Publications

(2020). Correspondent Sensitive Encryption Standard (CSES) Algorithm in insecure communication channel. Engineering in dependability of computer systems and networks : proceedings of the Fourteenth International Conference on Dependability of Computer Systems DepCoS-RELCOMEX, July 1-5, 2019, Brunów, Poland.

DOI

(2019). Malware detection using Machine Learning algorithms and Reverse Engineering of Android java code. International Journal of Network Security and Its Applications.

PDF DOI

(2018). Service selection method with multiple probabilistic QoS attributes using probabilistic AHP. International Journal of Computer Science and Network Security.

PDF

(2018). Novel scheme for multi criteria decision making method using probabilistic analytic hierarchy process. ICAI’18 : proceedings of the 2018 International Conference on Artificial Intelligence, July 30 - August 02 2018, Las Vegas, USA.

PDF

(2018). Improved Models for the Security of Encrypted and Deniable File Systems. Mobile and Wireless Technologies, ICMWT 2017.

PDF DOI

(2018). Android malware detection using machine learning and reverse engineering. Computer Science & Information Technology.

DOI

(2018). A Comparative Study of an Improved pAHP Implementation in SOA Architecture. ACCSE 2018 : the Third International Conference on Advances in Computation, Communications and Services, July 22-26, 2018, Barcelona, Spain.

PDF

(2017). Threat models for analyzing plausible deniability of deniable file systems. Journal of Software Networking [Dokument elektroniczny].

DOI

(2017). Defeating plausible deniability of VeraCrypt hidden operating systems. Applications and Techniques in Information Sequrity 8th International Conference, ATIS 2017, Auckland, New Zeland, July 6-7, 2017 : proceedings.

DOI

(2015). Context-sensitive text mining with fitness leveling genetic algorithm. 2015 IEEE 2nd International Conference on Cybernetics, CYBCONF 2015 [Dokument elektroniczny] : Gdynia, Poland, 24-26 June 2015.

DOI

(2013). Methods for detecting and analyzing hidden FAT32 volumes created with the use of cryptographic tools. New results in dependability and computer systems : proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9-13, 2013, Brunów, Poland.

DOI

(2012). Analysis of using 2D data (X-ray images) to modelling tissue structures. Current trends in development of implantable tissue structures, Warsaw, April 2012.

(2011). Wykorzystanie algorytmów obniżających entropię w celu zmniejszenia efektywności metod wykrywających zaszyfrowane dane. Interdyscyplinarność badań naukowych 2011 [Dokument elektroniczny] : praca zbiorowa.

PDF

(2011). Efficient N-Byte slack space hashing in retrieving and identifying partially recovered data. ICSOFT 2011 [Dokument elektroniczny] : proceedings of the 6th International Conference on Software and Database Technologies, Seville, Spain, 18-21 July, 2011. Vol. 1.

(2009). Procesowe zabezpieczanie i analiza uruchomionych komputerów :. Przestępczość informatyczna.

(2008). Information leakage from mobile devices using compromising electromagnetic emanations. 14th International Congress of Cybernetics and Systems of WOSC, 14th ICCS [Dokument elektroniczny] : proceedings, Wrocław, Poland, September 9-12, 2008.