default search action
Bogdan Ksiezopolski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c22]Jakub Pastuszuk, Patryk Burek, Bogdan Ksiezopolski:
Cybersecurity Ontology for Dynamic Analysis of IT Systems. KES 2021: 1011-1020 - [c21]Mateusz Kozlowski, Bogdan Ksiezopolski:
A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks. SECRYPT 2021: 728-733
2010 – 2019
- 2019
- [c20]Marek Miskiewicz, Bogdan Ksiezopolski:
Cryptographic keys management system based on DNA strands. FedCSIS 2019: 231-235 - 2018
- [j20]Krzysztof Cabaj, Zbigniew Kotulski, Bogdan Ksiezopolski, Wojciech Mazurczyk:
Cybersecurity: trends, issues, and challenges. EURASIP J. Inf. Secur. 2018: 10 (2018) - [c19]Michal Srokosz, Damian Rusinek, Bogdan Ksiezopolski:
A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment. FedCSIS 2018: 391-395 - 2017
- [j19]Katarzyna Mazur, Michal Wydra, Bogdan Ksiezopolski:
Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines. Sensors 17(7): 1610 (2017) - [c18]Jakub Pyda, Wojciech Prokop, Damian Rusinek, Bogdan Ksiezopolski:
Secure and Reliable Localization in Wireless Sensor Network Based on RSSI Mapping. CN 2017: 55-69 - [c17]Agata Niescieruk, Bogdan Ksiezopolski, Radoslaw Nielek, Adam Wierzbicki:
How to Train People to Increase Their Security Awareness in IT. MUE/FutureTech 2017: 12-17 - [i1]Katarzyna Mazur, Bogdan Ksiezopolski:
On Data Flow Management: the Multilevel Analysis of Data Center Total Cost. CoRR abs/1703.09316 (2017) - 2016
- [j18]Katarzyna Mazur, Bogdan Ksiezopolski, Radoslaw Nielek:
Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks. J. Sensors 2016: 5017248:1-5017248:13 (2016) - [j17]Tomasz Zurek, Michail Mokkas, Bogdan Ksiezopolski:
On the Modelling of Context-Aware Security for Mobile Devices. Mob. Inf. Syst. 2016: 8743504:1-8743504:16 (2016) - 2015
- [j16]Katarzyna Mazur, Bogdan Ksiezopolski, Zbigniew Kotulski:
The Robust Measurement Method for Security Metrics Generation. Comput. J. 58(10): 2280-2296 (2015) - [j15]Damian Rusinek, Bogdan Ksiezopolski, Adam Wierzbicki:
Security Trade-Off and Energy Efficiency Analysis in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 943475:1-943475:17 (2015) - [c16]Damian Rusinek, Bogdan Ksiezopolski, Adam Wierzbicki:
AQoPA: Automated Quality of Protection Analysis Framework for Complex Systems. CISIM 2015: 475-486 - [c15]Damian Rusinek, Bogdan Ksiezopolski, Adam Wierzbicki:
On the Balancing Security Against Performance in Database Systems. CN 2015: 102-116 - [c14]Katarzyna Mazur, Bogdan Ksiezopolski, Adam Wierzbicki:
On the Modelling of the Influence of Access Control Management to the System Security and Performance. ICEIS (2) 2015: 346-354 - 2014
- [j14]Damian Rusinek, Bogdan Ksiezopolski:
On the Effect of Security and Communication Factors in the Reliability of Wireless Sensor Networks. J. Sens. Actuator Networks 3(1): 81-94 (2014) - [j13]Bartlomiej Bielecki, Bogdan Ksiezopolski, Andrzej Krajka, Adam Wierzbicki:
The Concept and Security Analysis of Wireless Sensor Network for Gas Lift in Oilwells. Ann. UMCS Informatica 14(2): 76-84 (2014) - [c13]Ismail Mansour, Damian Rusinek, Gérard Chalhoub, Pascal Lafourcade, Bogdan Ksiezopolski:
Multihop Node Authentication Mechanisms for Wireless Sensor Networks. ADHOC-NOW 2014: 402-418 - [c12]Katarzyna Mazur, Bogdan Ksiezopolski:
Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML. CSS 2014: 178-192 - [c11]Agata Niescieruk, Bogdan Ksiezopolski:
Motivation-Based Risk Analysis Process for IT Systems. ICT-EurAsia 2014: 446-455 - [c10]Bogdan Ksiezopolski, Adam Wierzbicki, Damian Rusinek:
On the Modelling of the Computer Security Impact on the Reputation Systems. ICT-EurAsia 2014: 526-531 - [e1]Zbigniew Kotulski, Bogdan Ksiezopolski, Katarzyna Mazur:
Cryptography and Security Systems - Third International Conference, CSS 2014, Lublin, Poland, September 22-24, 2014. Proceedings. Communications in Computer and Information Science 448, Springer 2014, ISBN 978-3-662-44892-2 [contents] - 2013
- [c9]Radoslaw Nielek, Bogdan Ksiezopolski, Adam Wierzbicki, Lukasz Anwajler:
Surprising Consequences of Simple Privacy Protection Method. ICITCS 2013: 1-5 - [c8]Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki:
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML). ICT-EurAsia 2013: 261-270 - 2012
- [j12]Bogdan Ksiezopolski:
QoP-ML: Quality of protection modelling language for cryptographic protocols. Comput. Secur. 31(4): 569-596 (2012) - [j11]Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki:
On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML). Ann. UMCS Informatica 12(4): 69-81 (2012) - 2011
- [j10]Damian Rusinek, Bogdan Ksiezopolski:
Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2. Ann. UMCS Informatica 11(3): 117-127 (2011) - [c7]Wojciech Bylica, Bogdan Ksiezopolski:
On Scalable Security Audit for Web Application According to ISO 27002. CN 2011: 289-297 - [c6]Pawel Szalachowski, Zbigniew Kotulski, Bogdan Ksiezopolski:
Secure Position-Based Selecting Scheme for WSN Communication. CN 2011: 386-397 - 2010
- [j9]Pawel Szalachowski, Bogdan Ksiezopolski, Zbigniew Kotulski:
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks. Inf. Process. Lett. 110(7): 247-251 (2010) - [j8]Bogdan Ksiezopolski, Zbigniew Kotulski:
Middleware non-repudiation service for the data warehouse. Ann. UMCS Informatica 10(1): 131-144 (2010) - [c5]Bogdan Ksiezopolski, Pawel Szalachowski, Zbigniew Kotulski:
SPOT: Optimization Tool for Network Adaptable Security. CN 2010: 269-279 - [c4]Pawel Szalachowski, Bogdan Ksiezopolski, Zbigniew Kotulski:
On Authentication Method Impact upon Data Sampling Delay in Wireless Sensor Networks. CN 2010: 280-289
2000 – 2009
- 2009
- [j7]Pawel Szalachowski, Bogdan Ksiezopolski, Zbigniew Kotulski:
Optimization of TLS security protocol using the adaptable security model. Ann. UMCS Informatica 9(1): 59-75 (2009) - [c3]Bogdan Ksiezopolski, Zbigniew Kotulski, Pawel Szalachowski:
Adaptive Approach to Network Security. CN 2009: 233-241 - [c2]Damian Rusinek, Bogdan Ksiezopolski:
Voter non-repudiation oriented scheme for the medium scale e-voting protocol. IMCSIT 2009: 325-330 - 2007
- [j6]Bogdan Ksiezopolski, Zbigniew Kotulski:
Adaptable security mechanism for dynamic environments. Comput. Secur. 26(3): 246-255 (2007) - [j5]Bogdan Ksiezopolski, Pascal Lafourcade:
Attack and revison of an electronic auction protocol using OFMC. Ann. UMCS Informatica 6(1): 171-183 (2007) - 2005
- [j4]Bogdan Ksiezopolski, Adam Dziurda:
Implementation of certification subprotocol for electronic auction. Ann. UMCS Informatica 3(1): 355-364 (2005) - [c1]Bogdan Ksiezopolski, Zbigniew Kotulski:
On a Concept of Scalable Security: PKI-based Model using Additional Cryptographic Modules. ADBIS Research Communications 2005 - 2004
- [j3]Bogdan Ksiezopolski, Zbigniew Kotulski:
Cryptographic protocol for electronic auctions with extended requirements. Ann. UMCS Informatica 2(1): 391-400 (2004) - 2003
- [j2]Bogdan Ksiezopolski:
Using PHP and HTML languages and MySQL databases to create servers of scientific information. Ann. UMCS Informatica 1(1): 296-303 (2003) - [j1]Bogdan Ksiezopolski, Pawel Luka:
Using PHP and HTML languages to create graphical interfaces and to remote control of programs. Ann. UMCS Informatica 1(1): 304-309 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint