Adaptable security mechanism for dynamic environments B Księżopolski, Z Kotulski Computers & Security 26 (3), 246-255, 2007 | 68 | 2007 |
Cybersecurity: trends, issues, and challenges K Cabaj, Z Kotulski, B Księżopolski, W Mazurczyk EURASIP Journal on Information Security 2018, 1-3, 2018 | 41 | 2018 |
QoP-ML: Quality of Protection modelling language for cryptographic protocols B Ksiezopolski Computers & Security 31 (4), 569-596, 2012 | 40 | 2012 |
Time-aware monitoring of overhead transmission line sag and temperature with LoRa communication M Wydra, P Kubaczynski, K Mazur, B Ksiezopolski Energies 12 (3), 505, 2019 | 38 | 2019 |
Multilevel modeling of distributed denial of service attacks in wireless sensor networks K Mazur, B Ksiezopolski, R Nielek Journal of Sensors 2016 (1), 5017248, 2016 | 38 | 2016 |
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks P Szalachowski, B Ksiezopolski, Z Kotulski Information Processing Letters 110 (7), 247-251, 2010 | 35 | 2010 |
Adaptive approach to network security B Ksiezopolski, Z Kotulski, P Szalachowski Computer Networks: 16th Conference, CN 2009, Wisła, Poland, June 16-20, 2009 …, 2009 | 31 | 2009 |
Secure and time-aware communication of wireless sensors monitoring overhead transmission lines K Mazur, M Wydra, B Ksiezopolski Sensors 17 (7), 1610, 2017 | 29 | 2017 |
A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment M Srokosz, D Rusinek, B Ksiezopolski 2018 Federated Conference on Computer Science and Information Systems …, 2018 | 21 | 2018 |
Security trade-off and energy efficiency analysis in wireless sensor networks D Rusinek, B Ksiezopolski, A Wierzbicki International Journal of Distributed Sensor Networks 11 (6), 943475, 2015 | 16 | 2015 |
The robust measurement method for security metrics generation K Mazur, B Ksiezopolski, Z Kotulski The Computer Journal 58 (10), 2280-2296, 2015 | 14 | 2015 |
Quality of protection evaluation of security mechanisms B Ksiezopolski, T Zurek, M Mokkas The Scientific World Journal 2014 (1), 725279, 2014 | 14 | 2014 |
Machine-Learning-Based Scoring System for Antifraud CISIRTs in Banking Environment M Srokosz, A Bobyk, B Ksiezopolski, M Wydra Electronics 12 (1), 251, 2023 | 13 | 2023 |
Multihop node authentication mechanisms for wireless sensor networks I Mansour, D Rusinek, G Chalhoub, P Lafourcade, B Ksiezopolski Ad-hoc, Mobile, and Wireless Networks: 13th International Conference, ADHOC …, 2014 | 13 | 2014 |
On authentication method impact upon data sampling delay in wireless sensor networks P Szalachowski, B Ksiezopolski, Z Kotulski Computer Networks: 17th Conference, CN 2010, Ustroń, Poland, June 15-19 …, 2010 | 13 | 2010 |
On scalable security model for sensor networks protocols B Księżopolski, Z Kotulski CIB-W78 2005, 22nd Conference Information Technology in Construction …, 2005 | 13 | 2005 |
On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems B Ksiezopolski, Z Kotulski, P Szalachowski European Teletraffic Seminar 195, 2011 | 12 | 2011 |
Teaching a hands-on CTF-based web application security course B Ksiezopolski, K Mazur, M Miskiewicz, D Rusinek Electronics 11 (21), 3517, 2022 | 11 | 2022 |
Cryptographic protocol for electronic auctions with extended requirements B Księżopolski, Z Kotulski Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica 2 (1), 2004 | 11 | 2004 |
On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML) B Ksiezopolski, D Rusinek, A Wierzbicki Information and Communication Technology-EurAsia Conference, 261-270, 2013 | 10 | 2013 |