Michal Choras --- Homepage


prof. nadzw. Michal Choras, D.Sc. (hab.), Ph.D. Eng.

I work as the professor in the Institute of Telecommunications and Computer Science at University of Science and Technology (UTP) in Bydgoszcz, Poland.
I am the head of the Department of Teleinformatics Systems.

I obtained the habilitation degree (DSc) in computer science from AGH Cracow in 2014.
From January 2015, I hold the professor position at UTP Bydgoszcz.

Earlier in September 2005, I defended (with distinction) my Ph.D. Thesis.

I'm the author and co-author of over 170 scientific papers .
Moreover, I edited more than 25 project deliverables/reports and contributed to over 40 deliverables/reports.
The list of my publications ishere.

I am the member of University Senate (since 2016) and the member of the Faculty Board (since 2014). I participate in several Comissions and I lead the Comission for International Cooperation.

Security and IT Consulting

I work as consultant and project manager in the area of security, cyber security. homeland security, telecommunications, IT systems and informatics.

Moreover, I consult IT systems and networks security problems as well as safety (military, crisis management, homeland security, CT, the police operational procedures) aspects. I am aware of security procedures and have several clearences (incl. national, EU, NATO). In 2011 I received PRINCE2 Project Management Certificate.

I am also the expert for international and national organizations such as ENISA (European Network and Information Security Agency) or National Security Bureau (BBN).

I was the Chairman of Cybersecurity Thematic Area Group (TA7) at IMG-S (Integrated Mission Group Security) (2012-2014). Currently I am the Vice-chairman of TA7, the member of IMG-S SCG (Synthesis and Coordination Group) and I am also involved in activities of IMG-S TA2 on Communications.

Currently, I am a member of the Partnership Board of the European Cyber Security Organisation (ECSO).

Michal Choras - Projects

I have been the Coordinator of the CAMINO project . CAMINO is the Coordination and Support Action titled ā€œComprehensive Approach to cyber roadMap coordINation and develOpmentā€, a European research project in the security domain (Developing a Cyber crime and cyber terrorism research agenda) funded by the European Union 7th Framework Programme.

More information about the project can be found at the following website: www.fp7-camino.eu .

I have been involved as in several EU and national research projects, for example:

  • FP7 SEC CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network): www.ciprnet.eu ,
  • H2020 Q-Rapids,
  • DG HOME CIPHER (Integrated Cybersecurity Framework and Roadmap): www.cipherproject.eu ,
  • FP7 INTERSECTION (INfrastructure for heTErogeneous, Resilient, SEcure, Complex, Tightly Inter-Operating Networks)(ICT),
  • FP7 INSPIRE (INcreasing Security and Protection through Infrastructure Resilience)(ICT-SEC),
  • FP7 INSPIRE-INCO (ICT),
  • EDA ATHENA (Asymmetric Threat Environment Analysis),
  • JLS CIPS INMOTOS (INterdependency MOdelling TOols and Simulation based risk assessment of ICT critical infrastructures contingency plans),
  • MNiSW SOPAS (System for Protection from Cyber Attacks),
  • Human Identification on the basis of Emerging Modalities (BSM),
  • FP7 SEC TACTICS,
  • FP7 SEC iSAR+ (Online and Mobile Communications for Crisis Response and Search and Rescue),
  • FP7 SEC SOTERIA,
  • PBS SECOR.

    I have also worked on many research and commercial project proposals including several winning ones.

    I also took part in many projects demonstrations and experimentations. I took part in NATO CWIX (Coalition Warrior Interoperability Excercise).

    In 2012 I finished post-graduate studies on "Research Project Management and Research Reults Commercialization" at Faculty of Management and Economy, Gdansk University of Technology.

    Guest Editor/Special Sessions:

    1. CONFERENCE CHAIR (ONGOING): Image Processing and Communications IP&C 2017. Bydgoszcz. Poland.
    2. WORKSHOP CO-CHAIR: International Workshop on Challenges and Solutions for Critical Infrastructure Protection - CSCIP 2017. In conjunction with 10th IEEE International Conference on Cyber, Physical and Social Computing, IEEE CPSCom-2017, 21-23 June, 2017, Exeter, UK.
    3. ONGOING: Special Issue on: Advanced and Emerging Methods of Computer Science Applied to Cyber Security, Applied Mathematics and Compter Science (AMCS)
      http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=58940©ownerid=93578
    4. Special Issue on: 5G Communications - Energy Efficiency, Mobile Information systems (2016) - PUBLISHED
      http://www.hindawi.com/journals/misy/si/478121
    5. Special Issue on: Emerging Biometric Modalities – International Journal of Biometrics, Inderscience (2015) - PUBLISHED
      http://www.inderscience.com/info/inarticletoc.php?jcode=ijbm&year=2016&vol=8&issue=1
    6. RAI-BHI - Recent Advances In Biometric Human Identification at IP&C Conference, 2015 (with Dr J.Bobulski). - PUBLISHED. Proceedings published with AISC Springer.
    7. Special Issue on: Critical Infrastructure Protection Technologies: Advances, Trends, and Open Issues (CIPT), International Journal of Distributed Sensor Networks, Hindawi (2015).
      http://www.hindawi.com/journals/ijdsn/si/912803/cfp/ - SI CANCELLED
    8. Special Issue on: Real-time Big Data Analytics for Critical Infrastructure Protection - International Journal of Critical Computer-Based Systems, Inderscience (2015) - SI CANCELLED.

    Michal Choras - Research

    My research is focused on pattern recognition in security domain, in particular on: signal analysis, image processing, passive biometrics and cybersecurity. I'm especially interested and involved in research concerning passive systems of human identification based on image analysis and emerging modalities.

    My developments include geometrical feature extraction algorithms and methods for ear biometrics, as well as feature extraction and representation methods for lips recognition , face recognition, stereo & robotics vision and CBIR systems.
    My recent research interests are biometrics based on keystroke dynamics and multimodal hand/palm biometrics . Recently, I have worked on lips recognition and knuckle texture features for biometric human identification.

    I also work on multi-dimensional aspects of security and safety . I work on cybersecurity, attacks detection and anomaly detection methods for IDS systems, network traffic pattern analysis, military network enabled capabilities, semantic network management (ontologies) and critical infrastructure protection (CIP).

    I am also involved in research regarding homeland security, crisis management, social networks and CT.

    Michal Choras - Awards, Reviews and Scientific Involvement

    I was honoured for outstanding research by the Group Award of the 1st Degree by the Rector of UTP for publications in : 2002, 2003, 2004, 2010, 2011, 2012, 2013, 2014, 2016.
    I was honoured for outstanding research by the Individual Award of the 1st Degree by the Rector of UTP in: 2005, 2006, 2007, 2008, 2009, 2010 and 2015.

    In 2011 I received the scholarship for young researchers from Ministry of Science.
    I was honoured by the UTP Rector Award for Young Scientists in 2009, 2010, 2012 and 2014.
    I was honoured by the UTP Rector Award for Scientists in 2016.
    I was honoured by the President of Bydgoszcz City Award for the young scientists in 2010.

    My biography has been included into Who's Who in the World

    PhD Thesis reviews:

    • Ahmadi M., PhD Thesis, Modeling Neglected Functions of Android Applications to Effectively Detect Malware, DIEE, University of Cagliari.
    • Panasiuk P., PhD Thesis, Warsaw University of Technology, 2017.
    • Pazio M., PhD Thesis, Technical University Gdansk (PG), 2016.
    • Jankowski D., PhD Thesis, Technical University Wroclaw (PWr). 2016.

    Books reviews:

  • Czerniak J.M., Apiecionek L., Zych G., Programming Fundamentals (in Polish: Podstawy Programowania), UKW Press, 2016.

    I'm the reviewer for :

    • COST Actions (EC), projects and proposals, and
    • Slovak Academy of Science,
    • European Science Foundation (ESF).

    I'm in the Program Committee of:

    • International Conference on Intelligent Computing - ICIC 2008, Shanghai, China
    • IEEE Second International Conference on Biometrics: Theory, Applications and Systems - BTAS 2008, Washington DC
    • International Conference on Intelligent Computing - ICIC 2009 , Ulsan, Korea
    • Image Processing and Communications - IP&C 2009, Bydgoszcz, Poland
    • IEEE Third International Conference on Biometrics: Theory, Applications and Systems - BTAS 2009 , Washington DC
    • International Conference on Life System Modeling and Simulation - LSMS 2010, Wuxi, China
    • International Conference on Intelligent Computing - ICIC 2010 , Changsha, China
    • International Conference on Intelligent Computing for Sustainable Energy and Environment - ICSEE 2010, Wuxi, China
    • Image Processing and Communications - IP&C 2010, Bydgoszcz, Poland
    • First International Workshop on Emerging Techniques and Challenges for Hand-based Biometrics - ETCHB 2010 at ICPR 2010 - Stanbul
    • IEEE International Conference on Biometrics: Theory, Applications and Systems - BTAS 2010, Washington DC
    • International Conference on Intelligent Computing - ICIC 2011 , Zhengzhou, China
    • Image Processing and Communications - IP&C 2011, Bydgoszcz, Poland
    • International Workshop on Survivable Large-Scale Information Systems - SLSIS 2011, Paphos, Cyprus
    • International Conference on Hand-based Biometrics - ICHB 2011, HongKong
    • International Joint Conference on Biometrics - IJCB 2011, Washington DC
    • Image Processing and Communications - IP&C 2012, Bydgoszcz, Poland
    • International Conference on Intelligent Computing - ICIC 2012, Huangshan, China
    • Computational Intelligence in Security for Information Systems - CISIS 2012, Ostrava, Czech Republic
    • Theory and Practice in Modern Computing - TPMC 2012, Lisbon, Portugal
    • Computer Recognition Systems - CORES 2013, Milkow, Poland
    • International Conference on Intelligent Computing - ICIC 2013, Nanning, China
    • Computational Intelligence in Security for Information Systems - CISIS 2013, Salamanca, Spain
    • International Multi-Conference on Computing in the Global Information Technology - ICCGI 2013, Nice, France
    • International Conference on Intelligent Computing - ICIC 2014, Taiyuan, China
    • International Conference on Computer Vision Theory and Applications - VISAPP 2014, Lisbon, Portugal
    • International Workshop on Real-time Big Data Analytics for Critical Infrastructure Protection - BIG4CIP 2014, Newcastle, UK
    • International Multi-Conference on Computing in the Global Information Technology - ICCGI 2014, Seville, Spain
    • IEEE Joint International Information Technology and Artificial Intelligence Conference - ITAIC 2014,
    • Techniques and Applications for Mobile Communications & Commerce / FEDCIS - TAMoCO at FEDCIS - Warsaw, 2014
    • Computational Intelligence in Security for Information Systems - CISIS, Bilbao 2014
    • IEEE International Symposium on Biometrics & Security Technologies - ISBAST, Kuala Lampur 2014
    • International Conference on Computer Vision Theory and Applications - VISAPP, Berlin 2015
    • Image Processing and Commmunications - IP&C, Bydgoszcz 2015
    • 4th International Conference on Theory and Practice in Modern Computing, TPMC @ MCCSIS 2015 - Las Palmas de Gran Canaria, Spain, 2015
    • Machine Learning in Biometrics and Bioinformatics with Applications, MLBBA 2015 @ ACIIDS 2015 - Bali, Indonesia 2015
    • International Conference on Computational Intelligence in Security for Information Systems, CISIS 2015 - Burgos, Spain, 2015
    • 2nd Workshop on Cyber Security and Resilience of Large-Scale Systems, WSRL 2015 - Guimares, Portugal, 2015
    • Reliable Biometrics, BIORELIABILITY 2015 - Gdynia, Poland, 2015 (workshop @ CYBCONF 2015)
    • International Conference on Critical Information Infrastructures Security, CRITIS 2015 - Berlin, Germany, 2015
    • International Workshop on Cyber Crime, IWCC 2015 @ ARES 2015 - Toulouse, France, 2015
    • International Multi-Conference on Computing in the Global Information Technology - St Julians, Malta, 2015
    • Workshop on Bio-inspired Cyber Security & Networking, BCSN 2015 - Ghent, Belgium, 2015
    • European Intelligence and Security Informatics Conference, EISIC 2015 - Manchester, UK, 2015
    • International Conference on Computer Vision Theory and Applications - VISAPP, Rome 2016
    • International Conference on Intelligent Computing - ICIC 2016, Lanzhou, China, 2016
    • International Workshop on Cyber Crime, IWCC 2016 @ ARES 2016 - Salzburg, Austria, 2016
    • International Multi-Conference on Computing in the Global Information Technology - ICCGI 2016, Barcelona, Spain, 2016
    • International Conference on Information Science and Applications - ICISA 2016, HCMC (Saigon), Vietnam, 2016
    • Bio-inspired Security, Trust, Assurance and Resilience - BioSTAR 2016, San Jose, CA, USA, 2016
    • International Conference on Embedded and Ubiquitous Computing - EUC 2016, Paris, France, 2016
    • International Workshop on Traffic Measurements for Cybersecurity- WTMC 2016 @ AsiaCCS, Xi'an. China, 2016
    • International Conference on Critical Information Infrastructures Security, CRITIS 2016 - Paris, France, 2016
    • 4th International Symposium for ICS & SCADA Cyber Security Research - ICS-CSR, Belfast, UK, 2016
    • 3rd European Network Intelligence Conference - ENIC 2016, Wroclaw, Poland, 2016
    • International Conference on Computational Science - ICCS 2016, San Diego, CA, USA, 2016
    • International Conference on Computational Intelligence in Security for Information Systems, CISIS 2016 - San Sebastian, Spain, 2016
    • ICT Crime 2017 - TAPT, Szczytno, Poland
    • Computer Recognition Systems, CORES 2017 - Polanica, Poland, 2017
    • International Conference on Advanced Technologies Enhancing Education, ICAT2E 2017- Qingdao, China, 2017
    • International Workshop on Traffic Measurements for Cybersecurity, WTMC 2017 - San Jose, California, USA, 2017
    • International Conference on Network and System Security, NSS 2017 - Helsinki, Finland, 2017
    • International Workshop on Cyber Crime, IWCC 2017 @ ARES 2017 - Reggio Calabria, Italy, 2017
    • ICT Crime - TAPT 2017, Higher School of the Police, Szczytno, Poland, 2017
    • International Conference on Computational Intelligence in Security for Information Systems, CISIS 2017 - Leon, Spain, 2017
    • The 1st IEEE International COMPSAC Workshop on Smart IoT Sensors and Social Systems for eHealth and Well-Being Applications, SIS-SS 2017 - Torino. Italy, 2017
    • Bio-inspired Security, Trust, Assurance and Resilience, BioSTAR 2017 - San Jose, California, USA, 2017
    • Conference on IT Convergence and Security, ICATSE 2017 - Seoul, Korea, 2017

    I'm a reviewer for top international journals:

    • IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI),
    • IEEE Transactions on Image Processing,
    • Pattern Analysis and Applications (PAA),
    • IEEE Transactions on Knowledge and Data Engineering (TKDE),
    • IEEE Transactions on Information, Forensics and Security
    • IEEE Security & Privacy,
    • Sultan Qaboos University Journal for Science (SQUJS),
    • Electrotechnical Review (Przeglad Elektrotechniczny),
    • Journal of Systems and Software (Elsevier),
    • Image and Vision Computing (Elsevier),
    • Journal of Network Security (Springer),
    • Applied Mathematics and Computer Science (AMCS),
    • Journal Artificial Intelligence and Soft Computing Research (JAISCR),
    • Pattern Recognition (Elsevier),
    • Pattern Recognition Letters (Elsevier),
    • Knowledge and Information Systems (Springer),
    • Signal Processing (Elsevier),
    • The Computer Journal (IEEE),
    • Journal of Network and Systems Management (Springer),
    • International Journal of Biometrics (Inderscience),
    • IEEE Signal Processing Letters;
    • Entropy (MDPI);
    • Cybernetics and Systems (Taylor Francis);
    • Data and Knowledge Engineering Journal (Elsevier);
    • Electronic Commerce Research Journal (Springer);
    • EURASIP Journal on Information Security;
    • IET Biometrics;
    • Applied Mathematics and Computational Mechanics (AMCM);
    • Information Sciences (Elsevier);
    • IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews;
    • Logic Journal of the IGPL;
    • Journal of Visual Communication and Image Representation (Elsevier);
    • Information Security Journal: A Global Perspective;
    • Computers & Security (COSE);
    • Machine Vision and Applications (MVA);
    • Future Generation Computer Systems (FGCS);
    • IEEE Multimedia;
    • Engineering & Technology Reference;
    • Journal of Universal Computer Science;
    • Journal of Cyber Security and Mobility,
    • IET Cyber-Physical Systems: Theory and Applications,
    • Journal of Algorithms and Computational Technology.

    I have been the reviewer for international conferences:

    • ICAISC 2006 (LNAI 4029),
    • ICANNGA 2007 (LNCS 4431, LNCS 4432),
    • ICIC 2008 (LNCS),
    • BTAS 2008 (IEEE),
    • SRDS 2008 (IEEE),
    • ACIVS 2008 (LNCS),
    • ICIC 2009 (LNCS),
    • IP&C 2009 (EXIT),
    • BTAS 2009 (IEEE),
    • Mobilight 2010 (LNICST-Springer),
    • IT 2010 (IEEE),
    • ICIC 2010 (LNCS),
    • ETCHB 2010 at ICPR 2010 (IEEE),
    • IP&C 2010 (AICS),
    • BTAS 2010 (IEEE),
    • ICIC 2011 (LNCS),
    • IP&C 2011 (AISC),
    • SLSIS 2011 (IEEE),
    • IJCB 2011 (IEEE),
    • ICHB 2011 (IEEE),
    • ICIC 2012 (LNCS),
    • CSNDSP 2012 (IEEE),
    • ICAISC 2012 (LNAI),
    • IP&C 2012 (AISC),
    • CISIS 2012 (AISC),
    • CORES 2013 (AISC),
    • ICAISC 2013 (LNCS),
    • ICIC 2014 (LNCS),
    • VISAPP 2014 (INSTICC),
    • CISIS 2014 (AISC),
    • VISAPP 2014 (INSTICC),
    • ICAISC 2014 (LNAI),
    • BIG4CIP 2014 (ACM),
    • ICCGI 2014 (IARIA),
    • EUSIPCO 2014 (IEEE),
    • ICT Innovations 2014 (AISC),
    • ESREL 2014,
    • CSMEE 2014,
    • VISAPP 2015,
    • ICAIS 2015 (LNAI),
    • ACIIDS 2015 (LNAI),
    • CISIS 2015 (AISC),
    • BIORELIABILITY 2015 (IEEE),
    • IWCC 2015 @ ARES 2015 (IEEE),
    • IP&C 2015 (Springer),
    • ICCGI 2015 (IARIA),
    • EISIC 2015 (IEEE),
    • CRITIS 2015 (LNCS),
    • ICISA 2016,
    • WCS@ICC 2016 (IEEE),
    • ICCS 2016,
    • Biostar 2016 (IEEE),
    • IP&C 2016 (Springer),
    • IWCC 2016,
    • ENIC 2016,
    • ICS-CSR 2016,
    • CISIS 2016 (Springer),
    • CRITIS 2016 (Springer),
    • VISAPP 2017,
    • CORES 2017,
    • BioStar 2017,
    • WTMC 2017,
    • ICIC 2017,
    • CISIS-ICUETE 2017,
    • NSS 2017.

    I have reviewed chapters for the following following books:

    • Behavioral Biometrics for Human Identification: Intelligent Applications, Edited By: Liang Wang, Xin Geng. Medical Information Science Reference, 2009.
    • Handbook of Biometrics, Jain, Anil K.; Flynn, Patrick; Ross, Arun A., Springer, 2008.
    • Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, CRC Press 2012.

    Skills and Interests

    • National/Homeland Security & Safety
    • Biometric Systems, Human Identification Methods
    • Cybersecurity
    • Consulting
    • Project Management
    • Time Management
    • Security, Authentication, Surveillance and Monitoring Systems
    • Critical Infrastructures Protection, Security and Resiliency
    • Privacy by Design (PbD)
    • Crisis Management
    • Applied Ontologies

    My interests are: sports (I played basketball and tennis), tourism, wine and music of all kind.

    Languages

    • English - very good, certificates: FCE and CAE (Certificate of Advanced English)
    • German - good (Abitur)
    • Spanish - good
    • Italian - basic
    • Russian - basic

      Contact

      Campus Fordon, Building 2.4, Room 420

      E-mail: chorasm@utp.edu.pl


      Page launched: December 2008.
      Author: Michal Choras
      Last modification: June 2017.
      Page counter from: May 2012.

  • Page counter from: May 2012. free counters
    Free counters