Igor V. Kotenko

Orcid: 0000-0001-6859-7120

Affiliations:
  • St. Petersburg Institute for Informatics and Automation (SPIIRAS)


According to our database1, Igor V. Kotenko authored at least 253 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Anomaly Detection in IoT Networks Based on Intelligent Security Event Correlation.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

Hybrid Multi-Task Deep Learning for Improved IoT Network Intrusion Detection: Exploring Different CNN Structures.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Intelligent state assessment of complex autonomous objects based on wavelet analysis.
Eng. Appl. Artif. Intell., November, 2023

Graph Visualization: Alternative Models Inspired by Bioinformatics.
Sensors, April, 2023

Cyber Attacker Profiling for Risk Analysis Based on Machine Learning.
Sensors, February, 2023

The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices.
J. Sens. Actuator Networks, February, 2023

Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation.
Algorithms, February, 2023

Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks.
Big Data Cogn. Comput., 2023

A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities.
Artif. Intell. Rev., 2023

Autoencoder-based Malware Analysis: An Imagery Analysis Approach to Enhance the Security of Smart City IoT.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023

Determination of the Transition Probability Matrix for an IoT Fuzzy Security Model.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

An RFID Based Localization and Mental Stress Recognition System Using Wearable Sensors.
Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, 2023

2022
Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods.
Microprocess. Microsystems, April, 2022

Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
Sensors, 2022

Privacy Policies of IoT Devices: Collection and Analysis.
Sensors, 2022

A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods.
Sensors, 2022

Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches.
Sensors, 2022

Analytical Modeling for Identification of the Machine Code Architecture of Cyberphysical Devices in Smart Homes.
Sensors, 2022

Multi-Aspect Based Approach to Attack Detection in IoT Clouds.
Sensors, 2022

An approach for selecting countermeasures against harmful information based on uncertainty management.
Comput. Sci. Inf. Syst., 2022

Systematic Literature Review of Security Event Correlation Methods.
IEEE Access, 2022

Towards Resilient and Efficient Big Data Storage: Evaluating a SIEM Repository Based on HDFS.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

An approach to formal desription of the user notification scenarios in privacy policies.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022

Simulation-based and Graph oriented Approach to Detection of Network Attacks.
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022

Applying Machine Learning Methods to Detect Abnormal User Behavior in a University Data Center.
Proceedings of the Intelligent Distributed Computing XV, 2022

Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts.
Proceedings of the Intelligent Distributed Computing XV, 2022

Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract).
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure.
Microprocess. Microsystems, November, 2021

Applying machine learning and parallel data processing for attack detection in IoT.
IEEE Trans. Emerg. Top. Comput., 2021

Guest Editors' Introduction "Modeling and Simulation for Intelligent Distributed Computing".
Simul. Model. Pract. Theory, 2021

Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures.
Simul. Model. Pract. Theory, 2021

Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring.
Sensors, 2021

An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database.
J. Sens. Actuator Networks, 2021

Bot detection by friends graph in social networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Method and algorithms of visual audit of program interaction.
J. Internet Serv. Inf. Secur., 2021

An Approach to Ranking the Sources of Information Dissemination in Social Networks.
Inf., 2021

Identifying characteristics of software vulnerabilities by their textual description using machine learning.
Proceedings of the 2021 World Automation Congress, 2021

LSTM Neural Networks for Detecting Anomalies Caused by Web Application Cyber Attacks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021

Towards Security Decision Support for large-scale Heterogeneous Distributed Information Systems.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Situational Control of a Computer Network Security System in Conditions of Cyber Attacks.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Detecting Anomalous Behavior of Users of Data Centers Based on the Application of Artificial Neural Networks.
Proceedings of the Artificial Intelligence - 19th Russian Conference, 2021

A technique for early detection of cyberattacks using the traffic self-similarity property and a statistical approach.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

Selection of Deep Neural Network Models for IoT Anomaly Detection Experiments.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021

Detection of Business Email Compromise Attacks with Writing Style Analysis.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Combined Approach to Anomaly Detection in Wireless Sensor Networks on Example of Water Management System.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

Detection and Monitoring of the Destructive Impacts in the Social Networks Using Machine Learning Methods.
Proceedings of the ICT for Health, Accessibility and Wellbeing, 2021

A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems.
Proceedings of the Intelligent Distributed Computing XIV, 2021

Security Analysis of Information Systems Based on Attack Sequences Generation and Testing.
Proceedings of the Intelligent Distributed Computing XIV, 2021

An Approach to the Synthesis of a Neural Network System for Diagnosing Computer Incidents.
Proceedings of the Intelligent Distributed Computing XIV, 2021

CPE and CVE based Technique for Software Security Risk Assessment.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Predicting the Mental State of the Social Network Users based on the Latent Dirichlet Allocation and fastText.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Security Measuring System for IoT Devices.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
Machine Learning and Big Data Processing for Cybersecurity Data Analysis.
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020

Design and verification of a mobile robot based on the integrated model of cyber-Physical systems.
Simul. Model. Pract. Theory, 2020

Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models.
Simul. Model. Pract. Theory, 2020

Guest Editorial: Intelligent Distributed Computing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

A Semantic Model for Security Evaluation of Information Systems.
J. Cyber Secur. Mobil., 2020

Stateful RORI-based countermeasure selection using hypergraphs.
J. Inf. Secur. Appl., 2020

Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects.
Inf., 2020

Latest advances in parallel, distributed, and network-based processing.
Concurr. Comput. Pract. Exp., 2020

GRIDHPC: A decentralized environment for high performance computing.
Concurr. Comput. Pract. Exp., 2020

The intelligent system for detection and counteraction of malicious and inappropriate information on the Internet.
AI Commun., 2020

Intelligent support for network administrator decisions based on combined neural networks.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Social networks bot detection using Benford's law.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Optimizing Secure Information Interaction in Distributed Computing Systems by the Sequential Concessions Method.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

Augmented reality for visualizing security data for cybernetic and cyberphysical systems.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020

Graph-based evaluation of probability of disclosing the network structure by targeted attacks.
Proceedings of the NOMS 2020, 2020

Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty.
Proceedings of the International Conference on INnovations in Intelligent SysTems and Applications, 2020

Analysis of Formats of Young People's Communicative Behavior in Social Network.
Proceedings of the 24th International Conference on System Theory, Control and Computing, 2020

Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

Approach to combining different methods for detecting insiders.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020

P2Onto: Making Privacy Policies Transparent.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Towards Attacker Attribution for Risk Analysis.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
Hierarchical fuzzy situational networks for online decision-making: Application to telecommunication systems.
Knowl. Based Syst., 2019

Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits.
J. Univers. Comput. Sci., 2019

Social networks analysis by graph algorithms on the example of the VKontakte social network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Reference architecture for social networks graph analysis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks.
J. Internet Serv. Inf. Secur., 2019

Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions.
Autom. Control. Comput. Sci., 2019

An Approach for Intelligent Evaluation of the State of Complex Autonomous Objects Based on the Wavelet Analysis.
Proceedings of the Advancing Technology Industrialization Through Intelligent Software Methodologies, Tools and Techniques, 2019

Optimization of the cyber security system structure based on accounting of the prevented damage cost.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Attack Detection in IoT Critical Infrastructures: A Machine Learning and Big Data Processing Approach.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Access Control Visualization Using Triangular Matrices.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019

Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Automated Revealing of Organizational Assets Based on Event Correlation.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Adaptive Touch Interface: Application for Mobile Internet Security.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019

The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems.
Proceedings of the Intelligent Distributed Computing XIII, 2019

ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection.
Proceedings of the Intelligent Distributed Computing XIII, 2019

The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

An Approach to Intelligent Distributed Scanning and Analytical Processing of the Internet Inappropriate Information.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Ontology of Metrics for Cyber Security Assessment.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks.
ACM Trans. Internet Techn., 2018

A visual analytics approach for the cyber forensics based on different views of the network traffic.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Guest Editorial: Managing Insider Security Threats.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018

Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring.
J. Internet Serv. Inf. Secur., 2018

Hypergraph-driven mitigation of cyberattacks.
Internet Technol. Lett., 2018

An Ontology-based Storage of Security Information.
Inf. Technol. Control., 2018

Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning.
IEEE Access, 2018

Hierarchical Fuzzy Situational Networks for Online Decision Support in Distributed Cyber-Physical Systems.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018

Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks.
Proceedings of the Social Informatics, 2018

Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion.
Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling, 2018

Parallelization of Security Event Correlation Based on Accounting of Event Type Links.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

The Multi-Layer Graph Based Technique for Proactive Automatic Response Against Cyber Attacks.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Applying Intelligent Agents for Anomaly Detection of Network Traffic in Internet of Things Networks.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018

Application of Image Classification Methods for Protection against Inappropriate Information in the Internet.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018

Evolutionary Algorithms for Design of Virtual Private Networks.
Proceedings of the Intelligent Distributed Computing XII, 2018

Ensuring Availability of Wireless Mesh Networks for Crisis Management.
Proceedings of the Intelligent Distributed Computing XII, 2018

A technique for design of secure data transfer environment: Application for I2C protocol.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

Visual analysis of CAN bus traffic injection using radial bar charts.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

Genetic algorithms for role mining in critical infrastructure data spaces.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018

Image Clustering Method based on Particle Swarm Optimization.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Parallel big data processing system for security monitoring in Internet of Things networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Hybridization of computational intelligence methods for attack detection in computer networks.
J. Comput. Sci., 2017

Categorisation of web pages for protection against inappropriate content in the internet.
Int. J. Internet Protoc. Technol., 2017

Aggregation of elastic stack instruments for collecting, storing and processing of security information and events.
Proceedings of the 2017 IEEE SmartWorld, 2017

Enhancement of probabilistic attack graphs for accurate cyber security monitoring.
Proceedings of the 2017 IEEE SmartWorld, 2017

Parallel Processing of Big Heterogeneous Data for Security Monitoring of IoT Networks.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Voronoi Maps for Planar Sensor Networks Visualization.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017

Choosing Models for Security Metrics Visualization.
Proceedings of the Computer Network Security, 2017

Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers.
Proceedings of the Computer Network Security, 2017

Ontological Hybrid Storage for Security Data.
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017

Modeling and Analysis of IoT Energy Resource Exhaustion Attacks.
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017

Design lifecycle for secure cyber-physical systems based on embedded devices.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

Correlation of security events based on the analysis of structures of event types.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

Administrating role-based access control by genetic algorithms.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Analytical attack modeling and security assessment based on the common vulnerability scoring system.
Proceedings of the 20th Conference of Open Innovations Association, 2017

Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
Guest Editorial: Advances in Secure Distributed and Network-Based Computing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge.
J. Ambient Intell. Humaniz. Comput., 2016

An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

Application of Hybrid Neural Networks for Monitoring and Forecasting Computer Networks States.
Proceedings of the Advances in Neural Networks - ISNN 2016, 2016

Reconfiguration of RBAC schemes by genetic algorithms.
Proceedings of the Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing, 2016

Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference.
Proceedings of the Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing, 2016

Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes.
Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016

Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015
Guest Editorial: Security in Distributed and Network-Based Computing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Integrated Repository of Security Information for Network Security Evaluation.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Methodological Primitives for Phased Construction of Data Visualization Models.
J. Internet Serv. Inf. Secur., 2015

Improved genetic algorithms for solving the optimisation tasks for design of access control schemes in computer networks.
Int. J. Bio Inspired Comput., 2015

Design and verification of protected systems with integrated devices based on expert knowledge.
Autom. Control. Comput. Sci., 2015

Attack tree-based approach for real-time security event processing.
Autom. Control. Comput. Sci., 2015

Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic Algorithms.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015

The CAPEC based generator of attack scenarios for network security evaluation.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

Evaluation of text classification techniques for inappropriate web content blocking.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

Investigation of DDoS Attacks by Hybrid Simulation.
Proceedings of the Information and Communication Technology, 2015

The Genetic Approach for Design of Virtual Private Networks.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

Network Attack Detection Based on Combination of Neural, Immune and Neuro-Fuzzy Classifiers.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015

Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management.
Proceedings of the Risks and Security of Internet and Systems, 2015

2014
Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Fast Network Attack Modeling and Security Evaluation based on Attack Graphs.
J. Cyber Secur. Mobil., 2014

Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services.
Int. J. Mob. Comput. Multim. Commun., 2014

Creation of a Fuzzy Knowledge Base for Adaptive Security Systems.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

Security Metrics Based on Attack Graphs for the Olympic Games Scenario.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2014

A Genetic Approach for Virtual Computer Network Design.
Proceedings of the Intelligent Distributed Computing VIII, 2014

Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks.
Proceedings of the Intelligent Distributed Computing VIII, 2014

Security Assessment of Computer Networks Based on Attack Graphs and Security Events.
Proceedings of the Information and Communication Technology, 2014

Security Evaluation for Cyber Situational Awareness.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

Visualization of Security Metrics for Cyber Situation Awareness.
Proceedings of the Ninth International Conference on Availability, 2014

Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014

2013
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems.
Future Internet, 2013

Analytical Visualization Techniques for Security Information and Event Management.
Proceedings of the 21st Euromicro International Conference on Parallel, 2013

Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks.
Proceedings of the 21st Euromicro International Conference on Parallel, 2013

Dynamical Attack Simulation for Security Information and Event Management.
Proceedings of the Information Fusion and Geographic Information Systems, 2013

Logical Inference Framework for Security Management in Geographical Information Systems.
Proceedings of the Information Fusion and Geographic Information Systems, 2013

Security metrics for risk assessment of distributed information systems.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Computer attack modeling and security evaluation based on attack graphs.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Experiments With Simulation Of Botnets And Defense Agent Teams.
Proceedings of the 27th European Conference on Modelling and Simulation, 2013

A Cyber Attack Modeling and Impact Assessment framework.
Proceedings of the 5th International Conference on Cyber Conflict, 2013

The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Security and Anonymity in Agent Systems.
Proceedings of the Software Agents, Agent Systems and Their Applications, 2012

Software Agents for Computer Network Security.
Proceedings of the Software Agents, Agent Systems and Their Applications, 2012

Agent-based simulation of cooperative defence against botnets.
Concurr. Comput. Pract. Exp., 2012

Simulation of Protection Mechanisms against Botnets on the Basis of "Nervous Network" Framework.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012

Data Repository for Security Information and Event Management in Service Infrastructures.
Proceedings of the SECRYPT 2012, 2012

Attack Modelling and Security Evaluation for Security Information and Event Management.
Proceedings of the SECRYPT 2012, 2012

Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012

Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods.
Proceedings of the Computer Network Security, 2012

Configuration-Based Approach to Embedded Device Security.
Proceedings of the Computer Network Security, 2012

An Approach for Network Information Flow Analysis for Systems of Embedded Components.
Proceedings of the Computer Network Security, 2012

The Ontological Approach for SIEM Data Repository Implementation.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

Common Framework for Attack Modeling and Security Evaluation in SIEM Systems.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
Genetic Algorithms for Role Mining Problem.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011

Security Analysis of Information Systems Taking into Account Social Engineering Attacks.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011

Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems.
Proceedings of the Information Fusion and Geographic Information Systems, 2011

Verification of security policy filtering rules by Model Checking.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

2010
Malware Detection by Data Mining Techniques Based on Positionally Dependent Features.
Proceedings of the 18th Euromicro Conference on Parallel, 2010

Genetic Optimization of Access Control Schemes in Virtual Local Area Networks.
Proceedings of the Computer Network Security, 2010

Security and Scalability of Remote Entrusting Protection.
Proceedings of the Computer Network Security, 2010

Simulation of Botnets: Agent-Based Approach.
Proceedings of the Intelligent Distributed Computing IV - Proceedings of the 4th International Symposium on Intelligent Distributed Computing, 2010

2009
Framework for Integrated Proactive Network Worm Detection and Response.
Proceedings of the 17th Euromicro International Conference on Parallel, 2009

Integrated Usage of Data Mining Methods for Malware Detection.
Proceedings of the Information Fusion and Geographic Information Systems, 2009

Design of Entrusting Protocols for Software Protection.
Proceedings of the Information Fusion and Geographic Information Systems, 2009

Simulation Of Agent Teams: Application Of A Domain-Independent Framework To Computer Network Security.
Proceedings of the European Conference on Modelling and Simulation, 2009

2008
Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks.
Proceedings of the 16th Euromicro International Conference on Parallel, 2008

2007
Investigation of Cooperative Defense against DDoS.
Proceedings of the SECRYPT 2007, 2007

Hybrid Multi-module Security Policy Verification.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Security Policy Verification Tool for Geographical Information Systems.
Proceedings of the Third International Workshop on Information Fusion and Geographical Information Systems, 2007

Software Environment for Simulation and Evaluation of a Security Operation Center.
Proceedings of the Third International Workshop on Information Fusion and Geographical Information Systems, 2007

Multi-agent Framework for Simulation of Adaptive Cooperative Defense Against Internet Attacks.
Proceedings of the Autonomous Intelligent Systems: Multi-Agents and Data Mining, 2007

2006
Network Security Evaluation Based on Simulation of Malfactor's Behavior.
Proceedings of the SECRYPT 2006, 2006

Agent-based modeling and simulation of network softbots' competition.
Proceedings of the Knowledge-Based Software Engineering, 2006

Simulation of Internet DDoS Attacks and Defense.
Proceedings of the Information Security, 9th International Conference, 2006

Antagonistic Agents in the Internet: Computer Network Warfare Simulation.
Proceedings of the 9th International Conference on Information Fusion, 2006

Agent Teams in Cyberspace: Security Guards in the Global Internet.
Proceedings of the 5th International Conference on Cyberworlds (CW 2006), 2006

Attack Graph Based Evaluation of Network Security.
Proceedings of the Communications and Multimedia Security, 2006

2005
Security Checker Architecture for Policy-Based Security Management.
Proceedings of the Computer Network Security, 2005

Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle.
Proceedings of the Computer Network Security, 2005

The Software Environment for Multi-agent Simulation of Defense Mechanisms against DDoS Attacks.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

2004
Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines.
Prax. Inf.verarb. Kommun., 2004

Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines.
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004

2003
Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning.
Comput. Syst. Sci. Eng., 2003

Experiments with Simulation of Attacks against Computer Networks.
Proceedings of the Computer Network Security, 2003

Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003

Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks.
Proceedings of the Multi-Agent Systems and Applications III, 2003

2002
Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002

2001
Agent-Based Model of Computer Network Security System: A Case Study.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Software Development Kit for Multi-agent Systems Design and Implementation.
Proceedings of the From Theory to Practice in Multi-Agent Systems, 2001

2000
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community.
Proceedings of the Information Security for Global Information Infrastructures, 2000

1999
Ontology-Based Multi-Agent Model of an Information Security System.
Proceedings of the New Directions in Rough Sets, 1999

Application of Hybrid Agent-Based Technology for Design of Telecommunication Systems.
Proceedings of the 1st International Workshop of Central and Eastern Europe on Multi-Agent Systems, 1999

Agent-based Model of Information Security System: Architecture and Framework for Coordinated Behavior Specification.
Proceedings of the 1st International Workshop of Central and Eastern Europe on Multi-Agent Systems, 1999

1995
A framework for intelligent group decision support.
Proceedings of the Third European Conference on Information Systems, 1995

1994
Conflict Resolution in Computer-Supported Cooperative Design.
Proceedings of the Human-Computer Interaction, 4th International Conference, 1994


  Loading...