Dmitry Levshun
Orcid: 0000-0003-1898-6624
According to our database1,
Dmitry Levshun
authored at least 32 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2016
2017
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
6
7
8
2
3
1
2
1
1
1
2
2
2
4
2
4
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Considerations on sentiment of social network posts as a feature of destructive impacts.
AI Commun., 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Selection of Machine Learning Methods for Keylogger Detection Based on Network Activity.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
2023
Two-model active learning approach for inappropriate information classification in social networks.
Int. J. Inf. Sec., December, 2023
Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation.
Algorithms, February, 2023
Inf., 2023
Comparative Analysis of Machine Learning Methods in Vulnerability Categories Prediction Based on Configuration Similarity.
Proceedings of the Intelligent Distributed Computing XVI, 2023
Proceedings of the 33rd Conference of Open Innovations Association, 2023
2022
Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
Sensors, 2022
Active learning approach for inappropriate information classification in social networks.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022
Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts.
Proceedings of the Intelligent Distributed Computing XV, 2022
2021
The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure.
Microprocess. Microsystems, November, 2021
Models, algorithms and methodology for design of microcontroller-based physical security systems protected from cyber-physical attacks. (Modèles algorithmes et méthodologie pour la conception de systèmes de sécurité physique basés sur des microcontrôleurs protégés des attaques cyber-physiques).
PhD thesis, 2021
Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring.
Sensors, 2021
Proceedings of the 29th Euromicro International Conference on Parallel, 2021
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems.
Proceedings of the Intelligent Distributed Computing XIV, 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems.
Simul. Model. Pract. Theory, 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Proceedings of the 28th Euromicro International Conference on Parallel, 2020
2019
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks.
J. Internet Serv. Inf. Secur., 2019
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification.
Proceedings of the Intelligent Distributed Computing XIII, 2019
The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing.
Proceedings of the Intelligent Distributed Computing XIII, 2019
2018
A technique for design of secure data transfer environment: Application for I2C protocol.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
2017
Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017
2016
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016