On end-to-end approach for slice isolation in 5G networks. Fundamental challenges Z Kotulski, T Nowak, M Sepczuk, M Tunia, R Artych, K Bocianiak, T Osko, ... 2017 Federated conference on computer science and information systems …, 2017 | 94 | 2017 |
Towards constructive approach to end-to-end slice isolation in 5G networks Z Kotulski, TW Nowak, M Sepczuk, M Tunia, R Artych, K Bocianiak, ... EURASIP Journal on Information Security 2018, 1-23, 2018 | 76 | 2018 |
Verticals in 5G MEC-use cases and security challenges TW Nowak, M Sepczuk, Z Kotulski, W Niewolski, R Artych, K Bocianiak, ... IEEE Access 9, 87251-87298, 2021 | 65 | 2021 |
5G networks: Types of isolation and their parameters in RAN and CN slices Z Kotulski, TW Nowak, M Sepczuk, MA Tunia Computer Networks 171, 107135, 2020 | 42 | 2020 |
New Security Architecture of Access Control in 5G MEC Z Kotulski, W Niewolski, TW Nowak, M Sepczuk Security in Computing and Communications: 8th International Symposium, SSCC …, 2021 | 14 | 2021 |
Token-based authentication framework for 5G MEC mobile networks W Niewolski, TW Nowak, M Sepczuk, Z Kotulski Electronics 10 (14), 1724, 2021 | 10 | 2021 |
Graph-based quantitative description of networks’ slices isolation Z Kotulski, TW Nowak, M Sepczuk, MA Tunia | 9 | 2018 |
Security Context Migration in MEC: Challenges and Use Cases W Niewolski, TW Nowak, M Sepczuk, Z Kotulski, R Artych, K Bocianiak, ... Electronics 11 (21), 3512, 2022 | 4 | 2022 |
Low-complexity access control scheme for MEC-based services M Sepczuk, Z Kotulski, W Niewolski, TW Nowak 2022 17th Conference on Computer Science and Intelligence Systems (FedCSIS …, 2022 | 4 | 2022 |
Security architecture for authorized anonymous communication in 5G MEC W Niewolski, TW Nowak, M Sepczuk, Z Kotulski Journal of Network and Computer Applications 218, 103713, 2023 | 2 | 2023 |
Matematyczny model izolacji usług w sieciach plastrowych T Nowak Przegląd Telekomunikacyjny+ Wiadomości Telekomunikacyjne, 2017 | 1 | 2017 |
Keeping Verticals’ Sovereignty During Application Migration in Continuum Z Kotulski, T Nowak, M Sepczuk, K Bocianiak, T Pawlikowski, A Podlasek, ... Journal of Network and Systems Management 32 (4), 67, 2024 | | 2024 |
Webinar:" Security context migration in a multi-cloud ecostystem" Z Kotulski, M Sepczuk, T Nowak The Institute of Telecommunications, 2023 | | 2023 |
Webinar:" Security context transfer in mobile edge environment i 5G and beyond" Z Kotulski, T Nowak, M Sepczuk The Institute of Telecommunications, 2022 | | 2022 |
Webinar''Security need of Verticals hosted in 5G MEC'' Z Kotulski, M Sepczuk, T Nowak The Institute of Telecommunications, 2021 | | 2021 |
Przedstawianie parametrów sieciowych z wykorzystaniem skierowanych liczb rozmytych TW Nowak Przegląd Telekomunikacyjny+ Wiadomości Telekomunikacyjne, 2018 | | 2018 |
Network Slicing–calculating isolation: models, paramaters, tools Z Kotulski, T Nowak, M Sepczuk, MA Tunia The Institute of Telecommunications, 2017 | | 2017 |
Przegląd metod realizacji generatorów losowych ciągów binarnych T Nowak Oficyna Wydawnicza PW, 2016 | | 2016 |
Secure communicationwith using notary system T Nowak Instytut Telekomunikacji, 2014 | | 2014 |