Jerzy Konorski

Orcid: 0000-0002-3091-1628

According to our database1, Jerzy Konorski authored at least 55 papers between 1986 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Defending against fake VIP in scant-transparency information systems with QoS differentiation.
Inf. Sci., 2022

Mitigating Traffic Remapping Attacks in Autonomous Multihop Wireless Networks.
IEEE Internet Things J., 2022

2020
A reactive algorithm for deducing nodal forwarding behavior in a multihop ad-hoc wireless network in the presence of errors.
CoRR, 2020

Nodal cooperation equilibrium analysis in multihop wireless ad hoc networks with a reputation system.
CoRR, 2020

Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain.
Proceedings of the 30th International Telecommunication Networks and Applications Conference, 2020

2019
Analysis of a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network.
CoRR, 2019

Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes.
Proceedings of the Ad Hoc Networks - 11th EAI International Conference, 2019

2018
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network.
Wirel. Commun. Mob. Comput., 2018

Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures.
IEEE Wirel. Commun. Lett., 2018

Traffic Remapping Attacks in Ad Hoc Networks.
IEEE Commun. Mag., 2018

Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis.
Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling, 2018

A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs.
IEEE Commun. Lett., 2017

Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System.
Proceedings of the Computer Network Security, 2017

Fake VIP attacks and their mitigation via double-blind reputation.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

Modeling a Traffic Remapping Attack Game in a Multi-Hop Ad Hoc Network.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection.
Proceedings of the 18th International Workshop on Trust in Agent Societies co-located with the 15th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2016), 2016

2015
A Centralized Reputation System for MANETs Based on Observed Path Performance.
Proceedings of the 8th IFIP Wireless and Mobile Networking Conference, 2015

2014
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2014

Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm.
Proceedings of the International Conference on Information Networking 2014, 2014

2013
Theory and implementation of a virtualisation level Future Internet defence in depth architecture.
Int. J. Trust. Manag. Comput. Commun., 2013

2012
EDCA remapping in ad hoc IEEE 802.11 WLANs: An incentive compatible discouragement scheme.
Proceedings of the IFIP Wireless Days Conference 2012, Ireland, November 21-23, 2012, 2012

A Virtualization-Level Future Internet Defense-in-Depth Architecture.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
Wireless and mobile networking (Foreword).
Telecommun. Syst., 2011

DRinK: a defense strategy of cooperative wireless terminals in a wireless multihoming environment.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

Multihomed wireless terminals: MAC configuration and network selection games.
Proceedings of the 2011 International Conference on Information Networking, 2011

Effective Data-Centric Reputation Systems for MANETs: A Novel Evaluation Framework.
Proceedings of IEEE International Conference on Communications, 2011

2010
Router selfishness in community wireless mesh networks: Cross-layer benefits and harms.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

2009
Ad hoc multi-WLAN: A game-theoretic model of correlated play.
Proceedings of the 2nd IFIP Wireless Days, 2009

Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs.
Proceedings of the NTMS 2009, 2009

DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes.
Proceedings of the Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, 2009

Wireless multihoming modeled as a multi-WLAN game.
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009

2008
Noncooperative QoS support in an Ad Hoc WLAN.
Proceedings of the 1st IFIP Wireless Days, 2008

What is information?
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

2007
A station strategy to deter backoff attacks in IEEE 802.11 LANs.
J. Discrete Algorithms, 2007

An Incentive-Based Forwarding Protocol for Mobile Ad Hoc Networks with Anonymous Packets.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

Capacity-Fairness Performance of an Ad Hoc IEEE 802.11 WLAN with Noncooperative Stations.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

2006
A game-theoretic study of CSMA/CA under a backoff attack.
IEEE/ACM Trans. Netw., 2006

MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations.
J. Networks, 2006

Quality of service games in an IEEE 802.11 ad hoc wireless LAN.
Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2006

An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANs.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

Anonymous Agreed Order Multicast: Performance and Free Riding.
Proceedings of the Distributed Computing and Internet Technology, 2006

2005
Solvability of a Markovian Model of an IEEE 802.11 LAN under a Backoff Attack.
Proceedings of the 13th International Symposium on Modeling, 2005

Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations.
Proceedings of the Distributed Computing, 2005

Playing CSMA/CA Game to Deter Backoff Attacks in Ad Hoc Wireless LANs.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005

2004
Fair Packet Forwarding in MANETs with Anonymous Stations: A Game-Theoretic Approach.
Proceedings of the NETWORKING 2004, 2004

CSMA/CA Performance under Backoff Attacks: A Game-Theoretic Context.
Proceedings of the MMB & PGTS 2004, 2004

2002
Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations.
Proceedings of the NETWORKING 2002, 2002

2001
Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting.
Proceedings of the Protocols for Multimedia Systems, 6th International Conference, 2001

2000
Membership-Insensitive Totally Ordered Multicast: Properties and Performance.
Proceedings of the NETWORKING 2000, 2000

Packet Scheduling in Wireless LANs - A Framework for a Noncooperative Paradigm.
Proceedings of the Personal Wireless Communications, 2000

1993
Performance of the Cooperative Random Token Protocol for High-Speed Radio LANs.
Proceedings of the High Speed Networks and Their Performance, 1993

1986
Store-and-Forward Deadlock Prevention in Packet Networks: A Circulating Token Approach and Performance Considerations.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986


  Loading...