. Particularly, we demonstrate CIPRNet services for critical infrastructure protection (CIP) stakeholders. The role of the proposed services is to support decisions in the CIP domain. Moreover, those services are expected to serve as the underpinnings for the European Infrastructures Simulation and...