Dmitry P. Zegzhda
Orcid: 0000-0002-0232-7248
According to our database1,
Dmitry P. Zegzhda
authored at least 77 papers
between 2001 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems.
Autom. Control. Comput. Sci., December, 2023
Empirical Study of the Stability of a Linear Filter Based on the Neyman-Pearson Criterion to Changes in the Average Values.
Autom. Control. Comput. Sci., December, 2023
Probabilistic Approach to Estimate the Cyber Resistance of Mobile Networks Based on Their Connectivity.
Autom. Control. Comput. Sci., December, 2023
J. Comput. Virol. Hacking Tech., September, 2023
2022
Autom. Control. Comput. Sci., December, 2022
Detecting Malicious Executable Files Based on Static-Dynamic Analysis Using Machine Learning.
Autom. Control. Comput. Sci., December, 2022
2021
Key Concepts of Systemological Approach to CPS Adaptive Information Security Monitoring.
Symmetry, 2021
Autom. Control. Comput. Sci., 2021
Autom. Control. Comput. Sci., 2021
Autom. Control. Comput. Sci., 2021
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
2020
Application and improvement of sequence alignment algorithms for intrusion detection in the Internet of Things.
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020
2019
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series.
Autom. Control. Comput. Sci., 2019
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems.
Autom. Control. Comput. Sci., 2019
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls.
Autom. Control. Comput. Sci., 2019
Autom. Control. Comput. Sci., 2019
Approach to Presenting Network Infrastructure of Cyberphysical Systems to Minimize the Cyberattack Neutralization Time.
Autom. Control. Comput. Sci., 2019
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things.
Autom. Control. Comput. Sci., 2019
Detection of information security breaches in distributed control systems based on values prediction of multidimensional time series.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019
Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019
Proceedings of the 7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, 2019
Estimating the sustainability of cyber-physical systems based on spectral graph theory.
Proceedings of the 7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, 2019
Using GRU neural network for cyber-attack detection in automated process control systems.
Proceedings of the 7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, 2019
2018
Autom. Control. Comput. Sci., 2018
Autom. Control. Comput. Sci., 2018
Autom. Control. Comput. Sci., 2018
Assurance of Cyber Resistance of the Distributed Data Storage Systems Using the Blockchain Technology.
Autom. Control. Comput. Sci., 2018
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity.
Autom. Control. Comput. Sci., 2018
Autom. Control. Comput. Sci., 2018
Autom. Control. Comput. Sci., 2018
Autom. Control. Comput. Sci., 2018
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network.
Autom. Control. Comput. Sci., 2018
Autom. Control. Comput. Sci., 2018
Providing Stable Operation of Self-Organizing Cyber-Physical System via Adaptive Topology Management Methods Using Blockchain-Like Directed Acyclic Graph.
Autom. Control. Comput. Sci., 2018
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Sustainability of cyber-physical systems in the context of targeted destructive influences.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
2017
Autom. Control. Comput. Sci., 2017
Autom. Control. Comput. Sci., 2017
Autom. Control. Comput. Sci., 2017
Autom. Control. Comput. Sci., 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Detecting Android application malicious behaviors based on the analysis of control flows and data flows.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
2016
Multiagent system controllability evaluation using the multilevel structure of the graph of agents.
Autom. Control. Comput. Sci., 2016
Autom. Control. Comput. Sci., 2016
Applying the group signature for entity authentication in distributed grid computing networks.
Autom. Control. Comput. Sci., 2016
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Applying Virtualization Technology for the Construction of Trusted Executable Environment.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016
2015
Approach to the construction of the generalized functional-semantic cyber security model.
Autom. Control. Comput. Sci., 2015
Autom. Control. Comput. Sci., 2015
Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment.
Autom. Control. Comput. Sci., 2015
Autom. Control. Comput. Sci., 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Computer Network Security, 2012
Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems.
Proceedings of the Computer Network Security, 2012
2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Computer Network Security, 2010
2008
"Linux over OSMOS": the Secure Hybrid Operating System.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008
The Use of Conference Control to Design a Protected Videoconference System.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008
Security Assurance for the Attribute-Based Access Control Systems.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008
2007
Logical Security Evaluation of Real-World Operating Systems.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2007
2006
2005
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Computer Network Security, 2005
Proceedings of the Computer Network Security, 2005
2003
Proceedings of the Computer Network Security, 2003
2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001