Elena Fedorchenko

Orcid: 0000-0001-6707-9153

According to our database1, Elena Fedorchenko authored at least 58 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dataset Generation Methodology: Towards Application of Machine Learning in Industrial Water Treatment Security.
SN Comput. Sci., April, 2024

Considerations on sentiment of social network posts as a feature of destructive impacts.
AI Commun., 2024

2023
Cyber Attacker Profiling for Risk Analysis Based on Machine Learning.
Sensors, February, 2023

Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation.
Algorithms, February, 2023

An Analytical Review of the Source Code Models for Exploit Analysis.
Inf., 2023

Towards Application of the Tabular Data Transformation to Images in the Intrusion Detection Tasks Using Deep Learning Techniques.
Proceedings of the Intelligent Distributed Computing XVI, 2023

An RFID Based Localization and Mental Stress Recognition System Using Wearable Sensors.
Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, 2023

2022
Privacy Policies of IoT Devices: Collection and Analysis.
Sensors, 2022

Image-Based Approach to Intrusion Detection in Cyber-Physical Objects.
Inf., 2022

An approach for selecting countermeasures against harmful information based on uncertainty management.
Comput. Sci. Inf. Syst., 2022

Federated Learning for Intrusion Detection in the Critical Infrastructures: Vertically Partitioned Data Use Case.
Algorithms, 2022

Comparative Review of the Intrusion Detection Systems Based on Federated Learning: Advantages and Open Challenges.
Algorithms, 2022

Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts.
Proceedings of the Intelligent Distributed Computing XV, 2022

Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract).
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
Towards Security Decision Support for large-scale Heterogeneous Distributed Information Systems.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Detection and Monitoring of the Destructive Impacts in the Social Networks Using Machine Learning Methods.
Proceedings of the ICT for Health, Accessibility and Wellbeing, 2021

Security Analysis of Information Systems Based on Attack Sequences Generation and Testing.
Proceedings of the Intelligent Distributed Computing XIV, 2021

CPE and CVE based Technique for Software Security Risk Assessment.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Security Measuring System for IoT Devices.
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021

2020
A Semantic Model for Security Evaluation of Information Systems.
J. Cyber Secur. Mobil., 2020

Stateful RORI-based countermeasure selection using hypergraphs.
J. Inf. Secur. Appl., 2020

Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects.
Inf., 2020

Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty.
Proceedings of the International Conference on INnovations in Intelligent SysTems and Applications, 2020

Analysis of Formats of Young People's Communicative Behavior in Social Network.
Proceedings of the 24th International Conference on System Theory, Control and Computing, 2020

P2Onto: Making Privacy Policies Transparent.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

Towards Attacker Attribution for Risk Analysis.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits.
J. Univers. Comput. Sci., 2019

Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks.
J. Internet Serv. Inf. Secur., 2019

Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions.
Autom. Control. Comput. Sci., 2019

Automated Revealing of Organizational Assets Based on Event Correlation.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

The Architecture of Subsystem for Eliminating an Uncertainty in Assessment of Information Objects' Semantic Content Based on the Methods of Incomplete, Inconsistent and Fuzzy Knowledge Processing.
Proceedings of the Intelligent Distributed Computing XIII, 2019

The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Ontology of Metrics for Cyber Security Assessment.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Hypergraph-driven mitigation of cyberattacks.
Internet Technol. Lett., 2018

An Ontology-based Storage of Security Information.
Inf. Technol. Control., 2018

The Multi-Layer Graph Based Technique for Proactive Automatic Response Against Cyber Attacks.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018

Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Enhancement of probabilistic attack graphs for accurate cyber security monitoring.
Proceedings of the 2017 IEEE SmartWorld, 2017

CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017

Choosing Models for Security Metrics Visualization.
Proceedings of the Computer Network Security, 2017

Ontological Hybrid Storage for Security Data.
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017

Analytical attack modeling and security assessment based on the common vulnerability scoring system.
Proceedings of the 20th Conference of Open Innovations Association, 2017

Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

2016
Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components.
Proceedings of the Mobile Internet Security - First International Symposium, 2016

2015
Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

The CAPEC based generator of attack scenarios for network security evaluation.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management.
Proceedings of the Risks and Security of Internet and Systems, 2015

2014
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Security Metrics Based on Attack Graphs for the Olympic Games Scenario.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

Security Assessment of Computer Networks Based on Attack Graphs and Security Events.
Proceedings of the Information and Communication Technology, 2014

Security Evaluation for Cyber Situational Awareness.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
Comprehensive Multilevel Security Risk Assessment of Distributed Information Systems.
Int. J. Comput., 2013

Security metrics for risk assessment of distributed information systems.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2011
Security Analysis of Information Systems Taking into Account Social Engineering Attacks.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011

Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems.
Proceedings of the Information Fusion and Geographic Information Systems, 2011


  Loading...