A game-theoretic study of CSMA/CA under a backoff attack J Konorski IEEE/ACM Transactions On Networking 14 (6), 1167-1178, 2006 | 131 | 2006 |
Multiple access in ad-hoc wireless LANs with noncooperative stations J Konorski International Conference on Research in Networking, 1141-1146, 2002 | 105 | 2002 |
Solvability of a Markovian model of an IEEE 802.11 LAN under a backoff attack J Konorski 13th IEEE International Symposium on Modeling, Analysis, and Simulation of …, 2005 | 27 | 2005 |
Protection of fairness for multimedia traffic streams in a non-cooperative wireless LAN setting J Konorski International Conference on Protocols for Multimedia Systems, 116-129, 2001 | 27 | 2001 |
Data-centric Dempster-Shafer theory-based selfishness thwarting via trust evaluation in MANETs and WSNs J Konorski, R Orlikowski 2009 3rd International Conference on New Technologies, Mobility and Security …, 2009 | 25 | 2009 |
Discouraging traffic remapping attacks in local ad hoc networks J Konorski, S Szott IEEE transactions on wireless communications 13 (7), 3752-3767, 2014 | 18 | 2014 |
A station strategy to deter backoff attacks in IEEE 802.11 LANs J Konorski Journal of discrete Algorithms 5 (3), 436-454, 2007 | 14 | 2007 |
DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes J Konorski, R Orlikowski Joint IFIP Wireless and Mobile Networking Conference, 185-196, 2009 | 13 | 2009 |
Measurements of QoS/QoE parameters for media streaming in a PMIPv6 testbed with 802.11 b/g/n WLANs M Hoeft, K Gierlowski, T Gierszewski, J Konorski, K Nowicki, J Wozniak Metrology and Measurement Systems, 2012 | 12 | 2012 |
A framework for detection of selfishness in multihop mobile ad hoc networks J Konorski, R Orlikowski Journal of telecommunications and information technology, 34-40, 2009 | 11 | 2009 |
What is information? J Konorski, W Szpankowski 2008 IEEE Information Theory Workshop, 269-270, 2008 | 10 | 2008 |
Traffic remapping attacks in ad hoc networks S Szott, J Konorski IEEE Communications Magazine 56 (4), 218-224, 2018 | 9 | 2018 |
Application of a hash function to discourage MAC-layer misbehaviour in wireless LANS J Konorski, M Kurant Journal of Telecommunications and Information Technology, 38-46, 2004 | 8 | 2004 |
A centralized reputation system for MANETs based on observed path performance J Konorski, K Rydzewski 2015 8th IFIP Wireless and Mobile Networking Conference (WMNC), 56-63, 2015 | 6 | 2015 |
EDCA remapping in ad hoc IEEE 802.11 WLANs: An incentive compatible discouragement scheme J Konorski, S Szott 2012 IFIP Wireless Days, 1-8, 2012 | 6 | 2012 |
Multihomed wireless terminals: MAC configuration and network selection games J Konorski The International Conference on Information Networking 2011 (ICOIN2011), 224-229, 2011 | 6 | 2011 |
A reputation system for MANETs and WSNs using traffic shedding J Konorski, R Orlikowski 2010 3rd International Symposium on Applied Sciences in Biomedical and …, 2010 | 6 | 2010 |
Playing CSMA/CA game to deter backoff attacks in ad hoc wireless LANs J Konorski International Conference on Ad-Hoc Networks and Wireless, 127-140, 2005 | 6 | 2005 |
Mitigation of fake data content poisoning attacks in ndn via blockchain S Baranski, J Konorski 2020 30th International telecommunication networks and applications …, 2020 | 5 | 2020 |
Modeling a traffic remapping attack game in a multi-hop ad hoc network J Konorski, S Szott GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017 | 5 | 2017 |