Rafal Leszczyna

Orcid: 0000-0001-7293-2956

According to our database1, Rafal Leszczyna authored at least 31 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Activity-based payments: alternative (anonymous) online payment model.
Int. J. Inf. Sec., June, 2024

Cybersecurity Assessment Methods - Why Aren't They Used?
IT Prof., 2024

ISO/IEC 27001-Based Estimation of Cybersecurity Costs with Caspea.
Proceedings of the Harnessing Opportunities: Reshaping ISD in the post-COVID-19 and Generative AI Era (ISD2024 Proceedings), 2024

2021
Aiming at methods' wider adoption: Applicability determinants and metrics.
Comput. Sci. Rev., 2021

Review of cybersecurity assessment methods: Applicability perspective.
Comput. Secur., 2021

2020
Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study.
Proceedings of the Security and Privacy in Communication Networks, 2020

Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis.
Proceedings of the Information Systems Security - 16th International Conference, 2020

2019
Threat intelligence platform for the energy sector.
Softw. Pract. Exp., 2019

Standards with cybersecurity controls for smart grid - A systematic analysis.
Int. J. Commun. Syst., 2019

Developing novel solutions to realise the European Energy - Information Sharing & Analysis Centre.
Decis. Support Syst., 2019

Cybersecurity in the Electricity Sector - Managing Critical Infrastructure
Springer, ISBN: 978-3-030-19537-3, 2019

2018
Standards on cyber security assessment of smart grid.
Int. J. Crit. Infrastructure Prot., 2018

Cybersecurity and privacy in standards for smart grids - A comprehensive survey.
Comput. Stand. Interfaces, 2018

A review of standards with cybersecurity requirements for smart grid.
Comput. Secur., 2018

2016
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

2015
Approaching secure industrial control systems.
IET Inf. Secur., 2015

Evaluation of open source SIEM for situation awareness platform in the smart grid environment.
Proceedings of the IEEE World Conference on Factory Communication Systems, 2015

2014
Security information sharing for smart grids: Developing the right data model.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures.
Proceedings of the Multiagent Systems and Applications - Volume 1: Practice and Experience, 2013

2012
Security and Anonymity in Agent Systems.
Proceedings of the Software Agents, Agent Systems and Their Applications, 2012

Software Agents for Computer Network Security.
Proceedings of the Software Agents, Agent Systems and Their Applications, 2012

2011
Approach to security assessment of critical infrastructures' information systems.
IET Inf. Secur., 2011

2010
Simulating malware with MAlSim.
J. Comput. Virol., 2010

2008
MAISim: mobile agent malware simulator.
Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, 2008

Security Assessment Of A Turbo-Gas Power Plant.
Proceedings of the Critical Infrastructure Protection II, 2008

2007
Anonymity Architecture for Mobile Agent Systems.
Proceedings of the Holonic and Multi-Agent Systems for Manufacturing, 2007

2006
Performance analysis of untraceability protocols for mobile agents using an adaptable framework.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

2005
Trust case: justifying trust in an IT solution.
Reliab. Eng. Syst. Saf., 2005

Untraceability of mobile agents.
Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), 2005

Tool support for detecting defects in object-oriented models.
Proceedings of the Enhanced Methods in Computer Security, 2005

2003
An Approach to Trust Case Development.
Proceedings of the Computer Safety, 2003


  Loading...