Alexander I. Pechenkin
According to our database1,
Alexander I. Pechenkin
authored at least 18 papers
between 2015 and 2018.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2018
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems.
Autom. Control. Comput. Sci., 2018
Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence.
Autom. Control. Comput. Sci., 2018
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security.
Autom. Control. Comput. Sci., 2018
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code.
Autom. Control. Comput. Sci., 2018
An Approach to the Programs Security Analysis using Vector Representation of Machine Code.
Autom. Control. Comput. Sci., 2018
Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Vector representation of machine instructions for vulnerability assessment of digital infrastructure components.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
2017
Autom. Control. Comput. Sci., 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
2016
Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster.
Autom. Control. Comput. Sci., 2016
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
2015
Applying Correlation and Regression Analysis Methods for Security Incidents Detection in the Internet of Things.
Int. J. Commun. Networks Inf. Secur., 2015
Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster.
Autom. Control. Comput. Sci., 2015
Modeling the search for vulnerabilities via the fuzzing method using an automation representation of network protocols.
Autom. Control. Comput. Sci., 2015
Applying correlation analysis methods to control flow violation detection in the internet of things.
Autom. Control. Comput. Sci., 2015
Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015