Search Results - "Ogiela, Lidia"
-
1
Cryptographic techniques of strategic data splitting and secure information management
Published in Pervasive and mobile computing (01-07-2016)“…This publication presents techniques for classifying strategic information, namely financial figures which make it possible to determine the standing of an…”
Get full text
Journal Article -
2
Cognitive informatics in image semantics description, identification and automatic pattern understanding
Published in Neurocomputing (Amsterdam) (25-12-2013)“…In the paper a new way of pattern semantic interpretation directed at automatic semantic classification and image content understanding will be described. Such…”
Get full text
Journal Article -
3
Intelligent Data Management and Security in Cloud Computing
Published in Sensors (Basel, Switzerland) (18-06-2020)“…This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data…”
Get full text
Journal Article -
4
Linguistic techniques for cryptographic data sharing algorithms
Published in Concurrency and computation (10-02-2018)“…Summary This publication presents algorithms for protecting data from unauthorised access to it. A special role among information protection algorithms is…”
Get full text
Journal Article -
5
Human-artificial intelligence approaches for secure analysis in CAPTCHA codes
Published in EURASIP Journal on Information Security (12-12-2022)“…CAPTCHA ( Completely Automated Public Turing test to tell Computers and Humans Apart ) has long been used to keep automated bots from misusing web services by…”
Get full text
Journal Article -
6
Insider Threats and Cryptographic Techniques in Secure Information Management
Published in IEEE systems journal (01-06-2017)“…This publication presents some techniques for insider threats and cryptographic protocols in secure processes. Those processes are dedicated to the information…”
Get full text
Journal Article -
7
Cognitive CAPTCHA Password Reminder
Published in Sensors (Basel, Switzerland) (16-03-2023)“…In recent years, the number of personal accounts assigned to one business user has been constantly growing. There could be as many as 191 individual login…”
Get full text
Journal Article -
8
Cognitive Based Authentication Protocol for Distributed Data and Web Technologies
Published in Sensors (Basel, Switzerland) (31-10-2021)“…The objective of the verification process, besides guaranteeing security, is also to be effective and robust. This means that the login should take as little…”
Get full text
Journal Article -
9
Linguistic Methods of Image Division for Visual Data Security
Published in Applied sciences (01-04-2023)“…This paper defines new classes of algorithms for securing and sharing visual information. Algorithms offering data protection against unauthorised access are…”
Get full text
Journal Article -
10
A Comprehensive Analysis of Cognitive CAPTCHAs through Eye Tracking
Published in IEEE access (01-01-2024)“…CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) has long been employed to combat automated bots. It accomplishes this by…”
Get full text
Journal Article -
11
Visual CAPTCHA application in linguistic cryptography
Published in Concurrency and computation (25-01-2018)“…Summary This paper presents an idea of linguistic cryptography and linguistic techniques for data analysis. The main aspects are using parts of divided…”
Get full text
Journal Article -
12
Transformative computing in advanced data analysis processes in the cloud
Published in Information processing & management (01-09-2020)“…•The transformative computing in advanced data analysis was proposed.•The advanced data analysis processes in different structures were described.•The possible…”
Get full text
Journal Article -
13
ECG-Based Advanced Personal Identification Study With Adjusted (Qi Si)
Published in IEEE access (2019)“…Although many security systems with biometric information have appeared, they only have been used the static bio-information, e.g., a fingerprint, ris, and so…”
Get full text
Journal Article -
14
Advanced techniques for knowledge management and access to strategic information
Published in International journal of information management (01-04-2015)“…•In the paper was described advanced techniques for knowledge management.•These techniques are designed to analyse strategic data in knowledge…”
Get full text
Journal Article -
15
Intelligent techniques for secure financial management in cloud computing
Published in Electronic commerce research and applications (01-10-2015)“…•A new intelligent technique for cloud computing information management was defined.•A new class of CFMSiC systems (Cognitive Financial Management Systems in…”
Get full text
Journal Article -
16
Cognitive and innovative computation paradigms for big data and cloud computing applications
Published in Concurrency and computation (25-04-2020)Get full text
Journal Article -
17
Semantic analysis and biological modelling in selected classes of cognitive information systems
Published in Mathematical and computer modelling (01-09-2013)“…Cognitive categorisation systems are used for in-depth analyses of data which contains significant layers of information. These layers consist of the semantic…”
Get full text
Journal Article -
18
Towards cognitive economy
Published in Soft computing (Berlin, Germany) (01-09-2014)“…This publication discusses new development directions of cognitive economics charted based on cognitive processes of financial data analysis. Semantic analysis…”
Get full text
Journal Article -
19
Data management in cognitive financial systems
Published in International journal of information management (01-04-2013)“…► In the paper was described cognitive information systems for analysing economic data. ► This system are designed to semantically analyse some economic data…”
Get full text
Journal Article -
20
New protocols of cognitive data management and sharing in cloud computing
Published in Concurrency and computation (25-09-2020)“…Summary In this paper, we shall discuss new classes of cognitive systems dedicated the tasks of dividing and managing shared information not only in simple…”
Get full text
Journal Article