Michal Kedziora
Michal Kedziora
Wroclaw University of Science and Technology
Verified email at pwr.edu.pl - Homepage
Title
Cited by
Cited by
Year
Theoretical and practical aspects of encrypted containers detection-digital forensics approach
I Jozwiak, M Kedziora, A Melinska
Dependable Computer Systems, 75-85, 2011
222011
MALWARE DETECTION USING MACHINE LEARNING ALGORITHMS AND REVERSE ENGINEERING OF ANDROID JAVA CODE
M Kedziora, P Gawin, M Szczepanik, I Jozwiak
International Journal of Network Security & Its Applications (IJNSA) Vol. 11 …, 2019
112019
Context-sensitive text mining with fitness leveling genetic algorithm
M Huk, J Kwiatkowski, D Konieczny, M Kędziora, J Mizera-Pietraszko
2015 IEEE 2nd International Conference on Cybernetics (CYBCONF), 342-347, 2015
82015
Analysis of blockchain selfish mining attacks
M Kędziora, P Kozłowski, M Szczepanik, P Jóźwiak
International Conference on Information Systems Architecture and Technology …, 2019
52019
Analysis of blockchain selfish mining attacks
M Kędziora, P Kozłowski, M Szczepanik, P Jóźwiak
International Conference on Information Systems Architecture and Technology …, 2019
52019
Defeating plausible deniability of VeraCrypt hidden operating systems
M Kedziora, YW Chow, W Susilo
International Conference on Applications and Techniques in Information …, 2017
52017
Service selection method with multiple probabilistic QoS attributes using probabilistic AHP
I Jozwiak, M Kedziora, A Marianski
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY 18 (2), 33-38, 2018
42018
ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
M Kedziora, P Gawin, M Szczepanik, I Jozwiak
42018
Methods for detecting and analyzing hidden FAT32 volumes created with the use of cryptographic tools
I Jóźwiak, M Kędziora, A Melińska
New Results in Dependability and Computer Systems, 237-244, 2013
42013
Improved threat models for the security of encrypted and deniable file systems
M Kedziora, YW Chow, W Susilo
International Conference on Mobile and Wireless Technology, 223-230, 2017
22017
Android methods hooking detection using dalvik code and dynamic reverse engineering by stack trace analysis
M Szczepanik, M Kędziora, I Jóźwiak
International Conference on Dependability and Complex Systems, 633-641, 2020
12020
Anti-Cheat tool for detecting unauthorized user interference in the unity engine using Blockchain
M Kedziora, A Gorka, A Marianski, I Jozwiak
Data-Centric Business and Applications, 191-209, 2020
12020
Correspondent Sensitive Encryption Standard (CSES) Algorithm in Insecure Communication Channel
R Chałupnik, M Kędziora, P Jóźwiak, I Jóźwiak
International Conference on Dependability and Complex Systems, 90-98, 2019
12019
Threat Models for Analyzing Plausible Deniability of Deniable File Systems
M Kedziora, YW Chow, W Susilo
12017
Automated Music Generation Using Recurrent Neural Networks
M Czyz, M Kedziora
International Conference on Dependability and Complex Systems, 22-31, 2021
2021
Analyzing and improving tools for supporting fighting against COVID-19 based on prediction models and contact tracing
M Gruda, M Kedziora
Bulletin of the Polish Academy of Sciences: Technical Sciences, e137414-e137414, 2021
2021
Analysis of Segregated Witness Implementation for Increasing Efficiency and Security of the Bitcoin Cryptocurrency
M Kędziora, D Pieprzka, I Jóźwiak, Y Liu, H Song
International Conference on Computational Collective Intelligence, 640-651, 2020
2020
Secure Decentralized Application Development of Blockchain-based Games
N Trojanowska, M Kedziora, M Hanif, H Song
2020 IEEE 39th International Performance Computing and Communications …, 2020
2020
Security of Blockchain Distributed Ledger Consensus Mechanism in Context of the Sybil Attack
M Kedziora, P Kozlowski, P Jozwiak
International Conference on Industrial, Engineering and Other Applications …, 2020
2020
Android Hook Detection Based on Machine Learning and Dynamic Analysis
M Szczepanik, IJ Jóźwiak, PP Jóźwiak, M Kędziora, J Mizera-Pietraszko
Workshops of the International Conference on Advanced Information Networking …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20