关注
Bogdan Ksiezopolski
Bogdan Ksiezopolski
Kozminski University
在 acm.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Adaptable security mechanism for dynamic environments
B Księżopolski, Z Kotulski
Computers & Security 26 (3), 246-255, 2007
682007
Cybersecurity: trends, issues, and challenges
K Cabaj, Z Kotulski, B Księżopolski, W Mazurczyk
EURASIP Journal on Information Security 2018, 1-3, 2018
412018
QoP-ML: Quality of Protection modelling language for cryptographic protocols
B Ksiezopolski
Computers & Security 31 (4), 569-596, 2012
402012
Time-aware monitoring of overhead transmission line sag and temperature with LoRa communication
M Wydra, P Kubaczynski, K Mazur, B Ksiezopolski
Energies 12 (3), 505, 2019
382019
Multilevel modeling of distributed denial of service attacks in wireless sensor networks
K Mazur, B Ksiezopolski, R Nielek
Journal of Sensors 2016 (1), 5017248, 2016
382016
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks
P Szalachowski, B Ksiezopolski, Z Kotulski
Information Processing Letters 110 (7), 247-251, 2010
352010
Adaptive approach to network security
B Ksiezopolski, Z Kotulski, P Szalachowski
Computer Networks: 16th Conference, CN 2009, Wisła, Poland, June 16-20, 2009 …, 2009
312009
Secure and time-aware communication of wireless sensors monitoring overhead transmission lines
K Mazur, M Wydra, B Ksiezopolski
Sensors 17 (7), 1610, 2017
292017
A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment
M Srokosz, D Rusinek, B Ksiezopolski
2018 Federated Conference on Computer Science and Information Systems …, 2018
212018
Security trade-off and energy efficiency analysis in wireless sensor networks
D Rusinek, B Ksiezopolski, A Wierzbicki
International Journal of Distributed Sensor Networks 11 (6), 943475, 2015
162015
The robust measurement method for security metrics generation
K Mazur, B Ksiezopolski, Z Kotulski
The Computer Journal 58 (10), 2280-2296, 2015
142015
Quality of protection evaluation of security mechanisms
B Ksiezopolski, T Zurek, M Mokkas
The Scientific World Journal 2014 (1), 725279, 2014
142014
Machine-Learning-Based Scoring System for Antifraud CISIRTs in Banking Environment
M Srokosz, A Bobyk, B Ksiezopolski, M Wydra
Electronics 12 (1), 251, 2023
132023
Multihop node authentication mechanisms for wireless sensor networks
I Mansour, D Rusinek, G Chalhoub, P Lafourcade, B Ksiezopolski
Ad-hoc, Mobile, and Wireless Networks: 13th International Conference, ADHOC …, 2014
132014
On authentication method impact upon data sampling delay in wireless sensor networks
P Szalachowski, B Ksiezopolski, Z Kotulski
Computer Networks: 17th Conference, CN 2010, Ustroń, Poland, June 15-19 …, 2010
132010
On scalable security model for sensor networks protocols
B Księżopolski, Z Kotulski
CIB-W78 2005, 22nd Conference Information Technology in Construction …, 2005
132005
On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems
B Ksiezopolski, Z Kotulski, P Szalachowski
European Teletraffic Seminar 195, 2011
122011
Teaching a hands-on CTF-based web application security course
B Ksiezopolski, K Mazur, M Miskiewicz, D Rusinek
Electronics 11 (21), 3517, 2022
112022
Cryptographic protocol for electronic auctions with extended requirements
B Księżopolski, Z Kotulski
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica 2 (1), 2004
112004
On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML)
B Ksiezopolski, D Rusinek, A Wierzbicki
Information and Communication Technology-EurAsia Conference, 261-270, 2013
102013
系统目前无法执行此操作,请稍后再试。
文章 1–20