Skip to content

Faster, more stable, built to scale.

Software engineer working on production systems.

I build and improve systems, focusing on performance.

* main
exp0010 --> feat/elastic-email HEAD
2023 -> Present

Software Engineer

@ Elastic Email

// Full Stack Development & AI Integration

  • -> Implementing AI-powered features using RAG architecture and large language models
  • -> Core engineer on Inbox — owning features across frontend, backend, and data layers
  • -> Building shared component library and reusable patterns adopted across product teams
  • -> Identifying performance bottlenecks and driving infrastructure improvements
TypeScript
React.js
Node.js
Express.js
exp0030 --> edu/west-pomeranian-university-of-technology
2024 -> 2028

PhD Candidate

@ West Pomeranian University of Technology

// Cybersecurity & Phishing Detection

  • -> Published 2 papers (HICSS 2025, IEEE Access 2026), 3rd under review for CISIM 2026
  • -> Built browser extension for real-time phishing URL detection using XGBoost
  • -> Developing multi-layer detection pipeline combining NLP and computer vision
Python
PyTorch
Deep Learning
NLP
exp0020 --> feat/maritime-university-of-szczecin
2023 -> 2023

Web Developer

@ Maritime University of Szczecin

// Procurement System Development

  • -> Built and delivered the first version of a procurement system (NDA project), designing and implementing a full-stack solution using React, Redux, Express, TypeScript, and MySQL.
  • -> Deployed and configured on Debian server with secure database management
  • -> Led development across the entire project lifecycle to on-time delivery
React.js
Redux
Express.js
TypeScript
Published
2026

XGBoost-Based URL Phishing Detection Method With Cross-Dataset Validation

{ author(s):Milosz Misiek, Tomasz Hyla}

Machine LearningXGBoostPhishing DetectionURL Analysis

Conducted comprehensive cross-dataset validation of XGBoost for phishing URL detection across over 760,000 samples. The model achieved 90.7% accuracy, training 12.6x faster and using 3.6x less memory than comparable neural networks.

Time: 30 mindoi:10.1109/access.2026.3672690
VIEW PAPER
Abstract

XGBoost-Based URL Phishing Detection Method With Cross-Dataset Validation

{ author(s): Milosz Misiek, Tomasz Hyla }

This article analyses the performance characteristics of XGBoost models across multiple datasets for phishing URL detection, extending our previous conference paper with comprehensive cross-dataset validation and comparative analysis.

Using a validation framework with three distinct datasets — a custom phishing dataset (75,738 samples), the large-scale GramBeddings dataset (639,723 samples), and the PhiUSIIL dataset (47,103 samples)—we demonstrate that XGBoost delivers robust performance across diverse data sources. Our approach addresses the issue of feature instability, showing how balanced feature engineering is crucial for reliable detection.

The model achieves 90.7% accuracy and 91.2% F1 score on the custom dataset, with a solid 77.8% average accuracy across three independent test sets. In comparative benchmarks against Neural Networks, XGBoost proved superior in training efficiency and detection quality, achieving 2.1% higher accuracy and training 12.6 times faster (0.95s vs 12.01s) with 3.6 times less memory. Although Neural Networks offered faster inference (7.51ms vs 20.6ms) and smaller model sizes, XGBoost’s balance of high accuracy and rapid training makes it highly effective for practical, real-world phishing detection systems.

2026doi:10.1109/access.2026.3672690
VIEW PAPER
Published
2025

Preventing Phishing Attacks with Browser-Based URL Detection

{ author(s):Miłosz Misiek, Tomasz Hyla}

SecurityPhishing DetectionURL AnalysisBrowser Extension

Built and evaluated a machine-learning browser extension using XGBoost to detect phishing attacks in real-time. The solution accurately identifies malicious URLs while offering an exceptional balance of computational efficiency and interpretability.

Time: 15 mindoi:10.24251/hicss.2025.874
VIEW PAPER
Abstract

Preventing Phishing Attacks with Browser-Based URL Detection

{ author(s): Miłosz Misiek, Tomasz Hyla }

One way to protect users from clicking on a malicious URL is to continuously check all URLs displayed on the website and notify them when a suspicious URL is detected.

This paper presents a browser plug-in to detect malicious web addresses facilitating phishing attacks. The plug-in leverages a machine-learning model, specifically the Extreme Gradient Boosting decision tree model. The results indicate high performance in accurately identifying malicious URLs.

Although the XGBoost model does not achieve the highest possible accuracy, it offers an exceptional balance between various performance metrics. It provides practical benefits in terms of computational efficiency and interpretability. These features make it a solid foundation for further development and potential implementation in phishing detection systems on social networking sites. The plug-in identifies and flags all external URLs on a given page, providing users with information regarding the potential maliciousness of a URL.

2025doi:10.24251/hicss.2025.874
VIEW PAPER
00
NDA2025

Inbox: Communication Platform

// Core Engineer

Built a real-time communication system as a core contributor. Improved performance and reliability under high load to support low-latency messaging.

Next.jsNodeJSMongoDBGraphQLTypeScriptWebSocket
Inbox: Communication Platform
01
NDA2024

Home Page: Elastic Email

// Engineer

Contributed to the Elastic Email marketing website. Focused on performance and rendering efficiency to improve user experience.

Next.jsTypeScriptTailwindCSS
Home Page: Elastic Email
02
NDA2023

Template Editor: Elastic Email

// Engineer

Worked on a complex, client-heavy email template editor, addressing drag-and-drop integration, state synchronization challenges, and rendering performance for complex layouts.

ReactTypeScriptStyled ComponentsWordPress Gutenberg
Template Editor: Elastic Email

Let’s build something big.

// have an idea or interesting problem? i’d love to hear about it.

{ state: "waiting_for_input" }