Name
Affiliation
Papers
MICHAŁ CHORAŚ
Image Processing Group, Institute of Telecommunications, University of Technology & Life Sciences, S. Kaliskiego 7, 85-791 Bydgoszcz, Poland
37
Collaborators
Citations 
PageRank 
53
129
18.82
Referers 
Referees 
References 
316
499
236
Search Limit
100499
Title
Citations
PageRank
Year
Implementation of the BERT-derived architectures to tackle disinformation challenges.00.342022
Strategies To Manage Quality Requirements In Agile Software Development: A Multiple Case Study00.342021
Data-driven and tool-supported elicitation of quality requirements in agile companies10.372020
Q-Rapids framework for advanced data analysis to improve rapid software development20.452019
New solutions for exposing clustered applications deployed in the cloud10.482019
Practical Employment of Granular Computing to Complex Application Layer Cyberattack Detection.00.342019
SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation00.342019
Increasing product owners’ cognition and decision-making capabilities by data analysis approach00.342019
Q-Rapids Tool Prototype: Supporting Decision-Makers in Managing Quality in Rapid Software Development.40.742018
Simulation platform for cyber-security and vulnerability analysis of critical infrastructures.70.592017
5G Communications: Energy Efficiency.10.352017
Running Sports Decision Aid Tool Based on Reinforcement Learning Approach.00.342017
Recent Advances in Image Pre-processing Methods for Palmprint Biometrics.00.342017
Evaluation of the Pre-processing Methods in Image-Based Palmprint Biometrics.10.392017
Pattern Extraction Algorithm for NetFlow-Based Botnet Activities Detection.10.422017
Packets tokenization methods for web layer cyber security.30.502017
Netflow-Based Malware Detection And Data Visualisation System00.342017
Proposal and comparison of network anomaly detection based on long-memory statistical models.10.362016
The HTTP Content Segmentation Method Combined with AdaBoost Classifier for Web-Layer Anomaly Detection System.00.342016
Considering Service Name Indication for Multi-tenancy Routing in Cloud Environments.00.342016
Extreme Learning Machines for Web Layer Anomaly Detection.00.342016
COMPREHENSIVE APPROACH TO INFORMATION SHARING FOR INCREASED NETWORK SECURITY AND SURVIVABILITY20.372013
Statistical and signal-based network traffic recognition for anomaly detection110.852012
Contactless palmprint and knuckle biometrics for mobile devices231.212012
The human role in tools for improving robustness and resilience of critical infrastructures20.392012
The lip as a biometric160.922010
Ontology applied in decision support system for critical infrastructures protection51.092010
Image recognition techniques applied to automated and objective QoE assessment of mobile WWW services00.342010
Ontology-based decision support for security management in heterogeneous networks71.092009
Lips Recognition for Biometrics00.342009
Decision aid tool and ontology-based reasoning for critical infrastructure vulnerabilities and threats analysis40.512009
Human Lips as Emerging Biometrics Modality50.572008
Multimodal Hand-Palm Biometrics20.392007
Integrated color, texture and shape information for content-based image retrieval130.632007
Keystroke Dynamics for Biometrics Identification50.452007
Further developments in geometrical algorithms for ear biometrics100.862006
Symmetry-Based salient points detection in face images20.432006