Adjustable Pheromone Reinforcement Strategies for Problems with Efficient Heuristic Information
Improving monolithic kernel security and robustness through intra-kernel sandboxing
SoK: Secure Memory Allocation
Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment
Optimizing physical protection system using domain experienced exploration method
Hyper-heuristic Approach for Improving Marker Efficiency
Stabile Usage of Export Regulatory Standards in Data Security Process
Evolutionary Hyper-heuristic for Solving the Strip-Packing Problem
Designing DNA Microarrays with Ant Colony Optimization
Bottom-Left and Sequence Pair for Solving Packing Problems
Measuring performance of optimization algorithms in evolutionary computation
The information systems' security level assessment model based on an ontology and evidential reasoning approach
Asynchronous and implicitly parallel evolutionary computation models
On Using Genetic Algorithms for Intrinsic Side-channel Resistance: The Case of AES S-box
Glitch it if you can: parameter search strategies for successful fault injection
S-box, SET, Match: A Toolbox for S-box Analysis
A New Ant Colony Optimization Algorithm : Three Bound Ant System
Conceptual Information Modelling within the Contemporary Information Security Policies
Conceptual Modeling of Information Systems within the Information Security Policies
Evolving Cryptographically Sound Boolean Functions
On the Recombination Operator in the Real-Coded Genetic Algorithms
On the Analysis of Experimental Results in Evolutionary Computation
Influence of the Crossover Operator in the Performance of the Hybrid Taguchi GA
On Evolutionary Computation Methods in Cryptography, Proceedings of the Information Systems Security
A Pheromone Trails Model for MAX-MIN Ant System
Extended Trail Reinforcement Strategies for Ant Colony Optimization
Evaluation of Crossover Operator Performance in Genetic Algorithms with Binary Representation
Generic System for Remote Testing and Calibration of Measuring Instruments: Security Architecture
Neural Cryptography and Quantum Computers
On the Efficiency of Crossover Operators in Genetic Algorithms with Binary Representation
Comparison of a Crossover Operator in Binary-coded Genetic Algorithms
Applying ai-techniques as help for faculty administration - a case study
Operating Systems
The New Negative Slope Coefficient Measure
Quantum Cryptography: Development and Protocols
Dealings with Problem Hardness in Genetic Algorithms
Exam Timetabling Using Genetic Algorithm
Adaptive mutation operator cycling
A method for identifying Web applications
Using Trust on the Internet
Evolutionary Algorithms for the Resource Constrained Scheduling Problem
Implementation of EAP Authentication into IKEv2 Protocol
Synchronization problems
An Overview of Port-Based Network Access Control
Implementing Automated Vulnerability Assessment in Large Network Environments
An overview of distributed programming techniques
Security in mobile digital rights management
Identification of Individual Over-The-Air Generic Content Download for Mobile Phones
Using a set of elite individuals in a genetic algorithm
Quantum cryptography and security of information systems
Solving Timetable Scheduling Problem Using Genetic Algorithms
Solving n-Queen Problem Using Global Parallel Genetic Algorithm
Scheduling Multiprocessor Tasks with Genetic Algorithms
Parallelization of Elimination Tournament Selection without Synchronization
Improving the Efficiency of Parallel Genetic Algorithms
A New Model of Global Parallel Genetic Algorithm
An Asynchronous Model of Global Parallel Genetic Algorithms
Genetic Algorithms in Real-Time Imprecise Computing
Adaptive Genetic Algorithm
Genetic Algorithms in Real-Time Imprecise Computing
A Few Implementations of Parallel Genetic Algorithm
Adaptive Genetic Algorithm
Parallel Adaptive Genetic Algorithm
Using Genetic Algorithms for Adapting Approximation Functions
An Implementation of Binary and Floating Point Chromosome Representation in Genetic Algorithm
Traditional Techniques of Genetic Algorithms Applied to Floating-Point Chromosome Representations
Evaluating the use of Genetic Algorithms for Approximation Time Series
Teaching
University undergraduate
- Operating Systems (Lecturer in charge)
- Operating Systems (Lecturer in charge)
- BSc Thesis (Lectures)
- Final BSc Thesis (Lectures)
- Project C (Lectures)
- Software Design Project (Lectures)
- Software Design Project (Lectures)
- Software Design Project (Lectures)
University graduate
- Advanced Operating Systems (Lecturer in charge)
- Cryptography and Cryptoanalysis (Lecturer in charge)
- Laboratory of Computer Science 2 (Lecturer in charge)
- Diploma thesis (Lectures)
- Project (Lectures)
- Project (Lectures)
- Project (Lectures)
- Seminar 1 (Lectures)
Postgraduate doctoral study programme
- Computer System Security (Lecturer in charge)
Postgraduate spec. study
- Applied cryptography (Lecturer in charge)
Competences
-
Computers and information processing
Computer security -
Mathematics
Genetic algorithms Heuristic algorithms Optimization Cost function Optimal scheduling Optimization methods -
Computational and artificial intelligence
Evolutionary computation Genetic algorithms -
Industry applications
Cryptography Ciphers Encryption Public key -
Communications technology
Cryptographic protocols -
Engineering management
Security management