Cybersecurity and privacy in standards for smart grids–A comprehensive survey R Leszczyna Computer Standards & Interfaces 56, 62-73, 2018 | 81 | 2018 |
A review of standards with cybersecurity requirements for smart grid R Leszczyna Computers & security 77, 262-276, 2018 | 76 | 2018 |
Standards on cyber security assessment of smart grid R Leszczyna International Journal of Critical Infrastructure Protection 22, 70-89, 2018 | 70 | 2018 |
Trust case: Justifying trust in an IT solution J Górski, A Jarzębowicz, R Leszczyna, J Miler, M Olszewski Reliability Engineering & System Safety 89 (1), 33-47, 2005 | 60 | 2005 |
Evaluation of agent platforms R Leszczyna Proceedings of the Fifth International Joint Conference on Autonomous Agents …, 2004 | 41 | 2004 |
Simulating malware with MAlSim R Leszczyna, I Nai Fovino, M Masera Journal in computer virology 6, 65-75, 2010 | 39 | 2010 |
Approach to security assessment of critical infrastructures’ information systems R Leszczyna, IN Fovino, M Masera IET Information Security 5 (3), 135-144, 2011 | 35 | 2011 |
Review of cybersecurity assessment methods: Applicability perspective R Leszczyna Computers & Security 108, 102376, 2021 | 27 | 2021 |
Protecting industrial control systems-recommendations for europe and member states R Leszczyna, E Egozcue, L Tarrafeta, VF Villar, R Estremera, J Alonso tech. rep., Technical report, European Union Agency for Network and …, 2011 | 27 | 2011 |
Evaluation of open source SIEM for situation awareness platform in the smart grid environment R Leszczyna, MR Wróbel 2015 IEEE World Conference on Factory Communication Systems (WFCS), 1-4, 2015 | 26 | 2015 |
Untraceability of mobile agents R Leszczyna, J Górski Proceedings of the fourth international joint conference on Autonomous …, 2005 | 19 | 2005 |
Security assessment of a turbo-gas power plant M Masera, IN Fovino, R Leszczyna Critical Infrastructure Protection II 2, 31-40, 2008 | 17 | 2008 |
Malsim-mobile agent malware simulator R Leszczyna, IN Fovino, M Masera 1st International ICST Conference on Simulation Tools and Techniques for …, 2010 | 16 | 2010 |
Approaching secure industrial control systems R Leszczyna IET Information Security 9 (1), 81-89, 2015 | 15 | 2015 |
An approach to trust case development J Górski, A Jarzebowicz, R Leszczyna, J Miler, M Olszewski Computer Safety, Reliability, and Security: 22nd International Conference …, 2003 | 15 | 2003 |
Cyber security policies and critical infrastructure protection G Gluschke, MH Casin, M Macori Institute for Security and Safety Press, 2018 | 14 | 2018 |
Threat intelligence platform for the energy sector R Leszczyna, MR Wróbel Software: Practice and Experience 49 (8), 1225-1254, 2019 | 13 | 2019 |
Cost assessment of computer security activities R Leszczyna Computer Fraud & Security 2013 (7), 11-16, 2013 | 13 | 2013 |
ICT Security Assessment of a Power Plant, a Case Study IN Fovino, M Masera, R Leszczyna 2nd International Conference on Critical Infrastructure Protection …, 2008 | 13 | 2008 |
Anonymity architecture for mobile agent systems R Leszczyna Holonic and Multi-Agent Systems for Manufacturing: Third International …, 2007 | 13 | 2007 |