Andrii Shalaginov
Orcid: 0000-0003-1980-6875
According to our database1,
Andrii Shalaginov
authored at least 44 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Towards Resource-Efficient DDoS Detection in IoT: Leveraging Feature Engineering of System and Network Usage Metrics.
J. Netw. Syst. Manag., October, 2024
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications.
Int. J. Inf. Sec., August, 2024
2023
Mob. Networks Appl., August, 2023
2022
A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey.
IEEE Access, 2022
Artificial Intelligence Enabled Middleware for Distributed Cyberattacks Detection in IoT-based Smart Environments.
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Securing Resource-Constrained IoT Nodes: Towards Intelligent Microcontroller-Based Attack Detection in Distributed Smart Applications.
Future Internet, 2021
Deep Graph neural network-based spammer detection under the perspective of heterogeneous cyberspace.
Future Gener. Comput. Syst., 2021
BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem.
Future Gener. Comput. Syst., 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
RESPOnSE - A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments.
Sensors, 2020
IEEE Internet Things J., 2020
PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting.
Future Internet, 2020
Big Data Analytics and Artificial Intelligence for Cyber Crime Investigation and Prevention.
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
IoT Digital Forensics Readiness in the Edge: A Roadmap for Acquiring Digital Evidences from Intelligent Smart Applications.
Proceedings of the Edge Computing - EDGE 2020, 2020
Modern Cybercrime Investigation: Technological Advancement of Smart Devices and Legal Aspects of Corresponding Digital Transformation.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
MEML: Resource-aware MQTT-based Machine Learning for Network Attacks Detection on IoT Edge Devices.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019
Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance, 2019
Cybercrime Investigations in the Era of Smart Applications: Way Forward Through Big Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Intelligent analysis of digital evidences in large-scale logs in power systems attributed to the attacks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Big data analytics by automated generation of fuzzy rules for Network Forensics Readiness.
Appl. Soft Comput., 2017
A deep neuro-fuzzy method for multi-label malware classification and fuzzy rules extraction.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
Evolutionary optimization of on-line multilayer perceptron for similarity-based access control.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Fuzzy Logic Model for Digital Forensics: A Trade-off between Accuracy, Complexity and Interpretability.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
Dynamic feature-based expansion of fuzzy sets in Neuro-Fuzzy for proactive malware detection.
Proceedings of the 20th International Conference on Information Fusion, 2017
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017
2016
Intelligent generation of fuzzy rules for network firewalls based on the analysis of large-scale network traffic dumps.
Int. J. Hybrid Intell. Syst., 2016
Multinomial classification of web attacks using improved fuzzy rules learning by Neuro-Fuzzy.
Int. J. Hybrid Intell. Syst., 2016
Study of Soft Computing Methods for Large-Scale Multinomial Malware Types and Families Detection.
Proceedings of the Recent Developments and the New Direction in Soft-Computing Foundations and Applications, 2016
Automated intelligent multinomial classification of malware species using dynamic behavioural analysis.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016
2015
Automated generation of fuzzy rules from large-scale network traffic analysis in digital forensics investigations.
Proceedings of the 7th International Conference of Soft Computing and Pattern Recognition, 2015
A New Method for an Optimal SOM Size Determination in Neuro-Fuzzy for the Digital Forensics Applications.
Proceedings of the Advances in Computational Intelligence, 2015
Towards Improvement of Multinomial Classification Accuracy of Neuro-Fuzzy for Digital Forensics Applications.
Proceedings of the Hybrid Intelligent Systems, 2015
A new method of fuzzy patches construction in Neuro-Fuzzy for malware detection.
Proceedings of the 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (IFSA-EUSFLAT-15), 2015
Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security.
Proceedings of the Risks and Security of Internet and Systems, 2015