Jerzy Konorski
Orcid: 0000-0002-3091-1628
According to our database1,
Jerzy Konorski
authored at least 56 papers
between 1986 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Trustworthiness and Subversion in Large Service-Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
Defending against fake VIP in scant-transparency information systems with QoS differentiation.
Inf. Sci., 2022
IEEE Internet Things J., 2022
2020
A reactive algorithm for deducing nodal forwarding behavior in a multihop ad-hoc wireless network in the presence of errors.
CoRR, 2020
Nodal cooperation equilibrium analysis in multihop wireless ad hoc networks with a reputation system.
CoRR, 2020
Proceedings of the 30th International Telecommunication Networks and Applications Conference, 2020
2019
CoRR, 2019
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019
Proceedings of the Ad Hoc Networks - 11th EAI International Conference, 2019
2018
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network.
Wirel. Commun. Mob. Comput., 2018
IEEE Wirel. Commun. Lett., 2018
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling, 2018
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks.
Proceedings of the IEEE Global Communications Conference, 2018
2017
IEEE Commun. Lett., 2017
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System.
Proceedings of the Computer Network Security, 2017
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection.
Proceedings of the 18th International Workshop on Trust in Agent Societies co-located with the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2016), 2016
2015
Proceedings of the 8th IFIP Wireless and Mobile Networking Conference, 2015
2014
IEEE Trans. Wirel. Commun., 2014
Proceedings of the International Conference on Information Networking 2014, 2014
2013
Theory and implementation of a virtualisation level Future Internet defence in depth architecture.
Int. J. Trust. Manag. Comput. Commun., 2013
2012
EDCA remapping in ad hoc IEEE 802.11 WLANs: An incentive compatible discouragement scheme.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
2011
DRinK: a defense strategy of cooperative wireless terminals in a wireless multihoming environment.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011
Proceedings of the 2011 International Conference on Information Networking, 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
Router selfishness in community wireless mesh networks: Cross-layer benefits and harms.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
2009
Proceedings of the 2nd IFIP Wireless Days, 2009
Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs.
Proceedings of the NTMS 2009, 2009
Proceedings of the Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, 2009
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009
2008
Proceedings of the 1st IFIP Wireless Days, 2008
2007
J. Discrete Algorithms, 2007
An Incentive-Based Forwarding Protocol for Mobile Ad Hoc Networks with Anonymous Packets.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007
Capacity-Fairness Performance of an Ad Hoc IEEE 802.11 WLAN with Noncooperative Stations.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007
2006
IEEE/ACM Trans. Netw., 2006
J. Networks, 2006
Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2006
An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANs.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006
Proceedings of the Distributed Computing and Internet Technology, 2006
2005
Proceedings of the 13th International Symposium on Modeling, 2005
Proceedings of the Distributed Computing, 2005
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005
2004
Proceedings of the NETWORKING 2004, 2004
CSMA/CA Performance under Backoff Attacks: A Game-Theoretic Context.
Proceedings of the MMB & PGTS 2004, 2004
2002
Proceedings of the NETWORKING 2002, 2002
2001
Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting.
Proceedings of the Protocols for Multimedia Systems, 6th International Conference, 2001
2000
Proceedings of the NETWORKING 2000, 2000
Packet Scheduling in Wireless LANs - A Framework for a Noncooperative Paradigm.
Proceedings of the Personal Wireless Communications, 2000
1993
Performance of the Cooperative Random Token Protocol for High-Speed Radio LANs.
Proceedings of the High Speed Networks and Their Performance, 1993
1986
Store-and-Forward Deadlock Prevention in Packet Networks: A Circulating Token Approach and Performance Considerations.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986