Mateusz Nowak
Mateusz Nowak
Institute of Theoretical and Applied Informatics
Verified email at
Cited by
Cited by
Self-aware networks that optimize security, QoS, and energy
E Gelenbe, J Domanska, P Fröhlich, MP Nowak, S Nowak
Proceedings of the IEEE 108 (7), 1150-1167, 2020
Smart SDN management of fog services
P Fröhlich, E Gelenbe, MP Nowak
2020 Global Internet of Things Summit (GIoTS), 1-6, 2020
Hierarchical machine learning for IoT anomaly detection in SDN
P Amangele, MJ Reed, M Al-Naday, N Thomos, M Nowak
2019 International Conference on Information Technologies (InfoTech), 1-4, 2019
IoT network attack detection and mitigation
E Gelenbe, P Fröhlich, M Nowak, S Papadopoulos, A Protogerou, ...
2020 9th Mediterranean Conference on Embedded Computing (MECO), 1-6, 2020
Properties of advanced metering infrastructure networks' topologies
S Nowak, M Nowak, K Grochla
2014 IEEE Network Operations and Management Symposium (NOMS), 1-6, 2014
Efficient representation of transition matrix in the Markov process modeling of computer networks
P Pecka, S Deorowicz, M Nowak
Man-Machine Interactions 2, 457-464, 2011
Global queue pruning method for efficient broadcast in multihop wireless networks
S Nowak, M Nowak, K Grochla, P Pecka
International Symposium on Computer and Information Sciences, 214-224, 2016
Content aware network based on virtual infrastructure
A Beben, P Wisniewski, P Krawiec, M Nowak, P Pecka, JM Batalla, ...
2012 13th ACIS International Conference on Software Engineering, Artificial …, 2012
Smart SDN management of fog services to optimize QoS and energy
P Fröhlich, E Gelenbe, J Fiołka, J Chęciński, M Nowak, Z Filus
Sensors 21 (9), 3105, 2021
European cybersecurity research and the seriot project
J Domańska, M Nowak, S Nowak, T Czachórski
International Symposium on Computer and Information Sciences, 166-173, 2018
Mitigation of privacy threats due to encrypted traffic analysis through a policy-based framework and MUD profiles
G Baldini, JL Hernandez-Ramos, S Nowak, R Neisse, M Nowak
Symmetry 12 (9), 1576, 2020
Iot network risk assessment and mitigation: The SerIoT Approach
G Baldini, P Fröhlich, E Gelenbe, JL Hernandez-Ramos, M Nowak, ...
Secur. Risk Manag 88, 2020
Cognitive packet networks for the secure internet of things
M Nowak, S Nowak, J Domańska, T Czachórski
2019 Global IoT Summit (GIoTS), 1-4, 2019
Cognitive Routing for Improvement of IoT Security
M Nowak, S Nowak, J Domanska
ICFC 2019, 2019
MAGANET–on the need of realistic topologies for AMI network simulations
S Nowak, M Nowak, K Grochla
International Conference on Computer Networks, 79-88, 2014
New synchronization method for the parallel simulations of wireless networks
S Nowak, M Nowak, P Foremski
Smart Spaces and Next Generation Wired/Wireless Networking, 405-415, 2011
Parallel simulations with modified INET simulation package
M Nowak, S Nowak
Theoretical and Applied Informatics 19 (2), 147-156, 2007
Systemy wizualizacji algorytmów wspomagające badania naukowe
P Szmal, J Francik, M Nowak
III Krajowa Konferencja „Komputerowe wspomaganie badań naukowych KOWBAN ‘96 …, 1996
Solving large Markov models described with standard programming language
P Pecka, MP Nowak, A Rataj, S Nowak
International Symposium on Computer and Information Sciences, 57-67, 2018
IoT European security and privacy projects: Integration, architectures and interoperability
E Ferrera, C Pastrone, PE Brun, R De Besombes, K Loupos, ...
Next Generation Internet of Things. Distributed Intelligence at the Edge and …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20