Monolithic vs. microservice architecture: A performance and scalability evaluation G Blinowski, A Ojdowska, A Przybyłek IEEE Access 10, 20357-20374, 2022 | 141 | 2022 |
Security of visible light communication systems—A survey G Blinowski Physical Communication 34, 246-260, 2019 | 69 | 2019 |
Security issues in visible light communication systems G Blinowski IFAC-PapersOnLine 48 (4), 234-239, 2015 | 61 | 2015 |
CVE based classification of vulnerable IoT systems GJ Blinowski, P Piotrowski Theory and Applications of Dependable Computer Systems: Proceedings of the …, 2020 | 35 | 2020 |
Practical aspects of physical and MAC layer security in visible light communication systems GJ Blinowski International Journal of Electronics and Telecommunications 62 (1), 7--13, 2016 | 23 | 2016 |
The feasibility of launching rogue transmitter attacks in indoor visible light communication networks GJ Blinowski Wireless Personal Communications 97, 5325-5343, 2017 | 13 | 2017 |
Trans3D: a free tool for dynamical visualization of EEG activity transmission in the brain G Blinowski, M Kamiński, D Wawer Computers in Biology and Medicine 51, 214-222, 2014 | 10 | 2014 |
The feasibility of launching physical layer attacks in visible light communication networks G Blinowski arXiv preprint arXiv:1608.07146, 2016 | 8 | 2016 |
LuxSteg: First practical implementation of steganography in VLC G Blinowski, P Januszewski, G Stepniak, K Szczypiorski IEEE Access 6, 74366-74375, 2018 | 7 | 2018 |
Steganography in VLC Systems. GJ Blinowski, K Szczypiorski J. Univers. Comput. Sci. 23 (5), 454-478, 2017 | 4 | 2017 |
Modelling and evaluation of a multi-tag LED-ID platform G Blinowski, A Kmieciak FEDCSIS 2016, 2016 | 3 | 2016 |
Comparing Gausian and exact models of malicious interference in VLC systems G Blinowski, A Mościcki International Journal of Electronics and Telecommunications 65, 2019 | 2 | 2019 |
Risk-based decision making in IoT systems GJ Blinowski Information Systems Architecture and Technology: Proceedings of 38th …, 2018 | 1 | 2018 |
Układ Raspberry Pi jako uniwersalna platforma mikro-appliance do zastosowań sieciowych i bezpieczeństwa G Blinowski, T Pieczerak Przegląd Telekomunikacyjny+ Wiadomości Telekomunikacyjne, 697--701, 2014 | 1 | 2014 |
α-WWW/ISIS Technical Reference Manual v. 1.0 H Rybiński, GJ Blinowski, T Ramsza The Institute of Computer Science, 2011 | 1 | 2011 |
Inter-neuro: from chaos to neuroinformatics knowledge base G Blinowski, P Durka, A Spasiński Journal of Medical Informatics & Technologies 7, 2004 | 1 | 2004 |
Comparing Support Vector Machine and Neural Network Classifiers of CVE Vulnerabilities GJ Blinowski, P Piotrowski, M Wiśniewski 18th International Conference on Security and Cryptography, 2021 | | 2021 |
Estimation of Effective Connectivity from Electrophysiological Time Series. A Special Session Tutorial K Blinowska, M Kamiński, L Baccalá, K Sameshima, GJ Blinowski Zakład Graficzny Uniwersytetu Warszawskiego, 2014 | | 2014 |
Alpha-ISIS-Web-and Cloud-Oriented Information Storage and Retrieval Environment GJ Blinowski, H Rybiński, T Ramsza, T Kustra Oficyna Wydawnicza Politechniki Wrocławskiej, 2013 | | 2013 |
KCMail-wydajny filtr protokołu SMTP G Blinowski, K Ciechańska Przegląd Telekomunikacyjny+ Wiadomości Telekomunikacyjne, 585--591, 2013 | | 2013 |