Application of IoT in military operations in a smart city FT Johnsen, Z Zieliński, K Wrona, N Suri, C Fuchs, M Pradhan, J Furtak, ... 2018 International Conference on Military Communications and Information …, 2018 | 93 | 2018 |
Security techniques for the WSN link layer within military IoT J Furtak, Z Zieliński, J Chudzikiewicz 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 233-238, 2016 | 41 | 2016 |
Exploiting smart city IoT for disaster recovery operations N Suri, Z Zielinski, M Tortonesi, C Fuchs, M Pradhan, K Wrona, J Furtak, ... 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 458-463, 2018 | 34 | 2018 |
Fault-tolerant techniques for the Internet of Military Things J Chudzikiewicz, J Furtak, Z Zielinski 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 496-501, 2015 | 26 | 2015 |
Secure protocol for wireless communication within internet of military things J Chudzikiewicz, J Furtak, Z Zielinski 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 508-513, 2015 | 19 | 2015 |
An approach to integrating security and fault tolerance mechanisms into the military IoT Z Zieliski, J Chudzikiewicz, J Furtak Security and fault tolerance in internet of things, 111-128, 2019 | 17 | 2019 |
A framework for constructing a secure domain of sensor nodes J Furtak, Z Zieliński, J Chudzikiewicz Sensors 19 (12), 2797, 2019 | 12 | 2019 |
The concept of authentication in WSNs using TPM. J Furtak, J Chudzikiewicz FedCSIS (Position Papers), 183-190, 2014 | 10 | 2014 |
Securing transmissions between nodes of WSN using TPM J Furtak, J Chudzikiewicz 2015 Federated Conference on Computer Science and Information Systems …, 2015 | 9 | 2015 |
Secure workstation for special applications A Kozakiewicz, A Felkner, J Furtak, Z Zieliński, M Brudka, M Małowidzki Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011 | 9 | 2011 |
Procedures for sensor nodes operation in the secured domain J Furtak, Z Zieliński, J Chudzikiewicz Concurrency and Computation: Practice and Experience 32 (13), e5183, 2020 | 7 | 2020 |
Integrating some security and fault tolerant techniques for military applications of Internet of Things Z Zieliński, J Chudzikiewicz, J Furtak, P Głębocki 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 117-122, 2016 | 7 | 2016 |
Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept J Furtak Sensors 20 (17), 5012, 2020 | 6 | 2020 |
Secured workstation to process the data of different classification levels Z Zieliński, J Furtak, J Chudzikiewicz, A Stasiak, M Brudka Journal of Telecommunications and Information Technology, 5-12, 2012 | 6 | 2012 |
Reliability and fault tolerance solutions for miot Z Zieliński, K Wrona, J Furtak, J Chudzikiewicz IEEE Communications Magazine 59 (2), 36-42, 2021 | 5 | 2021 |
The procedure of key distribution in military IoT networks J Chudzikiewicz, T Malinowski, J Furtak, Z Zieliński Computer Networks: 26th International Conference, CN 2019, Kamień Śląski …, 2019 | 5 | 2019 |
Security techniques for the wsn link layer within military iot. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) J Furtak, Z Zieliński, J Chudzikiewicz IEEE, 233ś238, 2016 | 5 | 2016 |
Secured domain of sensor nodes-a new concept J Furtak, Z Zieliński, J Chudzikiewicz International Conference on Innovations for Community Services, 207-217, 2018 | 4 | 2018 |
Advances in network systems: architectures, security, and applications M Grzenda, AI Awad, J Furtak, J Legierski Springer, 2016 | 4 | 2016 |
Connecting the battlespace: C2 and iot technical interoperability in tactical federated environments M Manso, J Furtak, B Guerra, J Michaelis, D Ota, N Suri, K Wrona MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 1045-1052, 2022 | 3 | 2022 |