Publications
The list of my articles
2023
[63] A. Kuzdralinski, M. Miskiewicz, H. Szczerba, W. Mazurczyk, J. Nivala, B. Ksiezopolski – Unlocking the Potential of DNA-Based Tagging: Current Market Solutions and Expanding Horizons, Nature Communication 14, Article number: 6052 (2023)
[62] M.Srokosz, A.Bobyk, B. Ksiezopolski, M.Wydra – Machine-Learning-Based Scoring System for Antifraud CISIRTs in Banking Environment, Electronics 2023, 12, 251 .
2022
[61] M.Wydra, M.Kozlowski, D.Czerwinski, B. Ksiezopolski – Automated Adaptive-Ensemble Framework for Large Wind Power Prediction in Poland Using Deep Learning Models, Adv. Sci. Technol. Res. J. 2022; 16(6):214–225
[60] B.Ksiezopolski, K.Mazur, M.Miskiewicz, D. Rusinek – Teaching a Hands-On CTF-Based Web Application Security Course. Electronics 2022, 11, 3517.
2021
[59] M.Miskiewicz, A.Kuzdralinski, D. Rusinek , B.Ksiezopolski, – DNA Based Cryptographic Key Storage System With a Simple and Automated Method of Primers Selection. In Selected Topics in Applied Computer Science, Maria Curie-Sklodowska University Press, 2021.
[58] J.Pastuszuk, P. Burek, B.Ksiezopolski, – Cybersecurity Ontology for Dynamic Analysis of IT Systems – 25th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES 2021) – September 8-10, 2021
[57] M.Kozłowski, B.Ksiezopolski, – A new method of testing machine learning models of detection for targeted DDoS attacks – 18th International Conference on Security and Cryptography (SECRYPT 2021) – July 6-8, 2021
[56] B.Ksiezopolski, D.Rusinek, M.Miśkiewicz, A.Wróblewska – Hands-on Cybersecurity Labs in online learning. EdMedia + Innovate Learning: World Conference on Educational Media & Technology (Formerly ED-MEDIA: World Conference on Educational Multimedia, Hypermedia & Telecommunications), July 6-8, 2021
2019
[55] M.Miśkiewicz, B.Ksiezopolski – Cryptographic keys management system based on DNA strands; 6th Conference on Cryptography and Security Systems.
[54] M.Wydra, P.Kubaczynski, K.Mazur, B.Ksiezopolski– Time-aware monitoring of overhead transmission line sag and temperature with LoRa communication. Energies,
Volume 12, Issue 3, 5 February 2019
2018
[53] K.Cabaj, Z.Kotulski, B.Ksiezopolski, W.Mazurczyk – Cybersecurity: trends, issues, and challenges. Eurasip Journal on Information Security, Volume 2018, Issue 1
[52] M.Srokosz, D.Rusinek, B.Ksiezopolski – A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment; 5th Conference on Cryptography and Security Systems.
2017
[51] K.Mazur, M.Wydra, B.Ksiezopolski – Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines. Sensors 17(7) : 1610 (2017),
[50] J.Pyda, W.Prokop, D.Rusinek, B.Ksiezopolski – Secure and reliable localization in Wireless Sensor Network based on RSSI mapping – 24th International Science Conference on Computer Networks CN2017, CCIS Springer
[49] A.Niescieruk, B.Ksiezopolski, R.Nielek, A.Wierzbicki – How to train people to increase their security awareness in IT – 8th International Conference on Computer Science and Its Applications, In: Park J., Chen SC., Raymond Choo KK. (eds) Advanced Multimedia and Ubiquitous Engineering. MUE 2017, FutureTech 2017. Lecture Notes in Electrical Engineering, vol 448. Springer, Singapore
2016
[48] T.Zurek, M.Mokkas, B.Ksiezopolski – On the modelling of context-aware security for mobile devices, Mobile Information Systems, vol. 2016, Article ID 8743504, 16 pages, 2016
[47] M.Mokkas, B.Ksiezopolski – The Method for Quality of Experience Evaluation of IT Services – Studia Informatica 37 (2)
[46] K. Mazur, B.Ksiezopolski, R.Nielek – Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks – Journal of Sensors, Volume 2016 (2016), Article ID 5017248
2015
[45] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – AQoPA: Automated Quality of Protection Analysis framework for complex systems – 14th International Conference
on Computer Information Systems and Industrial Management Applications, Warsaw, Springer: LNCS, v.9339, p. 475-486, 2015
[44] K.Mazur, B.Ksiezopolski, A. Wierzbicki – On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact and Reducing Financial Costs for Data Centers, Mathematical Problems in Engineering, v.2015, 418535, p.1-19, 2015.
[43] K.Mazur, B.Ksiezopolski, A. Wierzbicki – On the Modelling of the Influence of Access Control Management to the System Security and Performance – 17th International Conference on Enterprise Information Systems, Barcelona, SCITEPRESS, v. II, p.346-‐354, 2015.
[42] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – On the balancing security against performance in database systems – 22nd International Science Conference on Computer Networks, Gliwice, Springer: CCIS, v.522, p. 102-116, 2015.
[41] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – Security trade-off and energy efficiency analysis in Wireless Sensor Networks – International Journal of Distributed Sensor Networks, v.2015, 943475, p.1-17, 2015.
[40] K.Mazur, B.Ksiezopolski, Z. Kotulski – The robust measurement method for security metrics generation – The Computer Journal, Oxford, v. 58 (10), p.2280-2296, 2015.
2014
[39] B.Ksiezopolski, T. Zurek, M.Mokkas – Quality of Protection evaluation of security mechanisms - The Scientific World Journal, Volume 2014 (2014), Article ID 725279, p.1-18, 2014.
[38] K.Mazur, B.Ksiezopolski – Comparison and assessment of security modelling approaches in terms of the QoP-ML, CSS 2014 , Springer CCIS v.448, pp. 178-192, 2014
[37] B.Bielecki, A.Krajka, B.Ksiezopolski, A.Wierzbicki – The concept and security analysis of Wireless Sensor Network for Gas Lift in Oilwells – Journal of Annales UMCS Informatica, AI IX, 2 (2014) 7685
[36] I. Mansour, D. Rusinek, G. Chalhoub, P. Lafourcade, B. Ksiezopolski – Multihop Node Authentication Mechanisms for Wireless Sensor Networks – AdHoc Now 2014, LNCS, 8487, pp. 402-418
[35] D.Rusinek, B.Ksiezopolski – On effect of security and communication factors on the reliability in Wireless Sensor Networks – Journal of Sensor and Actuator Networks 3 (1), pp.81-94, 2014
[34] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the modelling of the computer security impact on the reputation systems – AsiaARES 2014, Bali, Indonesia, LNCS v.8407, pp.526-531, 2014
[33] A.Niescieruk, B.Ksiezopolski – Motivation-based risk analysis process for IT Systems – AsiaARES 2014, Bali, Indonesia, LNCS v.8407, pp.446-455, 2014
2013
[32] R.Nielek, B.Ksiezopolski, A.Wierzbicki, L.Anwajler – Surprising Consequences of Simple Privacy Protection Method – 3rd International Conference on IT Convergence and Security 2013, Macau, China, pp.1-5, 2013
[31] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML) – AsiaARES 2013, Yogyakarta, Indonesia, LNCS, v. 7804, pp.261-270, 2013
2012
[30] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML) – Annales UMCS Informatica AI XII, 4, pp.69-81, 2012
[29] B.Ksiezopolski – QoP-ML: Quality of Protection modelling language for cryptographic protocols – Elsevier: Computers & Security 31(4), pp.569-596, 2012
2011
[28] D.Rusinek, B.Ksiezopolski – Anonymity in E-Government – Information System in Management, pp.78-82, 2011
[27] D.Rusinek, B.Ksiezopolski – Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2 Annales UMCS Informatica AI XI, 3, pp.117-127, (2011), Editors: Zbigniew Kotulski, Bogdan Ksiezopolski,
[26] D.Rusinek, B.Ksiezopolski, Z.Kotulski – On effect of the communication factors on the protocols goal availability service in high performance real-time Wireless Sensor Networks , (In Polish), Studia Informatica 32(3A(98)) (2011): 187.
[25] W.Bylica, B.Ksiezopolski – On scalable security audit for web application according to ISO 27002- Springer: CCIS, Computer Networks, v.160, pp. 386-397, 2011
[24] P.Szalachowski, Z.Kotulski, B.Ksiezopolski – Secure position-based selecting scheme for WSN communication- Springer: CCIS, Computer Networks, v.160, pp.289-297, 2011
[23] B.Ksiezopolski, Z.Kotulski, P.Szalachowski – On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems -Conference: European Teletraffic Seminar, pp.195-202, 2011
[22] B.Ksiezopolski – Information security governance according to the COBIT methodology -Conference: Information System in Management 2011, pp. 50-58, 2011
2010
[21] B.Ksiezopolski, Z.Kotulski -Middleware non-repudiation service for the data warehouse – Annales UMCS Informatica, Vol.AI.11, No.2, pp.145-158, 2010
[20] B.Ksiezopolski,P.Szalachowski, Z.Kotulski, – SPOT: Optimization tool for network adaptable security- Springer: CCIS, Computer Networks 2010, pp.269-279
[19] P.Szalachowski, B.Ksiezopolski, Z.Kotulski, – On authentication method impact upon data sampling delay in Wireless Sensor Networks- Springer: CCIS, Computer Networks 2010, pp.280-289
[18] P.Szalachowski, B.Ksiezopolski, Z.Kotulski, – CMAC, CCM and GCM/GMAC: advanced modes of operation of symmetric block ciphers in Wireless Sensor Networks – Elsevier: Information Processing Letters 110 ,pp.247-151, 2010 ‚;
2009
[17] P.Szalachowski, B.Ksiezopolski, Z.Kotulski, – Optimization of the TLS security protocol – Annales UMCS Informatica v.9, pp.59-75, (2009)’;
[16] D.Rusinek, B.Ksiezopolski – Voter non-repudiation oriented scheme for the medium scale e-voting protocol 9th International Multidiscipinary Conference on e-Commerce and e-Government, Mragowo, Poland, 2009, pp. 325-330 ‚;
[15] B.Ksiezopolski, Z.Kotulski, P.Szalachowski – Adaptive approach to network security – Springer: CCIS, Computer Networks 2009, pp.233-241′;
[14] B.Ksiezopolski – Adaptable security model for the system with limited resources – 7th Congress of SHP, Warsaw, pp.313-319, 2009′;
2007
[13] B.Księżopolski, P.Lafourcade – Attack and revision of electronic auction protocol using OFMC – IBIZA 2007 – Annales UMCS Informatica 2007, pp. 171-183′;
[12] B.Księżopolski, Z.Kotulski – Adaptable security mechanism for dynamic environments, Computers & Security, 26(3), pp. 246-255, 2007, Elsevier ISSN:0167-4048′;
2005
[11] B.Księżopolski, Z.Kotulski – On a concept of scalable security: PKI-based model with using additional cryptographic modules 9th East-European Conference on Advances in Databases and Information Systems, ADBIS2005,p.221-232 Tallinn, 12-15.09 2005′;
[10] B.Księżopolski, Z.Kotulski – On scalable security model for sensor networks protocols, 22nd CIB-W78 Conference Information Technology in Construction, Dresden, 19-21 July 2005, p.463-469 ‚;
[9] B.Księżopolski, Z.Kotulski – On a probability modeling of incidence occurrence in electronic processes, 7th NATO REGIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS 2005: Supporting NATO Network Enabled Capability (NNEC) with Next Generation CIS., 2005,p.297-305 ‚;
[8] B.Księżopolski, A.Dziurda – Implementation of certification subprotocol for electronic auction, Annales UMCS, Informatica, No.1, 2005, p.355-364 ‚;
[7] B.Księżopolski, Z.Kotulski – On a concept of scalable security: PKI-based model with supporting cryptographic modules in: J.Wachowicz[ed],Electronic Commerce Theory and Applications pp.73-83. Technical co-sponsorship: IEEE, Gdansk 2005, ISBN 83-88617-42-7
2004
[6] B.Księżopolski, Z.Kotulski – Zagrożenia procesów komunikacyjnych w e-commerce oraz sposoby przeciwdziałania, Informatyka Narzędziem Współczesnego Zarzšdzania, PJWSTK, Warszawa 2004, p.246-254, ISBN 83-89244-32-2
[5] B.Księżopolski, Z.Kotulski – Cryptographically Secure Multiple-Criteria Optimal Decision-Making System, in: W.Burakowski, L.Bella, ed. pp.179-187. ISBN: 83-920120-0-3.
[4] B.Księżopolski, Z.Kotulski – Bezpieczeństwo e-urzędu – Centrum Certyfikacji, w: Andrzej Kwiecień, Piotr Gaj, Współczesne Problemy Systemów Czasu Rzeczywistego, Rozdział 31, str. 349-359, Wydawnictwa Naukowo-Techniczne, Warszawa 2004, ISBN 83-204-3023-2.
[3] B.Księżopolski, Z.Kotulski – Cryptographic protocol for electronic auctions with extended requirements, Annales UMCS, Informatica, No.1, 2004,p.391-400 ,ISSN 1732-1360.
2003
[2] B.Księżopolski, P.Łuka – Using PHP and HTML languages to create graphical interfaces and to remote control of programs, Annales UMCS, Informatica, No.1, 2003, p.325-331, ISBN 83-227-2060-2
[1] B.Księżopolski – Using PHP and HTML languages and MySQL databases to create servers of scientific information, Annales UMCS, Informatica, No.1, 2003, p.317-325, ISBN 83-227-2060-2