List of publications

DBLP
Google Scholar
ResearchGate

2017

[50] J.Pyda, W.Prokop, D.Rusinek, B.Ksiezopolski – Secure and reliable localization in Wireless Sensor Network based on RSSI mapping – 24th International Science Conference on Computer Networks CN2017, CCIS Springer – accepted paper

[49] A.Niescieruk, B.Ksiezopolski, R.Nielek, A.Wierzbicki – How to train people to increase their security awareness in IT – 8th International Conference on Computer Science and Its Applications, In: Park J., Chen SC., Raymond Choo KK. (eds) Advanced Multimedia and Ubiquitous Engineering. MUE 2017, FutureTech 2017. Lecture Notes in Electrical Engineering, vol 448. Springer, Singapore

2016

[48] T.Zurek, M.Mokkas, B.Ksiezopolski  – On the modelling of context-aware security for mobile devices, Mobile Information Systems, vol. 2016, Article ID 8743504, 16 pages, 2016

[47] M.Mokkas, B.Ksiezopolski – The Method for Quality of Experience Evaluation of IT Services – Studia Informatica 37 (2)

[46] K. Mazur, B.Ksiezopolski, R.Nielek – Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks – Journal of Sensors, Volume 2016 (2016), Article ID 5017248

2015

[45] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – AQoPA: Automated Quality of Protection Analysis framework for complex systems – 14th International Conference
on Computer Information Systems and Industrial Management Applications, Warsaw, Springer: LNCS, v.9339, p. 475-486, 2015

[44] K.Mazur, B.Ksiezopolski, A. Wierzbicki – On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact and Reducing Financial Costs for Data Centers, Mathematical Problems in Engineering, v.2015, 418535, p.1-19, 2015.

[43] K.Mazur, B.Ksiezopolski, A. Wierzbicki – On the Modelling of the Influence of Access Control Management to the System Security and Performance – 17th International Conference on Enterprise Information Systems, Barcelona, SCITEPRESS, v. II, p.346-­‐354, 2015.

[42] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – On the balancing security against performance in database systems – 22nd International Science Conference on Computer Networks, Gliwice, Springer: CCIS, v.522, p. 102-116, 2015.

[41] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – Security trade-off and energy efficiency analysis in Wireless Sensor Networks – International Journal of Distributed Sensor Networks, v.2015, 943475, p.1-17, 2015.

[40] K.Mazur, B.Ksiezopolski, Z. Kotulski – The robust measurement method for security metrics generation – The Computer Journal, Oxford, v. 58 (10), p.2280-2296, 2015.

2014

[39] B.Ksiezopolski, T. Zurek, M.Mokkas – Quality of Protection evaluation of security mechanisms 
- The Scientific World Journal, Volume 2014 (2014), Article ID 725279, p.1-18, 2014.

[38] K.Mazur, B.Ksiezopolski – Comparison and assessment of security modelling approaches in terms of the QoP-ML, CSS 2014 , Springer CCIS v.448, pp. 178-192, 2014

[37] B.Bielecki, A.Krajka, B.Ksiezopolski, A.Wierzbicki – The concept and security analysis of Wireless Sensor Network for Gas Lift in Oilwells – Journal of Annales UMCS Informatica, AI IX, 2 (2014) 7685

[36] I. Mansour, D. Rusinek, G. Chalhoub, P. Lafourcade, B. Ksiezopolski – Multihop Node Authentication Mechanisms for Wireless Sensor Networks – AdHoc Now 2014, LNCS, 8487, pp. 402-418

[35] D.Rusinek, B.Ksiezopolski – On effect of security and communication factors on the reliability in Wireless Sensor Networks – Journal of Sensor and Actuator Networks 3 (1), pp.81-94, 2014

[34] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the modelling of the computer security impact on the reputation systems – AsiaARES 2014, Bali, Indonesia, LNCS v.8407, pp.526-531, 2014

[33] A.Niescieruk, B.Ksiezopolski – Motivation-based risk analysis process for IT Systems – AsiaARES 2014, Bali, Indonesia, LNCS v.8407, pp.446-455, 2014

2013

[32] R.Nielek, B.Ksiezopolski, A.Wierzbicki, L.Anwajler – Surprising Consequences of Simple Privacy Protection Method – 3rd International Conference on IT Convergence and Security 2013, Macau, China, pp.1-5, 2013

[31] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the efficiency modelling of  cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML) – AsiaARES 2013, Yogyakarta, Indonesia, LNCS, v. 7804, pp.261-270, 2013

2012

[30] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML) – Annales UMCS Informatica AI XII, 4, pp.69-81, 2012

[29] B.Ksiezopolski – QoP-ML: Quality of Protection modelling language for cryptographic protocols – Elsevier: Computers & Security 31(4), pp.569-596, 2012

2011

[28] D.Rusinek, B.Ksiezopolski – Anonymity in E-Government – Information System in Management, pp.78-82, 2011

[27] D.Rusinek, B.Ksiezopolski – Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2 Annales UMCS Informatica AI XI, 3, pp.117-127, (2011), Editors: Zbigniew Kotulski, Bogdan Ksiezopolski,

[26] D.Rusinek, B.Ksiezopolski, Z.Kotulski – On effect of the communication factors on the protocols goal availability service in high performance real-time Wireless Sensor Networks , (In Polish), Studia Informatica 32(3A(98)) (2011): 187.

[25] W.Bylica, B.Ksiezopolski – On scalable security audit for web application according to ISO 27002- Springer: CCIS, Computer Networks, v.160, pp. 386-397, 2011

[24] P.Szalachowski, Z.Kotulski, B.Ksiezopolski – Secure position-based selecting scheme for WSN communication- Springer: CCIS, Computer Networks, v.160, pp.289-297, 2011

[23] B.Ksiezopolski, Z.Kotulski, P.Szalachowski – On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems -Conference: European Teletraffic Seminar, pp.195-202, 2011

[22] B.Ksiezopolski – Information security governance according to the COBIT methodology -Conference: Information System in Management 2011, pp. 50-58, 2011

2010

[21] B.Ksiezopolski, Z.Kotulski -Middleware non-repudiation service for the data warehouse – Annales UMCS Informatica, Vol.AI.11, No.2, pp.145-158, 2010

[20] B.Ksiezopolski,P.Szalachowski, Z.Kotulski, – SPOT: Optimization tool for network adaptable security- Springer: CCIS, Computer Networks 2010, pp.269-279

[19] P.Szalachowski, B.Ksiezopolski, Z.Kotulski, – On authentication method impact upon data sampling delay in Wireless Sensor Networks- Springer: CCIS, Computer Networks 2010, pp.280-289

[18] P.Szalachowski, B.Ksiezopolski, Z.Kotulski, – CMAC, CCM and GCM/GMAC: advanced modes of operation of symmetric block ciphers in Wireless Sensor Networks – Elsevier: Information Processing Letters 110 ,pp.247-151, 2010 ‚;

2009

[17] P.Szalachowski, B.Ksiezopolski, Z.Kotulski, – Optimization of the TLS security protocol – Annales UMCS Informatica v.9, pp.59-75, (2009)’;

[16] D.Rusinek, B.Ksiezopolski – Voter non-repudiation oriented scheme for the medium scale e-voting protocol 9th International Multidiscipinary Conference on e-Commerce and e-Government, Mragowo, Poland, 2009, pp. 325-330 ‚;

[15] B.Ksiezopolski, Z.Kotulski, P.Szalachowski – Adaptive approach to network security – Springer: CCIS, Computer Networks 2009, pp.233-241′;

[14] B.Ksiezopolski – Adaptable security model for the system with limited resources – 7th Congress of SHP, Warsaw, pp.313-319, 2009′;

2007

[13] B.Księżopolski, P.Lafourcade – Attack and revision of electronic auction protocol using OFMC – IBIZA 2007 – Annales UMCS Informatica 2007, pp. 171-183′;

[12] B.Księżopolski, Z.Kotulski – Adaptable security mechanism for dynamic environments, Computers & Security, 26(3), pp. 246-255, 2007, Elsevier ISSN:0167-4048′;

2005

[11] B.Księżopolski, Z.Kotulski – On a concept of scalable security: PKI-based model with using additional cryptographic modules 9th East-European Conference on Advances in Databases and Information Systems, ADBIS2005,p.221-232 Tallinn, 12-15.09 2005′;

[10] B.Księżopolski, Z.Kotulski – On scalable security model for sensor networks protocols, 22nd CIB-W78 Conference Information Technology in Construction, Dresden, 19-21 July 2005, p.463-469 ‚;

[9] B.Księżopolski, Z.Kotulski – On a probability modeling of incidence occurrence in electronic processes, 7th NATO REGIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS 2005: Supporting NATO Network Enabled Capability (NNEC) with Next Generation CIS., 2005,p.297-305 ‚;

[8] B.Księżopolski, A.Dziurda – Implementation of certification subprotocol for electronic auction, Annales UMCS, Informatica, No.1, 2005, p.355-364 ‚;

[7] B.Księżopolski, Z.Kotulski – On a concept of scalable security: PKI-based model with supporting cryptographic modules in: J.Wachowicz[ed],Electronic Commerce Theory and Applications pp.73-83. Technical co-sponsorship: IEEE, Gdansk 2005, ISBN 83-88617-42-7

2004

[6] B.Księżopolski, Z.Kotulski – Zagrożenia procesów komunikacyjnych w e-commerce oraz sposoby przeciwdziałania, Informatyka Narzędziem Współczesnego Zarzšdzania, PJWSTK, Warszawa 2004, p.246-254, ISBN 83-89244-32-2

[5] B.Księżopolski, Z.Kotulski – Cryptographically Secure Multiple-Criteria Optimal Decision-Making System, in: W.Burakowski, L.Bella, ed. pp.179-187. ISBN: 83-920120-0-3.

[4] B.Księżopolski, Z.Kotulski – Bezpieczeństwo e-urzędu – Centrum Certyfikacji, w: Andrzej Kwiecień, Piotr Gaj, Współczesne Problemy Systemów Czasu Rzeczywistego, Rozdział 31, str. 349-359, Wydawnictwa Naukowo-Techniczne, Warszawa 2004, ISBN 83-204-3023-2.

[3] B.Księżopolski, Z.Kotulski – Cryptographic protocol for electronic auctions with extended requirements, Annales UMCS, Informatica, No.1, 2004,p.391-400 ,ISSN 1732-1360.

2003

[2] B.Księżopolski, P.Łuka – Using PHP and HTML languages to create graphical interfaces and to remote control of programs, Annales UMCS, Informatica, No.1, 2003, p.325-331, ISBN 83-227-2060-2

[1] B.Księżopolski – Using PHP and HTML languages and MySQL databases to create servers of scientific information, Annales UMCS, Informatica, No.1, 2003, p.317-325, ISBN 83-227-2060-2