Marek Pawlicki
Orcid: 0000-0001-5881-6406
According to our database1,
Marek Pawlicki
authored at least 101 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
The survey on the dual nature of xAI challenges in intrusion detection and their potential for AI innovation.
Artif. Intell. Rev., December, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur., February, 2024
AI vs linguistic-based human judgement: Bridging the gap in pursuit of truth for fake news detection.
Inf. Sci., 2024
Evaluating the necessity of the multiple metrics for assessing explainable AI: A critical examination.
Neurocomputing, 2024
Advanced insights through systematic analysis: Mapping future research directions and opportunities for xAI in deep learning and artificial intelligence used in cybersecurity.
Neurocomputing, 2024
Towards explainable fake news detection and automated content credibility assessment: Polish internet and digital media use-case.
Neurocomputing, 2024
IEEE Access, 2024
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024
Comparative Analysis of AI-Based Methods for Enhancing Cybersecurity Monitoring Systems.
Proceedings of the Computational Science and Its Applications - ICCSA 2024 Workshops, 2024
From Detection Through Display to Understanding: Bridging AI and UI in Disinformation and Fake News Analysis.
Proceedings of the Advances in Computational Collective Intelligence, 2024
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Second International Conference on Advances in Computing Research, 2024
A Novel Approach to the Use of Explainability to Mine Network Intrusion Detection Rules.
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024
Involving Society to Protect Society from Fake News and Disinformation: Crowdsourced Datasets and Text Reliability Assessment.
Proceedings of the Intelligent Information and Database Systems - 16th Asian Conference, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic Analysis.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Sensors, December, 2023
The survey and meta-analysis of the attacks, transgressions, countermeasures and security aspects common to the Cloud, Edge and IoT.
Neurocomputing, September, 2023
First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions.
Pers. Ubiquitous Comput., April, 2023
The Application of Deep Learning Imputation and Other Advanced Methods for Handling Missing Values in Network Intrusion Detection.
Vietnam. J. Comput. Sci., February, 2023
Has the pandemic made us more digitally literate?: Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity awareness occurring whilst working remotely during the COVID-19 pandemic.
J. Ambient Intell. Humaniz. Comput., 2023
What Will the Future of Cybersecurity Bring Us, and Will It Be Ethical? The Hunt for the Black Swans of Cybersecurity Ethics.
IEEE Access, 2023
Proceedings of the Research and Innovation Forum 2023 - Navigating Shocks and Crises in Uncertain Times, 2023
The Impact of Data Scaling Approaches on Deep Learning, Random Forest and Nearest Neighbour-Based Network Intrusion Detection Systems for DoS Detection in IoT Networks.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Strengths And Weaknesses of Deep, Convolutional and Recurrent Neural Networks in Network Intrusion Detection Deployments.
Proceedings of the Information Systems Development: Organizational Aspects and Societal Trends (ISD2023 Proceedings), Lisbon, Portugal, 30 August, 2023
Improving Siamese Neural Networks with Border Extraction Sampling for the use in Real-Time Network Intrusion Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023
The Need for Practical Legal and Ethical Guidelines for Explainable AI-based Network Intrusion Detection Systems.
Proceedings of the IEEE International Conference on Data Mining, 2023
Effective Rules for a Rule-Based SIEM System in Detecting DoS Attacks: An Association Rule Mining Approach.
Proceedings of the Applied Intelligence - First International Conference, 2023
The Rise of AI-Powered Writing: How ChatGPT is Revolutionizing Scientific Communication for Better or for Worse.
Proceedings of the Applied Intelligence - First International Conference, 2023
Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-Commerce.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Combating Disinformation with Holistic Architecture, Neuro-symbolic AI and NLU Models.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
Interpreting Intrusions - The Role of Explainability in AI-Based Intrusion Detection Systems.
Proceedings of the Progress on Pattern Classification, Image Processing and Communications, 2023
Proceedings of the International Joint Conference 16th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2023) 14th International Conference on EUropean Transnational Education (ICEUTE 2023), 2023
How to Boost Machine Learning Network Intrusion Detection Performance with Encoding Schemes.
Proceedings of the Computer Information Systems and Industrial Management, 2023
Proceedings of the 29th Americas Conference on Information Systems, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Sensors, 2022
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
A survey on neural networks for (cyber-) security and (cyber-) security of neural networks.
Neurocomputing, 2022
Log. J. IGPL, 2022
Log. J. IGPL, 2022
Fake News and Threats to IoT - The Crucial Aspects of Cyberspace in the Times of Cyberwar.
Proceedings of the Research and Innovation Forum 2022: Rupture, 2022
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022
The IoT Threat Landscape vs. Machine Learning, a.k.a. Who Attacks IoT, Why Do They Do It, and How to Prevent It?
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022
Graph Databases and E-commerce Cybersecurity - a Match Made in Heaven? The Innovative Technology to Enhance Cyberthreat Mitigation.
Proceedings of the Information Systems Development: Artificial Intelligence for Information Systems Development and Operations (ISD2022 Proceedings), Cluj-Napoca, Romania, 31 August, 2022
Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment.
Proceedings of the Intelligent Computing Methodologies - 18th International Conference, 2022
Analysis and Detection of DDoS Backscatter Using NetFlow Data, Hyperband-Optimised Deep Learning and Explainability Techniques.
Proceedings of the Artificial Intelligence and Soft Computing, 2022
Comparison of neural network paradigms for their usefulness in a real-world network intrusion detection deployment and a proposed optimised approach.
Proceedings of the EICC 2022: European Interdisciplinary Cybersecurity Conference, Barcelona, Spain, June 15, 2022
Fast Hybrid Oracle-Explainer Approach to Explainability Using Optimized Search of Comprehensible Decision Trees.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Sensors, 2021
The Proposition and Evaluation of the RoEduNet-SIMARGL2021 Network Intrusion Detection Dataset.
Sensors, 2021
The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good.
Pers. Ubiquitous Comput., 2021
A new method of hybrid time window embedding with transformer-based traffic data classification in IoT-networked environment.
Pattern Anal. Appl., 2021
Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Neurocomputing, 2021
Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks.
Entropy, 2021
Entropy, 2021
IEEE Access, 2021
Proceedings of the Intelligent Computing Theories and Application, 2021
The Proposition of Balanced and Explainable Surrogate Method for Network Intrusion Detection in Streamed Real Difficult Data.
Proceedings of the Advances in Computational Collective Intelligence, 2021
Proceedings of the Computational Science - ICCS 2021, 2021
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021
Using Machine Learning to Detect the Signs of Radicalization and Hate Speech on Twitter.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021
Proceedings of the Intelligent Information and Database Systems - 13th Asian Conference, 2021
Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021
2020
Common Representational Model and Ontologies for Effective Law Enforcement Solutions.
Vietnam. J. Comput. Sci., 2020
IEEE Technol. Soc. Mag., 2020
Sensors, 2020
Future Gener. Comput. Syst., 2020
Achieving Explainability of Intrusion Detection System by Hybrid Oracle-Explainer Approach.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Computational Science - ICCS 2020, 2020
Machine Learning - The Results Are Not the only Thing that Matters! What About Security, Explainability and Fairness?
Proceedings of the Computational Science - ICCS 2020, 2020
Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and Visualisation.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Hybrid Model for Improving the Classification Effectiveness of Network Intrusion Detection.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Real-time stream processing tool for detecting suspicious network patterns using machine learning.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.
Complex., 2019
Proceedings of the Image Processing and Communications, 2019
The Feasibility of Deep Learning Use for Adversarial Model Extraction in the Cybersecurity Domain.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2019, 2019
Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection.
Proceedings of the Intelligent Computing Theories and Application, 2019
The Identification and Creation of Ontologies for the Use in Law Enforcement AI Solutions - MAGNETO Platform Use Case.
Proceedings of the Computational Collective Intelligence - 11th International Conference, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
Fault-Prone Software Classes Recognition via Artificial Neural Network with Granular Dataset Balancing.
Proceedings of the Progress in Computer Recognition Systems, 2019
Proceedings of the Computer Information Systems and Industrial Management, 2019
SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Cost-Sensitive Distributed Machine Learning for NetFlow-Based Botnet Activity Detection.
Secur. Commun. Networks, 2018
Proceedings of the Image Processing and Communications Challenges 10, 2018
Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018