Radek Fujdiak

Orcid: 0000-0002-8319-0633

According to our database1, Radek Fujdiak authored at least 62 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Hunting Network Anomalies in a Railway Axle Counter System.
Sensors, March, 2023

Time-Dependent Unavailability Exploration of Interconnected Urban Power Grid and Communication Network.
Algorithms, 2023

Identifying Industry Devices via Time Delay in Dataflow.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

From Playground to Battleground: Cyber Range Training for Industrial Cybersecurity Education.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Automated Neural Network Structure Design for Efficient.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Convolutional Neural Network-Based Classification of Secured IEC 104 Traffic in Energy Systems.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Increasing data rate of LoRa technology using frequency division multiplex.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
LoRaWAN Physical Layer-Based Attacks and Countermeasures, A Review.
Sensors, 2022

Protection Schemes in HPON Networks Based on the PWFBA Algorithm.
Sensors, 2022

Insights into the Issue of Deploying a Private LoRaWAN.
Sensors, 2022

Performance Analysis of Different LoRaWAN Frequency Bands for mMTC Scenarios.
Proceedings of the 45th International Conference on Telecommunications and Signal Processing, 2022

Fuzzing ICS Protocols: Modbus Fuzzer Framework.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2022

Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite Used.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2022

Fuzzing Framework for IEC 60870-5-104 Protocol.
Proceedings of the 5th International Conference on Computer Science and Software Engineering, 2022

Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Generator of Slow Denial-of-Service Cyber Attacks.
Sensors, 2021

Application Perspective on Cybersecurity Testbed for Industrial Control Systems.
Sensors, 2021

Analysis and detection of application-independent slow Denial of Service cyber attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

Active Scanning in the Industrial Control Systems.
Proceedings of the 2021 International Symposium on Computer Science and Intelligent Control, 2021

2020
Investigation of the Performance of TDoA-Based Localization Over LoRaWAN in Theory and Practice.
Sensors, 2020

On the Performance of Multi-Gateway LoRaWAN Deployments: An Experimental Study.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Design of Advanced Slow Denial of Service Attack Generator.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020

Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined Radio.
Proceedings of the 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2020

Communication Performance of a Real-Life Wide-Area Low-Power Network Based on Sigfox Technology.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Simplified Method for Fast and Efficient Incident Detection in Industrial Networks.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

Specific Anomaly Detection Method in Wireless Communication Networks.
Proceedings of the 4th Cyber Security in Networking Conference, 2020

2019
A Secure Publish/Subscribe Protocol for Internet of Things.
IACR Cryptol. ePrint Arch., 2019

Managing the Secure Software Development.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Developing Battery of Vulnerability Tests for Industrial Control Systems.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Modeling the Trade-off Between Security and Performance to Support the Product Life Cycle.
Proceedings of the 8th Mediterranean Conference on Embedded Computing, 2019

Current State of Honeypots and Deception Strategies in Cybersecurity.
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019

Security and Performance Trade-offs for Data Distribution Service in Flying Ad-Hoc Networks.
Proceedings of the 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2019

Communication Model of Smart Substation for Cyber-Detection Systems.
Proceedings of the Computer Networks - 26th International Conference, 2019

Energy Attack in LoRaWAN: Experimental Validation.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Broadband Power-line Devices Comparison and HomePlug AV2 Experimental Measurement.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Experimental Measurements of Communication Technologies for Mesh Distribution Networks of Low Voltage.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Radiation of an Electromagnetic Field from the Power Line Communication Adapters.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Seeking the Relation Between Performance and Security in Modern Systems: Metrics and Measures.
Proceedings of the 41st International Conference on Telecommunications and Signal Processing, 2018

Simulated Coverage Estimation of Single Gateway LoRaWAN Network.
Proceedings of the 25th International Conference on Systems, Signals and Image Processing, 2018

IP Traffic Generator Using Container Virtualization Technology.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

Investigation of Power Line Communication and Wi-Fi Co-existence in Smart Home.
Proceedings of the 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2018

On Track of Sigfox Confidentiality with End-to-End Encryption.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Experimental measurements of multi-carrier power line communication systems.
Proceedings of the 40th International Conference on Telecommunications and Signal Processing, 2017

Performance evaluation of multi-carrier power line communication systems in real condition for smart grid neighborhood area networks.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

Lightweight structures of big numbers for cryptographic primitives in limited devices.
Proceedings of the 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2017

Software Optimization of Advanced Encryption Standard for Ultra-Low-Power MSP430.
Proceedings of the Software Engineering Trends and Techniques in Intelligent Systems, 2017

2016
A Harmonized Perspective on Transportation Management in Smart Cities: The Novel IoT-Driven Environment for Road Traffic Modeling.
Sensors, 2016

On perspective of security and privacy-preserving solutions in the internet of things.
Comput. Networks, 2016

Implementing a Broadcast Storm Attack on a Mission-Critical Wireless Sensor Network.
Proceedings of the Wired/Wireless Internet Communications, 2016

Power line topology prediction using time domain reflectometry.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Design of low-power random number generator using signal quantization error in Smart Grid.
Proceedings of the 39th International Conference on Telecommunications and Signal Processing, 2016

Analytical Evaluation of D2D Connectivity Potential in 5G Wireless Systems.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

Experimental measurements of noise influence on narrowband Power Line Communication.
Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016

Remote networking technology for IoT: Cloud-based access for AllJoyn-enabled devices.
Proceedings of the 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology, 2016

Advanced optimization method for improving the urban traffic management.
Proceedings of the 18th Conference of Open Innovations Association and Seminar on Information Security and Protection of Information Technology, 2016

Using genetic algorithm for advanced municipal waste collection in Smart City.
Proceedings of the 10th International Symposium on Communication Systems, 2016

2015
Implementation of Elliptic Curve Diffie Hellman in ultra-low power microcontroller.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Evaluation of load impedances, discontinuity and impedance mismatch in PLC networks by experimental measurements with coupling circuits.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Analysis of random number generator from texas instrument in MSP430 x5xx families.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Verification of genetic algorithm in dynamic traffic light management.
Proceedings of the 38th International Conference on Telecommunications and Signal Processing, 2015

Wireless M-BUS: An Attractive M2M Technology for 5G-Grade Home Automation.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

Efficiency evaluation of different types of cryptography curves on low-power devices.
Proceedings of the 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2015


  Loading...