dr inż. Sabina Szymoniak
Education:
June 29, 2017 - Obtaining a doctoral degree in the field of technical sciences in the discipline of computer science.
Title of the dissertation: Modeling and verification of security protocols includind dealys in the network , supervisor: dr hab. Mirosław Kurkowski, post supervisor: dr inż. Olga Siedlecka-Lamch.
2012 - 2017 - Doctoral studies at the Faculty of Mechanical Engineering and Computer Science of the Częstochowa University of Technology.
2011 - 2012 - Master's degree studies: Częstochowa University of Technology, Faculty of Mechanical Engineering and Computer Science, major: computer science, specialization: Integrated Management Systems and Data Analysis.
Master's thesis title: Analysis and comparison of optimization techniques in database systems , supervisor: dr inż. Olga Siedlecka-Lamch.
2007 - 2011 - Engineering studies: Częstochowa University of Technology, Faculty of Mechanical Engineering and Computer Science, major: computer science, specialization: Computer Networks.
Title of the engineering thesis: Internet application for managing the dental office , supervisor: dr inż. Łukasz Bartczuk.
Research:
Security of computer systems and networks
Modeling and verification of security protocols taking into account time parameters
Publications
2024
2023
- Bobulski J., Szymoniak S., Pasternak K., Safe data transmission in IoT system for air pollution monitoring, 2023 IEEE International Conference on Big Data (BigData), Sorrento, Italy, 2023, pp. 5438-5443.
- Foks K., Szymoniak S., Metody zapewnienia bezpieczeństwa informatycznego aplikacji webowych, Potencjał innowacyjny w inżynierii materiałoweji zarządzaniu produkcją, redakcją Agaty Dudek i Ewy Staniewskiej, Wydawnictwo Politechniki Częstochowskiej, Częstochowa, 2023, 321-330.
- Bobulski J., Szymoniak S., Pasternak K., Air Pollution Monitoring and Information Distribution System. In: Burduk, R., Choraś, M., Kozik, R., Ksieniewicz, P., Marciniak, T., Trajdos, P. (eds) Progress on Pattern Classification, Image Processing and Communications. CORES IP&C 2023 2023. Lecture Notes in Networks and Systems, vol 766. Springer, Cham, 2023.
- Piątkowski J., Szymoniak S., Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework, Applied Sciences, 2023, 13(23), 12668.
- Szymoniak S., Depta F., Karbowiak Ł., Kubanek M., Trustworthy Artificial Intelligence Methods for Users’ Physical and Environmental Security: A Comprehensive Review, Applied Sciences, 2023, 13(21), 12068.
- Siedlecka-Lamch O., Szymoniak S., Blockchain Technology in Medical Data Processing: A Study on Its Applications and Potential Benefits. Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering - ENASE, 664-671, 2023 , Prague, Czech Republic.
- Piątkowski, J., Szymoniak, S., Trivializing verification of cryptographic protocols. Computer Assisted Methods in Engineering and Science, 30(4):389–406, 2023.
- Szymoniak S., Kesar S., Key Agreement and Authentication Protocols in the Internet of Things: A Survey, Applied Sciences, 2023, 13(1), 404.
2022
- Szymoniak S., Siedlecka-Lamch O., Securing Meetings in D2D IoT Systems, Proceedings of the ETHICOMP 2022, Effectiveness of ICT ethics – How do we help solve ethical problems in the field of ICT?, Eds. Jani Koskinen, Kai K. Kimppa, Olli Heimo, Juhani Naskali, Salla Ponkala and Minna M. Rantanen, University of Turku, Turku School of Economics, Turku, Finland, pages 30-41, 2022.
- Siedlecka-Lamch O., Szymoniak S., Probabilistic Analysis of Security Protocols Using Probabilistic Timed Automata, Proceedings of the ETHICOMP 2022, Effectiveness of ICT ethics – How do we help solve ethical problems in the field of ICT?, Eds. Jani Koskinen, Kai K. Kimppa, Olli Heimo, Juhani Naskali, Salla Ponkala and Minna M. Rantanen, University of Turku, Turku School of Economics, Turku, Finland, pages 418-434, 2022.
- Bobulski J., Kubanek M., Kulawik J., Szymoniak S., Data Container for Autonomous Cars, Applied Human Factors and Ergonomics International, Human Systems Engineering and Design (IHSED2021): Future Trends and Applications, AHFE International, Volume 21, Issue 21, pp 7, 2022.
- Zbrzezny A. M., Szymoniak S., Kurkowski M., Practical Approach in Verification of Security Systems Using Satisfiability Modulo Theories, Logic Journal of the IGPL, Volume 30, Issue 2, April 2022, Pages 289–300.
- Bartłomiejczyk M., Fray I. E., Kurkowski M., Szymoniak S., Siedlecka-Lamch O., "User Authentication Protocol Based on the Location Factor for a Mobile Environment," in IEEE Access, vol. 10, pp. 16439-16455, 2022.
2021
- Szymoniak S., Using A Security Protocol To Protect Against False Links, Moving technology ethics at the forefront of society, organisations and governments ETHICOMP Book Series, Eds. Jorge Pelegrín Borondo, Mario Arias Oliva, Kiyoshi Murata, Ana María Lara Palma, 2021, p. 513-525.
- Szymoniak S., Amelia—A new security protocol for protection against false links, Computer Communications, Volume 179, 1 November 2021, Pages 73-81, 2021.
- Szymoniak S., A new security protocol for protection against false links, [New] Normal Technology Ethics: Proceedings of the ETHICOMP 2021, Mario Arias Oliva, Jorge Pelegrín Borondo, Kiyoshi Murata, Eva Marina Reinares Lara, Universidad de La Rioja, 2021, p. 303-306 (extended abstract).
- Szymoniak, S.; Siedlecka-Lamch, O.; Zbrzezny, A.M.; Zbrzezny, A.; Kurkowski, M. SAT and SMT-Based Verification of Security Protocols Including Time Aspects. Sensors 2021, 21, 3055.
- Szymoniak S., Time Influence on Security Protocol, Proceedings of the16th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2021, pp. 181-188, 2021.
- Szymoniak S., Security protocols analysis including various time parameters, Mathematical Biosciences and Engineering, 2021, 18(2): 1136-1153.
2020
- Szymoniak S., How to be on time with security protocol?, Mario Arias Oliva, Jorge Pelegrín Borondo, Kiyoshi Murata, Ana María Lara Palma, Societal Challenges in the Smart Society ETHICOMP Book Series, Universidad de La Rioja, p. 225-237.
- Siedlecka-Lamch O., Szymoniak S., Kurkowski M., El Fray I., Towards Most Efficient Method for Untimed Security Protocols Verification, Proceedings of the 24th Pacific Asia Conference on Information Systems: Information Systems (IS) for the Future, PACIS 2020.
- Szymoniak S., How to be on time with security protocol?, Jorge Pelegrín Borondo, Mario Arias Oliva, Kiyoshi Murata, Ana María Lara Palma, Paradigm Shifts in ICT Ethics, Proceedings of International Conference on the Ethical and Social Impact of ICT, ETHICOMP 2020, Logrono, Spain, Universidad de La Rioja, p. 139-143 (extended abstract).
- Zbrzezny A. M., Zbrzezny A., Szymoniak S., Siedlecka-Lamch O., Kurkowski M., VerSecTis - An Agent based Model Checker for Security Protocols, Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2020), B. An, N. Yorke-Smith, A. El Fallah Seghrouchni, G. Sukthankar (eds.), May 9–13, 2020, Auckland, New Zealand, p. 2123-2125.
2019
- Zbrzezny A. M., Siedlecka-Lamch O., Szymoniak S., Kurkowski M.,SMT solvers as Efficient Tools for Automatic Time Properties Verification of Security Protocols, 2019 20th International Conference on Parallel and Distributed Computing, Applications and Technologies PDCAT 2019, Gold Coast, Australia 5-7 December 2019, (Proceedings) IEEE Computer Society, 2020, 323-330.
- Siedlecka-Lamch O., Szymoniak S., Kurkowski M., A fast method for security protocols verification, Computer Information Systems and Industrial Management, pages 523–534, Cham, 2019. Springer International Publishing.
- Zbrzezny A. M., Szymoniak S., Kurkowski M., Efficient Verification of Security Protocols Time Properties Using SMT Solvers, International Joint Conference: 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019), Springer International Publishing, 2020, 25-35.
- Szymoniak S., KaoChow Protocol Timed Analysis, In Pejaś, J., El Fray, I., Hyla, T., Kacprzyk, J., eds.: Advances in Soft and Hard Computing, Cham, Springer International Publishing (2019) 346–357.
2018
- Szymoniak S., Siedlecka-Lamch O., Kurkowski M. (2019) Network’s Delays in Timed Analysis of Security Protocols. In: Borzemski L., Świątek J., Wilimowska Z. (eds) Information Systems Architecture and Technology: Proceedings of 39th International Conference on Information Systems Architecture and Technology – ISAT 2018. ISAT 2018. Advances in Intelligent Systems and Computing, vol 852. Springer, Cham
- Szymoniak S., The Impact of Time Parameters on the Security Protocols Correctness, in Proc.: 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Communications in Computer and Information Science, Volume 860, 333-343, Springer, 2018.
- Szymoniak S., Siedlecka-Lamch O., Kurkowski M., On Some Time Aspects in Security Protocols Analysis, in Proc.: 25th International Conference, CN 2018, Gliwice, Poland, June 19-22, 2018, Communications in Computer and Information Science, Volume 860, 344-356, Springer, 2018.
2017
- Szymoniak S., Siedlecka-Lamch O., Kurkowski M., SAT-based Verification of NSPK Protocol Including Delays in the Network, in Proc.: IEEE 14th International Scientific Conference on Informatics, Poprad, Slovakia, November 14-16, IEEE, 2017.
- Szymoniak S., Analysis and simulations of timed security protocols, Studia Informatica, vol. 38 (2), pp 55-66, 2017.
- Szymoniak S., Siedlecka-Lamch O., Kurkowski M., Timed analysis of security protocols, Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part II, vol. 522, pp 53-63, Springer Verlag, 2017.
2016
- Szymoniak S., Verification of security protocols including delays in network, Studia Informatica, vol. 37 (1), pp 71-82, 2016.
- Szymoniak S., Wzmocniony szyfr Cezara jako technika szyfrowania prostych komunikatów, w: 40. Studencka Konferencja Naukowa. Innowacje w Procesach Produkcyjnych, Technologicznych i Bezpieczeństwie, Wyd. WIiTM PCz, maj 2016.
2015
- Szymoniak S., Kurkowski M., Piątkowski J., Timed models of security protocols, Journal of Applied Mathematics and Computational Mechanics, vol 14, 2015.
- Szymoniak S., Permutacje jako element systemów zapewniających bezpieczeństwo danych, w: Innowacje w procesach produkcyjnych, technologicznych i bezpieczeństwie, Zarządzanie i Inżynieria Produkcji, Inżynieria bezpieczeństwa, Ochrona Środowiska, XXXIX Studencka Sesja Naukowa, Częstochowa 2015.
- Kurkowski M., Grosser A., Piątkowski J., Szymoniak S., ProToc - an universal language for security protocols specification, Advances in Intelligent Systems and Computing, vol. 342, Springer Verlag, 2015.
2014
- Siedlecka-Lamch O., Kurkowski M., Szymoniak S., Piech H., Parallel Bounded Model Checking of Security Protocols, in Proc. of PPAM'13, vol. 8384 of LNCS, Springer Verlag, 2014.
- Szymoniak S., Modelowanie wykonań protokołów kryptograficznych dla poprawy poziomu bezpieczeństwa systemów komputerowych, w: Innowacje w Procesach Produkcyjnych, Technologicznych i Bezpieczeństwie, XXXVIII Studencka Sesja Naukowa, Częstochowa 2014.
2013
- Szymoniak S., Weryfikacja modelowa za pomocą narzędzia PRISM, w: VI Międzywydziałowe Seminarium Kół Naukowych Politechniki Częstochowskiej. Materiały konferencyjne. Nauki techniczne i zdrowie publiczne, Częstochowa, 2013.
Projects:
Creation, adaptation and amplification of modern techniques and tools used in modeling and simulations - led by dr Elżbieta Gawrońska - BS / PB-1-112-3020 / 18 / P
Modeling and simulations - creation, adaptation and amplification of modern techniques and tools used in scientific and research works - led by Dr. Elżbieta Gawrońska - BS / PB-1-112-3020/17/P
Formal modeling and verification of cryptographic protocols - led by mgr inż. Sabina Szymoniak - BS/MN-1-112-303/15/P
Design and construction of engineering simulation systems - led by prof. dr hab. inż. Norbert Sczygiol - BS/PB-1-112-3020/11/P
PO KL, "Information Technologies: Research and their Interdisciplinary Applications", contract - April 15, 2013 - July 14, 2013
Languages:
English
Others:
Training: Fundamentals of Distance Learning - Course Design and Delivery - 2018
Training: Network security / Penetration tests - 2021
ETHICOMP 2021 Conference Scientific Committee Member
ETHICOMP 2022 Conference Scientific Committee Member
ETHICOMP 2024 Conference Scientific Committee Member
ETHICOMP Conference Steering Committee Member (2022-2025)
Cybersecurity scope coordinator
Coordinator of Student Science Club "Cyberhydra"