K. Nikodem, T. Rajba, Sz. Wąsowicz Functions Generating Strongly Schur-Convex Sums, Inequalities and applications 2010: dedicated to the memory of Wolfgang Walter / ed. Catherine Bandle (2012), 175-182
J. Mako, K. Nikodem, Zsolt Ples On strong ( , F)-convexity, Math. Inequal. Appl. 15 (2012), 289-299
K. Nikodem, T. Rajba, Sz. Wąsowicz On the classes of higher-order Jensen-convex functions and Wright-convex functions, J. Math. Anal. Appl., 396 (2012), 261-269
B. Micherda A characterization of convex a-functions, Opuscula Math. 32 (2012)
B. Micherda, T. Rajba On some Hermite-Hadamard-Fejer inequalities for (k,h)-convex functions, Math. Inequal. Appl. 15 (2012), 931-940
T. Rajba An application of the choquet theorem to the study of randomly-superinvariant measures, Opuscula Math. 32 (2012)
T. Rajba, S. Rajba The probability of collisions in Wireless Sensor Network with random sending, Przegl�d elektroniczny (Electrical Review), R.88 nr 9a/2012
T. Rajba A generalization of multiple Wright-convex functions via randomization, J. Math. Anal. Appl.
Sz. Wąsowicz, A. Witkowski On some inequality of Hermite-Hadamard type, Opuscula Math. 32 (2012)
M. Karpiski Monografia: Bezpiecze�stwo informacji, Warszawa: Wydawnictwo PAK 280, (2) (2012)
M. Aleksander, M. Karpiski, G. Litawa Implementation in FPGA of computations on eliptic curverGF(p) based onRademacher-Krestenson's bases, Infomacijna bezpeka = Informative Safety : shidoukrains'kij nacional'nij universitet imeni Volodomira Dal'a No. 1(7) (2012), 12-17
V. M. Ciz, O.I Demcisin, M. Karpi�ski, S.M. Balaban Using cluster model for calculation of reliability wireless sensor networks, Infomacijna bezpeka = Informative Safety : shidoukrains'kij nacional'nij universitet imeni Volodomira Dal'a No. 1(7) (2012), 83-89
M. Aleksander, B. Borowik, P. Evtukh, M. Karpiski Realization of the method of attacks visualization in wireless sensor networks, Visnik Nacional'nogo Universitetu "L'vivs'ka Politehnika": Radioelektronika ta Telekomunikacii nr. 738 (2012), 112-116
N. V. Piontko, M. Karpiski Criteria for segmenting partially blured images, Scientific Journal of the East Ukrainian National University No. 8(179) (2012), 285-291
U.O Acikovs'ka, M. Karpiski, Aroslav Kinah Modeling of DOS/DDOS attacts on the basais of probabilistic packet marketing, Scientific Journal of the East Ukrainian National University No. 8(179) (2012), 62-68
J. Kołodziej, Fatos Xhafa Integration of task abortion and security requirements in GA-based meta-heuristic for independent batch grid scheduling, Computers and Mathematics with Applications Vol. 63 Iss. 2 (2012), 350-364
J. Kołodziej, Samee U. Khan, Lizhe Wang, Albert Y. Zomaya Energy efficient genetic-based schedulers in computational grids, Concurrency and Computation: Practice and Experience (2012), 1-21
G. Gąbczyński, J. Kołodziej, Samee U. Khan Secure-Sim-G: security-aware grid simulator - basic concept and structure, Journal of Telecommunications and Information Technology 1 (2012), 33-42
K. Warwas, . Herok, P. Faat Test Driven development in evolutionary algorithms programming, Informatyka w dobie XXI wieku: technologie komputerowe w rozwoju nauki, techniki i edukacji, 157-168