Seguir
Janusz Furtak
Janusz Furtak
Dirección de correo verificada de wat.edu.pl
Título
Citado por
Citado por
Año
Application of IoT in military operations in a smart city
FT Johnsen, Z Zieliński, K Wrona, N Suri, C Fuchs, M Pradhan, J Furtak, ...
2018 International Conference on Military Communications and Information …, 2018
932018
Security techniques for the WSN link layer within military IoT
J Furtak, Z Zieliński, J Chudzikiewicz
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 233-238, 2016
412016
Exploiting smart city IoT for disaster recovery operations
N Suri, Z Zielinski, M Tortonesi, C Fuchs, M Pradhan, K Wrona, J Furtak, ...
2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 458-463, 2018
342018
Fault-tolerant techniques for the Internet of Military Things
J Chudzikiewicz, J Furtak, Z Zielinski
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 496-501, 2015
262015
Secure protocol for wireless communication within internet of military things
J Chudzikiewicz, J Furtak, Z Zielinski
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 508-513, 2015
192015
An approach to integrating security and fault tolerance mechanisms into the military IoT
Z Zieliski, J Chudzikiewicz, J Furtak
Security and fault tolerance in internet of things, 111-128, 2019
172019
A framework for constructing a secure domain of sensor nodes
J Furtak, Z Zieliński, J Chudzikiewicz
Sensors 19 (12), 2797, 2019
122019
The concept of authentication in WSNs using TPM.
J Furtak, J Chudzikiewicz
FedCSIS (Position Papers), 183-190, 2014
102014
Securing transmissions between nodes of WSN using TPM
J Furtak, J Chudzikiewicz
2015 Federated Conference on Computer Science and Information Systems …, 2015
92015
Secure workstation for special applications
A Kozakiewicz, A Felkner, J Furtak, Z Zieliński, M Brudka, M Małowidzki
Secure and Trust Computing, Data Management, and Applications: STA 2011 …, 2011
92011
Procedures for sensor nodes operation in the secured domain
J Furtak, Z Zieliński, J Chudzikiewicz
Concurrency and Computation: Practice and Experience 32 (13), e5183, 2020
72020
Integrating some security and fault tolerant techniques for military applications of Internet of Things
Z Zieliński, J Chudzikiewicz, J Furtak, P Głębocki
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 117-122, 2016
72016
Cryptographic Keys Generating and Renewing System for IoT Network Nodes—A Concept
J Furtak
Sensors 20 (17), 5012, 2020
62020
Secured workstation to process the data of different classification levels
Z Zieliński, J Furtak, J Chudzikiewicz, A Stasiak, M Brudka
Journal of Telecommunications and Information Technology, 5-12, 2012
62012
Reliability and fault tolerance solutions for miot
Z Zieliński, K Wrona, J Furtak, J Chudzikiewicz
IEEE Communications Magazine 59 (2), 36-42, 2021
52021
The procedure of key distribution in military IoT networks
J Chudzikiewicz, T Malinowski, J Furtak, Z Zieliński
Computer Networks: 26th International Conference, CN 2019, Kamień Śląski …, 2019
52019
Security techniques for the wsn link layer within military iot. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)
J Furtak, Z Zieliński, J Chudzikiewicz
IEEE, 233ś238, 2016
52016
Secured domain of sensor nodes-a new concept
J Furtak, Z Zieliński, J Chudzikiewicz
International Conference on Innovations for Community Services, 207-217, 2018
42018
Advances in network systems: architectures, security, and applications
M Grzenda, AI Awad, J Furtak, J Legierski
Springer, 2016
42016
Connecting the battlespace: C2 and iot technical interoperability in tactical federated environments
M Manso, J Furtak, B Guerra, J Michaelis, D Ota, N Suri, K Wrona
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 1045-1052, 2022
32022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20