Andrey Chechulin
Orcid: 0000-0001-7056-6972
According to our database1,
Andrey Chechulin
authored at least 77 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Big Data Cogn. Comput., March, 2024
From Detection to Dissection: Unraveling Bot Characteristics in the VKontakte Social Network.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
2023
Two-model active learning approach for inappropriate information classification in social networks.
Int. J. Inf. Sec., December, 2023
Sensors, April, 2023
Inf., 2023
Intelligent Selection of Requirements for a Secure Design of Smart City Transport Infrastructure Interfaces.
Proceedings of the Intelligent Distributed Computing XVI, 2023
Proceedings of the 33rd Conference of Open Innovations Association, 2023
2022
Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
Sensors, 2022
Sensors, 2022
Active learning approach for inappropriate information classification in social networks.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022
Technique for Investigating Attacks on a Company's Reputation on a Social Media Platform.
Proceedings of the Intelligent Distributed Computing XV, 2022
2021
The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure.
Microprocess. Microsystems, November, 2021
Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring.
Sensors, 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
Inf., 2021
Proceedings of the 29th Euromicro International Conference on Parallel, 2021
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
An Approach to Automated Assessment of the Image of a Territorial Entity in the Media Discourse of a Foreign States.
Proceedings of the Intelligent Distributed Computing XIV, 2021
A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems.
Proceedings of the Intelligent Distributed Computing XIV, 2021
Proceedings of the 29th Conference of Open Innovations Association, 2021
2020
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems.
Simul. Model. Pract. Theory, 2020
In-Vehicle Situation Monitoring for Potential Threats Detection Based on Smartphone Sensors.
Sensors, 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Proceedings of the 28th Euromicro International Conference on Parallel, 2020
Augmented reality for visualizing security data for cybernetic and cyberphysical systems.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020
2019
Social networks analysis by graph algorithms on the example of the VKontakte social network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks.
J. Internet Serv. Inf. Secur., 2019
Towards Blockchain-based Multi-Agent Robotic Systems: Analysis, Classification and Applications.
CoRR, 2019
Proceedings of the 27th Euromicro International Conference on Parallel, 2019
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification.
Proceedings of the Intelligent Distributed Computing XIII, 2019
Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet.
Proceedings of the Intelligent Distributed Computing XIII, 2019
Proceedings of the Intelligent Distributed Computing XIII, 2019
2018
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
A visual analytics approach for the cyber forensics based on different views of the network traffic.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks.
Proceedings of the Social Informatics, 2018
Application of Image Classification Methods for Protection against Inappropriate Information in the Internet.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018
A technique for design of secure data transfer environment: Application for I2C protocol.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
2017
Categorisation of web pages for protection against inappropriate content in the internet.
Int. J. Internet Protoc. Technol., 2017
Proceedings of the Mobile Internet Security - Second International Symposium, 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017
Analytical attack modeling and security assessment based on the common vulnerability scoring system.
Proceedings of the 20th Conference of Open Innovations Association, 2017
2016
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
J. Internet Serv. Inf. Secur., 2015
Autom. Control. Comput. Sci., 2015
Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015
Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015
2014
J. Cyber Secur. Mobil., 2014
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014
Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2014
2013
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems.
Future Internet, 2013
Proceedings of the Information Fusion and Geographic Information Systems, 2013
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013
Proceedings of the 5th International Conference on Cyber Conflict, 2013
2012
Attack Modelling and Security Evaluation for Security Information and Event Management.
Proceedings of the SECRYPT 2012, 2012
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012
Proceedings of the Computer Network Security, 2012
An Approach for Network Information Flow Analysis for Systems of Embedded Components.
Proceedings of the Computer Network Security, 2012
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
2011
Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems.
Proceedings of the Information Fusion and Geographic Information Systems, 2011