Bogdan Ksiezopolski
Orcid: 0000-0003-1904-3222
According to our database1,
Bogdan Ksiezopolski
authored at least 43 papers
between 2003 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
2019
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019
2018
A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018
2017
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines.
Sensors, 2017
CoRR, 2017
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017
Proceedings of the Computer Networks - 24th International Conference, 2017
2016
Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks.
J. Sensors, 2016
2015
Int. J. Distributed Sens. Networks, 2015
On the Modelling of the Influence of Access Control Management to the System Security and Performance.
Proceedings of the ICEIS 2015, 2015
Proceedings of the Computer Networks - 22nd International Conference, 2015
Proceedings of the Computer Information Systems and Industrial Management, 2015
2014
The Concept and Security Analysis of Wireless Sensor Network for Gas Lift in Oilwells.
Ann. UMCS Informatica, 2014
On the Effect of Security and Communication Factors in the Reliability of Wireless Sensor Networks.
J. Sens. Actuator Networks, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Cryptography and Security Systems - Third International Conference, 2014
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 13th International Conference, 2014
2013
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML).
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
2012
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML).
Ann. UMCS Informatica, 2012
Comput. Secur., 2012
2011
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2.
Ann. UMCS Informatica, 2011
Proceedings of the Computer Networks - 18th Conference, 2011
Proceedings of the Computer Networks - 18th Conference, 2011
2010
Ann. UMCS Informatica, 2010
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks.
Inf. Process. Lett., 2010
On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks.
Proceedings of the Computer Networks - 17th Conference, 2010
Proceedings of the Computer Networks - 17th Conference, 2010
2009
Ann. UMCS Informatica, 2009
Proceedings of the International Multiconference on Computer Science and Information Technology, 2009
Proceedings of the Computer Networks - 16th Conference, 2009
2007
Ann. UMCS Informatica, 2007
2005
Ann. UMCS Informatica, 2005
On a Concept of Scalable Security: PKI-based Model using Additional Cryptographic Modules.
Proceedings of the ADBIS 2005, 2005
2004
Ann. UMCS Informatica, 2004
2003
Using PHP and HTML languages to create graphical interfaces and to remote control of programs.
Ann. UMCS Informatica, 2003
Using PHP and HTML languages and MySQL databases to create servers of scientific information.
Ann. UMCS Informatica, 2003