The list of my articles

Google Scholar


[63] A. Kuzdralinski, M. Miskiewicz, H. Szczerba, W. Mazurczyk, J. Nivala, B. Ksiezopolski – Unlocking the Potential of DNA-Based Tagging: Current Market Solutions and Expanding Horizons, Nature Communication 14, Article number: 6052 (2023)

[62] M.Srokosz, A.Bobyk, B. Ksiezopolski, M.Wydra – Machine-Learning-Based Scoring System for Antifraud CISIRTs in Banking Environment, Electronics 2023, 12, 251 .


[61] M.Wydra, M.Kozlowski, D.Czerwinski, B. Ksiezopolski – Automated Adaptive-Ensemble Framework for Large Wind Power Prediction in Poland Using Deep Learning Models, Adv. Sci. Technol. Res. J. 2022; 16(6):214–225

[60] B.Ksiezopolski, K.Mazur, M.Miskiewicz, D. Rusinek – Teaching a Hands-On CTF-Based Web Application Security Course. Electronics 2022, 11, 3517.


[59] M.Miskiewicz, A.Kuzdralinski, D. Rusinek , B.Ksiezopolski,  – DNA Based Cryptographic Key Storage System With a Simple and Automated Method of Primers Selection. In Selected Topics in Applied Computer Science, Maria Curie-Sklodowska University Press, 2021.

[58] J.Pastuszuk, P. Burek, B.Ksiezopolski,  – Cybersecurity Ontology for Dynamic Analysis of IT Systems – 25th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES 2021) – September 8-10, 2021

[57]  M.Kozłowski, B.Ksiezopolski,  – A new method of testing machine learning models of detection for targeted DDoS attacks – 18th International Conference on Security and Cryptography (SECRYPT 2021) – July 6-8, 2021

[56]  B.Ksiezopolski, D.Rusinek, M.Miśkiewicz, A.Wróblewska  – Hands-on Cybersecurity Labs in online learning. EdMedia + Innovate Learning: World Conference on Educational Media & Technology (Formerly ED-MEDIA: World Conference on Educational Multimedia, Hypermedia & Telecommunications), July 6-8, 2021


[55]  M.Miśkiewicz, B.Ksiezopolski  – Cryptographic keys management system based on DNA strands; 6th Conference on Cryptography and Security Systems.

[54] M.Wydra, P.Kubaczynski, K.Mazur, B.Ksiezopolski– Time-aware monitoring of overhead transmission line sag and temperature with LoRa communication. Energies,
Volume 12, Issue 3, 5 February 2019


[53] K.Cabaj, Z.Kotulski, B.Ksiezopolski, W.Mazurczyk – Cybersecurity: trends, issues, and challenges. Eurasip Journal on Information Security, Volume 2018, Issue 1

[52]  M.Srokosz, D.Rusinek, B.Ksiezopolski  – A new WAF-based architecture for protecting web applications against CSRF attacks in malicious environment; 5th Conference on Cryptography and Security Systems.


[51]  K.Mazur, M.Wydra, B.Ksiezopolski  – Secure and Time-Aware Communication of Wireless Sensors Monitoring Overhead Transmission Lines. Sensors 17(7) : 1610 (2017),

[50] J.Pyda, W.Prokop, D.Rusinek, B.Ksiezopolski – Secure and reliable localization in Wireless Sensor Network based on RSSI mapping – 24th International Science Conference on Computer Networks CN2017, CCIS Springer

[49] A.Niescieruk, B.Ksiezopolski, R.Nielek, A.Wierzbicki – How to train people to increase their security awareness in IT – 8th International Conference on Computer Science and Its Applications, In: Park J., Chen SC., Raymond Choo KK. (eds) Advanced Multimedia and Ubiquitous Engineering. MUE 2017, FutureTech 2017. Lecture Notes in Electrical Engineering, vol 448. Springer, Singapore


[48] T.Zurek, M.Mokkas, B.Ksiezopolski  – On the modelling of context-aware security for mobile devices, Mobile Information Systems, vol. 2016, Article ID 8743504, 16 pages, 2016

[47] M.Mokkas, B.Ksiezopolski – The Method for Quality of Experience Evaluation of IT Services – Studia Informatica 37 (2)

[46] K. Mazur, B.Ksiezopolski, R.Nielek – Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks – Journal of Sensors, Volume 2016 (2016), Article ID 5017248


[45] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – AQoPA: Automated Quality of Protection Analysis framework for complex systems – 14th International Conference
on Computer Information Systems and Industrial Management Applications, Warsaw, Springer: LNCS, v.9339, p. 475-486, 2015

[44] K.Mazur, B.Ksiezopolski, A. Wierzbicki – On Security Management: Improving Energy Efficiency, Decreasing Negative Environmental Impact and Reducing Financial Costs for Data Centers, Mathematical Problems in Engineering, v.2015, 418535, p.1-19, 2015.

[43] K.Mazur, B.Ksiezopolski, A. Wierzbicki – On the Modelling of the Influence of Access Control Management to the System Security and Performance – 17th International Conference on Enterprise Information Systems, Barcelona, SCITEPRESS, v. II, p.346-­‐354, 2015.

[42] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – On the balancing security against performance in database systems – 22nd International Science Conference on Computer Networks, Gliwice, Springer: CCIS, v.522, p. 102-116, 2015.

[41] D.Rusinek, B.Ksiezopolski, A.Wierzbicki – Security trade-off and energy efficiency analysis in Wireless Sensor Networks – International Journal of Distributed Sensor Networks, v.2015, 943475, p.1-17, 2015.

[40] K.Mazur, B.Ksiezopolski, Z. Kotulski – The robust measurement method for security metrics generation – The Computer Journal, Oxford, v. 58 (10), p.2280-2296, 2015.


[39] B.Ksiezopolski, T. Zurek, M.Mokkas – Quality of Protection evaluation of security mechanisms 
- The Scientific World Journal, Volume 2014 (2014), Article ID 725279, p.1-18, 2014.

[38] K.Mazur, B.Ksiezopolski – Comparison and assessment of security modelling approaches in terms of the QoP-ML, CSS 2014 , Springer CCIS v.448, pp. 178-192, 2014

[37] B.Bielecki, A.Krajka, B.Ksiezopolski, A.Wierzbicki – The concept and security analysis of Wireless Sensor Network for Gas Lift in Oilwells – Journal of Annales UMCS Informatica, AI IX, 2 (2014) 7685

[36] I. Mansour, D. Rusinek, G. Chalhoub, P. Lafourcade, B. Ksiezopolski – Multihop Node Authentication Mechanisms for Wireless Sensor Networks – AdHoc Now 2014, LNCS, 8487, pp. 402-418

[35] D.Rusinek, B.Ksiezopolski – On effect of security and communication factors on the reliability in Wireless Sensor Networks – Journal of Sensor and Actuator Networks 3 (1), pp.81-94, 2014

[34] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the modelling of the computer security impact on the reputation systems – AsiaARES 2014, Bali, Indonesia, LNCS v.8407, pp.526-531, 2014

[33] A.Niescieruk, B.Ksiezopolski – Motivation-based risk analysis process for IT Systems – AsiaARES 2014, Bali, Indonesia, LNCS v.8407, pp.446-455, 2014


[32] R.Nielek, B.Ksiezopolski, A.Wierzbicki, L.Anwajler – Surprising Consequences of Simple Privacy Protection Method – 3rd International Conference on IT Convergence and Security 2013, Macau, China, pp.1-5, 2013

[31] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the efficiency modelling of  cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML) – AsiaARES 2013, Yogyakarta, Indonesia, LNCS, v. 7804, pp.261-270, 2013


[30] B.Ksiezopolski, D.Rusinek, A.Wierzbicki – On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML) – Annales UMCS Informatica AI XII, 4, pp.69-81, 2012

[29] B.Ksiezopolski – QoP-ML: Quality of Protection modelling language for cryptographic protocols – Elsevier: Computers & Security 31(4), pp.569-596, 2012


[28] D.Rusinek, B.Ksiezopolski – Anonymity in E-Government – Information System in Management, pp.78-82, 2011

[27] D.Rusinek, B.Ksiezopolski – Influence of CCM, CBC-MAC, CTR and stand-alone encryption on the quality of transmitted data in the high-performance WSN based on Imote2 Annales UMCS Informatica AI XI, 3, pp.117-127, (2011), Editors: Zbigniew Kotulski, Bogdan Ksiezopolski,

[26] D.Rusinek, B.Ksiezopolski, Z.Kotulski – On effect of the communication factors on the protocols goal availability service in high performance real-time Wireless Sensor Networks , (In Polish), Studia Informatica 32(3A(98)) (2011): 187.

[25] W.Bylica, B.Ksiezopolski – On scalable security audit for web application according to ISO 27002- Springer: CCIS, Computer Networks, v.160, pp. 386-397, 2011

[24] P.Szalachowski, Z.Kotulski, B.Ksiezopolski – Secure position-based selecting scheme for WSN communication- Springer: CCIS, Computer Networks, v.160, pp.289-297, 2011

[23] B.Ksiezopolski, Z.Kotulski, P.Szalachowski – On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems -Conference: European Teletraffic Seminar, pp.195-202, 2011

[22] B.Ksiezopolski – Information security governance according to the COBIT methodology -Conference: Information System in Management 2011, pp. 50-58, 2011


[21] B.Ksiezopolski, Z.Kotulski -Middleware non-repudiation service for the data warehouse – Annales UMCS Informatica, Vol.AI.11, No.2, pp.145-158, 2010

[20] B.Ksiezopolski,P.Szalachowski, Z.Kotulski, – SPOT: Optimization tool for network adaptable security- Springer: CCIS, Computer Networks 2010, pp.269-279

[19] P.Szalachowski, B.Ksiezopolski, Z.Kotulski, – On authentication method impact upon data sampling delay in Wireless Sensor Networks- Springer: CCIS, Computer Networks 2010, pp.280-289

[18] P.Szalachowski, B.Ksiezopolski, Z.Kotulski, – CMAC, CCM and GCM/GMAC: advanced modes of operation of symmetric block ciphers in Wireless Sensor Networks – Elsevier: Information Processing Letters 110 ,pp.247-151, 2010 ‚;


[17] P.Szalachowski, B.Ksiezopolski, Z.Kotulski, – Optimization of the TLS security protocol – Annales UMCS Informatica v.9, pp.59-75, (2009)’;

[16] D.Rusinek, B.Ksiezopolski – Voter non-repudiation oriented scheme for the medium scale e-voting protocol 9th International Multidiscipinary Conference on e-Commerce and e-Government, Mragowo, Poland, 2009, pp. 325-330 ‚;

[15] B.Ksiezopolski, Z.Kotulski, P.Szalachowski – Adaptive approach to network security – Springer: CCIS, Computer Networks 2009, pp.233-241′;

[14] B.Ksiezopolski – Adaptable security model for the system with limited resources – 7th Congress of SHP, Warsaw, pp.313-319, 2009′;


[13] B.Księżopolski, P.Lafourcade – Attack and revision of electronic auction protocol using OFMC – IBIZA 2007 – Annales UMCS Informatica 2007, pp. 171-183′;

[12] B.Księżopolski, Z.Kotulski – Adaptable security mechanism for dynamic environments, Computers & Security, 26(3), pp. 246-255, 2007, Elsevier ISSN:0167-4048′;


[11] B.Księżopolski, Z.Kotulski – On a concept of scalable security: PKI-based model with using additional cryptographic modules 9th East-European Conference on Advances in Databases and Information Systems, ADBIS2005,p.221-232 Tallinn, 12-15.09 2005′;

[10] B.Księżopolski, Z.Kotulski – On scalable security model for sensor networks protocols, 22nd CIB-W78 Conference Information Technology in Construction, Dresden, 19-21 July 2005, p.463-469 ‚;

[9] B.Księżopolski, Z.Kotulski – On a probability modeling of incidence occurrence in electronic processes, 7th NATO REGIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS 2005: Supporting NATO Network Enabled Capability (NNEC) with Next Generation CIS., 2005,p.297-305 ‚;

[8] B.Księżopolski, A.Dziurda – Implementation of certification subprotocol for electronic auction, Annales UMCS, Informatica, No.1, 2005, p.355-364 ‚;

[7] B.Księżopolski, Z.Kotulski – On a concept of scalable security: PKI-based model with supporting cryptographic modules in: J.Wachowicz[ed],Electronic Commerce Theory and Applications pp.73-83. Technical co-sponsorship: IEEE, Gdansk 2005, ISBN 83-88617-42-7


[6] B.Księżopolski, Z.Kotulski – Zagrożenia procesów komunikacyjnych w e-commerce oraz sposoby przeciwdziałania, Informatyka Narzędziem Współczesnego Zarzšdzania, PJWSTK, Warszawa 2004, p.246-254, ISBN 83-89244-32-2

[5] B.Księżopolski, Z.Kotulski – Cryptographically Secure Multiple-Criteria Optimal Decision-Making System, in: W.Burakowski, L.Bella, ed. pp.179-187. ISBN: 83-920120-0-3.

[4] B.Księżopolski, Z.Kotulski – Bezpieczeństwo e-urzędu – Centrum Certyfikacji, w: Andrzej Kwiecień, Piotr Gaj, Współczesne Problemy Systemów Czasu Rzeczywistego, Rozdział 31, str. 349-359, Wydawnictwa Naukowo-Techniczne, Warszawa 2004, ISBN 83-204-3023-2.

[3] B.Księżopolski, Z.Kotulski – Cryptographic protocol for electronic auctions with extended requirements, Annales UMCS, Informatica, No.1, 2004,p.391-400 ,ISSN 1732-1360.


[2] B.Księżopolski, P.Łuka – Using PHP and HTML languages to create graphical interfaces and to remote control of programs, Annales UMCS, Informatica, No.1, 2003, p.325-331, ISBN 83-227-2060-2

[1] B.Księżopolski – Using PHP and HTML languages and MySQL databases to create servers of scientific information, Annales UMCS, Informatica, No.1, 2003, p.317-325, ISBN 83-227-2060-2