Biblio
Book, Challenges and Reality of the IT-space: Software Engineering and Cybersecurity.
, in: International Conference SECS-2022, October 25-26th, 2022, Proceedings Book
, Institute of Bioorganic Chemistry, Polish Academy of Sciences, Scientific Publishers OWN, Poznań, 03/2023, pp. 132, ISBN 978-83-7712-049-1, PM: 20.
Book Chapter, Access Control Model for Dynamic VR Applications
, in: Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management
, IGI Global, 2011, pp. 284-305, ISBN 9781615208913 , DOI 10.4018/978-1-61520-891-3.ch013, PM: 5.
Book Chapter, Adaptable User Interfaces for SOA Applications in the Construction Sector
, in: SOA Infrastructure Tools - Concepts and Methods
, Wydawnictwa Uniwersytetu Ekonomicznego w Poznaniu, Poznań, 2010, pp. 493-469, ISBN 978-83-7417-544-9, PM: 5.
Book Chapter, Adaptable User Interfaces for Web 2.0 Educational Resources
, in: IT Tools in Management and Education - Selected Problems
, Wydawnictwo Politechniki Częstochowskiej , Częstochowa, 2011, pp. 104-124, ISBN 978-83-7193-508-4, PM: 5.
Book Chapter, Analysis of Factors Improving Accuracy of Passive User Identification with Streams of Face Images for Ubiquitous Commerce
, in: HCI for Cybersecurity, Privacy and Trust. HCII 2020. Lecture Notes in Computer Science, vol. 12210
, Springer, Cham, 2020, pp. 271-284, ISBN 978-3-030-50308-6, DOI 10.1007/978-3-030-50309-3_19, PM: 20.
Book Chapter, Building Augmented Reality Presentations with Web 2.0 Tools
, in: Advances in Intelligent Systems and Computing, vol. 369
, Springer International Publishing, ICEUTE 2015, 2015, pp. 595-605, ISBN 978-3-319-19712-8, DOI 10.1007/978-3-319-19713-5_52, PM: 15.
Book Chapter, Long Tail of Security Vulnerabilities and Nation State APT Actors.
, in: Challenges and Reality of the IT-space: Software Engineering and Cybersecurity. International Conference SECS-2022, October 25-26th, 2022, Proceedings Book
, Institute of Bioorganic Chemistry, Polish Academy of Sciences, Scientific Publishers OWN, Poznań, 2023, pp. 3-15, ISBN 978-83-7712-049-1, PM: 20.
Abstract
Pobierz: SECS_2022_Long_tail_manuscript.pdf (802.95 KB)
Book Chapter, Multiparty Computation in Practice: Increasing Security of Documents in Enterprise Content Management Systems
, in: ICSEB 2020: 2020 The 4th International Conference on Software and e-Business
, Association for Computing Machinery (ACM), New York, NY, USA, 2020, pp. 1–6, ISBN 9781450388849, DOI 10.1145/3446569.3446586, PM: 20.
Abstract
Book Chapter, New Challenges for User Privacy in Cyberspace
, in: Human Computer Interaction and Cybersecurity. Handbook
, CRC Press - Taylor and Francis, Boca Raton, USA, 2019, pp. 77-98, ISBN 9781138739161, PM: 20.
Book Chapter, Payment Authorization in Smart Environments: Security-Convenience Balance
, in: Enterprise Information Systems. Lecture Notes in Business Information Processing, vol. 363
, Springer, 2019, pp. 58-81, ISBN 978-3-030-26168-9, DOI 10.1007/978-3-030-26169-6_4, PM: 20.
Book Chapter, Representing User Privileges in Object-Oriented Virtual Reality Systems
, in: Emerging Trends in Technological Innovation, vol. 314
, Springer, The first IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2010, Costa de Caparica, Portugal, February 22-24, 2010, 2010, pp. 52-61, ISBN 978-3-642-11627-8, DOI 10.1007/978-3-642-11628-5_6, PM: 15.
Book Chapter, Secure User-Contributed 3D Virtual Environments
, in: Interactive 3D Multimedia Content - Models for Creation, Management, Search and Presentation
, Springer, London, Dordrecht, Heidelberg, New York, 2012, pp. 171-193, ISBN 978-1-4471-2496-2, DOI 10.1007/978-1-4471-2497-9_7, PM: 5.
Book Chapter, Securing Cryptoasset Insurance Services with Multisignatures
, in: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020), Advances in Intelligent Systems and Computing, vol. 1267
, Springer, Cham, 2021, pp. 35-44, ISBN 978-3-030-57804-6, DOI 10.1007/978-3-030-57805-3_4, PM: 70.
Book Chapter, Securing Learning Services Accessible with Adaptable User Interfaces
, in: Information Systems Architecture and Technology, vol. Service Oriented Networked Systems
, Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław, 2011, pp. 109-118, ISBN 978-83-7493-625-5, PM: 5.
Pobierz: ISAT_Best_Paper_Award.jpg (1.75 MB)
Book Chapter, Security Analysis of Transaction Authorization Methods for Next Generation Electronic Payment Services
, in: HCI for Cybersecurity, Privacy and Trust. HCII 2021. Lecture Notes in Computer Science, vol. 12788
, Springer, 2021, pp. 103-119, ISBN 978-3-030-77391-5, DOI https://doi.org/10.1007/978-3-030-77392-2_8, PM: 20.
Conference Paper, An Architecture for Parameterised Production of Interactive TV Contents
, 11th International Workshop on Systems, Signals And Image Processing; International Conference on Signals And Electronic Systems IWSSIP 2004, 09/2004, pp. 465-468, PM: 5.
Conference Paper, Evolutionary Approach to NOE Paths Assignment in RNA Structure Elucidation
, in: Proceedings of the 2004 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology
, IEEE, 10/2004, pp. 206-213, DOI 10.1109/cibcb.2004.1393955, PM: 15.
Conference Paper, Face-based Passive Customer Identification Combined with Multimodal Context-aware Payment Authorization: Evaluation at Point of Sale
, in: Proceedings of the 20th International Conference on Enterprise Information Systems
, ICEIS, SCITEPRESS, 2018, pp. 555-566, ISBN 978-989-758-298-1, DOI 10.5220/0006798105550566, PM: 5.
Conference Paper, Interactive Production of Dynamic 3D Sceneries for Virtual Television Studio
, in: The 7th Virtual Reality IC VRIC - Laval Virtual 2005
, 04/2005, pp. 167-177, ISBN 2-9515730-4- 9, PM: 5.
Conference Paper, Mining in Dynamically Composed Scripted 3D Scenes for Better Access Control – Computational Evaluation
, Computational Intelligence in Security for Information Systems (CISIS), Springer, 2014, pp. 423-432, ISBN 978-3-319-07994-3, DOI 10.1007/978-3-319-07995-0_42, PM: 15.
Conference Paper, Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort Preferences
, in: Advances in Intelligent Systems and Computing
, Computational Intelligence in Security for Information Systems, Springer International Publishing, 2015, pp. 285-295, ISBN 978-3-319-19712-8, PM: 15.
Conference Paper, Security Model for Large Scale Content Distribution Applied to Federated Virtual Environments
, in: Lecture Notes in Business Information Processing
, Conference on Advanced Information Systems Engineering Workshops: CAiSE 2013 International Workshops, Valencia (Spain), June 17 -21, 2013, Springer Verlag, Heidelberg, 2013, pp. 502--511, ISBN 978-3-642-38489-9, DOI 10.1007/978-3-642-38490-5_45, PM: 15.
Conference Paper, Semantic Exploration of Distributed AR Services
, in: Augmented Reality, Virtual Reality, and Computer Graphics. AVR 2017. Lecture Notes in Computer Science, vol. 10324
, Springer International Publishing, 2017, pp. 415-426, DOI 10.1007/978-3-319-60922-5_32, PM: 15.
Conference Paper, Web Platform with Role-based Security for Decentralized Creation of Web 2.0 Learning Content
, in: Proceedings of the 7th International Conference on Next Generation Web Services Practices (NWeSP), 19–21 October 2011, Salamanca, Spain
, IEEE, 2011, pp. 523-529, ISBN 9781457711251, DOI 10.1109/nwesp.2011.6088234, PM: 5.
Journal Article, Architecture for Adaptable Smart Spaces Oriented on User Privacy
, in: Logic Journal of the IGPL, vol. 25, issue 1
, Oxford University Press, 2017, pp. 3-17, DOI 10.1093/jigpal/jzw039, IF: 0.449, PM: 30.
Abstract