Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Dan Graur
Patrícia Pires
Barbara Aquilani
Bartosz Alchimowicz
Clemens Sauerwein
Maximilian Dürr
Jhonathan Pinzon
Liangliang Shang
Chen Ma
Home
/
Author
/
MICHAŁ CHORAŚ
Author Info
Open Visualization
Name
Affiliation
Papers
MICHAŁ CHORAŚ
Image Processing Group, Institute of Telecommunications, University of Technology & Life Sciences, S. Kaliskiego 7, 85-791 Bydgoszcz, Poland
37
Collaborators
Citations
PageRank
53
129
18.82
Referers
Referees
References
316
499
236
Search Limit
100
499
Publications (37 rows)
Collaborators (53 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Implementation of the BERT-derived architectures to tackle disinformation challenges.
0
0.34
2022
Strategies To Manage Quality Requirements In Agile Software Development: A Multiple Case Study
0
0.34
2021
Data-driven and tool-supported elicitation of quality requirements in agile companies
1
0.37
2020
Q-Rapids framework for advanced data analysis to improve rapid software development
2
0.45
2019
New solutions for exposing clustered applications deployed in the cloud
1
0.48
2019
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.
0
0.34
2019
SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation
0
0.34
2019
Increasing product owners’ cognition and decision-making capabilities by data analysis approach
0
0.34
2019
Q-Rapids Tool Prototype: Supporting Decision-Makers in Managing Quality in Rapid Software Development.
4
0.74
2018
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures.
7
0.59
2017
5G Communications: Energy Efficiency.
1
0.35
2017
Running Sports Decision Aid Tool Based on Reinforcement Learning Approach.
0
0.34
2017
Recent Advances in Image Pre-processing Methods for Palmprint Biometrics.
0
0.34
2017
Evaluation of the Pre-processing Methods in Image-Based Palmprint Biometrics.
1
0.39
2017
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection.
1
0.42
2017
Packets tokenization methods for web layer cyber security.
3
0.50
2017
Netflow-Based Malware Detection And Data Visualisation System
0
0.34
2017
Proposal and comparison of network anomaly detection based on long-memory statistical models.
1
0.36
2016
The HTTP Content Segmentation Method Combined with AdaBoost Classifier for Web-Layer Anomaly Detection System.
0
0.34
2016
Considering Service Name Indication for Multi-tenancy Routing in Cloud Environments.
0
0.34
2016
Extreme Learning Machines for Web Layer Anomaly Detection.
0
0.34
2016
COMPREHENSIVE APPROACH TO INFORMATION SHARING FOR INCREASED NETWORK SECURITY AND SURVIVABILITY
2
0.37
2013
Statistical and signal-based network traffic recognition for anomaly detection
11
0.85
2012
Contactless palmprint and knuckle biometrics for mobile devices
23
1.21
2012
The human role in tools for improving robustness and resilience of critical infrastructures
2
0.39
2012
The lip as a biometric
16
0.92
2010
Ontology applied in decision support system for critical infrastructures protection
5
1.09
2010
Image recognition techniques applied to automated and objective QoE assessment of mobile WWW services
0
0.34
2010
Ontology-based decision support for security management in heterogeneous networks
7
1.09
2009
Lips Recognition for Biometrics
0
0.34
2009
Decision aid tool and ontology-based reasoning for critical infrastructure vulnerabilities and threats analysis
4
0.51
2009
Human Lips as Emerging Biometrics Modality
5
0.57
2008
Multimodal Hand-Palm Biometrics
2
0.39
2007
Integrated color, texture and shape information for content-based image retrieval
13
0.63
2007
Keystroke Dynamics for Biometrics Identification
5
0.45
2007
Further developments in geometrical algorithms for ear biometrics
10
0.86
2006
Symmetry-Based salient points detection in face images
2
0.43
2006
1