Zbigniew Kotulski
Cited by
Cited by
Cybersecurity education: evolution of the discipline and analysis of master programs
K Cabaj, D Domingos, Z Kotulski, A Respicio
Computers & Security 75, 24-35, 2018
Discrete chaotic cryptography
Z Kotulski, J Szczepanski
Annalen der Physik 6, 38l-394, 1997
Application of discrete chaotic dynamical systems in cryptography—DCC method
Z Kotulski, J SZCZEPAŃSKI, K Górski, A Paszkiewicz, A Zugaj
International Journal of Bifurcation and Chaos 9 (06), 1121-1135, 1999
On end-to-end approach for slice isolation in 5G networks. Fundamental challenges
Z Kotulski, T Nowak, M Sepczuk, M Tunia, R Artych, K Bocianiak, T Ośko, ...
Proceedings of the 2017 Federated Conference on Computer Science and …, 2017
New security and control protocol for VoIP based on steganography and digital watermarking
W Mazurczyk, Z Kotulski
Annales UMCS, Informatica 5, 417-426, 2006
Towards constructive approach to end-to-end slice isolation in 5G networks
Z Kotulski, TW Nowak, M Sepczuk, M Tunia, R Artych, K Bocianiak, ...
EURASIP Journal on Information Security 2018 (2), 1-23, 2018
Error analysis with applications in engineering
Z Kotulski, W Szczepiński
Springer Verlag, 2010
Adaptable security mechanism for dynamic environments
B Ksiezopolski, Z Kotulski
Computers & Security 26 (3), 246-255, 2007
Verticals in 5G MEC -use cases and security challenges
TW Nowak, M Sepczuk, Z Kotulski, W Niewolski, R Artych, K Bocianiak, ...
IEEE Access 9, DOI: 10.1109/ACCESS.2021.3088374, 2021
New VoIP traffic security scheme with digital watermarking
W Mazurczyk, Z Kotulski
International Conference on Computer Safety, Reliability, and Security, 170-181, 2006
Linear systems and normality
Z Kotulski, K Sobczyk
Journal of Statistical Physics 24 (2), 359-373, 1981
Pseudorandom number generators based on chaotic dynamical systems
J Szczepański, Z Kotulski
Open Systems & Information Dynamics 8 (2), 137-146, 2001
On constructive approach to chaotic pseudorandom number generators
Z Kotulski, J Szczepanski, K Górski, A Górska, A Paszkiewicz
Proc. Regional Conf. on Military Communication and Information Systems …, 2000
Towards Quality of Experience-based reputation models for future web service provisioning
T Ciszkowski, W Mazurczyk, Z Kotulski, T Hossfeld, M Fiedler, D Collange
Telecommunication Systems, 1-13, 2009
Cybersecurity: trends, issues, and challenges
K Cabaj, Z Kotulski, B Księżopolski, W Mazurczyk
EURASIP Journal on Information Security 2018 (2018:10), 1-2, 2018
5G networks: Types of isolation and their parameters in RAN and CN slices
Z Kotulski, TW Nowak, M Sepczuk, MA Tunia
Computer Networks 171, 107135, 2020
A new risk-based authentication management model oriented on user's experience
M Sepczuk, Z Kotulski
Computers & Security 73, 17–33, 2018
Analysis of different architectures of neural networks for application in intrusion detection systems
P Kukielka, Z Kotulski
2008 International Multiconference on Computer Science and Information …, 2008
Effects of parameter uncertainty on the response of vibratory systems to random excitation
Z Kotulski, K Sobczyk
Journal of Sound and Vibration 119 (1), 159-172, 1987
CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks
P Szalachowski, B Ksiezopolski, Z Kotulski
Information Processing Letters 110 (7), 247-251, 2010
The system can't perform the operation now. Try again later.
Articles 1–20