default search action
Jerzy Konorski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2022
- [j12]Jerzy Konorski, Szymon Szott:
Mitigating Traffic Remapping Attacks in Autonomous Multihop Wireless Networks. IEEE Internet Things J. 9(15): 13555-13569 (2022) - [j11]Jerzy Konorski:
Defending against fake VIP in scant-transparency information systems with QoS differentiation. Inf. Sci. 607: 831-848 (2022) - 2018
- [j10]Szymon Szott, Jerzy Konorski:
Traffic Remapping Attacks in Ad Hoc Networks. IEEE Commun. Mag. 56(4): 218-224 (2018) - [j9]Szymon Szott, Jerzy Konorski:
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures. IEEE Wirel. Commun. Lett. 7(4): 658-661 (2018) - [j8]Jerzy Konorski, Jakub Grochowski:
Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network. Wirel. Commun. Mob. Comput. 2018: 8612817:1-8612817:16 (2018) - 2017
- [j7]Jerzy Konorski, Szymon Szott:
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs. IEEE Commun. Lett. 21(3): 624-627 (2017) - 2014
- [j6]Jerzy Konorski, Szymon Szott:
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks. IEEE Trans. Wirel. Commun. 13(7): 3752-3767 (2014) - 2013
- [j5]Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski:
Theory and implementation of a virtualisation level Future Internet defence in depth architecture. Int. J. Trust. Manag. Comput. Commun. 1(3/4): 274-299 (2013) - 2011
- [j4]Jerzy Konorski:
Wireless and mobile networking (Foreword). Telecommun. Syst. 48(3-4): 233-236 (2011) - 2007
- [j3]Jerzy Konorski:
A station strategy to deter backoff attacks in IEEE 802.11 LANs. J. Discrete Algorithms 5(3): 436-454 (2007) - 2006
- [j2]Jerzy Konorski:
MAC Contention in a Wireless LAN with Noncooperative Anonymous Stations. J. Networks 1(2): 27-36 (2006) - [j1]Jerzy Konorski:
A game-theoretic study of CSMA/CA under a backoff attack. IEEE/ACM Trans. Netw. 14(6): 1167-1178 (2006)
Conference and Workshop Papers
- 2023
- [c41]Jerzy Konorski:
Trustworthiness and Subversion in Large Service-Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection. TrustCom 2023: 722-729 - 2020
- [c40]Stanislaw Baranski, Jerzy Konorski:
Mitigation of Fake Data Content Poisoning Attacks in NDN via Blockchain. ITNAC 2020: 1-6 - 2019
- [c39]Jerzy Konorski, Karol Rydzewski:
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes. ADHOCNETS 2019: 314-331 - [c38]Jerzy Konorski:
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting. ITNAC 2019: 1-7 - 2018
- [c37]Jerzy Konorski, Szymon Szott:
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks. GLOBECOM 2018: 1-7 - [c36]Jerzy Konorski:
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis. RNDM 2018: 1-7 - [c35]Jerzy Konorski:
Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted Interactions. TrustCom/BigDataSE 2018: 1637-1641 - 2017
- [c34]Jerzy Konorski, Szymon Szott:
Modeling a Traffic Remapping Attack Game in a Multi-Hop Ad Hoc Network. GLOBECOM 2017: 1-7 - [c33]Jerzy Konorski:
Fake VIP attacks and their mitigation via double-blind reputation. ITNAC 2017: 1-8 - [c32]Jerzy Konorski, Karol Rydzewski:
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System. MMM-ACNS 2017: 131-142 - 2016
- [c31]Jerzy Konorski:
Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection. TRUST@AAMAS 2016: 43-53 - 2015
- [c30]Jerzy Konorski, Karol Rydzewski:
A Centralized Reputation System for MANETs Based on Observed Path Performance. WMNC 2015: 56-63 - 2014
- [c29]Jerzy Konorski, Artur Makutunowicz:
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm. ICOIN 2014: 314-319 - 2012
- [c28]Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski:
A Virtualization-Level Future Internet Defense-in-Depth Architecture. SNDS 2012: 283-292 - [c27]Jerzy Konorski, Szymon Szott:
EDCA remapping in ad hoc IEEE 802.11 WLANs: An incentive compatible discouragement scheme. Wireless Days 2012: 1-8 - 2011
- [c26]Jerzy Konorski:
Effective Data-Centric Reputation Systems for MANETs: A Novel Evaluation Framework. ICC 2011: 1-6 - [c25]Jerzy Konorski:
Multihomed wireless terminals: MAC configuration and network selection games. ICOIN 2011: 224-229 - [c24]Jerzy Konorski:
DRinK: a defense strategy of cooperative wireless terminals in a wireless multihoming environment. ISABEL 2011: 83:1-83:6 - 2010
- [c23]Krzysztof Gierlowski, Jerzy Konorski:
Router selfishness in community wireless mesh networks: Cross-layer benefits and harms. WOWMOM 2010: 1-6 - 2009
- [c22]Jerzy Konorski:
Wireless multihoming modeled as a multi-WLAN game. MSWiM 2009: 147-154 - [c21]Jerzy Konorski, Rafal Orlikowski:
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes. WMNC/PWC 2009: 185-196 - [c20]Jerzy Konorski, Rafal Orlikowski:
Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs. NTMS 2009: 1-5 - [c19]Jerzy Konorski:
Ad hoc multi-WLAN: A game-theoretic model of correlated play. Wireless Days 2009: 1-5 - 2008
- [c18]Jerzy Konorski, Wojciech Szpankowski:
What is information? ITW 2008: 269-270 - [c17]Jerzy Konorski:
Noncooperative QoS support in an Ad Hoc WLAN. Wireless Days 2008: 1-5 - 2007
- [c16]Jerzy Konorski:
Capacity-Fairness Performance of an Ad Hoc IEEE 802.11 WLAN with Noncooperative Stations. Networking 2007: 1136-1139 - [c15]Jerzy Konorski:
An Incentive-Based Forwarding Protocol for Mobile Ad Hoc Networks with Anonymous Packets. NEW2AN 2007: 316-329 - 2006
- [c14]Jerzy Konorski:
Anonymous Agreed Order Multicast: Performance and Free Riding. ICDCIT 2006: 128-135 - [c13]Jerzy Konorski:
An Idea Bag Strategy to Discourage Selfish Behavior Under Random Token MAC Protocols for Wireless LANs. ICDCN 2006: 582-593 - [c12]Jerzy Konorski:
Quality of service games in an IEEE 802.11 ad hoc wireless LAN. MSWiM 2006: 265-272 - 2005
- [c11]Jerzy Konorski:
Playing CSMA/CA Game to Deter Backoff Attacks in Ad Hoc Wireless LANs. ADHOC-NOW 2005: 127-140 - [c10]Jerzy Konorski:
Noncooperative Channel Contention in Ad Hoc Wireless LANs with Anonymous Stations. IWDC 2005: 262-274 - [c9]Jerzy Konorski:
Solvability of a Markovian Model of an IEEE 802.11 LAN under a Backoff Attack. MASCOTS 2005: 491-498 - 2004
- [c8]Jerzy Konorski:
CSMA/CA Performance under Backoff Attacks: A Game-Theoretic Context. MMB 2004: 349-358 - [c7]Jerzy Konorski:
Fair Packet Forwarding in MANETs with Anonymous Stations: A Game-Theoretic Approach. NETWORKING 2004: 418-429 - 2002
- [c6]Jerzy Konorski:
Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. NETWORKING 2002: 1141-1146 - 2001
- [c5]Jerzy Konorski:
Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting. PROMS 2001: 116-129 - 2000
- [c4]Jerzy Konorski:
Packet Scheduling in Wireless LANs - A Framework for a Noncooperative Paradigm. PWC 2000: 29-42 - [c3]Jerzy Konorski:
Membership-Insensitive Totally Ordered Multicast: Properties and Performance. NETWORKING 2000: 201-212 - 1993
- [c2]Jerzy Konorski, Krzysztof Nowicki, Józef Wozniak:
Performance of the Cooperative Random Token Protocol for High-Speed Radio LANs. Data Communication Networks and their Performance 1993: 47-60 - 1986
- [c1]Jerzy Konorski:
Store-and-Forward Deadlock Prevention in Packet Networks: A Circulating Token Approach and Performance Considerations. ICC 1986: 119-123
Editorship
- 2009
- [e2]Józef Wozniak, Jerzy Konorski, Ryszard J. Katulski, Andrzej R. Pach:
Wireless and Mobile Networking - Second IFIP WG 6.8 Joint Conference, WMNC 2009, Gdansk, Poland, September 9-11, 2009. Proceedings. IFIP Advances in Information and Communication Technology 308, Springer 2009, ISBN 978-3-642-03840-2 [contents] - 2000
- [e1]Józef Wozniak, Jerzy Konorski:
Personal Wireless Communications, IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications (PWC'2000), September 14-15, 2000, Gdansk, Poland. IFIP Conference Proceedings 179, Kluwer 2000, ISBN 0-7923-7941-1 [contents]
Informal and Other Publications
- 2020
- [i6]Jerzy Konorski, Karol Rydzewski:
Nodal cooperation equilibrium analysis in multihop wireless ad hoc networks with a reputation system. CoRR abs/2001.06056 (2020) - [i5]Karol Rydzewski, Jerzy Konorski:
A reactive algorithm for deducing nodal forwarding behavior in a multihop ad-hoc wireless network in the presence of errors. CoRR abs/2002.01106 (2020) - 2019
- [i4]Jerzy Konorski, Szymon Szott:
Analysis of a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network. CoRR abs/1902.04561 (2019) - 2018
- [i3]Jerzy Konorski, Szymon Szott:
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks. CoRR abs/1804.10456 (2018) - 2017
- [i2]Jerzy Konorski, Szymon Szott:
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network. CoRR abs/1704.04053 (2017) - [i1]Szymon Szott, Jerzy Konorski:
Selfish Attacks in Two-hop IEEE 802.11 Relay Networks: Impact and Countermeasures. CoRR abs/1710.01006 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-05 21:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint