List of Publications – Michał Choraś 2013 2012
Transkrypt
List of Publications – Michał Choraś 2013 2012
List of Publications – Michał Choraś 2013 1. Choraś Michał, Comprehensive Approach to Information Sharing for Increased Network Security and Survivability, Cybernetics and Systems, vol. 44, issue 6-7, 550-568, 2013. 2. D’Antonio S., Coppolino L., Choraś Michał, Kozik R., Distributed Framework for Cybersecurity of Critical Infrastructures , In: Flammini F. et al. (Eds.): Effective Surveillance for Homeland Security: Balancing Technology and Social Issues, CRC PRess, 2013. (http://www.crcpress.com/product/isbn/9781439883242). 3. Choraś Michał, Kozik R., Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection , In: Snasel V. et al. (Eds.): Soft Computing in Industrial Applications, Advances in Intelligent Systems and Computing, 223, Springer, 2013. 4. Kozik R., Choraś Michał, Current Cyber Security Threats and Challenges in Critical Infrastructures Protection, In: The Second International Conference on Informatics and Applications (ICIA2013), 23-25.09.2013, Lodz, Poland, pp 93-97, IEEE, 2013. 5. Choraś Michał, A Short Overview of Feature Extractors for Knuckle Biometrics , In: Burduk R. et al. (Eds.): Proc. of the 8th International Conference on Computer Recognition systems (CORES 2013), Advances in Intelligent Systems and Computing, 226, 519-526, Springer, 2013. 6. Choraś Michał, Kozik R., Evaluation of Various Techniques for SQL Injection Attack Detection , In: Burduk R. et al. (Eds.): Proc. of the 8th International Conference on Computer Recognition systems (CORES 2013), Advances in Intelligent Systems and Computing, 226, 753-762, Springer, 2013. 7. Renk R., Choraś Michał, Gierszal H., Hołubowicz W., Ewaluacja Parametrów Ruchu Sieciowego pod Kątem Przydatności do Wykrywania Anomalii, w: Kosinski J. (ed.) Przestępczość Teleinformatyczna, 37-52, Wyższa Szkoła Policji, Szczytno, 2013. 8. Kozik R., Choraś Michał, Machine Learning Techniques for Cyber Attacks Detection, In: Image Processing and Communication Challenges 5, Advances in Intelligent Systems and Computing, 233, 391-397, Springer, 2013. 2012 9. Choraś Michał, Saganowski Ł., Renk R., Hołubowicz W., Statistical and signal-based network traffic recognition for anomaly detection, Expert Systems, vol. 29, issue 3, 232-245, 2012. 10. Choraś Michał, Kozik R., Contactless palmprint and knuckle biometrics for mobile devices, Pattern Analysis and Applications, vol. 15, no. 1, 73-85, Springer, 2012. 11. Amantini A., Choraś Michał, D’Antonio S., Egozcue E., Germanus D., Hutter R., The human role in tools for improving robustness and resilience of critical infrastructures, Cognition, Technology & Work, Volume 14, Number 2 (2012), 143-155, 2012. 12. Choraś Michał, Kozik R., The Preliminary Results of the Intelligent Computer Vision System to Support Blind People , Journal of Medical Informatics & Technologies, vol. 21, 19-26, 2012. 13. Kozik R., Choraś Michał, Koncepcja wymiany informacji w systemie ochrony sieci federacyjnych, Pomiary Automatyka Kontrola, vol. 2/2012, 184-188, 2012. 14. Choraś Michał,, Kozik R., Puchalski D., Holubowicz W., Correlation Approach for SQL Injection Attacks Detection, In: Herrero A. et al (Eds.), Advances in Intelligent and Systems and Computing, 189, 177-186, Springer, 2012. 15. Andrysiak T., Saganowski L, Choraś Michał,, Greedy Algorithms for Network Anomaly Detection, In: Herrero A. et al (Eds.), Advances in Intelligent and Systems and Computing, 189, 235-244, Springer, 2012. 16. Choraś Michał,, Kozik R., Renk. R, Holubowicz W., Information Exchange Mechanism between Federated Domains: P2P Approach , In: Herrero A. et al (Eds.), Advances in Intelligent and Systems and Computing, 189, 187-196, Springer, 2012. 17. Jasiul B., Piotrowski R., Berezinski P., Choraś Michał,, Kozik R., Brzostek J., Federated Cyber Defence System - Applied Methods and Techniques , In: Amanowicz M. (Ed.), Military Communications and Information Technology: A Trusted Cooperation Enabler, 347-357, MUT Press, 2012. 18. Choraś Michał, Manso M., Puchalski D., Kozik R., Samp K., Online Social Networks: Emerging Security and Safety Applications , In: Image Processing and Communication Challenges 4, Advances in Intelligent and Systems and Computing, AISC 184, 291-302, Springer, 2012. 19. Andrysiak T., Saganowski L., Choraś Michał,, DDoS Attacks Detection by Means of Greedy Algorithms, In: Image Processing and Communication Challenges 4, Advances in Intelligent and Systems and Computing, AISC 184, 303-310, Springer, 2012. 20. Flizikowski A., Majewski M., Puchalski D., Hassnaa M., Choraś Michał,, A Concept of Unobtrusive Method for Complementary Emotive User Profiling and Personalization for IPTV Platforms, , In: Image Processing and Communication Challenges 4, Advances in Intelligent and Systems and Computing, AISC 184, 269-282, Springer, 2012. 21. Choraś Michał , Kozik R., Flizikowski A. INSPIRE Decision Aid Tool: narzędzie wspierające analizę zagrożeń I ochronę cybernetyczną krytycznych sieci teleinformatycznych, Przegląd Telekomunikacyjny, vol. 8-9, p. 1215-1221, 2012. 22. Choraś Michał, Kozik R, Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection , In. Proc. of WSC17 Online Conference on Soft Computing in Industrial Applications, 2012. 23. Jasiul B., Piotrowski R., Berezinski P., Choraś Michał, Kozik R., Brzostek J., Federated Cyber Defence System - Applied Methods and Techniques , In Proc. of MCC12 Military Communications and Information Systems Conference, Gdansk, Poland, IEEE Explore 2012. 2011 24. Choraś Michał,, Kozik R., Fast Feature Extractors for Palmprint Biometrics , In Chaki N. et al. (Eds.): Computer Information Systems – Analysis and Technologies, Communications in Computer and Information Science CCIS, 121-127, Springer, 2011. 25. Choraś Michał,, Kozik R., Network Event Correlation and Semantic Reasoning for Federated Networks Protection System , In Chaki N. et al. (Eds.): Computer Information Systems – Analysis and Technologies, Communications in Computer and Information Science CCIS, 48-54, Springer, 2011. 26. Choraś Michał, Kozik R., Piotrowski R., Brzostek J., Holubowicz W., Network Events Correlation for Federated Networks Protection System , In: Abramowicz W. et al. (Eds.): Towards a Service-Based Internet, LNCS 6994, pp. 100–111, Springer 2011. 27. Piotrowski R., Jasiul B., Sliwka M., Kantyka G., Podlasek T., Dalecki T., Choraś Michał, Kozik R., Brzostek J., The Response to Cyber Threats in Federation of Systems Environment, In: Amanowicz M. (Ed.): Military Communications and Information Technology: A Comprehensive Approach Enabler, pp. 325-335, WAT Press 2011. 28. Choraś Michał, D'Antonio S., Iannello G., Jedlitschka A., Kozik R., Miesenberger K., Wołoszczuk A., Innovative man machine interfaces and solutions to support totally blind people , In: Image Processing and Communication Challenges 3, Advances in Soft Computing, AISC 102, Springer, 2011. 29. Choraś Michał, Kozik R., Knuckle Recognition for Human Identification , In: Burduk R. et al. (Eds.): Computer Recognition Systems 4, AISC 95, 61-70, Springer-Verlag, 2011. 30. Saganowski Ł., Andrysiak T., Choraś Michał, Renk R., Expansion of Matching Pursuit Methodology for Anomaly Detection in Computer Networks , In: Burduk R. et al. (Eds.): Computer Recognition Systems 4, AISC 95, 727-736, Springer-Verlag, 2011. 31. Choraś Michał, Kozik R., Saganowski L., Renk R., Aspekty wykorzystania synchrofazorów w sieciach energetycznych, Rynek Energii, vol. 2(93)/2011, 2011. 32. Choraś Michał, Kozik R., Nowakowski W., Rozpoznawania osób na podstawie kostek dłoni, Elektronika, vol. 4, 92-95, 2011. 33. Renk R., Choraś Michał, Saganowski Ł., Holubowicz W., Signal Processing Methodology for Network Anomaly Detection, in: Intrusion Detection Systems, Pawel Skrobanek (Ed.), ISBN: 978-953-307-167-1, InTech, 2011. 2010 34. Renk R., Saganowski Ł., Choraś Michał, Hołubowicz W., Comprehensive Approach to Anomaly Detection System Evaluation, Image Processing & Communications, vol. 15, no. 1, 69-78, 2010. 35. Choraś Michał, Renk R., Kozik R., Hołubowicz W., Inteligentne sieci energetyczne: aktualny stan i trendy rozwojowe, Proc. of Intelligent Systems in Energy, SIWE'10, Wisła, Poland, November 2010. 36. Choraś Michał, Hołubowicz W., Renk R, Samp K., Ontology of Network Threats and Vulnerabilities in the context of NATO Network Enabled Capabilities (NNEC), In: Concept and Implementations for Innovative Military Communications and Information Technologies, 267-276, 2010. 37. Renk R., Saganowski Ł., Choraś Michał, Hołubowicz W., Performance Evaluation of ADS System Based on Redundant Dictionary, In: Choras (Ed.): Image Processing and Communication Challenges 2, Advances in Soft Computing, 468-476, Springer, 2010. 38. Choraś Michał, Kozik R, Knuckle Biometrics for Human Identification, In: Choras (Ed.): Image Processing and Communication Challenges 2, Advances in Soft Computing, 95-102, Springer, 2010. 39. Choraś Michał, The lip as a biometric, Pattern Analysis and Applications, vol. 13, no. 1, 105-112, Springer, 2010. 40. Choraś Michał, Kozik R., Flizikowski A., Hołubowicz W., Image Recognition Techniques Applied to Automated and Objective QoE Assessment of Mobile WWW Services, In L. Bolc et al. (Eds.): Computer Vision and Graphics, Part I, LNCS 6374, pp. 275–282, 2010. 41. Choraś Michał, Kozik R, Knuckle Biometrics Based on Texture Features, In. Proc. of International Workshop on Emerging Techniques and Challenges for Hand-based Biometrics (ETCHB2010), Stambul, IEEE, August 2010. 42. Kozik R. Choraś Michał, Hołubowicz W., Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection, In J. Alonso- Zarate and O. Hoffmann (Eds.): Mobile Lightweight Wireless Systems, LNICST 45, pp. 451–463, 2010. 43. Choraś Michał, Kozik R., Feature Extraction Method for Contactless Palmprint Biometrics, In D.-S. Huang et al. (Eds.): Advanced Intelligent Computing Theories and Applications, ICIC 2010, Communications in Computer and Information Science 93, pp. 435–442, Springer, 2010. 44. Choraś Michał, Kozik R., Flizikowski A., Hołubowicz W., Ontology Applied in Decision Support System for Critical Infrastructures Protection, In N. Garcia-Pedrajas et al. (Eds.): Trends in Applied Intelligent Systems, IEA/AIE 2010, Part I, LNAI 6096, pp. 671-680, 2010. 45. Choraś Michał, Flizikowski A., Kozik R., Hołubowicz W., Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis, E. Rome and R. Bloomfield (Eds.): Critical Information Infrastructures Security, CRITIS 2009, LNCS 6027, pp. 98–110, 2010. 46. Kozik R. Choraś Michał, Hołubowicz W., Fusion of Bayesian and Ontology Approach Applied to Decision Support System for Critical Infrastructures Protection, In Proc. of MOBILIGHT (Mobile Lightweight Wireless Systems), Barcelona, May, 2010 (on CD). 47. Choraś Michał, Stachowicz A., Kozik R., Semantic Description of Cyber Threats , In Proc. of Multimedia Communication, Services and Security, MCSS 2010, 20-24, Cracow, May, 2010. 48. Choraś Michał, D'Antonio Salvatore, Kozik R., Holubowicz W., INTERSECTION Approach to Vulnerability Handling , In Proc. of 6th International Conference on Web Information Systems and Technologies, WEBIST 2010, vol. 1, 171-174, INSTICC Press, Valencia, Spain, April 2010. 49. Choraś Michał, Renk R., Ochrona sieci energetycznych poprzez zwiększenie bezpieczenstwa cybernetycznego na styku sieci teleinformatycznych I systemów SCADA, Rynek Energii, vol. 2/2010, 35-39, 2010. 50. Kozik R., Choraś Michał, Combined Shape and Texture Information for Palmprint Biometrics, Journal of Information Assurance and Security, vol. 5, issue 1, 58-63, 2010. 2009 51. Choraś Michał, Stachowicz A., Kozik R., Flizikowski A., Renk R., Ontology-based approach to SCADA systems vulnerabilities representation for CIP, Electronics, vol. 11/2009, 35-38, November 2009. 52. Saganowski Ł., Choraś Michał, Renk R., Hołubowicz W., On Tuning Redundant Dictionary Parameters in Signal-based Anomaly Detection System, Image Processing & Communications, vol. 14, no. 4, 29-34, 2009. 53. Flizikowski A., Choraś Michał, Wachowiak M., Holubowicz W., A Method for Semiautomated Assessment of User Satisfaction When Using WWW Services with Mobile Terminals, Image Processing & Communications, vol. 14, no. 2-3, 69-80, 2009. 54. Choraś Michał, Ear Biometrics, in: Li S. (Ed.) Encyclopedia of Biometrics, 233-240, Springer, 2009. 55. Choraś Michał, Ear Biometrics based on Geometrical Feature Extraction, In: Bunke H. et al. (Eds.) Progress in Computer Vision and Image Analysis , 321-338, World Scientific, 2009. 56. Saganowski Ł., Choraś Michał, Renk R., Hołubowicz W., A Novel Signal-Based Approach to Anomaly Detection in IDS Systems , M. Kolehmainen et al. (Eds.): Adaptive and Natural Computing Algorithms, ICANNGA 2009, LNCS 5495, pp. 527–536, Springer 2009. 57. Choraś Michał, Flizikowski A., Kozik R., Renk R., Holubowicz W., Ontology-Based Reasoning Combined with Inference Engine for SCADA-ICT Interdependencies, Vulnerabilities and Threats Analysis , In Pre-Proc of 4th International Workshop on Critical Information Infrastructures Security, CRITIS'09, Bonn, Germany, 213-214, Fraunhofer IAIS, 2009. 58. Choraś Michał, Kozik R., Flizikowski A., Renk R., Hołubowicz W., Ontology-based Decision Support for Security Management in Heterogeneous Networks, In: Huang, D.-S. et al. (Eds.): Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, LNAI 5755, Springer 2009. 59. Kozik R., Choraś Michał, Palmprint Biometrics for Human Identification, In: Image Processing & Communications Challenges, 271-277, EXIT, 2009. 60. Saganowski Ł., Choraś Michał, Renk R., Hołubowicz W., Anomaly Detection System based on Redundant Dictionary of Base Functions, In: Image Processing & Communications Challenges, 443-449, EXIT, 2009. 61. Flizikowski A., Choraś Michał, Wachowiak M., Holubowicz W., Video Profiling for Automated Assessment of QoS/QoE in Mobile WWW Services, In: Image Processing & Communications Challenges, 450-457, EXIT, 2009. 62. Choraś Michał, Stachowicz Anna, Flizikowski Adam, Renk Rafal, Hołubowicz Witold, Mechanizmy bezpieczeństwa na styku sieci teleinformatycznych i systemów SCADA w celu ochrony infrastruktur, Przegląd Telekomunikacyjny, vol. 8-9, 1408-1416, 2009. 63. Choraś Michał, Flizikowski A., Ochrona sektora energetycznego – wzmocnienie bezpieczenstwa na styku systemów SCADA z sieciami teleinformatycznymi, Nowa Energia, vol. 3/2009, 82-85, 2009. 64. Choraś Michał, Lips Recognition for Biometrics, In: Massimo Tistarelli, Mark S. Nixon (Eds.): Advances in Biometrics. LNCS 5558, 1260-1269, Springer 2009. 65. Choraś Michał, Saganowski L., Renk R., Kozik R., Holubowicz W., Recognizing Anomalies/Intrusions in Heterogeneous Networks , in M. Kurzynski and M. Wozniak (Eds.): Computer Recognition Sys. 3, AISC 57, pp. 619-627, Springer-Verlag, 2009 66. Tarłowski R., Choraś Michał, Digital Analysis of 2D Code Images Based on Radon Transform, Digital Analysis of 2D Code Images Based on Radon Transform , in M. Kurzynski and M. Wozniak (Eds.): Computer Recognition Sys. 3, AISC 57, pp. 155–162, Springer-Verlag, 2009. 67. Choraś Michał, Novel techniques applied to biometric human identification, Electronics, vol. 3/2009, 54-57, March 2009. 68. Flizikowski A., Choraś Michał, Infrastruktury krytyczne – aspekty bezpieczeństwa, Boston IT Security Review, vol. 2/2009, 35-39, 2009. 2008 69. Choraś Michał, Flizikowski A., Stachowicz A., Redo M., Renk R., Hołubowicz W., Ontology Notation and Description of Vulnerabilities in Heterogeneous Networks and Critical Infrastructures , Methods of Applied Informatics of Polish Academy of Sciences, vol. 4, 35-44, 2008. 70. Choraś Michał, Renk R., Flizikowski A., Hołubowicz W., Ontology-based description of networks vulnerabilities, Polish Journal of Environmental Studies, vol. 17, no. 4C, 354-359, 2008. 71. Saganowski Ł., Choraś Michał, Renk R, Hołubowicz W., Signal-based Approach to Anomaly Detection in IDS Systems, International Journal of Intelligent Engineering and Systems, vol. 1 (4), 18-24, 2008. 72. Choraś Michał, Rafał Kozik, Aleksandra Żelek, A Novel Shape-Texture Approach to Palmprint Detection and Identification, in Proc. Intelligent Systems Design and Applications, ISDA '08, 638-643, IEEE CS Press, Kaohsiung, Taiwan, 2008. 73. Renk R., Saganowski Ł.; Hołubowicz W.; Choraś Michał, Intrusion Detection System Based on Matching Pursuit, in Proc. Intelligent Networks and Intelligent Systems, ICINIS '08, 213-216, IEEE CS Press, Wuhan, China, 2008. 74. Choraś Michał, Perspective Methods of Biometric Human Identification, In Proc of NTAV/SPA (New Trends in Audio and Video/ Signal Processing), 195-200, Poznań, September 2008. 75. Choraś Michał, Saganowski Ł., Renk R, Hołubowicz W., Signal Processing Methods Applied to Innovative Intrusion Detection Systems, in Adam Grzech et al. (Eds.): Information Systems Architecture and Technology - Information Systems and Computer Communications Network, 139-150, 2008. 76. Flizikowski A., Choraś Michał, Renk R., Hołubowicz W., On Applying Ontologies to Security and QoS Management in Heterogeneous Networks in Adam Grzech et al. (Eds.): Information Systems Architecture and Technology - Information Systems and Computer Communications Network, 189-200, 2008. 77. Tarłowski Rafal, Choraś Michał, Analiza dwuwymiarowych obrazów kodowych oparta o transformate Radona, Przegląd Telekomunikacyjny, vol.8-9, 1014-1021, 2008. 78. Dąbrowski R., Renk R., Choraś Michał, Hołubowicz W., Architektura podsystemu bezpieczeństwa dla sieci heterogenicznych, Przegląd Telekomunikacyjny, vol.8-9, 13391346, 2008. 79. Choraś Michał, Human Lips as Emerging Biometrics Modality, in A. Campilho and M. Kamel (Eds.): Image Analysis and Recognition, ICIAR 2008, LNCS 5112, 994-1003, Springer-Verlag, 2008. 80. Rafał Kozik, Aleksandra Żelek, Choraś Michał, Palmprint Segmentation and Feature Extraction Methods, in L. Rutkowski et al. (Eds.): Computational Intelligence: Methods and Applications, 377-388, Academic Publishing House EXIT, 2008. 81. Rafał Kozik, Aleksandra Żelek, Choraś Michał, Palmprint Recognition Enhanced by the Shape Features, Proc. of 7th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'08), IEEE CS Press, 214-215, Ostrava, June 2008. 82. Choraś Michał, Perspective methods of human identification: Ear biometrics, OptoElectronics Review, vol. 16, no.1, 85-96, 2008. 2007 83. Andrysiak Tomasz, Choraś Michał, Algorithms for Stereovision Disparity Calculation in the Moments Space, Machine Graphics & Vision MGV, vol. 15, no. 3/4, 255-264, 2006. (printed in 2007). 84. Choraś Michał, Image Pre-classification for Biometrics Identification Systems , in J. Pejas and K. Saeed (Eds): Advances in Information Processing and Protection, 361-370, Springer NY, 2007. 85. Choraś Michał, Human Lips Recognition , in M. Kurzyński et al. (Eds): Computer Recognition Systems 2, Advances in Soft Computing, 838-843, Springer, 2007. 86. Choraś S. Ryszard, Andrysiak Tomasz , Choraś Michał, Integrated Color, Texture and Shape Information for Content-Based Image Retrieval, Pattern Analysis and Applications (PAA), vol. 10, no. 4, 333-343, 2007. 87. Choraś Michał, Emerging Methods of Biometrics Human Identification, Proc. of 2nd International Conference on Innovative Computing, Information and Control (ICICIC'07), IEEE CS Press, Kumamoto, Japan, September 2007. 88. Choraś Michał, Intelligent Computing for Automated Biometrics, Criminal and Forensic Applications, in D.-S. Huang et al. (Eds.): Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, LNCS 4681, 11701181, Springer Berlin, 2007. 89. Choraś Michał, Image Feature Extraction Methods for Ear Biometrics - A Survey, Proc. of 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07), 261-265, IEEE CS Press, Ełk, June 2007. 90. Choraś Michał, Mroczkowski Piotr, Recognizing Individual Typing Patterns, in Marti J. et al. (Eds.): Pattern Recognition and Image Analysis, IbPRIA – Part II, 323-330, LNCS 4478, Springer Berlin, 2007. 91. Choraś Michał, Mroczkowski Piotr, Keystroke Dynamics for Biometrics Identification, in B. Beliczynski et al. (Eds.): Adaptive and Natural Computing Algorithms - ICANNGA (part II), 424-431, LNCS 4432, Springer Berlin, 2007. 92. Choraś S. Ryszard, Choraś Michał, Multimodal Hand-Palm Biometrics, in B. Beliczynski et al. (Eds.): Adaptive and Natural Computing Algorithms - ICANNGA (part II), 407-414, LNCS 4432, Springer Berlin, 2007. 93. Choraś Michał, Mroczkowski Piotr, Web Security Enhancement Based on Keystroke Dynamics, Proc. of Web Information systems and Technologies (WEBIST), INSTICC Press, 337-340, Barcelona, March 2007. 2006 94. Choraś Michał, Biometria ucha: metody wydzielania cech bazujące na parametrach geometrycznych, Przegląd Elektrotechniczny, nr 12/2006, 5-10, 2006. 95. Choraś Michał, Perspektywiczne metody identyfikacji osób z wykorzystaniem informacji obrazowej, Techniki Przetwarzania Obrazów TPO - Serock, Oficyna Wydawnicza Politechniki Warszawskiej, 412-422, 2006. 96. Choraś Michał, Andrysiak Tomasz, Automatyczna metoda lokalizacji punktów szczegółowych w obrazach twarzy, Techniki Przetwarzania Obrazów TPO - Serock, Oficyna Wydawnicza Politechniki Warszawskiej, 321-327, 2006. 97. Andrysiak Tomasz, Choraś Michał, Image Filtration and Feature Extraction for Face Recognition, in K. Saeed et al. (Eds): Biometrics, Computer Security Systems and Artificial Intelligence Applications, chapter 1, 3-12, Springer NY, 2006. 98. Choraś Michał, Biometric Images Pre-classification: Original Solution for Ear Biometrics, Proc. of Advanced Computer Systems (ACS), vol. II, 139-146, Międzyzdroje, Poland, October 2006. 99. Mroczkowski Piotr, Choraś Michał, Keystroke Dynamics in Biometrics Client-Server Password Hardening System, Proc. of Advanced Computer Systems (ACS), vol. II, 75-82, Międzyzdroje, Poland, October 2006. 100. Choraś S. Ryszard, Choraś Michał, Hand Shape Geometry and Palmprint Features for the Personal Identification, Proc. of ISDA (Intelligent Systems Design and Applications), vol. II, 1085-1090, IEEE CS Press, Jinan, China, October 2006. 101. Choraś Michał, Choraś S. Ryszard, Geometrical Algorithms of Ear Contour Shape Representation and Feature Extraction, Proc. of ISDA (Intelligent Systems Design and Applications), vol. II, 451-456, IEEE CS Press, Jinan, China, October 2006. 102. Andrysiak Tomasz, Choraś Michał, Stereo Disparity Estimation Using Orthogonal Discrete Moments, Proc. of ICINCO 2006 Conference, 504-507, INSTICC Press, Setubal, Portugal, 2006. 103. Choraś Michał, Further Developments in Geometrical Algorithms for Ear Biometrics, in F.J Perales and B. Fisher (Eds.): Articulated Motion and Deformable Objects AMDO 2006, 5867, LNCS 4069, Springer-Verlag 2006. 104. Choraś Michał, Andrysiak Tomasz, Symmetry-based Salient Points Detection in Face Images, in L. Rutkowski et al. (Eds.): Artificial Intelligence and Soft Computing, ICAISC 2006, LNCS 4029, 688-693, Springer-Verlag 2006. 105. Choraś Michał, Ear Biometrics in Passive Human Identification Systems, Proc. of ICEISPRIS (Pattern Recognition in Information Society), INSTICC Press, 169-174, Paphos, Cyprus, 2006. 2005 106. Andrysiak Tomasz, Choraś Michał, Multiresolution Matching and Disparity Calculation of Stereo Images in Frequency Domain, Information Extraction and Processing, no. 23 (99), 106-111, 2005. 107. Andrysiak Tomasz, Choraś Michał, Image Retrieval Based on Hierarchical Gabor Filters, International Journal Applied Mathematics and Computer Science (AMCS), vol. 15, no. 4, 471-480, 2005. 108. Andrysiak Tomasz, Choraś Michał, Stereo Matching for Robotics Vision, Proc. of International Conference PELINCEC 2005 (10 pages). PhD Thesis with distinction: Human Identification based on Ear Biometrics – 22.09.2005. 109. Andrysiak Tomasz, Choraś Michał, LPT and DST for Face Feature Extraction and Representation, 148-151, Proc. of IAPR Conference on Pattern Recognition and Image Processing - PRIP, Minsk 2005. 110. Andrysiak Tomasz, Choraś Michał, Face Feature Extraction and Representation, Proc. of ACS-CISIM, vol. 1: Image Analysis, Computer Graphics, Security Systems and Artificial Intelligence Applications, 297-306, University of Finance and Management in Bialystok, 2005. 111. Choraś Michał, Image Processing Methods in Person Identification Applications – Ear Biometrics, Electrotechnical Review (Przegląd Elektrotechniczny) no. 4/81, 38-41, 2005. 112. Choraś Ryszard, Andrysiak Tomasz, Choraś Michał, Content Based Image Retrieval Technique, in M. Kurzyński et al. (Eds): Computer Recognition Systems, Advanced Soft Computing Series Book, 371-379, Springer, 2005. 113. Choraś Michał, Ear Biometrics Based on Geometrical Feature Extraction, Electronic Letters on Computer Vision and Image Analysis (Journal ELCVIA), vol. 5, no. 3, 85-95, 2005. 2004 114. Choraś Michał, Human Ear Identification Based on Image Anlysis, in L. Rutkowski et al. (Eds): Artificial Intelligence and Soft Computing, ICAISC 2004, LNAI 3070, 688-693, Springer-Verlag 2004. 115. Choraś Michał, Ear Biometrics Based on Geometrical Method of Feature Extraction, in F.J Perales and B.A. Draper (Eds.): Articulated Motion and Deformable Objects, LNCS 3179, 51-61, Springer-Verlag 2004. 116. Choraś Michał, Biometryczne metody identyfikacji osób bazujące na obrazach ucha, Biuletyn Informacyjny Techniki Komputerowe nr 1/2004, ISSN 0239-8044, 59-69, 2004. 117. Choraś Michał, Feature Extraction Based on Contour Processing in Ear Biometrics, IEEE Workshop on Multimedia Communications and Services, MCS’04, 15-19, Cracow. 2003 118. Choraś Michał, Human Identification Based on Image Analysis – New Trends, IEEE Workshop on Signal Processing , 111-116, Poznan, 2003. 119. Andrysiak Tomasz, Choraś Michał, Hierarchical Object Recognition Using Gabor Wavelets, Komputerowe Systemy Rozpoznawania KOSYR’2003, 271-278, Miłków. 2002 120. Choraś S. Ryszard, Choraś Michał, Automatyczne wykrywanie i lokalizacja twarzy w 2D obrazach., Techniki Przetwarzania Obrazów TPO 2002, 262-267, Serock. 121. Choraś Michał, Zastosowanie transformacji zespolonych do rozpoznawania odcisków palców., Techniki Przetwarzania Obrazów TPO 2002, 274-279, Serock. 122. Choraś S. Ryszard, Choraś Michał, Computer Visual System Analyzing the Influence of Stimulants on Human Motion., in F.J Perales and E.R. Hancock (Eds.): Articulated Motion and Deformable Objects, Springer-Verlag LNCS 2492, 241-250, 2002. 123. Choraś S. Ryszard, Choraś Michał, Feature Extraction Methods in Fingerprint Recognition, IEEE Workshop on Signal Processing ’02, 21-26, Poznań. 124. Choraś Michał, Identyfikacja osób z wykorzystaniem analizy obrazów, Sztuczna Inteligencja ’02, 223-231, Siedlce. 125. Choraś Michał, Wykorzystanie transformacji MHT i HAARCOS do kodowania obrazów wideotelefonicznych, KST ’02, tom B, 68-74, Bydgoszcz.