default search action
Rafal Leszczyna
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Rafal Leszczyna:
Activity-based payments: alternative (anonymous) online payment model. Int. J. Inf. Sec. 23(3): 1741-1759 (2024) - [j13]Rafal Leszczyna:
Cybersecurity Assessment Methods - Why Aren't They Used? IT Prof. 26(4): 71-79 (2024) - [c12]Rafal Leszczyna:
ISO/IEC 27001-Based Estimation of Cybersecurity Costs with Caspea. ISD 2024 - 2021
- [j12]Rafal Leszczyna:
Review of cybersecurity assessment methods: Applicability perspective. Comput. Secur. 108: 102376 (2021) - [j11]Rafal Leszczyna:
Aiming at methods' wider adoption: Applicability determinants and metrics. Comput. Sci. Rev. 40: 100387 (2021) - 2020
- [c11]Rafal Leszczyna, Adrian Litwin:
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis. ICISS 2020: 267-287 - [c10]Rafal Leszczyna:
Evaluating the Cost of Personnel Activities in Cybersecurity Management: A Case Study. SecureComm (2) 2020: 268-274
2010 – 2019
- 2019
- [b1]Rafal Leszczyna:
Cybersecurity in the Electricity Sector - Managing Critical Infrastructure. Springer 2019, ISBN 978-3-030-19537-3, pp. 1-213 - [j10]Rafal Leszczyna, Tania Wallis, Michal R. Wróbel:
Developing novel solutions to realise the European Energy - Information Sharing & Analysis Centre. Decis. Support Syst. 122 (2019) - [j9]Rafal Leszczyna:
Standards with cybersecurity controls for smart grid - A systematic analysis. Int. J. Commun. Syst. 32(6) (2019) - [j8]Rafal Leszczyna, Michal R. Wróbel:
Threat intelligence platform for the energy sector. Softw. Pract. Exp. 49(8): 1225-1254 (2019) - 2018
- [j7]Rafal Leszczyna:
A review of standards with cybersecurity requirements for smart grid. Comput. Secur. 77: 262-276 (2018) - [j6]Rafal Leszczyna:
Cybersecurity and privacy in standards for smart grids - A comprehensive survey. Comput. Stand. Interfaces 56: 62-73 (2018) - [j5]Rafal Leszczyna:
Standards on cyber security assessment of smart grid. Int. J. Crit. Infrastructure Prot. 22: 70-89 (2018) - 2016
- [c9]Damiano Bolzoni, Rafal Leszczyna, Michal R. Wróbel:
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics. FedCSIS 2016: 743-749 - 2015
- [j4]Rafal Leszczyna:
Approaching secure industrial control systems. IET Inf. Secur. 9(1): 81-89 (2015) - [c8]Rafal Leszczyna, Michal R. Wróbel:
Evaluation of open source SIEM for situation awareness platform in the smart grid environment. WFCS 2015: 1-4 - 2014
- [c7]Rafal Leszczyna, Michal R. Wróbel:
Security information sharing for smart grids: Developing the right data model. ICITST 2014: 163-169 - 2013
- [p4]Rafal Leszczyna:
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures. Multiagent Systems and Applications - Volume 1 2013: 129-146 - 2012
- [p3]Rafal Leszczyna, Igor V. Kotenko:
Security and Anonymity in Agent Systems. Software Agents, Agent Systems and Their Applications 2012: 157-177 - [p2]Igor V. Kotenko, Rafal Leszczyna:
Software Agents for Computer Network Security. Software Agents, Agent Systems and Their Applications 2012: 260-285 - 2011
- [j3]Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera:
Approach to security assessment of critical infrastructures' information systems. IET Inf. Secur. 5(3): 135-144 (2011) - 2010
- [j2]Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera:
Simulating malware with MAlSim. J. Comput. Virol. 6(1): 65-75 (2010)
2000 – 2009
- 2008
- [c6]Marcelo Masera, Igor Nai Fovino, Rafal Leszczyna:
Security Assessment Of A Turbo-Gas Power Plant. Critical Infrastructure Protection 2008: 31-40 - [c5]Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera:
MAISim: mobile agent malware simulator. SimuTools 2008: 35 - 2007
- [c4]Rafal Leszczyna:
Anonymity Architecture for Mobile Agent Systems. HoloMAS 2007: 93-103 - 2006
- [c3]Rafal Leszczyna, Janusz Górski:
Performance analysis of untraceability protocols for mobile agents using an adaptable framework. AAMAS 2006: 1063-1070 - 2005
- [j1]Janusz Górski, Aleksander Jarzebowicz, Rafal Leszczyna, Jakub Miler, Marcin Olszewski:
Trust case: justifying trust in an IT solution. Reliab. Eng. Syst. Saf. 89(1): 33-47 (2005) - [c2]Rafal Leszczyna, Janusz Górski:
Untraceability of mobile agents. AAMAS 2005: 1233-1234 - [p1]Janusz Górski, Aleksander Jarzebowicz, Rafal Leszczyna, Jakub Miler, Marcin Olszewski:
Tool support for detecting defects in object-oriented models. Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems 2005: 103-112 - 2003
- [c1]Janusz Górski, Aleksander Jarzebowicz, Rafal Leszczyna, Jakub Miler, Marcin Olszewski:
An Approach to Trust Case Development. SAFECOMP 2003: 193-206
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint