Elena Sitnikova
Orcid: 0000-0001-7392-0383
According to our database1,
Elena Sitnikova
authored at least 35 papers
between 2007 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
0
1
2
3
4
5
6
7
8
9
2
4
1
3
1
1
1
1
1
1
5
1
4
1
3
3
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
X-IIoTID: A Connectivity- and Device-agnostic Intrusion Dataset for Industrial Internet of Things.
Dataset, May, 2022
Wirel. Networks, 2022
X-IIoTID: A Connectivity-Agnostic and Device-Agnostic Intrusion Data Set for Industrial Internet of Things.
IEEE Internet Things J., 2022
2021
An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems.
IEEE Trans. Sustain. Comput., 2021
IEEE Internet Things J., 2021
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems.
IEEE Access, 2021
Asynchronous Peer-to-Peer Federated Capability-Based Targeted Ransomware Detection Model for Industrial IoT.
IEEE Access, 2021
How to define utility for use in practical wireless network resource trading platforms.
Proceedings of the IEEE International Conference on Communications Workshops, 2021
2020
A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework.
Future Gener. Comput. Syst., 2020
Privacy-Preserving Techniques for Protecting Large-Scale Data of Cyber-Physical Systems.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
2019
Targeted Ransomware: A New Cyber Threat to Edge System of Brownfield Industrial Internet of Things.
IEEE Internet Things J., 2019
Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset.
Future Gener. Comput. Syst., 2019
Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions.
IEEE Access, 2019
A system architecture for time-sensitive heterogeneous wireless distributed software-defined networks.
Proceedings of the 2019 Military Communications and Information Systems Conference, 2019
Toward a framework for assessing the cyber-worthiness of complex mission critical systems.
Proceedings of the 2019 Military Communications and Information Systems Conference, 2019
Leveraging Deep Learning Models for Ransomware Detection in the Industrial Internet of Things Environment.
Proceedings of the 2019 Military Communications and Information Systems Conference, 2019
An Efficient Intrusion Detection Model for Edge System in Brownfield Industrial Internet of Things.
Proceedings of the 3rd International Conference on Big Data and Internet of Things, 2019
Industrial Internet of Things Based Ransomware Detection using Stacked Variational Neural Network.
Proceedings of the 3rd International Conference on Big Data and Internet of Things, 2019
2018
Identification of malicious activities in industrial internet of things based on deep learning models.
J. Inf. Secur. Appl., 2018
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018
2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Towards Developing Network Forensic Mechanism for Botnet Activities in the IoT Based on Machine Learning Techniques.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017
2016
SCADA Systems Cyber Security for Critical Infrastructures: Case Studies in Multiple Sectors.
Int. J. Cyber Warf. Terror., 2016
2015
Studying SCADA Organisations Information Security Goals: An Integrated System Theory Approach.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015
2014
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks.
Proceedings of the ICT Systems Security and Privacy Protection, 2014
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
2013
Proceedings of the Information Assurance and Security Education and Training, 2013
Development & expansion of an industrial control system security laboratory and an international research collaboration.
Proceedings of the Cyber Security and Information Intelligence, 2013
Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security.
Proceedings of the Eleventh Australasian Information Security Conference, 2013
2012
Int. J. Bifurc. Chaos, 2012
2009
The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems.
Proceedings of the Forensics in Telecommunications, 2009
2007
Software and systems engineering process capability in the South Australian defence industry.
Innov. Syst. Softw. Eng., 2007