Dmitry P. Zegzhda

Orcid: 0000-0002-0232-7248

According to our database1, Dmitry P. Zegzhda authored at least 77 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems.
Autom. Control. Comput. Sci., December, 2023

Empirical Study of the Stability of a Linear Filter Based on the Neyman-Pearson Criterion to Changes in the Average Values.
Autom. Control. Comput. Sci., December, 2023

Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity.
Autom. Control. Comput. Sci., December, 2023

Counteraction the cybersecurity threats of the in-vehicle local network.
J. Comput. Virol. Hacking Tech., September, 2023

2022
Bank Fraud Detection with Graph Neural Networks.
Autom. Control. Comput. Sci., December, 2022

Detecting Malicious Executable Files Based on Static-Dynamic Analysis Using Machine Learning.
Autom. Control. Comput. Sci., December, 2022

2021
Modelling Artificial Immunization Processes to Counter Cyberthreats.
Symmetry, 2021

Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring.
Symmetry, 2021

Detection of Malicious Executable Files Based on Clustering of Activities.
Autom. Control. Comput. Sci., 2021

Using Security-through-Obscurity Principle in an Industrial Internet of Things.
Autom. Control. Comput. Sci., 2021

Requirements on Providing a Sustainability of Industrial Internet of Things.
Autom. Control. Comput. Sci., 2021

A Necessary Condition for Industrial Internet of Things Sustainability.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

2020
Cyber Attack Prevention Based on Evolutionary Cybernetics Approach.
Symmetry, 2020

Application and improvement of sequence alignment algorithms for intrusion detection in the Internet of Things.
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020

2019
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series.
Autom. Control. Comput. Sci., 2019

Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems.
Autom. Control. Comput. Sci., 2019

Big Data Management System Security Threat Model.
Autom. Control. Comput. Sci., 2019

Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls.
Autom. Control. Comput. Sci., 2019

Application of an Artificial Neural Network for Detection of Attacks in VANETs.
Autom. Control. Comput. Sci., 2019

Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time.
Autom. Control. Comput. Sci., 2019

An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things.
Autom. Control. Comput. Sci., 2019

Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

High-performance NIDS Architecture for Enterprise Networking.
Proceedings of the 7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, 2019

Estimating the sustainability of cyber-physical systems based on spectral graph theory.
Proceedings of the 7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, 2019

Using GRU neural network for cyber-attack detection in automated process control systems.
Proceedings of the 7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, 2019

2018
Approaches to Modeling the Security of Cyberphysical Systems.
Autom. Control. Comput. Sci., 2018

Ensuring Secure Data Input/Output Operations for SGX ENCLAVE.
Autom. Control. Comput. Sci., 2018

Digital Manufacturing Security Indicators.
Autom. Control. Comput. Sci., 2018

Cyber-sustainability of Software-Defined Networks Based on Situational Management.
Autom. Control. Comput. Sci., 2018

Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology.
Autom. Control. Comput. Sci., 2018

The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity.
Autom. Control. Comput. Sci., 2018

Problems of Security in Digital Production and Its Resistance to Cyber Threats.
Autom. Control. Comput. Sci., 2018

Architecture of the Protected Cloud Data Storage Using Intel SGX Technology.
Autom. Control. Comput. Sci., 2018

A Blockchain Decentralized Public Key Infrastructure Model.
Autom. Control. Comput. Sci., 2018

Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network.
Autom. Control. Comput. Sci., 2018

Analysis of the Information Security Threats in the Digital Production Networks.
Autom. Control. Comput. Sci., 2018

Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph.
Autom. Control. Comput. Sci., 2018

Applying deep learning techniques for Android malware detection.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Sustainability of cyber-physical systems in the context of targeted destructive influences.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

2017
Use of Intel SGX to ensure the confidentiality of data of cloud users.
Autom. Control. Comput. Sci., 2017

Systematization and security assessment of cyber-physical systems.
Autom. Control. Comput. Sci., 2017

Cyber-physical system homeostatic security management.
Autom. Control. Comput. Sci., 2017

Protection of Wi-Fi network users against rogue access points.
Autom. Control. Comput. Sci., 2017

Modeling of information systems to their security evaluation.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Detecting Android application malicious behaviors based on the analysis of control flows and data flows.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2016
Multiagent system controllability evaluation using the multilevel structure of the graph of agents.
Autom. Control. Comput. Sci., 2016

Sustainability as a criterion for information security in cyber-physical systems.
Autom. Control. Comput. Sci., 2016

Applying the group signature for entity authentication in distributed grid computing networks.
Autom. Control. Comput. Sci., 2016

Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Applying Virtualization Technology for the Construction of Trusted Executable Environment.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Software defined security for vehicular ad hoc networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
Approach to the construction of the generalized functional-semantic cyber security model.
Autom. Control. Comput. Sci., 2015

Approach to APCS protection from cyber threats.
Autom. Control. Comput. Sci., 2015

Thermodynamic approach to modeling multi-agent systems in cyberspace.
Autom. Control. Comput. Sci., 2015

Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment.
Autom. Control. Comput. Sci., 2015

Secure processor architecture modeling for large-scale systems.
Autom. Control. Comput. Sci., 2015

Large-scale systems security evolution: control theory approach.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2014
Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2012
Using Graph Theory for Cloud System Security Modeling.
Proceedings of the Computer Network Security, 2012

Security Modeling of Grid Systems Using Petri Nets.
Proceedings of the Computer Network Security, 2012

Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems.
Proceedings of the Computer Network Security, 2012

2010
Homogeneity analysis of power consumption for information security purposes.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Clarifying Integrity Control at the Trusted Information Environment.
Proceedings of the Computer Network Security, 2010

Virtual Environment Security Modeling.
Proceedings of the Computer Network Security, 2010

2008
"Linux over OSMOS": the Secure Hybrid Operating System.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008

The Use of Conference Control to Design a Protected Videoconference System.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008

Security Assurance for the Attribute-Based Access Control Systems.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008

2007
Logical Security Evaluation of Real-World Operating Systems.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2007

2006
Formal Verification of Security Model Using SPR Tool.
Comput. Artif. Intell., 2006

2005
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility.
Proceedings of the Security in Information Systems, 2005

Vulnerabilities Detection in the Configurations of MS Windows Operating System.
Proceedings of the Computer Network Security, 2005

Secure Hybrid Operating System "Linux over Fenix".
Proceedings of the Computer Network Security, 2005

2003
Logical Resolving for Security Evaluation.
Proceedings of the Computer Network Security, 2003

2001
Secure Systems Design Technology.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Fenix Secure Operating System: Principles, Models and Architecture.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001


  Loading...