Marek Pawlicki

Orcid: 0000-0001-5881-6406

According to our database1, Marek Pawlicki authored at least 101 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The survey on the dual nature of xAI challenges in intrusion detection and their potential for AI innovation.
Artif. Intell. Rev., December, 2024

A Meta-Analysis of State-of-the-Art Automated Fake News Detection Methods.
IEEE Trans. Comput. Soc. Syst., August, 2024

When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024

AI vs linguistic-based human judgement: Bridging the gap in pursuit of truth for fake news detection.
Inf. Sci., 2024

Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination.
Neurocomputing, 2024

Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity.
Neurocomputing, 2024

Towards explainable fake news detection and automated content credibility assessment: Polish internet and digital media use-case.
Neurocomputing, 2024

ARIA, HaRIA, and GeRIA: Novel Metrics for Pre-Model Interpretability.
IEEE Access, 2024

Explainability versus Security: The Unintended Consequences of xAI in Cybersecurity.
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024

Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems.
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024

From Detection Through Display to Understanding: Bridging AI and UI in Disinformation and Fake News Analysis.
Proceedings of the Advances in Computational Collective Intelligence, 2024

An Innovative Approach to Real-Time Concept Drift Detection in Network Security.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024

Towards Hybrid NIDS: Combining Rule-Based SIEM with AI-Based Intrusion Detectors.
Proceedings of the Second International Conference on Advances in Computing Research, 2024

A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules.
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024

ULTIMATE Project Toolkit for Robotic AI-Based Data Analysis and Visualization.
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024

Involving Society to Protect Society from Fake News and Disinformation: Crowdsourced Datasets and Text Reliability Assessment.
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024

Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Introducing a Multi-Perspective xAI Tool for Better Model Explainability.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024

2023
Deep Learning for Combating Misinformation in Multicategorical Text Contents.
Sensors, December, 2023

The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT.
Neurocomputing, September, 2023

First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions.
Pers. Ubiquitous Comput., April, 2023

The Application of Deep Learning Imputation and Other Advanced Methods for Handling Missing Values in Network Intrusion Detection.
Vietnam. J. Comput. Sci., February, 2023

Has the pandemic made us more digitally literate?: Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic.
J. Ambient Intell. Humaniz. Comput., 2023

What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics.
IEEE Access, 2023

How Explainable Is Explainability? Towards Better Metrics for Explainable AI.
Proceedings of the Research and Innovation Forum 2023 - Navigating Shocks and Crises in Uncertain Times, 2023

The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023

Strengths And Weaknesses of Deep, Convolutional and Recurrent Neural Networks in Network Intrusion Detection Deployments.
Proceedings of the Information Systems Development: Organizational Aspects and Societal Trends (ISD2023 Proceedings), Lisbon, Portugal, 30 August, 2023

Improving Siamese Neural Networks with Border Extraction Sampling for the use in Real-Time Network Intrusion Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

Explainable Artificial Intelligence 101: Techniques, Applications and Challenges.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023

Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach.
Proceedings of the Applied Intelligence - First International Conference, 2023

The Rise of AI-Powered Writing: How ChatGPT is Revolutionizing Scientific Communication for Better or for Worse.
Proceedings of the Applied Intelligence - First International Conference, 2023

Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023

Towards Quality Measures for xAI algorithms: Explanation Stability.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Model Stitching Algorithm for Fake News Detection Problem.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

How to secure the IoT-based surveillance systems in an ELEGANT way.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems.
Proceedings of the Progress on Pattern Classification, Image Processing and Communications, 2023

SWAROG Project Approach to Fake News Detection Problem.
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023

How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes.
Proceedings of the Computer Information Systems and Industrial Management, 2023

How to Navigate the Uncharted Waters of Cyberwar.
Proceedings of the 29th Americas Conference on Information Systems, 2023

Modern NetFlow network dataset with labeled attacks and detection methods.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Sensors and Pattern Recognition Methods for Security and Industrial Applications.
Sensors, 2022

Hunting cyberattacks: experience from the real backbone network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

A survey on neural networks for (cyber-) security and (cyber-) security of neural networks.
Neurocomputing, 2022

Fake news detection platform - conceptual architecture and prototype.
Log. J. IGPL, 2022

Unsupervised network traffic anomaly detection with deep autoencoders.
Log. J. IGPL, 2022

Fake News and Threats to IoT - The Crucial Aspects of Cyberspace in the Times of Cyberwar.
Proceedings of the Research and Innovation Forum 2022: Rupture, 2022

Parameters Transfer Framework for Multi-domain Fake News Detection.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

The IoT Threat Landscape vs. Machine Learning, a.k.a. Who Attacks IoT, Why Do They Do It, and How to Prevent It?
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022

Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation.
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022

Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment.
Proceedings of the Intelligent Computing Methodologies - 18th International Conference, 2022

Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques.
Proceedings of the Artificial Intelligence and Soft Computing, 2022

Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022

Fast Hybrid Oracle-Explainer Approach to Explainability Using Optimized Search of Comprehensible Decision Trees.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

The cybersecurity-related ethical issues of cloud technology and how to avoid them.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

A novel, refined dataset for real-time Network Intrusion Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
A Systematic Review of Recommender Systems and Their Applications in Cybersecurity.
Sensors, 2021

The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset.
Sensors, 2021

The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good.
Pers. Ubiquitous Comput., 2021

A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment.
Pattern Anal. Appl., 2021

Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Intrusion detection approach based on optimised artificial neural network.
Neurocomputing, 2021

Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks.
Entropy, 2021

How to Effectively Collect and Process Network Data for Intrusion Detection?
Entropy, 2021

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection.
IEEE Access, 2021

Towards AI-Based Reaction and Mitigation for e-Commerce - the ENSURESEC Engine.
Proceedings of the Intelligent Computing Theories and Application, 2021

The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data.
Proceedings of the Advances in Computational Collective Intelligence, 2021

The Methods and Approaches of Explainable Artificial Intelligence.
Proceedings of the Computational Science - ICCS 2021, 2021

Cyber-Attack Detection from IoT Benchmark Considered as Data Streams.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Extending Machine Learning-Based Intrusion Detection with the Imputation Method.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

Missing and Incomplete Data Handling in Cybersecurity Applications.
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021

Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Common Representational Model and Ontologies for Effective Law Enforcement Solutions.
Vietnam. J. Comput. Sci., 2020

Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance.
IEEE Technol. Soc. Mag., 2020

A Deep Learning Ensemble for Network Anomaly and Cyber-Attack Detection.
Sensors, 2020

Detection of Cyberattacks Traces in IoT Data.
J. Univers. Comput. Sci., 2020

Defending network intrusion detection systems against adversarial evasion attacks.
Future Gener. Comput. Syst., 2020

Achieving Explainability of Intrusion Detection System by Hybrid Oracle-Explainer Approach.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

On the Impact of Network Data Balancing in Cybersecurity Applications.
Proceedings of the Computational Science - ICCS 2020, 2020

Machine Learning - The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness?
Proceedings of the Computational Science - ICCS 2020, 2020

Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Distributed Architecture for Fake News Detection.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

Real-time stream processing tool for detecting suspicious network patterns using machine learning.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.
Complex., 2019

Gated Recurrent Units for Intrusion Detection.
Proceedings of the Image Processing and Communications, 2019

The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019

Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection.
Proceedings of the Intelligent Computing Theories and Application, 2019

The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case.
Proceedings of the Computational Collective Intelligence - 11th International Conference, 2019

Recognizing Faults in Software Related Difficult Data.
Proceedings of the Computational Science - ICCS 2019, 2019

Fault-Prone Software Classes Recognition via Artificial Neural Network with Granular Dataset Balancing.
Proceedings of the Progress in Computer Recognition Systems, 2019

Software Development Metrics Prediction Using Time Series Methods.
Proceedings of the Computer Information Systems and Industrial Management, 2019

SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection.
Secur. Commun. Networks, 2018

Sparse Autoencoders for Unsupervised Netflow Data Classification.
Proceedings of the Image Processing and Communications Challenges 10, 2018

Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018


  Loading...