The Dangers of Key Reuse: Practical Attacks on {IPsec}{IKE} D Felsch, M Grothe, J Schwenk, A Czubak, M Szymanek 27th USENIX Security Symposium (USENIX Security 18), 567-583, 2018 | 47 | 2018 |
Minimal Büchi automata for certain classes of LTL formulas J Cichon, A Czubak, A Jasinski 2009 Fourth International Conference on Dependability of Computer Systems, 17-24, 2009 | 32 | 2009 |
On applications of wireless sensor networks A Czubak, J Wojtanowski Internet–technical development and applications, 91-99, 2009 | 26 | 2009 |
Algorithmic complexity vulnerability analysis of a stateful firewall A Czubak, M Szymanek Information Systems Architecture and Technology: Proceedings of 37th …, 2017 | 12 | 2017 |
A Note on Keys and Keystreams of Chacha20 for Multi-Key Channels A Czubak, A Jasiński, M Szymanek Computer Networks: 25th International Conference, CN 2018, Gliwice, Poland …, 2018 | 3 | 2018 |
A note on the local minimum problem in wireless sensor networks A Czubak Computer Networks: 20th International Conference, CN 2013, Lwówek Śląski …, 2013 | 3 | 2013 |
Lifespan-aware routing for wireless sensor networks A Czubak, J Wojtanowski Agent and Multi-Agent Systems: Technologies and Applications: 4th KES …, 2010 | 3 | 2010 |
Approximate Algorithm for Fast Capacity Provisioning in WANs with Trade-Off between Performance and Cost under Budget Constraint M Gola, A Czubak Proceedings of the Ninth International Conference on Dependability and …, 2014 | 1 | 2014 |
Designing Frame Relay WAN Networks with Trade-off Between Link Cost and Performance M Gola, A Czubak Man-Machine Interactions 3, 559-566, 2014 | 1 | 2014 |
Virtual Environment for Implementation and Testing Private Wide Area Network Solutions M Gola, A Czubak New Results in Dependability and Computer Systems: Proceedings of the 8th …, 2013 | 1 | 2013 |
The network balance realized by routing organization system H Piech, A Czubak Agent and Multi-Agent Systems: Technologies and Applications: 5th KES …, 2011 | 1 | 2011 |
A note on capacity provisioning in SDN service provider network M Gola, A Czubak Studia Informatica 36 (4), 2015 | | 2015 |
Metodologia projektowania sieci komputerowych A Czubak Strategiczne modelowanie i animowanie rozwoju oraz technologii., 17, 2014 | | 2014 |
A Probabilistic Approach to the Count-To-Infinity Problem in Distance-Vector Routing Algorithms A Czubak New Results in Dependability and Computer Systems: Proceedings of the 8th …, 2013 | | 2013 |
EXPRESSING IMPACT OF VULNERABILITIES: AN EXPERT-FILLED DATASET AND VECTOR CHANGER FRAMEWORK FOR MODELLING MULTISTAGE ATTACKS, BASED ON CVE, CVSS and CWE T Machalewski, M Szymanek, A Czubak, T Turba | | |
Bezpieczeństwo sieci komputerowych M Gola, J Wojtanowski, A Czubak | | |