Follow
Rafal Leszczyna
Title
Cited by
Cited by
Year
Cybersecurity and privacy in standards for smart grids–A comprehensive survey
R Leszczyna
Computer Standards & Interfaces 56, 62-73, 2018
812018
A review of standards with cybersecurity requirements for smart grid
R Leszczyna
Computers & security 77, 262-276, 2018
762018
Standards on cyber security assessment of smart grid
R Leszczyna
International Journal of Critical Infrastructure Protection 22, 70-89, 2018
702018
Trust case: Justifying trust in an IT solution
J Górski, A Jarzębowicz, R Leszczyna, J Miler, M Olszewski
Reliability Engineering & System Safety 89 (1), 33-47, 2005
602005
Evaluation of agent platforms
R Leszczyna
Proceedings of the Fifth International Joint Conference on Autonomous Agents …, 2004
412004
Simulating malware with MAlSim
R Leszczyna, I Nai Fovino, M Masera
Journal in computer virology 6, 65-75, 2010
392010
Approach to security assessment of critical infrastructures’ information systems
R Leszczyna, IN Fovino, M Masera
IET Information Security 5 (3), 135-144, 2011
352011
Review of cybersecurity assessment methods: Applicability perspective
R Leszczyna
Computers & Security 108, 102376, 2021
272021
Protecting industrial control systems-recommendations for europe and member states
R Leszczyna, E Egozcue, L Tarrafeta, VF Villar, R Estremera, J Alonso
tech. rep., Technical report, European Union Agency for Network and …, 2011
272011
Evaluation of open source SIEM for situation awareness platform in the smart grid environment
R Leszczyna, MR Wróbel
2015 IEEE World Conference on Factory Communication Systems (WFCS), 1-4, 2015
262015
Untraceability of mobile agents
R Leszczyna, J Górski
Proceedings of the fourth international joint conference on Autonomous …, 2005
192005
Security assessment of a turbo-gas power plant
M Masera, IN Fovino, R Leszczyna
Critical Infrastructure Protection II 2, 31-40, 2008
172008
Malsim-mobile agent malware simulator
R Leszczyna, IN Fovino, M Masera
1st International ICST Conference on Simulation Tools and Techniques for …, 2010
162010
Approaching secure industrial control systems
R Leszczyna
IET Information Security 9 (1), 81-89, 2015
152015
An approach to trust case development
J Górski, A Jarzebowicz, R Leszczyna, J Miler, M Olszewski
Computer Safety, Reliability, and Security: 22nd International Conference …, 2003
152003
Cyber security policies and critical infrastructure protection
G Gluschke, MH Casin, M Macori
Institute for Security and Safety Press, 2018
142018
Threat intelligence platform for the energy sector
R Leszczyna, MR Wróbel
Software: Practice and Experience 49 (8), 1225-1254, 2019
132019
Cost assessment of computer security activities
R Leszczyna
Computer Fraud & Security 2013 (7), 11-16, 2013
132013
ICT Security Assessment of a Power Plant, a Case Study
IN Fovino, M Masera, R Leszczyna
2nd International Conference on Critical Infrastructure Protection …, 2008
132008
Anonymity architecture for mobile agent systems
R Leszczyna
Holonic and Multi-Agent Systems for Manufacturing: Third International …, 2007
132007
The system can't perform the operation now. Try again later.
Articles 1–20