default search action
Urszula Ogiela
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c59]Urszula Ogiela, Marek R. Ogiela:
Towards User-Oriented Steganography. AINA (4) 2024: 159-165 - [c58]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Transformative Intelligence in Data Analysis and Knowledge Exploration. AINA (2) 2024: 274-281 - 2023
- [j17]Marek R. Ogiela, Urszula Ogiela:
Linguistic methods in healthcare application and COVID-19 variants classification. Neural Comput. Appl. 35(19): 13935-13940 (2023) - [c57]Urszula Ogiela, Marek R. Ogiela:
AI Cognitive - Based Systems Supporting Learning Processes. AIED (Posters/Late Breaking Results/...) 2023: 447-452 - [c56]Marek R. Ogiela, Urszula Ogiela:
User-Oriented Cybersecurity Systems. AINA (2) 2023: 430-433 - [c55]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Cybersecurity of Distributed Systems and Dispersed Computing. AINA (2) 2023: 434-438 - [c54]Marek R. Ogiela, Urszula Ogiela:
Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges. ISSREW 2023: 39-40 - [c53]Urszula Ogiela, Makoto Takizawa, Marek R. Ogiela:
Context-Aware Approaches in Cognitive Cloud and Cybersecurity. NBiS 2023: 180-185 - 2022
- [j16]Urszula Ogiela, Václav Snásel:
Predictive intelligence in evaluation of visual perception thresholds for visual pattern recognition and understanding. Inf. Process. Manag. 59(2): 102865 (2022) - [c52]Urszula Ogiela, Marek R. Ogiela:
Personalized Cryptography in Cybersecurity Systems. 3PGCIC 2022: 59-61 - [c51]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Semantic-Based Techniques for Efficient and Secure Data Management. AINA (2) 2022: 543-546 - [c50]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Human-Centered Protocols for Secure Data Management in Distributed Systems. BWCCA 2022: 175-179 - [c49]Marek R. Ogiela, Urszula Ogiela:
Steganographic Approaches for Carrier Related Information Hiding. CISIS 2022: 143-146 - [c48]Urszula Ogiela, Makoto Takizawa, Marek R. Ogiela:
Visual Authentication Codes Generated Using Predictive Intelligence. EIDWT 2022: 38-41 - [c47]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Hybrid Intelligence Approaches for Distributed Information Management. IMIS 2022: 207-210 - [c46]Urszula Ogiela, Marek R. Ogiela:
Personalized Security Solutions in Dispersed Computing. INCoS 2022: 58-61 - [c45]Marek R. Ogiela, Urszula Ogiela:
DNA-based Secret Sharing and Hiding in Dispersed Computing. ISSRE Workshops 2022: 126-127 - [c44]Urszula Ogiela, Makoto Takizawa, Marek R. Ogiela:
Human-AI Protocols for Cloud Data Management. NBiS 2022: 115-118 - 2021
- [j15]Weijun Chen, Urszula Ogiela, Jindan Zhang:
Customer-oriented sales modeling strategy in a big data environment. Concurr. Comput. Pract. Exp. 33(19) (2021) - [j14]Urszula Ogiela:
Transformative and cognitive approaches to information retrieval and security procedures. Concurr. Comput. Pract. Exp. 33(23) (2021) - [j13]Jindan Zhang, Chuan Lin, Urszula Ogiela, Nadia Nedjah, Arun Kumar Sangaiah, Xuan Wang:
Improved publicly verifiable auditing protocol for cloud storage. Concurr. Comput. Pract. Exp. 33(23) (2021) - [c43]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Modern Cognitive Solutions for Advanced Information Processing. 3PGCIC 2021: 64-68 - [c42]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Human Centered Protocols in Transformative Computing. AINA (2) 2021: 603-607 - [c41]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Fusion Techniques for Strong Data Protection. BWCCA 2021: 189-192 - [c40]Urszula Ogiela, Marek R. Ogiela:
Predictive Intelligence Approaches for Security Technologies. BWCCA 2021: 193-196 - [c39]Urszula Ogiela, Marek R. Ogiela:
Cognitive Approach for Creation of Visual Security Codes. INCoS 2021: 107-111 - [c38]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Transformative Computing Based on Advanced Human Cognitive Processes. INCoS 2021: 112-115 - [c37]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Personalized Cryptographic Protocols for Advanced Data Protection. NBiS 2021: 219-222 - 2020
- [j12]Urszula Ogiela:
Cognitive cryptography for data security in cloud computing. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j11]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Classification of cognitive algorithms for managing services used in cloud computing. Int. J. Grid Util. Comput. 11(3): 378-387 (2020) - [j10]Jindan Zhang, Zhihu Li, Baocang Wang, Xu An Wang, Urszula Ogiela:
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation. Inf. Process. Manag. 57(6): 102287 (2020) - [c36]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Transformative Computing for Distributed Services Management Protocols. AINA 2020: 470-475 - [c35]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Data Fusion Protocols for Cloud Infrastructures. BWCCA 2020: 199-203 - [c34]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Transformative Computing in Knowledge Extraction and Service Management Processes. EIDWT 2020: 222-225 - [c33]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Secure Cognitive Protocols for Data Fusion in Transformative Computing. NBiS 2020: 89-93
2010 – 2019
- 2019
- [j9]Lidia Ogiela, Urszula Ogiela:
Cognitive and biologically cryptographic protocols for data security. Cogn. Syst. Res. 56: 1-6 (2019) - [c32]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Biometric-Based Linguistic Solutions for Data Encryption and Sharing. AINA 2019: 181-187 - [c31]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Impact of Sharing Algorithms for Cloud Services Management. BWCCA 2019: 423-427 - [c30]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
Personalized Protocols for Data Division and Knowledge Management. CISIS 2019: 159-164 - [c29]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Linguistic-Based Security in Fog and Cloud Computing. EIDWT 2019: 120-127 - [c28]Lidia Ogiela, Urszula Ogiela, Marek R. Ogiela:
Cognitive CAPTCHA Based on Perceptual Abilities. FSDM 2019: 958-962 - [c27]Lidia Ogiela, Makoto Takizawa, Urszula Ogiela:
User Oriented Protocols for Data Sharing and Services Management. NBiS 2019: 137-141 - 2018
- [j8]Lidia Ogiela, Urszula Ogiela:
New paradigms of cognitive management extending computational intelligence approaches. Ann. Oper. Res. 265(2): 293-304 (2018) - [j7]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Visual CAPTCHA application in linguistic cryptography. Concurr. Comput. Pract. Exp. 30(2) (2018) - [j6]Urszula Ogiela, Lidia Ogiela:
Linguistic techniques for cryptographic data sharing algorithms. Concurr. Comput. Pract. Exp. 30(3) (2018) - [j5]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Cognitive Approaches for Medicine in Cloud Computing. J. Medical Syst. 42(4): 70:1-70:5 (2018) - [c26]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Cognitive Systems for Service Management in Cloud Computing. AINA 2018: 968-972 - [c25]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Linguistic and Biometric Approaches for Data and Services Management in Cloud Computing. BWCCA 2018: 159-167 - [c24]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Influence of Management and Sharing Protocols for Decision Making Processes in Cloud Computing. CISIS 2018: 263-268 - [c23]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Service Management Protocols in Cloud Computing. EIDWT 2018: 863-869 - [c22]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Innovative Protocols for Data Sharing and Cyber Systems Security. NBiS 2018: 445-452 - 2017
- [c21]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Classification of Cognitive Service Management Systems in Cloud Computing. BWCCA 2017: 309-313 - [c20]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Security of Selected Secret Sharing Schemes. IMIS 2017: 395-400 - [c19]Urszula Ogiela, Makoto Takizawa, Lidia Ogiela:
Security of Visual Captcha for Authentication Procedures. NBiS 2017: 148-152 - 2016
- [c18]Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela:
Comparison of Biometric and Linguistic Secret Sharing Protocols. BWCCA 2016: 501-505 - [c17]Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela:
Efficiency of Strategic Data Sharing and Management Protocols. IMIS 2016: 198-201 - 2015
- [c16]Lidia Ogiela, Urszula Ogiela:
Information Security in Intelligent Data Management Processes. BWCCA 2015: 169-172 - [c15]Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Biometric Methods for Advanced Strategic Data Sharing Protocols. IMIS 2015: 179-183 - 2014
- [b1]Marek R. Ogiela, Urszula Ogiela:
Secure Information Management Using Linguistic Threshold Approach. Advanced Information and Knowledge Processing, Springer 2014, ISBN 978-1-4471-5015-2, pp. 1-136 - [c14]Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Intelligent Bio-inspired Approach for Secrecy Management in the Cloud. 3PGCIC 2014: 286-289 - [c13]Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Crypto-Biometric Models for Information Secrecy. CD-ARES 2014: 172-178 - [c12]Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Advanced Techniques for Computer Sharing and Management of Strategic Data. ICT-EurAsia 2014: 521-525 - [c11]Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Cryptographic Techniques in Advanced Information Management. IMIS 2014: 254-257 - [c10]Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Security and Privacy in Distributed Information Management. INCoS 2014: 73-78 - [c9]Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela:
Cognitive information systems in secure information management and personalized cryptography. SCIS&ISIS 2014: 1152-1157 - 2012
- [j4]Marek R. Ogiela, Urszula Ogiela:
Linguistic protocols for secure information management and sharing. Comput. Math. Appl. 63(2): 564-572 (2012) - [j3]Marek R. Ogiela, Urszula Ogiela:
DNA-like linguistic secret sharing for strategic information systems. Int. J. Inf. Manag. 32(2): 175-181 (2012) - [j2]Marek R. Ogiela, Lidia Ogiela, Urszula Ogiela:
Strategic Information Splitting Using Biometric Patterns. J. Internet Serv. Inf. Secur. 2(3/4): 129-133 (2012) - [c8]Marek R. Ogiela, Urszula Ogiela, Lidia Ogiela:
Secure Information Sharing Using Personal Biometric Characteristics. FGIT-MulGraB/BSBT/IUrC 2012: 369-373 - 2011
- [c7]Marek R. Ogiela, Urszula Ogiela:
Secure Information Management Protocol Based on Linguistic Sharing Techniques. IMIS 2011: 169-174 - 2010
- [j1]Marek R. Ogiela, Urszula Ogiela:
The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Comput. Math. Appl. 60(2): 267-271 (2010) - [c6]Marek R. Ogiela, Urszula Ogiela:
Grammar Encoding in DNA-Like Secret Sharing Infrastructure. AST/UCMA/ISA/ACN 2010: 175-182
2000 – 2009
- 2009
- [c5]Marek R. Ogiela, Urszula Ogiela:
Shadow Generation Protocol in Linguistic Threshold Schemes. FGIT-SecTech 2009: 35-42 - [c4]Marek R. Ogiela, Urszula Ogiela:
Secure Information Splitting Using Grammar Schemes. ICCCI (SCI Volume) 2009: 327-336 - [c3]Marek R. Ogiela, Urszula Ogiela:
Secret Sharing Protocol for Linguistic Threshold Schemes. IIH-MSP 2009: 410-413 - [c2]Marek R. Ogiela, Urszula Ogiela:
Security of Linguistic Threshold Schemes in Multimedia Systems. KES IIMSS 2009: 13-20 - 2008
- [c1]Marek R. Ogiela, Urszula Ogiela:
Linguistic Approach to Cryptographic Data Sharing. FGCN (1) 2008: 377-380
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint