Elena Basan

Orcid: 0000-0001-6127-4484

According to our database1, Elena Basan authored at least 23 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Analysis of Attack Intensity on Autonomous Mobile Robots.
Robotics, July, 2024

2023
Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode.
Sensors, February, 2023

2021
An Adaptive Protection System for Sensor Networks Based on Analysis of Neighboring Nodes.
Sensors, 2021

A Self-Diagnosis Method for Detecting UAV Cyber Attacks Based on Analysis of Parameter Changes.
Sensors, 2021

Analysis of Security Problems in Groups of Intelligent Sensors.
Proceedings of the Advances in Swarm Intelligence - 12th International Conference, 2021

Intelligent Intrusion Detection System for a Group of UAVs.
Proceedings of the Advances in Swarm Intelligence - 12th International Conference, 2021

Radio Frequency Method for Emulating Multiple UAVs.
Proceedings of the 17th International Conference on Intelligent Environments, 2021

2019
Method for Detecting Abnormal Activity in a Group of Mobile Robots.
Sensors, 2019

Analysis of the initial security of the robotics system.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Overview of Information Security Issues for a Robotic System.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Detection of Anomalies in the Robotic System Based on the Calculation of Kullback-Leibler Divergence.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

2018
Development of a Protection System for a Group of Mobile Robots, Taking into Account the Requirements of Foreign and Russian Legislation.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Development of the Methodology for Testing the Security of Group Management System for Mobile Robots.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Development of the Anomaly Detection Method for a Group of Mobile Robots.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Analysis of the Impact of Denial of Service Attacks on the Group of Robots.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

Evaluating and Detecting Internal Attacks in a Mobile Robotic Network.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
Analysis of ways to secure group control for autonomous mobile robots.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

A Trust Evaluation Method for Active Attack Counteraction in Wireless Sensor Networks.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Methodology of Countering Attacks for Wireless Sensor Networks Based on Trust.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
Trust management system for mobile cluster-based wireless sensor network.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

An Energy-Efficient System of Counteraction Against Attacks in the Mobile Wireless Sensor Networks.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

2013
Development of a secure cluster-based wireless sensor network model.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013


  Loading...