default search action
Andrzej Kwiecien
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c34]Pawel Benecki, Daniel Kostrzewa, Marek Drewniak, Bohdan Shubyn, Piotr Grzesik, Vaidy S. Sunderam, Boleslaw Pochopien, Andrzej Kwiecien, Bozena Malysiak-Mrozek, Dariusz Mrozek:
Towards Detection of Anomalies in Automated Guided Vehicles Based on Telemetry Data. ICCS (7) 2024: 192-207 - [c33]Yevheniy Sierhieiev, Vadym Paiuk, Andrii Nicheporuk, Andrzej Kwiecien, Oleksandr Huralnyk:
Detection and prediction of the vulnerabilities in software systems based on behavioral analysis with machine learning. ICyberPhyS 2024: 239-254 - [c32]Maxim Prodeus, Andrii Nicheporuk, Andrzej Kwiecien, Dmytro Martiniyuk, Oleksii Lyhun:
Subsystem of anomaly detection in the Smart House system based on machine learning. ICyberPhyS 2024: 339-350 - [c31]Yevheniy Sierhieiev, Vadym Paiuk, Anatoliy Sachenko, Andrii Nicheporuk, Andrzej Kwiecien:
A graph-based vulnerability detection method. IntelITSIS 2024: 343-355 - [c30]Serhii Danchuk, Olena Geidarova, Andrii Nicheporuk, Andrzej Kwiecien:
Method of detecting cyberattacks on communication channels based on spectral clustering and machine learning methods. IntelITSIS 2024: 375-387 - [c29]Karol Marszalek, Adam Domanski, Rafal Cupek, Jerry Chun-Wei Lin, Andrzej Kwiecien:
A Queueing System to Jobs Scheduling Problem in AGVs. PDP 2024: 199-206 - 2023
- [c28]Anastasiia Nicheporuk, Andrii Nicheporuk, Andrzej Kwiecien, Serhii Posonskyi, Galina Radelchuk:
A Data Collection System from the RPL Routing Protocol for Detecting Distributed Denial of Service Attacks in IoT Networks. IntelITSIS 2023: 411-424 - [c27]Anastasiia Nicheporuk, Andrii Nicheporuk, Andrzej Kwiecien:
Behavioral Model of a Smart Grid Cyberphysical System Functioning under the Influence of MitM Cyberattacks. IntelITSIS 2023: 628-637 - 2022
- [c26]Mykola Stetsyuk, Antonina Kashtalian, Andrzej Kwiecien, Oleg Sachenko:
Method of Ensuring the Failure Resistance of Specialized Information Technologies Under the Influence of Malicious Software. IntelITSIS 2022: 352-364 - [c25]Kira Bobrovnikova, Sergii Lysenko, Ivan Hurman, Andrzej Kwiecien:
Machine Learning Based Techniques for Cyberattacks Detection in the Internet of Things Infrastructure. IntelITSIS 2022: 411-420 - 2020
- [e12]Piotr Gaj, Wojciech Guminski, Andrzej Kwiecien:
Computer Networks - 27th International Conference, CN 2020, Gdańsk, Poland, June 23-24, 2020, Proceedings. Communications in Computer and Information Science 1231, Springer 2020, ISBN 978-3-030-50718-3 [contents]
2010 – 2019
- 2019
- [e11]Piotr Gaj, Michal Sawicki, Andrzej Kwiecien:
Computer Networks - 26th International Conference, CN 2019, Kamień Śląski, Poland, June 25-27, 2019, Proceedings. Communications in Computer and Information Science 1039, Springer 2019, ISBN 978-3-030-21951-2 [contents] - 2018
- [c24]Michal Sawicki, Andrzej Kwiecien:
The Method of Isochronous Cycle Duration Measurement for Serial Interface IEEE 1394A. CN 2018: 206-215 - [e10]Piotr Gaj, Michal Sawicki, Grazyna Suchacka, Andrzej Kwiecien:
Computer Networks - 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Proceedings. Communications in Computer and Information Science 860, Springer 2018, ISBN 978-3-319-92458-8 [contents] - 2017
- [j2]Michal Sawicki, Andrzej Kwiecien:
Unexpected anomalies of isochronous communication over USB 3.1 Gen 1. Comput. Stand. Interfaces 49: 67-70 (2017) - [c23]Andrzej Kwiecien, Michal Mackowski, Jacek Stój, Dariusz Rzonca, Marcin Sidzina:
Utilization of Redundant Communication Network Throughput for Non-critical Data Exchange in Networked Control Systems. CN 2017: 182-194 - [c22]Jacek Stój, Andrzej Kwiecien:
Temporal Costs of Computing Unit Redundancy in Steady and Transient State. KKIO Software Engineering Conference 2017: 1-14 - [e9]Piotr Gaj, Andrzej Kwiecien, Michal Sawicki:
Computer Networks - 24th International Conference, CN 2017, Lądek Zdrój, Poland, June 20-23, 2017, Proceedings. Communications in Computer and Information Science 718, Springer 2017, ISBN 978-3-319-59766-9 [contents] - 2016
- [c21]Andrzej Kwiecien, Blazej Kwiecien, Michal Mackowski:
Algorithms for Transmission Failure Detection in a Communication System with Two Buses. CN 2016: 141-153 - [c20]Andrzej Kwiecien, Blazej Kwiecien, Michal Mackowski:
A Failure Influence on Parameters of Real-Time System with Two Buses. CN 2016: 154-167 - [e8]Piotr Gaj, Andrzej Kwiecien, Piotr Stera:
Computer Networks - 23rd International Conference, CN 2016, Brunów, Poland, June 14-17, 2016, Proceedings. Communications in Computer and Information Science 608, Springer 2016, ISBN 978-3-319-39206-6 [contents] - 2015
- [c19]Andrzej Kwiecien, Blazej Kwiecien, Michal Mackowski:
Automatic Scenario Selection of Cyclic Exchanges in Transmission via Two Buses. CN 2015: 150-161 - [c18]Andrzej Kwiecien, Michal Sawicki:
Scheduling of Isochronous Data Transactions in Compliance with QoS Restrictions in the USB 3.0 Interface. CN 2015: 382-388 - [c17]Andrzej Kwiecien, Michal Mackowski, Marek Kojder, Maciej Manczyk:
Reliability of Bluetooth Smart Technology for Indoor Localization System. CN 2015: 444-454 - [e7]Piotr Gaj, Andrzej Kwiecien, Piotr Stera:
Computer Networks - 22nd International Conference, CN 2015, Brunów, Poland, June 16-19, 2015. Proceedings. Communications in Computer and Information Science 522, Springer 2015, ISBN 978-3-319-19418-9 [contents] - 2014
- [c16]Andrzej Kwiecien, Michal Mackowski, Jacek Stój, Marcin Sidzina:
Influence of Electromagnetic Disturbances on Multi-network Interface Node. CN 2014: 298-307 - [e6]Andrzej Kwiecien, Piotr Gaj, Piotr Stera:
Computer Networks - 21st International Conference, CN 2014, Brunów, Poland, June 23-27, 2014. Proceedings. Communications in Computer and Information Science 431, Springer 2014, ISBN 978-3-319-07940-0 [contents] - 2013
- [j1]Arkadiusz Jestratjew, Andrzej Kwiecien:
Performance of HTTP Protocol in Networked Control Systems. IEEE Trans. Ind. Informatics 9(1): 271-276 (2013) - [c15]Andrzej Kwiecien, Marcin Sidzina, Michal Mackowski:
The Concept of Using Multi-protocol Nodes in Real-Time Distributed Systems for Increasing Communication Reliability. CN 2013: 177-188 - [c14]Andrzej Kwiecien, Michal Mackowski, Marcin Sidzina:
Data Security in Microprocessor Units. CN 2013: 495-506 - [c13]Andrzej Kwiecien, Michal Mackowski, Krzysztof Skoroniak:
The Concept of Software-Based Techniques of Increasing Immunity of Microprocessor Unit to Electromagnetic Disturbances. CN 2013: 507-516 - [e5]Andrzej Kwiecien, Piotr Gaj, Piotr Stera:
Computer Networks, 20th International Conference, CN 2013, Lwówek Śląski, Poland, June 17-21, 2013. Proceedings. Communications in Computer and Information Science 370, Springer 2013, ISBN 978-3-642-38864-4 [contents] - 2012
- [c12]Andrzej Kwiecien, Michal Mackowski, Krzysztof Skoroniak:
Reverse Engineering of Microprocessor Program Code. CN 2012: 191-197 - [c11]Andrzej Kwiecien, Karol Opielka:
Management of Industrial Networks Based on the FCAPS Guidelines. CN 2012: 280-288 - [e4]Andrzej Kwiecien, Piotr Gaj, Piotr Stera:
Computer Networks - 19th International Conference, CN 2012, Szczyrk, Poland, June 19-23, 2012. Proceedings. Communications in Computer and Information Science 291, Springer 2012, ISBN 978-3-642-31216-8 [contents] - 2011
- [c10]Arkadiusz Jestratjew, Andrzej Kwiecien:
Using HTTP as Field Network Transfer Protocol. CN 2011: 306-313 - [c9]Andrzej Kwiecien, Jacek Stój:
Genius Network Communication Process Registration and Analysis. CN 2011: 314-321 - [c8]Andrzej Kwiecien, Karol Opielka:
Industrial Networks in Explosive Atmospheres. CN 2011: 367-378 - [c7]Andrzej Kwiecien, Marcin Sidzina:
The Method of Reducing the Cycle of Programmable Logic Controller (PLC) Vulnerable "to Avalanche of Events". CN 2011: 379-385 - [c6]Andrzej Kwiecien, Michal Mackowski, Krzysztof Skoroniak:
The Analysis of Microprocessor Instruction Cycle. CN 2011: 417-426 - [c5]Andrzej Kwiecien, Michal Mackowski, Krzysztof Skoroniak:
Instruction Prediction in Microprocessor Unit. CN 2011: 427-433 - [e3]Andrzej Kwiecien, Piotr Gaj, Piotr Stera:
Computer Networks - 18th Conference, CN 2011, Ustron, Poland, June 14-18, 2011. Proceedings. Communications in Computer and Information Science 160, Springer 2011, ISBN 978-3-642-21770-8 [contents] - 2010
- [c4]Andrzej Kwiecien, Jacek Stój:
The Cost of Redundancy in Distributed Real-Time Systems in Steady State. CN 2010: 106-120 - [c3]Arkadiusz Jestratjew, Andrzej Kwiecien:
Using Cloud Storage in Production Monitoring Systems. CN 2010: 226-235 - [e2]Andrzej Kwiecien, Piotr Gaj, Piotr Stera:
Computer Networks - 17th Conference, CN 2010, Ustroń, Poland, June 15-19, 2010. Proceedings. Communications in Computer and Information Science 79, Springer 2010, ISBN 978-3-642-13860-7 [contents]
2000 – 2009
- 2009
- [c2]Andrzej Kwiecien, Marcin Sidzina:
Dual Bus as a Method for Data Interchange Transaction Acceleration in Distributed Real Time Systems. CN 2009: 252-263 - [c1]Andrzej Kwiecien, Jacek Rysinski, Marcin Sidzina:
Application of Distributed System in Control and Diagnostic Toothed Gears. CN 2009: 334-343 - [e1]Andrzej Kwiecien, Piotr Gaj, Piotr Stera:
Computer Networks - 16th Conference, CN 2009, Wisła, Poland, June 16-20, 2009. Proceedings. Communications in Computer and Information Science 39, Springer 2009, ISBN 978-3-642-02670-6 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint