Follow
Michal Kedziora
Michal Kedziora
Wroclaw University of Science and Technology
Verified email at pwr.edu.pl - Homepage
Title
Cited by
Cited by
Year
MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING OF ANDROID JAVA CODE
M Kedziora, P Gawin, M Szczepanik, I Jozwiak
International Journal of Network Security & Its Applications (IJNSA) Vol. 11 …, 2019
282019
Theoretical and practical aspects of encrypted containers detection-digital forensics approach
I Jozwiak, M Kedziora, A Melinska
Dependable Computer Systems, 75-85, 2011
242011
Analysis of blockchain selfish mining attacks
M Kędziora, P Kozłowski, M Szczepanik, P Jóźwiak
Information Systems Architecture and Technology: Proceedings of 40th …, 2020
212020
Context-sensitive text mining with fitness leveling genetic algorithm
M Huk, J Kwiatkowski, D Konieczny, M Kędziora, J Mizera-Pietraszko
2015 IEEE 2nd International Conference on Cybernetics (CYBCONF), 342-347, 2015
122015
Secure decentralized application development of blockchain-based games
N Trojanowska, M Kedziora, M Hanif, H Song
2020 IEEE 39th International Performance Computing and Communications …, 2020
112020
Security of Blockchain Distributed Ledger Consensus Mechanism in Context of the Sybil Attack
M Kedziora, P Kozlowski, P Jozwiak
Trends in Artificial Intelligence Theory and Applications. Artificial …, 2020
112020
Performance and scalability evaluation of a permissioned Blockchain based on the Hyperledger Fabric, Sawtooth and Iroha
A Woznica, M Kedziora
Computer Science and Information Systems 19 (2), 659-678, 2022
102022
Anti-Cheat tool for detecting unauthorized user interference in the unity engine using Blockchain
M Kedziora, A Gorka, A Marianski, I Jozwiak
Data-Centric Business and Applications: Towards Software Development (Volume …, 2020
72020
Defeating plausible deniability of VeraCrypt hidden operating systems
M Kedziora, YW Chow, W Susilo
Applications and Techniques in Information Security: 8th International …, 2017
72017
Analysis of segregated witness implementation for increasing efficiency and security of the Bitcoin cryptocurrency
M Kedziora, D Pieprzka, I Jozwiak, Y Liu, H Song
Journal of Information and Telecommunication 7 (1), 44-55, 2023
62023
Using simplified EEG-based brain computer interface and decision tree classifier for emotions detection
R Chalupnik, K Bialas, Z Majewska, M Kedziora
International Conference on Advanced Information Networking and Applications …, 2022
62022
ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
M Kedziora, P Gawin, M Szczepanik, I Jozwiak
62018
Methods for detecting and analyzing hidden FAT32 volumes created with the use of cryptographic tools
I Jóźwiak, M Kędziora, A Melińska
New Results in Dependability and Computer Systems: Proceedings of the 8th …, 2013
62013
State Management and Software Architecture Approaches in Cross-platform Flutter Applications.
M Szczepanik, M Kedziora
ENASE, 407-414, 2020
52020
Service selection method with multiple probabilistic QoS attributes using probabilistic AHP
I Jozwiak, M Kedziora, A Marianski
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY 18 (2), 33-38, 2018
52018
Analysis of solutions for a blockchain compliance with GDPR
M Godyn, M Kedziora, Y Ren, Y Liu, HH Song
Scientific Reports 12 (1), 15021, 2022
42022
Multifactor authentication system using simplified EEG brain–computer interface
K Białas, M Kedziora, R Chałupnik, HH Song
IEEE Transactions on Human-Machine Systems 52 (5), 867-876, 2022
42022
Security and scalability in private permissionless blockchain: Problems and solutions leading to creating Consent-as-a-Service (CaaS) deployment
H Grodzicka, M Kedziora, L Madeyski
International Conference on Computational Collective Intelligence, 278-289, 2021
42021
Automated music generation using recurrent neural networks
M Czyz, M Kedziora
International Conference on Dependability and Complex Systems, 22-31, 2021
42021
Android methods hooking detection using dalvik code and dynamic reverse engineering by stack trace analysis
M Szczepanik, M Kędziora, I Jóźwiak
International Conference on Dependability and Complex Systems, 633-641, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20