Andrii Shalaginov

Orcid: 0000-0003-1980-6875

According to our database1, Andrii Shalaginov authored at least 44 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards Resource-Efficient DDoS Detection in IoT: Leveraging Feature Engineering of System and Network Usage Metrics.
J. Netw. Syst. Manag., October, 2024

IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications.
Int. J. Inf. Sec., August, 2024

2023
An Overview of Smart Home IoT Trends and related Cybersecurity Challenges.
Mob. Networks Appl., August, 2023

Hybrid IoT Cyber Range.
Sensors, March, 2023

2022
A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey.
IEEE Access, 2022

Artificial Intelligence Enabled Middleware for Distributed Cyberattacks Detection in IoT-based Smart Environments.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications.
Future Internet, 2021

Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace.
Future Gener. Comput. Syst., 2021

BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem.
Future Gener. Comput. Syst., 2021

Securing Smart Future: Cyber Threats and Intelligent Means to Respond.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
RESPOnSE - A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments.
Sensors, 2020

Decentralized Self-Enforcing Trust Management System for Social Internet of Things.
IEEE Internet Things J., 2020

PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting.
Future Internet, 2020

Big Data Analytics and Artificial Intelligence for Cyber Crime Investigation and Prevention.
Future Gener. Comput. Syst., 2020

Predicting likelihood of legitimate data loss in email DLP.
Future Gener. Comput. Syst., 2020

Intelligent mobile malware detection using permission requests and API calls.
Future Gener. Comput. Syst., 2020

IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications.
Proceedings of the Edge Computing - EDGE 2020, 2020

Modern Cybercrime Investigation: Technological Advancement of Smart Devices and Legal Aspects of Corresponding Digital Transformation.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Smart Home Forensics: An Exploratory Study on Smart Plug Forensic Analysis.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019

Cybersecurity Awareness and Culture in Rural Norway.
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019

Cybercrime Investigations in the Era of Smart Applications: Way Forward Through Big Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

PACE: Platform for Android Malware Classification and Performance Evaluation.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial.
CoRR, 2018

Intelligent analysis of digital evidences in large-scale logs in power systems attributed to the attacks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Identification of Attack-based Digital Forensic Evidences for WAMPAC Systems.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness.
Appl. Soft Comput., 2017

A deep neuro-fuzzy method for multi-label malware classification and fuzzy rules extraction.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

Evolutionary optimization of on-line multilayer perceptron for similarity-based access control.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Fuzzy Logic Model for Digital Forensics: A Trade-off between Accuracy, Complexity and Interpretability.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Dynamic feature-based expansion of fuzzy sets in Neuro-Fuzzy for proactive malware detection.
Proceedings of the 20th International Conference on Information Fusion, 2017

Cyber crime investigations in the era of big data.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Intelligent generation of fuzzy rules for network firewalls based on the analysis of large-scale network traffic dumps.
Int. J. Hybrid Intell. Syst., 2016

Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy.
Int. J. Hybrid Intell. Syst., 2016

Study of Soft Computing Methods for Large-Scale Multinomial Malware Types and Families Detection.
Proceedings of the Recent Developments and the New Direction in Soft-Computing Foundations and Applications, 2016

Automated intelligent multinomial classification of malware species using dynamic behavioural analysis.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Cyber Security Risk Assessment of a DDoS Attack.
Proceedings of the Information Security - 19th International Conference, 2016

Soft Computing and Hybrid Intelligence for Decision Support in Forensics Science.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Understanding Neuro-Fuzzy on a class of multinomial malware detection problems.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

2015
Automated generation of fuzzy rules from large-scale network traffic analysis in digital forensics investigations.
Proceedings of the 7th International Conference of Soft Computing and Pattern Recognition, 2015

A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications.
Proceedings of the Advances in Computational Intelligence, 2015

Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications.
Proceedings of the Hybrid Intelligent Systems, 2015

A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection.
Proceedings of the 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (IFSA-EUSFLAT-15), 2015

Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security.
Proceedings of the Risks and Security of Internet and Systems, 2015


  Loading...