关注
Jerzy Konorski
Jerzy Konorski
Gdansk University of Technology
在 eti.pg.edu.pl 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A game-theoretic study of CSMA/CA under a backoff attack
J Konorski
IEEE/ACM Transactions On Networking 14 (6), 1167-1178, 2006
1312006
Multiple access in ad-hoc wireless LANs with noncooperative stations
J Konorski
International Conference on Research in Networking, 1141-1146, 2002
1052002
Solvability of a Markovian model of an IEEE 802.11 LAN under a backoff attack
J Konorski
13th IEEE International Symposium on Modeling, Analysis, and Simulation of …, 2005
272005
Protection of fairness for multimedia traffic streams in a non-cooperative wireless LAN setting
J Konorski
International Conference on Protocols for Multimedia Systems, 116-129, 2001
272001
Data-centric Dempster-Shafer theory-based selfishness thwarting via trust evaluation in MANETs and WSNs
J Konorski, R Orlikowski
2009 3rd International Conference on New Technologies, Mobility and Security …, 2009
242009
Discouraging traffic remapping attacks in local ad hoc networks
J Konorski, S Szott
IEEE transactions on wireless communications 13 (7), 3752-3767, 2014
182014
A station strategy to deter backoff attacks in IEEE 802.11 LANs
J Konorski
Journal of discrete Algorithms 5 (3), 436-454, 2007
142007
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes
J Konorski, R Orlikowski
Joint IFIP Wireless and Mobile Networking Conference, 185-196, 2009
132009
Measurements of QoS/QoE parameters for media streaming in a PMIPv6 testbed with 802.11 b/g/n WLANs
M Hoeft, K Gierlowski, T Gierszewski, J Konorski, K Nowicki, J Wozniak
Metrology and Measurement Systems, 2012
122012
A framework for detection of selfishness in multihop mobile ad hoc networks
J Konorski, R Orlikowski
Journal of telecommunications and information technology, 34-40, 2009
112009
What is information?
J Konorski, W Szpankowski
2008 IEEE Information Theory Workshop, 269-270, 2008
102008
Traffic remapping attacks in ad hoc networks
S Szott, J Konorski
IEEE Communications Magazine 56 (4), 218-224, 2018
92018
Application of a hash function to discourage MAC-layer misbehaviour in wireless LANS
J Konorski, M Kurant
Journal of Telecommunications and Information Technology, 38-46, 2004
82004
A centralized reputation system for MANETs based on observed path performance
J Konorski, K Rydzewski
2015 8th IFIP Wireless and Mobile Networking Conference (WMNC), 56-63, 2015
62015
EDCA remapping in ad hoc IEEE 802.11 WLANs: An incentive compatible discouragement scheme
J Konorski, S Szott
2012 IFIP Wireless Days, 1-8, 2012
62012
Multihomed wireless terminals: MAC configuration and network selection games
J Konorski
The International Conference on Information Networking 2011 (ICOIN2011), 224-229, 2011
62011
A reputation system for MANETs and WSNs using traffic shedding
J Konorski, R Orlikowski
2010 3rd International Symposium on Applied Sciences in Biomedical and …, 2010
62010
Playing CSMA/CA game to deter backoff attacks in ad hoc wireless LANs
J Konorski
International Conference on Ad-Hoc Networks and Wireless, 127-140, 2005
62005
Modeling a traffic remapping attack game in a multi-hop ad hoc network
J Konorski, S Szott
GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017
52017
A virtualization-level future internet defense-in-depth architecture
J Konorski, P Pacyna, G Kolaczek, Z Kotulski, K Cabaj, P Szalachowski
Recent Trends in Computer Networks and Distributed Systems Security …, 2012
52012
系统目前无法执行此操作,请稍后再试。
文章 1–20