Follow
Adam Czubak
Title
Cited by
Cited by
Year
The Dangers of Key Reuse: Practical Attacks on {IPsec}{IKE}
D Felsch, M Grothe, J Schwenk, A Czubak, M Szymanek
27th USENIX Security Symposium (USENIX Security 18), 567-583, 2018
472018
Minimal Büchi automata for certain classes of LTL formulas
J Cichon, A Czubak, A Jasinski
2009 Fourth International Conference on Dependability of Computer Systems, 17-24, 2009
322009
On applications of wireless sensor networks
A Czubak, J Wojtanowski
Internet–technical development and applications, 91-99, 2009
262009
Algorithmic complexity vulnerability analysis of a stateful firewall
A Czubak, M Szymanek
Information Systems Architecture and Technology: Proceedings of 37th …, 2017
122017
A Note on Keys and Keystreams of Chacha20 for Multi-Key Channels
A Czubak, A Jasiński, M Szymanek
Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland …, 2018
32018
A note on the local minimum problem in wireless sensor networks
A Czubak
Computer Networks: 20th International Conference, CN 2013, Lwówek Śląski …, 2013
32013
Lifespan-aware routing for wireless sensor networks
A Czubak, J Wojtanowski
Agent and Multi-Agent Systems: Technologies and Applications: 4th KES …, 2010
32010
Approximate Algorithm for Fast Capacity Provisioning in WANs with Trade-Off between Performance and Cost under Budget Constraint
M Gola, A Czubak
Proceedings of the Ninth International Conference on Dependability and …, 2014
12014
Designing Frame Relay WAN Networks with Trade-off Between Link Cost and Performance
M Gola, A Czubak
Man-Machine Interactions 3, 559-566, 2014
12014
Virtual Environment for Implementation and Testing Private Wide Area Network Solutions
M Gola, A Czubak
New Results in Dependability and Computer Systems: Proceedings of the 8th …, 2013
12013
The network balance realized by routing organization system
H Piech, A Czubak
Agent and Multi-Agent Systems: Technologies and Applications: 5th KES …, 2011
12011
A note on capacity provisioning in SDN service provider network
M Gola, A Czubak
Studia Informatica 36 (4), 2015
2015
Metodologia projektowania sieci komputerowych
A Czubak
Strategiczne modelowanie i animowanie rozwoju oraz technologii., 17, 2014
2014
A Probabilistic Approach to the Count-To-Infinity Problem in Distance-Vector Routing Algorithms
A Czubak
New Results in Dependability and Computer Systems: Proceedings of the 8th …, 2013
2013
EXPRESSING IMPACT OF VULNERABILITIES: AN EXPERT-FILLED DATASET AND VECTOR CHANGER FRAMEWORK FOR MODELLING MULTISTAGE ATTACKS, BASED ON CVE, CVSS and CWE
T Machalewski, M Szymanek, A Czubak, T Turba
Bezpieczeństwo sieci komputerowych
M Gola, J Wojtanowski, A Czubak
The system can't perform the operation now. Try again later.
Articles 1–16