Michal Kedziora
Michal Kedziora
Wroclaw University of Science and Technology
Zweryfikowany adres z pwr.edu.pl - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Theoretical and practical aspects of encrypted containers detection-digital forensics approach
I Jozwiak, M Kedziora, A Melinska
Dependable Computer Systems, 75-85, 2011
222011
MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING OF ANDROID JAVA CODE
M Kedziora, P Gawin, M Szczepanik, I Jozwiak
International Journal of Network Security & Its Applications (IJNSA) Vol. 11 …, 2019
122019
Context-sensitive text mining with fitness leveling genetic algorithm
M Huk, J Kwiatkowski, D Konieczny, M Kędziora, J Mizera-Pietraszko
2015 IEEE 2nd International Conference on Cybernetics (CYBCONF), 342-347, 2015
92015
Analysis of blockchain selfish mining attacks
M Kędziora, P Kozłowski, M Szczepanik, P Jóźwiak
International Conference on Information Systems Architecture and Technology …, 2019
62019
Analysis of blockchain selfish mining attacks
M Kędziora, P Kozłowski, M Szczepanik, P Jóźwiak
International Conference on Information Systems Architecture and Technology …, 2019
62019
Defeating plausible deniability of VeraCrypt hidden operating systems
M Kedziora, YW Chow, W Susilo
International Conference on Applications and Techniques in Information …, 2017
52017
Service selection method with multiple probabilistic QoS attributes using probabilistic AHP
I Jozwiak, M Kedziora, A Marianski
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY 18 (2), 33-38, 2018
42018
ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
M Kedziora, P Gawin, M Szczepanik, I Jozwiak
42018
Anti-Cheat tool for detecting unauthorized user interference in the unity engine using Blockchain
M Kedziora, A Gorka, A Marianski, I Jozwiak
Data-Centric Business and Applications, 191-209, 2020
22020
Improved threat models for the security of encrypted and deniable file systems
M Kedziora, YW Chow, W Susilo
International Conference on Mobile and Wireless Technology, 223-230, 2017
22017
Secure Decentralized Application Development of Blockchain-based Games
N Trojanowska, M Kedziora, M Hanif, H Song
2020 IEEE 39th International Performance Computing and Communications …, 2020
12020
Security of Blockchain Distributed Ledger Consensus Mechanism in Context of the Sybil Attack
M Kedziora, P Kozlowski, P Jozwiak
International Conference on Industrial, Engineering and Other Applications …, 2020
12020
Android methods hooking detection using dalvik code and dynamic reverse engineering by stack trace analysis
M Szczepanik, M Kędziora, I Jóźwiak
International Conference on Dependability and Complex Systems, 633-641, 2020
12020
Practical Analysis of Traceability Problem in Monero's Blockchain.
M Kedziora, W Wojtysiak
ENASE, 261-268, 2020
12020
Correspondent Sensitive Encryption Standard (CSES) Algorithm in Insecure Communication Channel
R Chałupnik, M Kędziora, P Jóźwiak, I Jóźwiak
International Conference on Dependability and Complex Systems, 90-98, 2019
12019
Threat Models for Analyzing Plausible Deniability of Deniable File Systems
M Kedziora, YW Chow, W Susilo
12017
Methods for Detecting and Analyzing Hidden FAT32 Volumes Created with the Use of Cryptographic Tools
I Jóźwiak, M Kędziora, A Melińska
New Results in Dependability and Computer Systems, 237-244, 2013
12013
Automated Music Generation Using Recurrent Neural Networks
M Czyz, M Kedziora
International Conference on Dependability and Complex Systems, 22-31, 2021
2021
Blockchain Decentralized Voting for Verified Users with a Focus on Anonymity
P Pospiech, A Marianski, M Kedziora
CS & IT Conference Proceedings 11 (8), 2021
2021
Analyzing and improving tools for supporting fighting against COVID-19 based on prediction models and contact tracing
M Gruda, M Kedziora
Bulletin of the Polish Academy of Sciences: Technical Sciences, e137414-e137414, 2021
2021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20