Cybersecurity education: evolution of the discipline and analysis of master programs K Cabaj, D Domingos, Z Kotulski, A Respicio Computers & Security 75, 24-35, 2018 | 147 | 2018 |
Discrete chaotic cryptography Z Kotulski, J Szczepanski Annalen der Physik 6, 38l-394, 1997 | 143 | 1997 |
Application of discrete chaotic dynamical systems in cryptography—DCC method Z Kotulski, J SZCZEPAŃSKI, K Górski, A Paszkiewicz, A Zugaj International Journal of Bifurcation and Chaos 9 (06), 1121-1135, 1999 | 103 | 1999 |
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges Z Kotulski, T Nowak, M Sepczuk, M Tunia, R Artych, K Bocianiak, T Ośko, ... Proceedings of the 2017 Federated Conference on Computer Science and …, 2017 | 94 | 2017 |
New security and control protocol for VoIP based on steganography and digital watermarking W Mazurczyk, Z Kotulski Annales UMCS, Informatica 5, 417-426, 2006 | 81 | 2006 |
Towards constructive approach to end-to-end slice isolation in 5G networks Z Kotulski, TW Nowak, M Sepczuk, M Tunia, R Artych, K Bocianiak, ... EURASIP Journal on Information Security 2018 (2), 1-23, 2018 | 74 | 2018 |
Error analysis with applications in engineering Z Kotulski, W Szczepiński Springer Verlag, 2010 | 64* | 2010 |
Adaptable security mechanism for dynamic environments B Ksiezopolski, Z Kotulski Computers & Security 26 (3), 246-255, 2007 | 64 | 2007 |
Verticals in 5G MEC -use cases and security challenges TW Nowak, M Sepczuk, Z Kotulski, W Niewolski, R Artych, K Bocianiak, ... IEEE Access 9, DOI: 10.1109/ACCESS.2021.3088374, 2021 | 61 | 2021 |
New VoIP traffic security scheme with digital watermarking W Mazurczyk, Z Kotulski International Conference on Computer Safety, Reliability, and Security, 170-181, 2006 | 60 | 2006 |
Linear systems and normality Z Kotulski, K Sobczyk Journal of Statistical Physics 24 (2), 359-373, 1981 | 47 | 1981 |
Pseudorandom number generators based on chaotic dynamical systems J Szczepański, Z Kotulski Open Systems & Information Dynamics 8 (2), 137-146, 2001 | 44* | 2001 |
On constructive approach to chaotic pseudorandom number generators Z Kotulski, J Szczepanski, K Górski, A Górska, A Paszkiewicz Proc. Regional Conf. on Military Communication and Information Systems …, 2000 | 44 | 2000 |
Towards Quality of Experience-based reputation models for future web service provisioning T Ciszkowski, W Mazurczyk, Z Kotulski, T Hossfeld, M Fiedler, D Collange Telecommunication Systems, 1-13, 2009 | 43 | 2009 |
Cybersecurity: trends, issues, and challenges K Cabaj, Z Kotulski, B Księżopolski, W Mazurczyk EURASIP Journal on Information Security 2018 (2018:10), 1-2, 2018 | 39 | 2018 |
5G networks: Types of isolation and their parameters in RAN and CN slices Z Kotulski, TW Nowak, M Sepczuk, MA Tunia Computer Networks 171, 107135, 2020 | 38 | 2020 |
A new risk-based authentication management model oriented on user's experience M Sepczuk, Z Kotulski Computers & Security 73, 17–33, 2018 | 36 | 2018 |
Analysis of different architectures of neural networks for application in intrusion detection systems P Kukielka, Z Kotulski 2008 International Multiconference on Computer Science and Information …, 2008 | 36 | 2008 |
Effects of parameter uncertainty on the response of vibratory systems to random excitation Z Kotulski, K Sobczyk Journal of Sound and Vibration 119 (1), 159-172, 1987 | 36 | 1987 |
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks P Szalachowski, B Ksiezopolski, Z Kotulski Information Processing Letters 110 (7), 247-251, 2010 | 35 | 2010 |