Michal Choras - Publications

    New:

  1. Ficco M., Choras Michal, Kozik R., Simulation Platform for Cyber-Security and Vulnerability Analysis of Critical Infrastructures, Journal of Computational Science, In Press, Elsevier (IF=2,009).
  2. Choras Michal, Choras S. Ryszard, (Editors) Image Processing and Communications Challenges 9 , Advances in Intelligent Systems and Computing, vol. 681, Springer 2017.

    2017

  3. Kozik R., Choras Michal and Holubowicz W., Packets tokenization methods for web layer cyber security , Logic Journal of the IGPL, vol. 25, issue 1, 103-113, 2017 (IF=0,556).
  4. Demestichas K.P., Adamopoulou E.F., Choras Michal, 5G Communications: Energy Efficiency. Mobile Information Systems vol. 2017, 2017 (IF=1,462).
  5. Wojciechowska A., Choras Michal , Kozik R. The overview of trends and challenges in mobile biometrics , Journal of Applied Mathematics and Computational Mechanics, vol. 16, Issue 2, 173-185, 2017.
  6. Choras Michal , Kozik R., Renk R., Holubowicz W., The Concept of Applying Lifelong Learning Paradigm to Cybersecurity , in: Intelligent Computing Methodologies, ICIC 2017, Liverpool, UK, Lecture Notes in Computer Science, LNCS 10363, 663-671, Springer, 2017.
  7. Wojciechowska A., Choras Michal , Kozik R. Evaluation of the Pre-Processing Methods in Image-Based Palmprint Biometrics , in: Image Processing and Communications Challenges 9, Advances in Intelligent Systems and Computing, vol. 681, 43-49, Springer 2017.
  8. Kozik R., Morzynska J., Choras Michal , Running Sports Decision Aid Tool Based on Reinforcement Learning Approach, , in: Image Processing and Communications Challenges 9, Advances in Intelligent Systems and Computing, vol. 681, 160-169, Springer 2017.
  9. Wojciechowska A., Choras Michal , Kozik R. Recent Advances in Image Pre-processing Methods for Palmprint Biometrics , in: Kurzynski M. et al.: Proc. of the 10th International Conference on Computer Recognition Systems CORES 2017, Advances in Intelligent Systems and Computing, AISC, vol. 579, 268-275, Springer, 2017.
  10. Kozik R., Mlodzikowski R., Choras Michal , Netflow-Based Malware Detection and Data Visualization System , in: Saeed K. et al.: Computer Information Systems and Industrial Management, CISIM 2017, Bialystok, Lecture Notes in Computer Science LNCS 10244, 652-660, Springer, 2017.
  11. Choras Michal , Kozik R., Flizikowski A., Renk R., Holubowicz W., Cyber Threats Impacting Critical Infrastructures , in: Setola R. et al.: Managing the Complexity of Critical Infrastructures, Studies in Systems, Decision and Control, vol. 90, 139-161, Springer, 2016 (printed in 2017). (Open Access paper/book for download)

    2016

  12. Kozik R., Choras Michal and Holubowicz W., Evolutionary-based packets classification for anomaly detection in web layer , Security and Communication Networks, vol. 9, Issue 15, 2901-2910, Wiley, 2016 (IF=0,806).
  13. Saganowski L., Andrysiak T., Kozik R. and Choras Michal, DWT-based anomaly detection method for cyber security of wireless sensor networks , Security and Communication Networks, vol. 9, Issue 15, 2911-2922, Wiley, 2016 (IF=0,806).
  14. Andrysiak T., Saganowski L., Choras Michal, Kozik R., Proposal and comparison of network anomaly detection based on long-memory statistical models , Logic Journal of the IGPL, vol. 24, issue 6, 944-956, 2016 (IF=0,556).
  15. Choras Michal, Emerging approaches and advances in biometric human identification , Int. J. Biometrics, vol. 8, no. 1, 2016.
  16. Kozik R., Choras Michal, Renk R., Holubowicz W., Cyber Security of the Application Layer of Mission Critical Industrial Systems , in: Saeed K. and Homenda W., Computer Information Systems and Industrial Management, CISIM 2016, Vilnius, Lecture Notes in Computer Science LNCS 9842, 342-351, Springer, 2016.
  17. Choras Michal, Kozik R., Puchalski D., Holubowicz W., Cybercrime in the European Projects DG HOME CIPHER and FP7 CAMINO , Internal Security, Semiannual Journal, vol.7, Issue 2, 2015 (printed in 2016).
  18. Choras Michal, Kozik R., Hammerli B., Cyber security landscape, challenges, initiatives and solutions (Editorial) , European CIIP Newsletter, Volume 10, Number 3, 5-7, 2016.
  19. Choras Michal, Kozik R., Maciejewska I., Emerging Cyber-Security: Bio-Inspired Techniques and MITM Detection in IoT, In: Akhgar B., Brewster B. (Eds.): Combatting Cybercrime and Cyberterrorism – Challenges, Trends and Priorities, pp. 193-207, Advanced Sciences and Technologies for Security Applications, Springer, Switzerland, 2016
  20. Akhgar B., Choras Michal, Brewster B., Bosco F., Vermeersch E., Puchalski D., Wells D., Consolidated Taxonomy and Research Roadmap for Cybercrime and Cyberterrorism , In: Akhgar B., Brewster B. (Eds.): Combatting Cybercrime and Cyberterrorism – Challenges, Trends and Priorities, pp. 295-321, Advanced Sciences and Technologies for Security Applications, Springer, Switzerland, 2016
  21. Choras Michal, Kozik R., Churchill A., Yautsiukhin A., Are We Doing All The Right Things To Counter Cybercrime? In: Akhgar B., Brewster B. (Eds.): Combatting Cybercrime and Cyberterrorism – Challenges, Trends and Priorities, pp. 279-294, Advanced Sciences and Technologies for Security Applications, Springer, Switzerland, 2016
  22. Kozik R., Choras Michal, The HTTP Content Segmentation Method Combined with AdaBoost Classifier for Web-Layer Anomaly Detection System , in Grana M. et al. (Eds.): International Joint Conference SOCO'16-CISIS'16-ICUETE'16, Advances in Intelligent Systems and Computing, vol. 527, 555-563, CISIS 2016, San Sebastian, Springer 2016.
  23. Kozik R., Choras Michal, Holubowicz W., Renk R., Extreme Learning Machines for Web Layer Anomaly Detection , in Image Processing and Communications Challenges 8, Advances in Intelligent Systems and Computing, vol. 525, 226-233, Springer 2016.
  24. Laskawiec S., Choras Michal Considering Service Name Indication for Multi-tenancy Routing in Cloud Environments , in Image Processing and Communications Challenges 8, Advances in Intelligent Systems and Computing, vol. 525, 271-278, Springer 2016.
  25. Choras Michal, Kozik R. Comprehensive roadmap (research agenda) for fight against cybercrime and cyber terrorism , FP7 CAMINO Project Deliverable published as a book, ISBN 978-83-64539-01-5, 2016.
  26. Przybyszewski M., Stachowicz A., Olejniczak T., Choras Michal, Zych J., Application Pomoc - Emergency Calls with Geo-location , In: In Tapia A. et al.(Eds.), ISCRAM 2016 Conference Proceedings; 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil.
  27. Kozik R., Choras Michal, Solution to Data Imbalance Problem in Application Layer Anomaly Detection systems , in Martinez-Alvarez F., Troncoso A., Quintian H., Corchado E. (Eds.): Hybrid Artificial Intelligent Systems, HAIS 2016, LNAI vol. 9648, 441-450,Springer 2016.
  28. Patsakis C., van Rest J., Choras Michal, Bouroche M., Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption , in: Garcia-Alfaro J. et al. (Eds.): Data Privacy Management and Security Assurance, Proc. of DPM/QASA 2015, Lecture Notes in Computer Science, LNCS 9481, 169-182, Springer, 2016.
  29. Kozik R., Choras Michal, Renk R., Holubowicz W., Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic , in Burduk R. (et al.): Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015, Advances in Intelligent Systems and Computing, vol. 403, 767-776, Springer 2016.
  30. Choras Michal, Mlynarek P. Smart grid networks: models and communities , European CIIP Newsletter, Volume 10, Number 1, 35-38, 2016.

    2015

  31. Kozik R., Choras Michal , Flizikowski A., Theocharidou M., Rosato V., Rome E., Advanced services for critical infrastructures protection , Journal of Ambient Intelligence and Humanized Computing, vol. 6(6), 783-795, Springer, 2015. (paper for download)
  32. Choras Michal, Kozik R., Machine learning techniques applied to detect cyber attacks on web applications , Logic Journal of the IGPL, vol. 23(1): 45-56, 2015.
  33. Choras Michal , Ear Biometrics , in: Li S.Z., Jain A.K: Encyclopedia of Biometrics, Second Edition, 363-368, Springer US, 2015.
  34. Puchalski D., Choras Michal , Kozik R., Holubowicz W., CAMINO Roadmap to Counter Cyber Crime and Cyber Terrorism (in Polish) , in: Kosinski J.: ICT Crime 2015 (Przestepczosc Teleinformatyczna 2015), 279-287, Szczytno 2015.
  35. Kozik R., Choras Michal , Adapting an Ensemble of One-Class Classifiers for a Web-Layer Anomaly Detection System , in Proc. Of 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC, November, Cracow, 724-729, IEEE CPS, 2015.
  36. Choras Michal, Kozik R., Torres Bruna M.P., Yautsiukhin A., Churchill A., Maciejewska I., Eguinoa I., Jomni A., Comprehensive Approach to Increase Cyber Security and Resielience , in Proc. of ARES (International Conference on Availability, Reliability and Security), 686-692, Touluse, August 2015, IEEE.
  37. Kozik R., Choras Michal, Holubowicz W., Renk R., Increasing Protection and Resilience of Critical Infrastructures - Current challenges and approaches , Journal of the Polish Safety & Reliability Association, vol. 6, number 3, 79-84, 2015.
  38. Kozik R., Choras Michal, Local Statistic Embedding for Malware Behaviour Modelling , Image Processing and Communication Challenges 7, Advances in Intelligent Systems and Computing, vol. 389, 267-273, Springer 2015.
  39. Puchalski D., Choras Michal, FP7 CAMINO Roadmap , CIIP Focus, no. 10, 13-15, 2015.
  40. Kozik R., Choras Michal, Renk R., Holubowicz W., Patterns Extraction Method for Anomaly Detection in HTTP Traffic , in: Herrero A., Baruque B., Sedano J., Quintan H., Corchado E. (Eds.), International Joint Conference CISIS'15 and ICEUTE'15, Advances in Intelligent Systems and Computing, 227-236, ISBN 978-3-319-19712-8, Springer 2015.
  41. Choras Michal, Kozik R., Renk R., Holubowicz W., A Practical Framework and Guidelines to Enhance Cyber Security and Privacy , in: Herrero A., Baruque B., Sedano J., Quintan H., Corchado E. (Eds.), International Joint Conference CISIS'15 and ICEUTE'15, Advances in Intelligent Systems and Computing, 485-496, ISBN 978-3-319-19712-8, Springer 2015.
  42. Choras Michal, Kozik R., D’Antonio S., Iannello G., Jedlitschka A., Miesenberger K., Vollero L., Woloszczuk A., Innovative Solutions for Inclusion of Totally Blind People , in: Garcia N.M., Rodrigues J.J.P.C.: Ambient Assisted Living, Chapter 15, 401-431, CRC Press, 2015.
  43. Kozik R., Choras Michal, Renk R., Holubowicz W., Semi-unsupervised Machine Learning for Anomaly Detection in HTTP Traffic , in Burduk R. (et. al): Proceedings of the 9th International Conference on Computer Recognition Systems CORES 2015 (on USB).
  44. Choras Michal, Mlynarek P., Kosinski J., Kozik R., Research and activities of CAMINO Project in the area of countering cyber crime (in Polish) , in: Kosinski J.: ICT Crime 2014 (Przestepczosc Teleinformatyczna 2014), Szczytno 2015.
  45. Choras Michal, Kozik R., Holubowicz W., Flizikowski A., CIPHER Framework - a Methodology to protect personal data in computer systems (in Polish) , in: Kosinski J.: ICT Crime 2014 (Przestepczosc Teleinformatyczna 2014), Szczytno 2015.
  46. Kozik R., Choras Michal, Finger Knuckle Print Identification with Hierarchical Model of Local Gradient Features , in: Barabucha D. et al. (Eds.), New Trends in Intelligent Information and Database Systems, Studies in Computatiional Intelligence 598, Springer, 2015.

    2014

  47. BOOK: Choras Michal (Ed.), Methodological Framework for Enhancing Cyber Security, Data Protection, and the Privacy of the Users , CIPHER Project Report published as a book with ISBN, ISBN 978-83-64539-00-8, 2014.
  48. Kozik R., Choras Michal, Renk R., Holubowicz W., A Proposal of Algorithm for Web Applications Cyber Attacks Detection , in Saeed K. and Snasel V. (Eds.): Computer Information Systems and Industrial Management, CISIM 2014, November, Vietnam, Lecture Notes in Computer Science, vol. 8838, 680-687, Springer, 2014.
  49. Kozik R., Choras Michal, Renk R., Holubowicz W., Modelling HTTP Requests with Regular Expressions for Detection of Cyber Attacks Targeted at Web Applications , in José Gaviria de la Puerta et al., Advances in Intelligent Systems and Computing, vol. 229, 527-536, Springer, 2014.
  50. Choras Michal, Kozik R., Flizikowski A., Holubowicz w., Critical Infrastructure Resilience as the Factor for Structural Homeland Security , (written in Polish), in: W. Bednarek and A. Ukleja (Eds.): Wartosciowanie bezpieczenstwa w dobie kryzysu, p. 19 – 33, ISBN 978-83-62753-36-9, Jozefów 2013 (published in 2014).
  51. Andrysiak T., Saganowski L., Choras Michal, Kozik R., Network Traffic Prediction and Anomaly Detection Based on ARFIMA Model , in José Gaviria de la Puerta et al., Advances in Intelligent Systems and Computing, vol. 229, 545-554, Springer, 2014.
  52. Kozik R., Choras Michal, Holubowicz W., Hardening web applications against SQL Injection cyber attacks using anomaly detection approach , in Image Processing and Communications 6, Advances in Intelligent Systems and Computing, vol. 313, 289-296, Springer 2014.
  53. Choras Michal, Kozik R., Renk R., Holubowicz W., End-users needs and requirements for tools to support critical infrastructures protection , EDDC 2014, BIG4CIP 2014, arXiv:1404.7564.

    2013

  54. Choras Michal, Comprehensive Approach to Information Sharing for Increased Network Security and Survivability , Cybernetics and Systems, vol. 44, issue 6-7, 550-568, 2013.
  55. D’Antonio S., Coppolino L., Choras Michal, Kozik R., Distributed Framework for Cybersecurity of Critical Infrastructures , In: Flammini F. et al. (Eds.): Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, CRC PRess, 2013. (http://www.crcpress.com/product/isbn/9781439883242).
  56. Choras Michal, Kozik R., Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection , In: Snasel V. et al. (Eds.): Soft Computing in Industrial Applications, Advances in Intelligent Systems and Computing, 223, Springer, 2013.
  57. Kozik R., Choras Michal, Current Cyber Security Threats and Challenges in Critical Infrastructures Protection, In: The Second International Conference on Informatics and Applications (ICIA2013), 23-25.09.2013, Lodz, Poland, pp 93-97, IEEE, 2013.
  58. Choras Michal, A Short Overview of Feature Extractors for Knuckle Biometrics , In: Burduk R. et al. (Eds.): Proc. of the 8th International Conference on Computer Recognition systems (CORES 2013), Advances in Intelligent Systems and Computing, 226, 519-526, Springer, 2013.
  59. Choras Michal, Kozik R., Evaluation of Various Techniques for SQL Injection Attack Detection , In: Burduk R. et al. (Eds.): Proc. of the 8th International Conference on Computer Recognition systems (CORES 2013), Advances in Intelligent Systems and Computing, 226, 753-762, Springer, 2013.
  60. Renk R., Choras Michal, Gierszal H., Holubowicz W., Performance Evaluation of a Network Traffic Parameters Used for Detection of Anomalies (written in Polish), In: Kosinski J. (ed.) Computer Crimes, 37-52, WSPol Press, Szczytno, 2013.
  61. Kozik R., Choras Michal, Machine Learning Techniques for Cyber Attacks Detection , In: Image Processing and Communication Challanges 5, Advances in Intelligent Systems and Computing, 233, 391-397, Springer, 2013.

    2012

    Journals:

  62. Choras Michal, Saganowski L., Renk R., Holubowicz W., Statistical and signal-based network traffic recognition for anomaly detection , Expert Systems, vol. 29, issue 3, 232-245, 2012.
  63. Choras Michal, Kozik R., Contactless palmprint and knuckle biometrics for mobile devices , Pattern Analysis and Applications, vol. 15, no. 1, 73-85, Springer, 2012.
  64. Amantini A. , Choras Michal, D’Antonio S., Egozcue E., Germanus D., Hutter R., The human role in tools for improving robustness and resilience of critical infrastructures , Cognition, Technology & Work, Volume 14, Number 2 (2012), 143-155, 2012.
  65. Choras Michal, Kozik R., The PReliminary Results of the Intelligent Computer Vision System to Support Blind People , Journal of Medical Informatics & Technologies, vol. 21, 19-26, 2012.
  66. Choras Michal, Kozik R., Flizikowski A. INSPIRE Decision Aid Tool: a Support for Risk Management and Cyber Protection of Critical Infrastructures , Telecommunications Review, vol. 8-9, p. 1215-1221, 2012.
  67. Kozik R., Choras Michal, Information Exchange Between Domains in Federated Networks Protection System , Measurement Automation and Monitoring Journal (PAK), vol. 2/2012, 184-188, 2012.

    Books and conferences:

  68. Choras Michal, Kozik R., Puchalski D., Holubowicz W., Correlation Approach for SQL Injection Attacks Detection, In: Herrero A. et al (Eds.), Advances in Intelligent and Soft Computing, 189, 177-186, Springer, 2012.
  69. Andrysiak T., Saganowski L, Choras Michal, Greedy Algorithms for Network Anomaly Detection, In: Herrero A. et al (Eds.), Advances in Intelligent and Soft Computing, 189, 235-244, Springer, 2012.
  70. Choras Michal, Kozik R., Renk. R, Holubowicz W., Information Exchange Mechanism between Federated Domains: P2P Approach , In: Herrero A. et al (Eds.), Advances in Intelligent and Soft Computing, 189, 187-196, Springer, 2012.
  71. Jasiul B., Piotrowski R., Berezinski P., Choras Michal, Kozik R., Brzostek J., Federated Cyber Defence System - Applied Methods and Techniques , In: Amanowicz M. (Ed.), Military Communications and Information Technology: A Trusted Cooperation Enabler, 347-357, MUT Press, 2012.
  72. Choras Michal, Manso M., Puchalski D., Kozik R., Samp K., Online Social Networks: Emerging Security and Safety Applications , In: Image Processing and Communication Challenges 4, Advances in Intelligent and Soft Computing, AISC 184, 291-302, Springer, 2012.
  73. Andrysiak T., Saganowski L, Choras Michal, DDoS Attacks Detection by Means of Greedy Algorithms, In: Image Processing and Communication Challenges 4, Advances in Intelligent and Soft Computing, AISC 184, 303-310, Springer, 2012.
  74. Flizikowski A., Majewski M., Puchalski D., Hassnaa M., Choras Michal, A Concept of Unobtrusive Method for Complementary Emotive User Profiling and Personalization for IPTV Platforms, , In: Image Processing and Communication Challenges 4, Advances in Intelligent and Soft Computing, AISC 184, 269-282, Springer, 2012.
  75. Choras Michal, Kozik R, Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection , In. Proc. of WSC17 Online Conference on Soft Computing in Industrial Applications, 2012.
  76. Jasiul B., Piotrowski R., Berezinski P., Choras Michal, Kozik R., Brzostek J., Federated Cyber Defence System - Applied Methods and Techniques , In Proc. of MCC12 Military Communications and Information Systems Conference, Gdansk, Poland, IEEE Explore 2012.

    2011

    Journals:

  77. Choras Michal, Kozik R., Saganowski L., Renk R., Aspects of Deploying Synchrophasors in Energy Grids (written in Polish) , Energy Market (Rynek Energii), vol. 2(93)/2011, 2011.
  78. Choras Michal, Kozik R., Nowakowski W. Biometric Recognition based on Knuckles (written in Polish), Electronics (Elektronika), vol. 4, 92-95, 2011.

    Books and conferences:

  79. Choras Michal, Kozik R., Fast Feature Extractors for Palmprint Biometrics , In Chaki N. et al. (Eds.): Computer Information Systems – Analysis and Technologies, Communications in Computer and Information Science CCIS, 121-127, Springer, 2011.
  80. Choras Michal, Kozik R., Network Event Correlation and Semantic Reasoning for Federated Networks Protection System , In Chaki N. et al. (Eds.): Computer Information Systems – Analysis and Technologies, Communications in Computer and Information Science CCIS, 48-54, Springer, 2011.
  81. Choras Michal, Kozik R., Piotrowski R., Brzostek J., Holubowicz W., Network Events Correlation for Federated Networks Protection System , In: Abramowicz W. et al. (Eds.): Towards a Service-Based Internet, LNCS 6994, pp. 100–111, Springer 2011.
  82. Piotrowski R., Jasiul B., Sliwka M., Kantyka G., Podlasek T., Dalecki T., Choras Michal, Kozik R., Brzostek J., The Response to Cyber Threats in Federation of Systems Environment , In: Amanowicz M. (Ed.): Military Communications and Information Technology: A Comprehensive Approach Enabler, pp. 325-335, MUT Press 2011. ,
  83. Choras Michal, D'Antonio S., Iannello G., Jedlitschka A., Kozik R., Miesenberger K., Woloszczuk A., Innovative man machine interfaces and solutions to support totally blind people , In: Image Processing and Communication Challenges 3, Advances in Soft Computing, AISC 102, 437-444, Springer, 2011.
  84. Choras Michal, Kozik R., Knuckle Recognition for Human Identification , In Burduk R. et al. (Eds.): Computer Recognition Systems 4, AISC 95, 61-70, Springer-Verlag, 2011.
  85. Saganowski Ł., Andrysiak T., Choras Michal, Renk R., Expansion of Matching Pursuit Methodology for Anomaly Detection in Computer Networks , In: Burduk R. et al. (Eds.): Computer Recognition Systems 4, AISC 95, 727-736, Springer-Verlag, 2011.
  86. Renk R., Choras Michal, Saganowski Ł., Holubowicz W., Signal Processing Methodology for Network Anomaly Detection, in: Intrusion Detection Systems, Pawel Skrobanek (Ed.), ISBN: 978-953-307-167-1, InTech, 2011, Available from: http://www.intechweb.org/books/show/title/intrusion-detection-systems

    2010

    Journals:

  87. Choras Michal, The lip as a biometric , Pattern Analysis and Applications, PAA, vol. 13, no. 1, 105-112, Springer, 2010.
  88. Renk R., Saganowski L., Choras Michal, Holubowicz W., Comprehensive Approach to Anomaly Detection System Evaluation , Image Processing & Communications, vol. 15, no. 1, 69-78, 2010.
  89. Choras Michal, Renk Rafal, Power Grid Protection through Increasing Cyber Security of ICT-SCADA Systems Interconnection (written in Polish) , Energy Market (Rynek Energii), vol. 2(86)/2010, 35-39, 2010.
  90. Kozik Rafal, Choras Michal Combined Shape and Texture Information for Palmprint Biometrics , Journal of Information Assurance and Security, vol. 5, issue 1, 58-63, 2010.

    Books and conferences:

  91. Choras Michal, Holubowicz W., Renk R, Samp K., Ontology of Network Threats and Vulnerabilities in the context of NATO Network Enabled Capabilities (NNEC), In: Concept and Implementations for Innovative Military Communications and Information Technologies, 267-276, MUT Press 2010.
  92. Choras Michal, Kozik R., Feature Extraction Method for Contactless Palmprint Biometrics , In D.-S. Huang et al. (Eds.): Advanced Intelligent Computing Theories and Applications, Communications in Computer and Information Science 93, pp. 435–442, Springer, 2010.
  93. Renk R., Saganowski Ł., Choras Michal, Holubowicz W., Performance Evaluation of ADS System Based on Redundant Dictionary, In: Choras (Ed.): Image Processing and Communication Challenges 2, Advances in Soft Computing, 468-476, Springer, 2010.
  94. Choras Michal, Kozik R., Knuckle Biometrics for Human Identification, In: Choras (Ed.): Image Processing and Communication Challenges 2, Advances in Soft Computing, 95-102, Springer, 2010.
  95. Choras Michal, Kozik R., Flizikowski A., Holubowicz W., Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services , In L. Bolc et al. (Eds.): Computer Vision and Graphics, Part I, LNCS 6374, pp. 275–282, Springer, 2010.
  96. Kozik R., Choras Michal, Hołubowicz W., Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection, In J. Alonso-Zarate and O. Hoffmann (Eds.): Mobile Lightweight Wireless Systems, LNICST 45, pp. 451–463, 2010.
  97. Choras Michal, Kozik R., Flizikowski A., Holubowicz W., Ontology Applied in Decision Support System for Critical Infrastructures Protection , In N. Garcia-Pedrajas et al. (Eds.): Trends in Applied Intelligent Systems, IEA/AIE 2010, Part I, LNAI 6096, pp. 671-680, 2010.
  98. Choras Michal, Flizikowski A., Kozik R., Holubowicz W., Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis , In E. Rome and R. Bloomfield (Eds.): Critical Information Infrastructures Security, LNCS 6027, pp. 98–110, 2010
  99. Choras Michal, Kozik R, Knuckle Biometrics Based on Texture Features, In. Proc. of International Workshop on Emerging Techniques and Challenges for Hand-based Biometrics (ETCHB2010), Stambul, IEEE CS Press, August 2010.
  100. Kozik R., Choras Michal, Holubowicz W., Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection, In Proc. of MOBILIGHT (Mobile Lightweight Wireless Systems), Barcelona, May, 2010.
  101. Choras Michal, Stachowicz A., Kozik R., Semantic Description of Cyber Threats , In Proc. of Multimedia Communication, Services and Security, MCSS 2010, 20-24, Cracow, May, 2010.
  102. Choras Michal, D'Antonio Salvatore, Kozik R., Holubowicz W., INTERSECTION Approach to Vulnerability Handling , In Proc. of 6th International Conference on Web Information Systems and Technologies, WEBIST 2010, vol. 1, 171-174, INSTICC Press, Valencia, Spain, April 2010.

    2009

    Journals:

  103. Choras Michal, Stachowicz Anna, Kozik Rafal, Flizikowski Adam, Renk Rafal Ontology-based approach to SCADA systems vulnerabilities representation for CIP , Electronics, vol. 11/2009, 35-38, November 2009.
  104. Flizikowski A., Choras Michal, Wachowiak M., Holubowicz W., A Method for Semi-automated Assessment of User Satisfaction When Using WWW Services with Mobile Terminals , Image Processing & Communications, vol. 14, no. 2-3, 69-80, 2009.
  105. Saganowski Lukasz, Choras Michal, Renk Rafal, Holubowicz Witold, On Tuning Redundant Dictionary Parameters in Signal-based Anomaly Detection System , Image Processing & Communications, vol. 14, no. 4, 29-34, 2009.
  106. Choras Michal, Stachowicz Anna, Flizikowski Adam, Renk Rafal, Holubowicz Witold, Solutions for securing SCADA interconnection with telecommunications networks in critical infrastructure protection (written in Polish) , Telecommunications Review, vol. 8-9, 1408-1416, 2009.
  107. Choras Michal, Flizikowski Adam, Energy sector protection - securing SCADA interconnection with telecommunications networks (written in Polish), New Energy, vol. 3/2009, 82-85, 2009.
  108. Choras Michal, Novel techniques applied to biometric human identification , Electronics, vol. 3/2009, March 2009.
  109. Flizikowski Adam, Choras Michal, Critical Infrastructures - Security Aspects (written in Polish) , Boston IT Security Review, vol. 2/2009, 35-39, 2009.

    Books and conferences:

  110. Choras Michal, Ear Biometrics , In: Li S. (Ed.) Encyclopedia of Biometrics , 233-240, Springer, 2009.
  111. Choras Michal, Ear Biometrics based on Geometrical Feature Extraction , In: Bunke H. et al. (Eds.) Progress in Computer Vision and Image Analysis , 321-338, World Scientific, 2009.
  112. Saganowski L., Choras Michal, Renk R., Holubowicz W., A Novel Signal-Based Approach to Anomaly Detection in IDS Systems , M. Kolehmainen et al. (Eds.): Adaptive and Natural Computing Algorithms, ICANNGA 2009, LNCS 5495, pp. 527–536, Springer 2009.
  113. Choras Michal, Kozik R., Flizikowski A., Renk R., Holubowicz W., Ontology-based Decision Support for Security Management in Heterogeneous Networks , In: Huang, D.-S. et al. (Eds.): Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, LNAI 5755, 920-927, Springer 2009.
  114. Kozik R., Choras Michal, Palmprint Biometrics for Human Identification , In: Image Processing & Communications Challenges, 271-277, EXIT, 2009.
  115. Saganowski L., Choras Michal, Renk R., Holubowicz W., Anomaly Detection System based on Redundant Dictionary of Base Functions , In: Image Processing & Communications Challenges, 443-449, EXIT, 2009.
  116. Flizikowski A., Choras Michal, Wachowiak M., Holubowicz W., Video Profiling for Automated Assessment of QoS/QoE in Mobile WWW Services , In: Image Processing & Communications Challenges, 450-457, EXIT, 2009.
  117. Choras Michal, Lips Recognition for Biometrics , In: Massimo Tistarelli, Mark S. Nixon (Eds.): Advances in Biometrics. LNCS 5558, 1260-1269, Springer 2009.
  118. Choras Michal, Saganowski L., Renk R., Kozik R., Holubowicz W., Recognizing Anomalies/Intrusions in Heterogeneous Networks , in M.Kurzynski and M.Wozniak (Eds.): Computer Recognition Sys. 3, AISC 57, pp. 619-627, Springer-Verlag, 2009.
  119. Tarlowski R., Choras Michal, Digital Analysis of 2D Code Images Based on Radon Transform , in M.Kurzynski and M.Wozniak (Eds.): Computer Recognition Sys. 3, AISC 57, pp. 155–162, Springer-Verlag, 2009.
  120. Choras Michal, Flizikowski A., Kozik R., Renk R., Holubowicz W., Ontology-Based Reasoning Combined with Inference Engine for SCADA-ICT Interdependencies, Vulnerabilities and Threats Analysis , In Pre-Proc. of 4th International Workshop on Critical Information Infrastructures Security, CRITIS'09, Bonn, Germany, 203-214, Fraunhofer IAIS, 2009.

    2008

    Journals:

  121. Saganowski Lukasz , Choras Michal, Renk Rafal, Holubowicz Witold, Signal-based Approach to Anomaly Detection in IDS Systems , International Journal of Intelligent Engineering and Systems, vol. 1 (4), 18-24, 2008.
  122. Choras Michal, Flizikowski Adam, Anna Stachowicz, Marta Redo, Renk Rafal, Holubowicz Witold, Ontology Notation and Description of Vulnerabilities in Heterogeneous Networks and Critical Infrastructures , Methods of Applied Informatics of Polish Academy of Sciences, vol. 4, 2008.
  123. Choras Michal, Renk Rafal, Flizikowski Adam, Holubowicz Witold, Ontology-based description of networks vulnerabilities , Polish Journal of Environmental Studies, vol. 5c, 2008.
  124. Tarlowski Rafal, Choras Michal, Analysis of 2D Code Images based on Radon Transform (written in Polish), Telecommunication Review (Przeglad Telekomunikacyjny), vol.8-9, 1014-1021, 2008.
  125. Dabrowski Rafal, Renk Rafal, Choras Michal, Holubowicz Witold, Security Subsystem Architecture for Heterogeneous Networks (written in Polish), Telecommunication Review (Przeglad Telekomunikacyjny), vol.8-9, 1339-1346, 2008.
  126. Choras Michal, Perspective methods of human identification: Ear Biometrics , Opto-Electronics Review, vol. 16, no.1, 85-96, 2008. (http://www.springerlink.com/content/yj27m7151633535n/).

    Books and conferences:

  127. Choras Michal, Saganowski L., Renk R, Holubowicz W., Signal Processing Methods Applied to Innovative Intrusion Detection Systems , in Adam Grzech et al. (Eds.): Information Systems Architecture and Technology - Information Systems and Computer Communications Network, 139-150, ISBN 978-83-7493-416-9, 2008.
  128. Flizikowski A., Choras Michal, Renk R., Holubowicz W., On Applying Ontologies to Security and QoS Management in Heterogeneous Networks , in Adam Grzech et al. (Eds.): Information Systems Architecture and Technology - Information Systems and Computer Communications Network, 189-200, ISBN 978-83-7493-416-9, 2008.
  129. Choras Michal, Human Lips as Emerging Biometrics Modality, in A. Campilho and M. Kamel (Eds.): Image Analysis and Recognition, ICIAR 2008, LNCS 5112, 994-1003, Springer-Verlag, 2008. (doi:10.1007/978-3-540-69812-8).
  130. Rafal Kozik, Aleksandra Zelek, Choras Michal, Palmprint Segmentation and Feature Extraction Methods, in L. Rutkowski et al. (Eds.): Computational Intelligence: Methods and Applications, 377-388, Academic Publishing House EXIT, 2008.
  131. Rafal Kozik, Aleksandra Zelek, Choras Michal, A Novel Shape-Texture Approach to Palmprint Detection and Identification , in Proc. Intelligent Systems Design and Applications, ISDA '08, 638-643, IEEE CS Press, Kaohsiung, Taiwan, 2008.
  132. Renk R, Saganowski L., Holubowicz W.,Choras Michal, Intrusion Detection System Based on Matching Pursuit , in Proc. Intelligent Networks and Intelligent Systems, ICINIS '08, 213-216, IEEE CS Press, Wuhan, China, 2008.
  133. Choras Michal, Perspective Methods of Biometric Human Identification , In Proc of NTAV/SPA (New Trends in Audio and Video/ Signal Processing), 195-200, Poznan, September 2008.
  134. Rafal Kozik, Aleksandra Zelek, Choras Michal, Palmprint Recognition Enhanced by the Shape Features, Proc. of 7th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07), IEEE CS Press, 214-215, Ostrava, June 2008.

    2007

    Journals:

  135. Andrysiak Tomasz, Choras Michal, Algorithms for Stereovision Disparity Calculation in the Moments Space, Machine Graphics & Vision, MGV, vol. 15, no. 3/4, 255-264, 2006 (printed in October 2007).
  136. Choras S. Ryszard, Andrysiak Tomasz, Choras Michal, Integrated Color, Texture and Shape Information for Content-Based Image Retrieval, Pattern Analysis and Applications, PAA, vol. 10,no. 4, 333-343, October 2007. (doi:10.1007/s10044-007-0071-0).

    Books and conferences:

  137. Choras Michal, Human Lips Recognition , in M. Kurzyński et al. (Eds): Computer Recognition Systems 2, Advances in Soft Computing, 838-843, Springer, 2007. (doi:10.1007/978-3-540-75175-5_104).
  138. Choras Michal, Image Pre-classification for Biometrics Identification Systems , in J. Pejas and K. Saeed (Eds): Advances in Information Processing and Protection, 361-370, Springer NY, 2007.(doi:10.1007/978-0-387-73137-7_32).
  139. Choras Michal, Intelligent Computing for Automated Biometrics, Criminal and Forensic Applications, in D.-S. Huang et al. (Eds.): Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues,1170-1181, LNCS 4681, Springer Berlin, 2007. (doi:10.1007/978-3-540-74171-8).
  140. Choras Michal, Mroczkowski Piotr, Recognizing Individual Typing Patterns, , in Marti J. et al. (Eds.): Pattern Recognition and Image Analysis, IbPRIA – Part II, 323-330, LNCS 4478, Springer Berlin, 2007.(doi:10.1007/978-3-540-72849-8_41).
  141. Choras S. Ryszard, Choras Michal, Multimodal Hand-Palm Biometrics, in B. Beliczynski et al. (Eds.): Adaptive and Natural Computing Algorithms - ICANNGA (part II), 407-414, LNCS 4432, Springer Berlin, 2007.(doi:10.1007/978-3-540-71629-7_46).
  142. Choras Michal, Mroczkowski Piotr, Keystroke Dynamics for Biometrics Identification, in B. Beliczynski et al. (Eds.): Adaptive and Natural Computing Algorithms - ICANNGA (part II), 424-431, LNCS 4432, Springer Berlin, 2007.(doi:10.1007/978-3-540-71629-7_48).
  143. Choras Michal, Emerging Methods of Biometrics Human Identification , Proc. of 2nd International Conference on Innovative Computing, Information and Control (ICICIC'07), p. 365, IEEE CS Press, Kumamoto, Japan, September 2007.
  144. Choras Michal, Image Feature Extraction Methods for Ear Biometrics - A Survey , Proc. of 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07), IEEE CS Press, 261-265, Elk, June 2007.
  145. Choras Michal, Mroczkowski Piotr, Web Security Enhancement Based on Keystroke Dynamics , Proc. of Web Information systems and Technologies (WEBIST), INSTICC Press, 337-340, Barcelona, March 2007.

    2006

  146. Choras Michal, Ear biometrics: feature extraction methods based on geometrical parameters (written in Polish), Przegląd Elektrotechniczny (Electrotechnical Review) no. 12/2006, 5-10, 2006.
  147. Andrysiak Tomasz, Choras Michal, Image Filtration and Feature Extraction for Face Recognition, in K. Saeed et al. (Eds): Biometrics, Computer Security Systems and Artificial Intelligence Applications, chapter 1, pages 3-12, Springer NY, 2006.(doi:10.1007/978-0-387-36503-9_1).
  148. Choras Michal, Further Developments in Geometrical Algorithms for Ear Biometrics, in F.J Perales and B. Fisher (Eds.): Articulated Motion and Deformable Objects - AMDO 2006, 58-67, LNCS 4069, Springer-Verlag 2006.(doi:10.1007/11789239_7).
  149. Choras Michal, Andrysiak Tomasz, Symmetry-based Salient Points Detection in Face Images, in L. Rutkowski et al. (Eds): Artificial Intelligence and Soft Computing - ICAISC 2006, 758-767, LNCS 4029, Springer-Verlag 2006.(doi:10.1007/11785231_79).
  150. Choras Michal, Biometric Images Pre-classification: Original Solution for Ear Biometrics, Proc. of Advanced Computer Systems (ACS), vol. II, 139-146, Miedzyzdroje, Poland, October 2006.
  151. Mroczkowski Piotr, Choras Michal, Keystroke Dynamics in Biometrics Client-Server Password Hardening System, Proc. of Advanced Computer Systems (ACS), vol. II, 75-82, Miedzyzdroje, Poland, October 2006.
  152. Choras Michal, Choras S. Ryszard, Geometrical Algorithms of Ear Contour Shape Representation and Feature Extraction , Proc. of ISDA (Intelligent Systems Design and Applications), vol. II, 451-456, IEEE CS Press, Jinan, China, October 2006.
  153. Choras S. Ryszard, Choras Michal, Hand Shape Geometry and Palmprint Features for the Personal Identification , Proc. of ISDA (Intelligent Systems Design and Applications), vol. II, 1085-1090, IEEE CS Press, Jinan, China, October 2006.
  154. Andrysiak Tomasz, Choras Michal, Stereo Disparity Estimation Using Orthogonal Discrete Moments, Proc. of ICINCO 2006 Conference, INSTICC Press, 504-507, Setubal, Portugal, August 2006.
  155. Choras Michal, Ear Biometrics in Passive Human Identification Systems, Proc. of Pattern Recognition in Information Society (ICEIS-PRIS), INSTICC Press, 169-175, Paphos, Cyprus, May 2006.

    2005

    Journals:

  156. Andrysiak Tomasz, Choras Michal, Multiresolution Matching and Disparity Calculation of Stereo Images in Frequency Domain, Information Extraction and Processing, no. 23 (99), 106-111, 2005.
  157. Andrysiak Tomasz, Choras Michal, Image Retrieval Based on Hierarchical Gabor Filters, International Journal Applied Mathematics and Computer Science (AMCS), vol. 15, no. 4, 471-480, 2005.(http://www.amcs.uz.zgora.pl./images/articles/vol15no4/vol15no4_5.pdf).
  158. Choras Michal, Ear Biometrics Based on Geometrical Feature Extraction, Electronic Letters on Computer Vision and Image Analysis (Journal ELCVIA), vol. 5, no. 3, 85-95, 2005. (elcvia.cvc.uab.es/journal/publish.php?art=a2004085-1).
  159. Choras Michal, Image Processing Methods in Person Identification Applications - Ear Biometrics, Electrotechnical Review (Przegląd Elektrotechniczny) no. 4/81, 38-41, 2005.

    Books and conferences:

  160. Choras Ryszard, Andrysiak Tomasz, Choras Michal, Content Based Image Retrieval Technique, in M. Kurzyński et al. (Eds): Computer Recognition Systems, Advances in Soft Computing, 371-379, Springer, 2005.
  161. Andrysiak Tomasz, Choras Michal, Stereo Matching for Robotics Vision, Proc. of International Conference PELINCEC 2005 (10 pages).
  162. Andrysiak Tomasz, Choras Michal, Face Feature Extraction and Representation, Proc. of ACS-CISIM, vol. 1: Image Analysis, Computer Graphics, Security Systems and Artificial Intelligence Applications, 297-306, University of Finance and Management in Bialystok, 2005.
  163. Andrysiak Tomasz, Choras Michal, LPT and DST for Face Feature Extraction and Representation, Proc. of IAPR Conference on Pattern Recognition and Image Processing - PRIP, 148-151, Minsk 2005.

    2004

  164. Choras Michal, Ear Biometrics Based on Geometrical Method of Feature Extraction, in F.J Perales and B.A. Draper (Eds.): Articulated Motion and Deformable Objects, LNCS 3179, 51-61, Springer-Verlag 2004.
  165. Choras Michal, Human Ear Identification Based on Image Anlysis, in L. Rutkowski et al. (Eds): Artificial Intelligence and Soft Computing, LNAI 3070, 688-693, Springer-Verlag 2004.
  166. Choras Michal, Feature Extraction Based on Contour Processing in Ear Biometrics, IEEE Workshop on Multimedia Communications and Services, MCS 2004, 15-19, Cracow.
  167. Choras Michal, Biometrics Human Identification Methods Based on Ear Image Analysis (in Polish), Biuletyn Informacyjny Techniki Komputerowe no 1/2004, ISSN 0239-8044, 59-69, 2004.

    2003

  168. Choras Michal, Human Identification Based on Image Analysis - New Trends, IEEE Workshop on Signal Processing , 111-116, Poznan, 2003.
  169. Andrysiak Tomasz, Choras Michal, Hierarchical Object Recognition Using Gabor Wavelets, Komputerowe Systemy Rozpoznawania KOSYR 2003, 271-278, Miłków.

    2002

  170. Choras S. Ryszard, Choras Michal, Computer Visual System Analyzing the Influence of Stimulants on Human Motion, in F.J Perales and E.R. Hancock (Eds.): Articulated Motion and Deformable Objects, LNCS 2492, 241-250, Springer-Verlag 2002.
  171. Choras S. Ryszard, Choras Michal, Feature Extraction Methods in Fingerprint Recognition, IEEE Workshop on Signal Processing 2002, 21-26, Poznań.

    Conference Papers written in Polish language:

  172. Choras Michal, Renk R., Kozik R., Holubowicz W. Intelligent Energy Grids , Proc. of Intelligent Systems in Energy, SIWE'10, Wisla, Poland, November 2010.
  173. Choras Michal, Perspective methods of human identification based on image content, Proc. of Image Processing Techniques TPO 2006 - Serock, Warsaw University of Technology Press, 413-422, 2006.
  174. Choras Michal, Andrysiak Tomasz, Automated method of characteristic points localization in face images, Proc. of Image Processing Techniques TPO 2006 - Serock, Warsaw University of Technology Press, 321-326, 2006.
  175. Choras Michal, Complex Transformations for Fingerprint Recognition, Proc. of Image Processing Techniques TPO 2002, 274-279, Serock.
  176. Choras S. Ryszard, Choras Michal, Automated Localization and Detection of Faces in 2D Images, Proc. of Image Processing Techniques TPO 2002, 262-267, Serock.
  177. Choras Michal, Human Identification with the Use of Image Analysis, Proc. of Artifficial Intelligence 2002, Sztuczna Inteligencja 2002, 223-231, Siedlce.
  178. Choras Michal, MHT and HAARCOS Transformations for Videotelephony Image Coding, Proc. of KST 2002, vol. B, 68-74, Bydgoszcz.

    Contributor to:

  179. Manso M., Manso B., The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts , In Proc. of International Command and Control Research and Technology Symposium, ICCRTS, Fairfax, VA, USA, 2012. (ICCRTS Best Paper Award)

Acknowledged by:

  1. Protecting Industrial Control Systems, Recommendations for Europe and Member States, ENISA Report, December 2011.
  2. van Hengst M., Warnier M., Cyber Crime in Privately Held Information Systems – Personal data at stake, In Proc. of IEEE European Intelligence and Security Informatics Conference, Uppsala, Sweden, 2013.

Plagiarized by:

  1. RAMESH KUMAR, K.NAGESWARA RAO, Pattern Recognition Algorithms for Ear Biometrics, Journal of Theoretical and Applied Information Technology, Vol 8. No. 1, 2009.
  2. Ramesh, K.P., Rao, K.N., Pattern extraction methods for ear biometrics - A survey, Proc. of Nature & Biologically Inspired Computing, 1657 - 1660, NaBIC 2009.

Theses:

  1. Doctor of Science (habilitation) : Selected solutions to enhance digital security and safety , AGH Cracow, 2014.
  2. Ph.D. Thesis with distinction, Human Identification Based on Ear Image Analysis, 2005.
  3. M.Sc. Thesis with distinction, Static and Moving Image Coding, 2001

Guest Editor/Special Sessions:

  1. CONFERENCE CHAIR (ONGOING): Image Processing and Communications IP&C 2017. Bydgoszcz. Poland.
  2. WORKSHOP CO-CHAIR: International Workshop on Challenges and Solutions for Critical Infrastructure Protection - CSCIP 2017. In conjunction with 10th IEEE International Conference on Cyber, Physical and Social Computing, IEEE CPSCom-2017, 21-23 June, 2017, Exeter, UK.
  3. ONGOING: Special Issue on: Advanced and Emerging Methods of Computer Science Applied to Cyber Security, Applied Mathematics and Compter Science (AMCS)
    http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=58940©ownerid=93578
  4. Special Issue on: 5G Communications - Energy Efficiency, Mobile Information systems (2016) - PUBLISHED
    http://www.hindawi.com/journals/misy/si/478121
  5. Special Issue on: Emerging Biometric Modalities – International Journal of Biometrics, Inderscience (2015) - PUBLISHED
    http://www.inderscience.com/info/inarticletoc.php?jcode=ijbm&year=2016&vol=8&issue=1
  6. RAI-BHI - Recent Advances In Biometric Human Identification at IP&C Conference, 2015 (with Dr J.Bobulski). - PUBLISHED. Proceedings published with AISC Springer.
  7. Special Issue on: Critical Infrastructure Protection Technologies: Advances, Trends, and Open Issues (CIPT), International Journal of Distributed Sensor Networks, Hindawi (2015).
    http://www.hindawi.com/journals/ijdsn/si/912803/cfp/ - SI CANCELLED
  8. Special Issue on: Real-time Big Data Analytics for Critical Infrastructure Protection - International Journal of Critical Computer-Based Systems, Inderscience (2015) - SI CANCELLED.

Selected Edited Reports and Deliverables

  1. Solutions for securing heterogeneous networks: a state of the art analysis. (D2.1. INTERSECTION)
  2. Identification and classification of vulnerabilities of network infrastructures. (D2.2. INTERSECTION)
  3. Requirements for an integrated security framework. (D2.3. INTERSECTION)
  4. INSPIRE D4.2: Verification report
  5. INSPIRE D4.3: Validation report
  6. INSPIRE D4.4: Integration report
  7. INSPIRE D4.5: The INSPIRE prototype
  8. INCO D1.1: First US meeting report and project roadmap
  9. TACTICS D2.1
  10. TACTICS D2.2
  11. TACTICS D2.3
  12. CIPHER D2.1
  13. CIPHER D2.2
  14. CIPHER D2.3
  15. CIPRNet D5.1
  16. CIPRNet D5.2
  17. CAMINO D2.1
  18. CAMINO D1.1
  19. CAMINO D1.2
  20. CAMINO D4.3
  21. CAMINO D5.2
  22. CAMINO D4.4
  23. Q-Rapids D4.1
  24. Q-Rapids D4.2
  25. ... and contribution to more than 30 other EU and national projects reports and deliverables

Invited talks, seminars and tutorials:

  1. Cyber security and CIP - challenges and solutions , (with R.Kozik) CIPRNet Training Lecture at University of Cyprus, UCY, Nicosia, CYprus, 2017.
  2. Cyber Security and Critical Infrastructure Protection , Opening Talk, PAN Seminar, UTP Bydgoszcz, 21 October 2016.
  3. Cyber Security - Comprehensive Approach , Visiting Erasmus Professor Lecture, University of Naples Parthenope, Naples, Italy, September, 2016.
  4. How to Counter Cybercrime in the Coming Years , Cybercrime and Cyberterrorism Research Summit, 3rd March, San Sebastian, Spain, 2016.
  5. Solutions for the Future, COURAGE-CAMINO-CyberRoad Ideas , COURAGE-CAMINO-CyberRoad Joint Conference, Emerging and Current Challenges in Cybercrime and Cyberterrorism, 9-10 March, the Hague, the Netherlands, 2016.
  6. Cyber-physical security solutions for critical infrastructure protection , (with R.Kozik) CIPRNet Training Lecture at Department of Electrical and Electronic Engineering, University of Cagliari, 16 February, Cagliari, 2016.
  7. Which technologies should be developed to counter cyber crime - an European perspective , presentation at SECURE 2015 (with J.Kosinski), October, Warsaw, 2015.
  8. Comprehensive Approach to Increase Cyber Security and Resilience Against Cyber Crime and Cyber Terrorism - presentation at workshop Parameters for Guidance & Roadmap for the Prosecution of Cyber Crime in Civil, Criminal & Common Law, 15 June, Royal Halloway University London, UK, 2015.
  9. How to improve resilience against cybercrime and cyberterrorism? - presentation/panelist at Innovation and cybercrime: Challenges of the digital transformation in Europe, 8 April, Montpellier, France, 2015.
  10. Comprehensive Approach to Cyber Roadmap Coordination and Development - presentation at Cyber Attacks 2015, 24 March, Torun, Poland, 2015.
  11. Cyber Crime - panelist at Cyber crime Conference at AON (National Defence University), 13 February, Warsaw, Poland, 2015.
  12. Methods for increasing protection and resilience of critical infrastructures , CIPRNet Training Lecture, 22 January, UTP Bydgoszcz, 2015.
  13. Technologies and means to protect privacy and personal data from cyber crime , panelist at cybersecurity panel at CPEXPO 2014 / Security Research Conference, 8-11 December, Genova, Italy, 2014.
  14. Convergent Cyber-Physical Security Techniques for Critical Infrastructure Protection and Resilience, EIT ICTLabs Future Networking Solutions Outreach Workshop, Budapest, Hungary, 5 December 2014.
  15. CAMINO - Project Introduction 1st CAMINO Experts Workshop, ReESRA 2016-2017: Reshaping the European Security Research Agenda for 2016-2017, Bern, September 2014.
  16. Workshop Summary 1st CAMINO Experts Workshop, ReESRA 2016-2017: Reshaping the European Security Research Agenda for 2016-2017, Bern, September 2014.
  17. Selected aspects of convergent security: biometric human identification and cyber security , Seminar at AGH Cracow, Cracow, April 2014.
  18. Offline security framework , Workshop: Protecting Critical Infrastructures, Rome, January 2011.
  19. Human identification based on knuckle biometrics , Biometrics 2010, IMM and Ministry of Economy, Warsaw, December 2010.
  20. Practical application of biometric identification methods , Invited Talk at PROTECH Congress, Wroclaw, October 2010.
  21. Biometric identification - emerging methods , Seminar at Biometric Labs NASK, WUT, Warsaw, June 2010.
  22. Methods of Biometric Human Identification , Seminar at IPI PAN, Warsaw, May 2010.
  23. Biometric Identification Systems: Challenges and Trends , Invited Talk at Polish BioCybernetics Society, Bydgoszcz, April 2010.
  24. Modelling and protecting interdependencies between critical infrastructures and telecommunication information systems , Safety, Security & Information Technology Seminar, INTERTELECOM 2009.
  25. Perspective Methods of Human Identification , Invited Tutorial at NTA/SPA 2008 Conference in Poznan, September 2008.
  26. Emerging Methods of Biometric Human Identification , Invited Talk at Polish BioCybernetics Society, Bydgoszcz, June 2008.
  27. Biometric Human Identification: Perspective Methods and Applications , seminar at Computer Graphics, Image Processing and Recognition, Warsaw University of Technology, April 2008.
  28. Model Based Image Coding , seminar at Image Processing and Multimedia, Poznan, 2002.

Forthcoming Publications:

Co-author of the paper accepted to Elsevier monograph.
Co-author of the paper accepted to IJEG Journal (Inderscience)