Bogdan Ksiezopolski
Bogdan Ksiezopolski
Polish-Japanese Institute of Information Technology in Warsaw
Zweryfikowany adres z acm.org - Strona główna
Cytowane przez
Cytowane przez
Adaptable security mechanism for dynamic environments
B Księżopolski, Z Kotulski
Computers & Security 26 (3), 246-255, 2007
QoP-ML: Quality of Protection modelling language for cryptographic protocols
B Ksiezopolski
Computers & Security 31 (4), 569-596, 2012
Multilevel modeling of distributed denial of service attacks in wireless sensor networks
K Mazur, B Ksiezopolski, R Nielek
Journal of Sensors 2016, 2016
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks
P Szalachowski, B Ksiezopolski, Z Kotulski
Information Processing Letters 110 (7), 247-251, 2010
Time-aware monitoring of overhead transmission line sag and temperature with LoRa communication
M Wydra, P Kubaczynski, K Mazur, B Ksiezopolski
Energies 12 (3), 505, 2019
Cybersecurity: trends, issues, and challenges
K Cabaj, Z Kotulski, B Księżopolski, W Mazurczyk
EURASIP Journal on Information Security 2018 (1), 1-3, 2018
Adaptive approach to network security
B Ksiezopolski, Z Kotulski, P Szalachowski
Computer Networks: 16th Conference, CN 2009, Wisła, Poland, June 16-20, 2009 …, 2009
Secure and time-aware communication of wireless sensors monitoring overhead transmission lines
K Mazur, M Wydra, B Ksiezopolski
Sensors 17 (7), 1610, 2017
A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment
M Srokosz, D Rusinek, B Ksiezopolski
2018 Federated Conference on Computer Science and Information Systems …, 2018
The robust measurement method for security metrics generation
K Mazur, B Ksiezopolski, Z Kotulski
The Computer Journal 58 (10), 2280-2296, 2015
Security trade-off and energy efficiency analysis in wireless sensor networks
D Rusinek, B Ksiezopolski, A Wierzbicki
International Journal of Distributed Sensor Networks 11 (6), 943475, 2015
Quality of protection evaluation of security mechanisms
B Ksiezopolski, T Zurek, M Mokkas
The Scientific World Journal 2014, 2014
Multihop node authentication mechanisms for wireless sensor networks
I Mansour, D Rusinek, G Chalhoub, P Lafourcade, B Ksiezopolski
Ad-hoc, Mobile, and Wireless Networks: 13th International Conference, ADHOC …, 2014
On scalable security model for sensor networks protocols
B Księżopolski, Z Kotulski
CIB-W78 2005, 22nd Conference Information Technology in Construction …, 2005
On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems
B Ksiezopolski, Z Kotulski, P Szalachowski
European Teletraffic Seminar 195, 2011
On authentication method impact upon data sampling delay in wireless sensor networks
P Szalachowski, B Ksiezopolski, Z Kotulski
Computer Networks: 17th Conference, CN 2010, Ustroń, Poland, June 15-19 …, 2010
On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML)
B Ksiezopolski, D Rusinek, A Wierzbicki
Information and Communication Technology-EurAsia Conference, 261-270, 2013
Cryptographic protocol for electronic auctions with extended requirements
B Księżopolski, Z Kotulski
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica 2 (1), 2004
Multilevel Modeling of Secure Systems in QoP-ML
B Księżopolski
CRC Press, 2015
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML)
B Księżopolski, D Rusinek, A Wierzbicki
Annales Universitatis Mariae Curie-Sklodowska, sectio AI–Informatica 12 (4 …, 2012
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20