Alexander I. Pechenkin

According to our database1, Alexander I. Pechenkin authored at least 18 papers between 2015 and 2018.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems.
Autom. Control. Comput. Sci., 2018

Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence.
Autom. Control. Comput. Sci., 2018

Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security.
Autom. Control. Comput. Sci., 2018

An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code.
Autom. Control. Comput. Sci., 2018

An Approach to the Programs Security Analysis using Vector Representation of Machine Code.
Autom. Control. Comput. Sci., 2018

Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Vector representation of machine instructions for vulnerability assessment of digital infrastructure components.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

2017
Intelligent data analysis in decision support systems for penetration tests.
Autom. Control. Comput. Sci., 2017

Modeling of information systems to their security evaluation.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Integer overflow vulnerabilities detection in software binary code.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2016
Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster.
Autom. Control. Comput. Sci., 2016

Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

2015
Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things.
Int. J. Commun. Networks Inf. Secur., 2015

Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster.
Autom. Control. Comput. Sci., 2015

Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols.
Autom. Control. Comput. Sci., 2015

Applying correlation analysis methods to control flow violation detection in the internet of things.
Autom. Control. Comput. Sci., 2015

Adaptive reflexivity threat protection.
Autom. Control. Comput. Sci., 2015

Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015


  Loading...