Elena Fedorchenko
Orcid: 0000-0001-6707-9153
According to our database1,
Elena Fedorchenko
authored at least 58 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security.
SN Comput. Sci., April, 2024
Considerations on sentiment of social network posts as a feature of destructive impacts.
AI Commun., 2024
2023
Sensors, February, 2023
Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation.
Algorithms, February, 2023
Towards Application of the Tabular Data Transformation to Images in the Intrusion Detection Tasks Using Deep Learning Techniques.
Proceedings of the Intelligent Distributed Computing XVI, 2023
An RFID Based Localization and Mental Stress Recognition System Using Wearable Sensors.
Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, 2023
2022
An approach for selecting countermeasures against harmful information based on uncertainty management.
Comput. Sci. Inf. Syst., 2022
Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case.
Algorithms, 2022
Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges.
Algorithms, 2022
Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts.
Proceedings of the Intelligent Distributed Computing XV, 2022
Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract).
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
2021
Towards Security Decision Support for large-scale Heterogeneous Distributed Information Systems.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Detection and Monitoring of the Destructive Impacts in the Social Networks Using Machine Learning Methods.
Proceedings of the ICT for Health, Accessibility and Wellbeing, 2021
Security Analysis of Information Systems Based on Attack Sequences Generation and Testing.
Proceedings of the Intelligent Distributed Computing XIV, 2021
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
J. Cyber Secur. Mobil., 2020
J. Inf. Secur. Appl., 2020
Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects.
Inf., 2020
Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty.
Proceedings of the International Conference on INnovations in Intelligent SysTems and Applications, 2020
Proceedings of the 24th International Conference on System Theory, Control and Computing, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
2019
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits.
J. Univers. Comput. Sci., 2019
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks.
J. Internet Serv. Inf. Secur., 2019
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions.
Autom. Control. Comput. Sci., 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
The Architecture of Subsystem for Eliminating an Uncertainty in Assessment of Information Objects' Semantic Content Based on the Methods of Incomplete, Inconsistent and Fuzzy Knowledge Processing.
Proceedings of the Intelligent Distributed Computing XIII, 2019
The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing.
Proceedings of the Intelligent Distributed Computing XIII, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
The Multi-Layer Graph Based Technique for Proactive Automatic Response Against Cyber Attacks.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Proceedings of the 2017 IEEE SmartWorld, 2017
CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017
Analytical attack modeling and security assessment based on the common vulnerability scoring system.
Proceedings of the 20th Conference of Open Innovations Association, 2017
Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
2016
Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components.
Proceedings of the Mobile Internet Security - First International Symposium, 2016
2015
Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015
Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management.
Proceedings of the Risks and Security of Internet and Systems, 2015
2014
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
2013
Comprehensive Multilevel Security Risk Assessment of Distributed Information Systems.
Int. J. Comput., 2013
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013
The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
2011
Security Analysis of Information Systems Taking into Account Social Engineering Attacks.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011
Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems.
Proceedings of the Information Fusion and Geographic Information Systems, 2011