Fuzzy approach for intrusion detection based on user’s commands P Kudłacik, P Porwik, T Wesołowski Soft Computing 20 (7), 2705-2719, 2016 | 53 | 2016 |
Electronic Health Record Security Based on Ensemble Classification of Keystroke Dynamics TE Wesołowski, P Porwik, R Doroz Applied Artificial Intelligence 30 (6), 521-540, 2016 | 20 | 2016 |
Dynamic keystroke pattern analysis and classifiers with competence for user recognition P Porwik, R Doroz, TE Wesolowski Applied Soft Computing 99, 106902, 2021 | 17 | 2021 |
A computational assessment of a blood vessel’s compliance: a procedure based on computed tomography coronary angiography P Porwik, M Sosnowski, T Wesolowski, K Wrobel International Conference on Hybrid Artificial Intelligence Systems, 428-435, 2011 | 9 | 2011 |
Computer User Verification Based on Mouse Activity Analysis T Wesolowski, M Palys, P Kudlacik New Trends in Intelligent Information and Database Systems, 61-70, 2015 | 8 | 2015 |
Keystroke dynamics and finger knuckle imaging fusion for continuous user verification TE Wesołowski, R Doroz, K Wrobel, H Safaverdi Computer Information Systems and Industrial Management: 16th IFIP TC8 …, 2017 | 5 | 2017 |
Computer user profiling based on keystroke analysis TE Wesołowski, P Porwik Advanced Computing and Systems for Security: Volume 1, 3-13, 2016 | 5 | 2016 |
Keystroke Data Classification for Computer User Profiling and Verification TE Wesołowski, P Porwik Computational Collective Intelligence, 588-597, 2015 | 4 | 2015 |
User Profiling Based on Multiple Aspects of Activity in a Computer System T Wesołowski, P Kudłacik Journal of Medical Informatics & Technologies 23, 121-129, 2014 | 4 | 2014 |
A Computational Assessment of a Blood Vessel’s Roughness T Wesolowski, K Wrobel Proceedings of the 8th International Conference on Computer Recognition …, 2013 | 4 | 2013 |
Repozytorium systemu wspomagania lingwistycznego analityka obiektowego LIANA [on-line] T Wesołowski, P Kudłacik, M Gola Politechnika Śląska. Instytut Informatyki. Zakład Oprogramowania [Dostęp 15 …, 2005 | 3* | 2005 |
Data Clustering For the Block Profile Method of Intruder Detection T Wesołowski, P Kudłacik Journal of Medical Informatics & Technologies 22, 209-216, 2013 | 2 | 2013 |
The attempt of the Blood Vessel contractibility estimation on the basis of the Computed Tomography imaging P Porwik, M Sosnowski, K Wróbel, T Wesołowski Journal of Medical Informatics & Technologies 17, 173-181, 2011 | 2 | 2011 |
Hybrid verification method based on finger-knuckle analysis and keystroke dynamics TE Wesolowski, H Safaverdi, R Doroz, K Wrobel Journal of Medical Informatics & Technologies 26, 2017 | 1 | 2017 |
Computer User Verification Based on Typing Habits and Finger-Knuckle Analysis H Safaverdi, TE Wesolowski, R Doroz, K Wrobel, P Porwik Computational Collective Intelligence: 9th International Conference, ICCCI …, 2017 | 1 | 2017 |
USER VERIFICATION BASED ON THE ANALYSIS OF KEYSTROKES WHILE USING VARIOUS SOFTWARE TE WESOŁOWSKI, P PORWIK Journal of Medical Informatics & Technologies 24, 13-22, 2015 | 1 | 2015 |
Applying tools for bytecode obfuscation in the process of the memory optimization K Dobosz, T Wesołowski Studia Informatica 30 (3A), 47-57, 2009 | 1 | 2009 |
Obstacle Detection Algorithm for Railroad-Road Crossings Based on Video Stream Analysis P Kudłacik, TE Wesołowski Procedia Computer Science 225, 1552-1561, 2023 | | 2023 |
FEATURES REDUCTION FOR COMPUTER USER PROFILING BASED ON MOUSE ACTIVITY M PALYS, TE WESOŁOWSKI Journal of Medical Informatics & Technologies 24, 45-51, 2015 | | 2015 |
Zastosowanie narzędzi do zaciemniania kodu bajtowego w procesie optymalizacji pamięciowej K DOBOSZ, T WESOŁOWSKI Studia Informatica 30 (3A), 47-57, 2009 | | 2009 |