Ireneusz J. Jozwiak

Orcid: 0000-0002-2160-7077

According to our database1, Ireneusz J. Jozwiak authored at least 24 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Penetration Testing and Security Assessment Methodology for Biomedical Devices.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2024

2023
Analysis of segregated witness implementation for increasing efficiency and security of the Bitcoin cryptocurrency.
J. Inf. Telecommun., January, 2023

Improvement of the Process of Diagnosing Patient's Condition via Computer Tomography Lung Scans Using Neural Networks.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2023

2022
Detecting Attacks on Computer Networks Using Artificial Intelligence Algorithms.
Proceedings of the 14th International Conference on Management of Digital EcoSystems, 2022

Computer Diagnosis of Color Vision Deficiencies Using a Mobile Device.
Proceedings of the Intelligent and Safe Computer Systems in Control and Diagnostics, 2022

Multiplatform Comparative Analysis of Intelligent Robots for Communication Efficiency in Smart Dialogs.
Proceedings of the Advanced Information Networking and Applications, 2022

An Empirical Comparison of Steganography and Steganalysis Solutions.
Proceedings of the Recent Challenges in Intelligent Information and Database Systems, 2022

2020
Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain.
Data-Centric Business and Applications, 2020

Android Hook Detection Based on Machine Learning and Dynamic Analysis.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Correspondent Sensitive Encryption Standard (CSES) Algorithm in Insecure Communication Channel.
Proceedings of the Engineering in Dependability of Computer Systems and Networks, 2019

2017
Content Delivery Network and External Resources Detection for Selected Hosts.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology - ISAT 2017, 2017

Security of Mobile Banking Applications.
Proceedings of the Advanced Solutions in Diagnostics and Fault Tolerant Control, 2017

2016
Analysis of the Minutia Groups Base of Currents Algorithms 'Pasterns' Database.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology - ISAT 2016, 2016

2015
Security Lock System for Mobile Devices Based on Fingerprint Recognition Algorithm.
Proceedings of the Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology - ISAT 2015, 2015

2013
Methods for Detecting and Analyzing Hidden FAT32 Volumes Created with the Use of Cryptographic Tools.
Proceedings of the New Results in Dependability and Computer Systems, 2013

2012
Fingerprint Recognition Based on Minutes Groups Using Directing Attention Algorithms.
Proceedings of the Artificial Intelligence and Soft Computing, 2012

Data Management for Fingerprint Recognition Algorithm Based on Characteristic Points' Groups.
Proceedings of the New Trends in Databases and Information Systems, 2012

2011
Efficient N-Byte Slack Space Hashing in Retrieving and Identifying Partially Recovered Data.
Proceedings of the ICSOFT 2011, 2011

2010
Composite Fermions in Braid Group Terms.
Open Syst. Inf. Dyn., 2010

Detecting Malwares in Honeynet Using a Multi-agent System.
Proceedings of the Networked Digital Technologies - Second International Conference, 2010

Detecting New and Unknown Malwares Using Honeynet.
Proceedings of the Advances in Multimedia and Network Information System Technologies, 2010

2007
Application of braid groups for information processing.
Proceedings of the 2007 International Conference on Foundations of Computer Science, 2007

A Hardware-Based Software Protection Systems - Analysis of Security Dongles with Time Meters.
Proceedings of the 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), 2007


  Loading...