Publications
Found 58 results
Filters: Author is Mateusz P. Nowak  [Clear All Filters]
.  
2022.  Energy, QoS and Security Aware Edge Services. EuroCybersec 2021.  (3.06 MB)
 (3.06 MB)
 (3.06 MB)
 (3.06 MB).  
2022.  Energy, QoS and Security Aware Edge Services. International ISCIS Security Workshop. 
.  
2022.  An IoT Course Program to Foster the Adoption of IoT Driven Food and Agriculture in Sub-Saharan Africa (SSA). Proceedings of the 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET).  (863.3 KB)
 (863.3 KB)
 (863.3 KB)
 (863.3 KB).  
2022.  Routing Algorithms Simulation for Self-Aware SDN. Electronics.  11(1) (915.74 KB)
 (915.74 KB)
 (915.74 KB)
 (915.74 KB).  
2021.  Detection, control and mitigation system for secure vehicular communication. Vehicular Communications.  (3.54 MB)
 (3.54 MB)
 (3.54 MB)
 (3.54 MB).  
2021.  Reinforcement Learning and Energy-Aware Routing. ACM 4th FlexNets'21 Workshop, ACM SIGCOMM 2021. 
.  
2021.  Smart SDN Management of Fog Services to Optimize QoS and Energy. Sensors. 21(9) (2.41 MB)
 (2.41 MB)
 (2.41 MB)
 (2.41 MB).  
2020.  IoT Network Attack Detection and Mitigation. The 9th Mediterranean Conference on Embedded Computing (MECO'2020).  (644.89 KB)
 (644.89 KB)
 (644.89 KB)
 (644.89 KB).  
2020.  IoT Network Risk Assessment and Mitigation: The  SerIoT Approach. Security Risk Management for the Internet of Things: Technologies and Techniques  for IoT Security, Privacy and Data Protection. :88–104. (998 KB)
 (998 KB)
 (998 KB)
 (998 KB).  
2020.  Mitigation of Privacy Threats due to Encrypted Traffic Analysis through a Policy-Based Framework and MUD Profiles. Symmetry. 12(9) (395.99 KB)
 (395.99 KB)
 (395.99 KB)
 (395.99 KB).  
2020.  Self-Aware Networks that Optimize Security, QoS and Energy. Proceedings of the IEEE. 108(7) (5.07 MB)
 (5.07 MB)
 (5.07 MB)
 (5.07 MB).  
2020.  Smart SDN Management of Fog Services. Global IoT Summit (GIOTS) 2020.  (256.06 KB)
 (256.06 KB)
 (256.06 KB)
 (256.06 KB).  
2019.  Cognitive Packet Networks for the Secure Internet of Things. Global IoT Summit (GIoTS). 
.  
2019.  Cognitive Routing for Improvement of IoT Security. 2019 IEEE International Conference on Fog Computing ICFC. 
.  
2019.  Hierarchical Machine Learning for IoT Anomaly Detection in SDN. IEEE International Conference on Information Technologies InfoTech. 
.  
2018.  European Cybersecurity Research and the SerIoT Project. Communications in Computer and Information Science . 935:166-173.
.  
2018.  IoT European Security and Privacy Projects: Integration, Architectures and Interoperability. Next Generation Internet of Things. Distributed Intelligence at the Edge and Human Machine-to-Machine Cooperation. 
.  
2018.  Solving large Markov models described with standard programming language. Int. Symposium on Computer and Information Sciences. ISCIS 2018. 
.  
2017.  Application of Fault-Tolerant GQP Algorithm in Multihop AMI Networks. Computer Networks. CN 2017. Communications in Computer and Information Science, vol 718. :70-80.
.  
2017.  Influence of message-oriented middleware on performance of network management system: a modelling study.. Multimedia and Network Information Systems. . Advances in Intelligent Systems and Computing, Vol. 506:379-393.
.  
2016.  Efektywne rozgłaszanie w wielohopowej sieci bezprzewodowej. Effective Broadcasts in Multihop Wireless Network. Przegląd Telekomunikacyjny - Wiadomości Telekomunikacyjne. (8-9):887-891.
.  
2016.  Global Queue Pruning Method for Efficient Broadcast in Multihop Wireless Networks. Computer and Information Sciences: 31st International Symposium, ISCIS 2016, Kraków, Poland, October 27–28, 2016, Proceedings. :214–224.
.  
2014.  MAGANET - On the need of realistic topologies for AMI network simulations. Computer Networks. :79–88.
.  
2014.  Properties of advanced metering infrastructure networks' topologies. 2014 IEEE Network Operations and Management Symposium (NOMS). 
.  
2013.  Evaluations of the new synchronization method for the parallel simulations of wireless networks. International Journal of Computer Theory and Engineering. 5:698–702.
