[HTML][HTML] A survey on neural networks for (cyber-) security and (cyber-) security of neural networks

M Pawlicki, R Kozik, M Choraś - Neurocomputing, 2022 - Elsevier
The goal of this systematic and broad survey is to present and discuss the main challenges
that are posed by the implementation of Artificial Intelligence and Machine Learning in the …

Tokenfication-The potential of non-fungible tokens (NFT) for game development

A Fowler, J Pirker - Extended abstracts of the 2021 annual symposium …, 2021 - dl.acm.org
In recent years, there has been an increase in the interest in non-fungible tokens (NFT) to
purchase digital art and has shaped a new form of art collecting. The art community has a …

Has the pandemic made us more digitally literate? Innovative association rule mining study of the relationships between shifts in digital skills and cybersecurity …

A Pawlicka, R Tomaszewska, E Krause… - Journal of Ambient …, 2023 - Springer
Digital literacy has been included in the set of the eight key competences, which are
necessary to enjoy life to the full in the twenty-first century. According to the previous studies …

The stray sheep of cyberspace aka the actors who claim they break the law for the greater good

A Pawlicka, M Choraś, M Pawlicki - Personal and Ubiquitous Computing, 2021 - Springer
The development of cyberspace has brought about innumerable advantages for the
mankind. However, it also came with several serious drawbacks; as cyberspace evolves, so …

Human-driven and human-centred cybersecurity: policy-making implications

A Pawlicka, M Pawlicki, R Kozik… - … : People, Process and …, 2022 - emerald.com
Purpose The purpose of this paper is to challenge the prevailing, stereotypical approach of
the human aspect of cybersecurity, ie treating people as weakness or threat. Instead, several …

Insecure software on a fragmenting Internet

I Ryan, U Roedig, KJ Stol - 2022 Cyber Research Conference …, 2022 - ieeexplore.ieee.org
Global geopolitical forces are pushing much of the world towards Internet nationalism,
threatening to turn the Internet into a 'Splinternet.'In this paper we argue that the crisis in …

How to secure the IoT-based surveillance systems in an elegant way

A Pawlicka, D Puchalski, M Pawlicki… - … Conference on Cyber …, 2023 - ieeexplore.ieee.org
With the emergence and development of the Internet of Things, every interconnected device,
from tiny smart home appliances to cars, critical infrastructures and mass surveillance …

Personally identifiable information (pii) detection in the unstructured large text corpus using natural language processing and unsupervised learning technique

P Kulkarni, NK Cauvery - International Journal of Advanced …, 2021 - search.proquest.com
Abstract Personally Identifiable Information (PII) has gained much attention with the rapid
development of technologies and the exploitation of information relating to an individual …

Improving siamese neural networks with border extraction sampling for the use in real-time network intrusion detection

M Pawlicki, R Kozik, M Choraś - 2023 International Joint …, 2023 - ieeexplore.ieee.org
Society reaps the benefits of networking technologies, with the number of connected citizens
and devices constantly on the rise. The convenience and efficiency brought by connected …

Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics

D Puchalski, M Pawlicki, R Kozik, R Renk… - Proceedings of the 19th …, 2024 - dl.acm.org
In recent years, the increasing sophistication and proliferation of cyberthreats have
underscored the necessity for robust network security measures, as well as a …