Igor V. Kotenko
Orcid: 0000-0001-6859-7120Affiliations:
- St. Petersburg Institute for Informatics and Automation (SPIIRAS)
According to our database1,
Igor V. Kotenko
authored at least 268 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
Internet Things, 2024
Multi-task learning for IoT traffic classification: A comparative analysis of deep autoencoders.
Future Gener. Comput. Syst., 2024
CoRR, 2024
Considerations on sentiment of social network posts as a feature of destructive impacts.
AI Commun., 2024
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
Hybrid Multi-Task Deep Learning for Improved IoT Network Intrusion Detection: Exploring Different CNN Structures.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
2023
Intelligent state assessment of complex autonomous objects based on wavelet analysis.
Eng. Appl. Artif. Intell., November, 2023
Sensors, April, 2023
Sensors, February, 2023
The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices.
J. Sens. Actuator Networks, February, 2023
Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation.
Algorithms, February, 2023
Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks.
Big Data Cogn. Comput., 2023
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities.
Artif. Intell. Rev., 2023
Autoencoder-based Malware Analysis: An Imagery Analysis Approach to Enhance the Security of Smart City IoT.
Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, 2023
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023
Towards Application of the Tabular Data Transformation to Images in the Intrusion Detection Tasks Using Deep Learning Techniques.
Proceedings of the Intelligent Distributed Computing XVI, 2023
Intelligent Selection of Requirements for a Secure Design of Smart City Transport Infrastructure Interfaces.
Proceedings of the Intelligent Distributed Computing XVI, 2023
VAE-GAN for Robust IoT Malware Detection and Classification in Intelligent Urban Environments: An Image Analysis Approach.
Proceedings of the Risks and Security of Internet and Systems, 2023
An RFID Based Localization and Mental Stress Recognition System Using Wearable Sensors.
Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, 2023
2022
Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods.
Microprocess. Microsystems, April, 2022
Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View.
Sensors, 2022
A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods.
Sensors, 2022
Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches.
Sensors, 2022
Analytical Modeling for Identification of the Machine Code Architecture of Cyberphysical Devices in Smart Homes.
Sensors, 2022
An approach for selecting countermeasures against harmful information based on uncertainty management.
Comput. Sci. Inf. Syst., 2022
IEEE Access, 2022
Towards Resilient and Efficient Big Data Storage: Evaluating a SIEM Repository Based on HDFS.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022
An approach to formal desription of the user notification scenarios in privacy policies.
Proceedings of the 30th Euromicro International Conference on Parallel, 2022
Proceedings of the 11th Mediterranean Conference on Embedded Computing, 2022
Applying Machine Learning Methods to Detect Abnormal User Behavior in a University Data Center.
Proceedings of the Intelligent Distributed Computing XV, 2022
Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts.
Proceedings of the Intelligent Distributed Computing XV, 2022
Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract).
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
2021
The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure.
Microprocess. Microsystems, November, 2021
IEEE Trans. Emerg. Top. Comput., 2021
Guest Editors' Introduction "Modeling and Simulation for Intelligent Distributed Computing".
Simul. Model. Pract. Theory, 2021
Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures.
Simul. Model. Pract. Theory, 2021
Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring.
Sensors, 2021
J. Sens. Actuator Networks, 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Internet Serv. Inf. Secur., 2021
Inf., 2021
Specification of Quality Indicators for Security Event and Incident Management in the Supply Chain.
Int. J. Comput., 2021
Identifying characteristics of software vulnerabilities by their textual description using machine learning.
Proceedings of the 2021 World Automation Congress, 2021
LSTM Neural Networks for Detecting Anomalies Caused by Web Application Cyber Attacks.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2021
Towards Security Decision Support for large-scale Heterogeneous Distributed Information Systems.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Situational Control of a Computer Network Security System in Conditions of Cyber Attacks.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Detecting Anomalous Behavior of Users of Data Centers Based on the Application of Artificial Neural Networks.
Proceedings of the Artificial Intelligence - 19th Russian Conference, 2021
A technique for early detection of cyberattacks using the traffic self-similarity property and a statistical approach.
Proceedings of the 29th Euromicro International Conference on Parallel, 2021
Proceedings of the 29th Euromicro International Conference on Parallel, 2021
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021
Combined Approach to Anomaly Detection in Wireless Sensor Networks on Example of Water Management System.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021
Detection and Monitoring of the Destructive Impacts in the Social Networks Using Machine Learning Methods.
Proceedings of the ICT for Health, Accessibility and Wellbeing, 2021
A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems.
Proceedings of the Intelligent Distributed Computing XIV, 2021
Security Analysis of Information Systems Based on Attack Sequences Generation and Testing.
Proceedings of the Intelligent Distributed Computing XIV, 2021
An Approach to the Synthesis of a Neural Network System for Diagnosing Computer Incidents.
Proceedings of the Intelligent Distributed Computing XIV, 2021
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021
Predicting the Mental State of the Social Network Users based on the Latent Dirichlet Allocation and fastText.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021
Proceedings of the Computer Security. ESORICS 2021 International Workshops, 2021
2020
Proceedings of the Data Science in Cybersecurity and Cyberthreat Intelligence, 2020
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems.
Simul. Model. Pract. Theory, 2020
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models.
Simul. Model. Pract. Theory, 2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
J. Cyber Secur. Mobil., 2020
J. Inf. Secur. Appl., 2020
Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects.
Inf., 2020
Network Application-Layer Protocol Classification based on fuzzy Data and Neural Network Processing.
Int. J. Comput., 2020
Concurr. Comput. Pract. Exp., 2020
Concurr. Comput. Pract. Exp., 2020
The intelligent system for detection and counteraction of malicious and inappropriate information on the Internet.
AI Commun., 2020
Intelligent support for network administrator decisions based on combined neural networks.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Optimizing Secure Information Interaction in Distributed Computing Systems by the Sequential Concessions Method.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020
Augmented reality for visualizing security data for cybernetic and cyberphysical systems.
Proceedings of the 28th Euromicro International Conference on Parallel, 2020
Graph-based evaluation of probability of disclosing the network structure by targeted attacks.
Proceedings of the NOMS 2020, 2020
Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty.
Proceedings of the International Conference on INnovations in Intelligent SysTems and Applications, 2020
Proceedings of the 24th International Conference on System Theory, Control and Computing, 2020
Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model.
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020
Proceedings of the ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems, 2020
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020
Proceedings of the Risks and Security of Internet and Systems, 2020
2019
Hierarchical fuzzy situational networks for online decision-making: Application to telecommunication systems.
Knowl. Based Syst., 2019
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits.
J. Univers. Comput. Sci., 2019
Social networks analysis by graph algorithms on the example of the VKontakte social network.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks.
J. Internet Serv. Inf. Secur., 2019
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions.
Autom. Control. Comput. Sci., 2019
An Approach for Intelligent Evaluation of the State of Complex Autonomous Objects Based on the Wavelet Analysis.
Proceedings of the Advancing Technology Industrialization Through Intelligent Software Methodologies, Tools and Techniques, 2019
Optimization of the cyber security system structure based on accounting of the prevented damage cost.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019
Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019
Attack Detection in IoT Critical Infrastructures: A Machine Learning and Big Data Processing Approach.
Proceedings of the 27th Euromicro International Conference on Parallel, 2019
Proceedings of the 27th Euromicro International Conference on Parallel, 2019
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model.
Proceedings of the Mobile Internet Security - 4th International Symposium, 2019
The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification.
Proceedings of the Intelligent Distributed Computing XIII, 2019
Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems.
Proceedings of the Intelligent Distributed Computing XIII, 2019
Proceedings of the Intelligent Distributed Computing XIII, 2019
The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing.
Proceedings of the Intelligent Distributed Computing XIII, 2019
Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019
An Approach to Intelligent Distributed Scanning and Analytical Processing of the Internet Inappropriate Information.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019
A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019
Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks.
ACM Trans. Internet Techn., 2018
A visual analytics approach for the cyber forensics based on different views of the network traffic.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring.
J. Internet Serv. Inf. Secur., 2018
Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning.
IEEE Access, 2018
Hierarchical Fuzzy Situational Networks for Online Decision Support in Distributed Cyber-Physical Systems.
Proceedings of the New Trends in Intelligent Software Methodologies, Tools and Techniques, 2018
Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks.
Proceedings of the Social Informatics, 2018
Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion.
Proceedings of the 10th International Workshop on Resilient Networks Design and Modeling, 2018
Parallelization of Security Event Correlation Based on Accounting of Event Type Links.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
The Multi-Layer Graph Based Technique for Proactive Automatic Response Against Cyber Attacks.
Proceedings of the 26th Euromicro International Conference on Parallel, 2018
Applying Intelligent Agents for Anomaly Detection of Network Traffic in Internet of Things Networks.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018
Application of Image Classification Methods for Protection against Inappropriate Information in the Internet.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2018
Proceedings of the Intelligent Distributed Computing XII, 2018
Proceedings of the Intelligent Distributed Computing XII, 2018
A technique for design of secure data transfer environment: Application for I2C protocol.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2018
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018
Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Parallel big data processing system for security monitoring in Internet of Things networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
Hybridization of computational intelligence methods for attack detection in computer networks.
J. Comput. Sci., 2017
Categorisation of web pages for protection against inappropriate content in the internet.
Int. J. Internet Protoc. Technol., 2017
Aggregation of elastic stack instruments for collecting, storing and processing of security information and events.
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE SmartWorld, 2017
Parallel Processing of Big Heterogeneous Data for Security Monitoring of IoT Networks.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection.
Proceedings of the 25th Euromicro International Conference on Parallel, 2017
Proceedings of the Mobile Internet Security - Second International Symposium, 2017
Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines.
Proceedings of the Mobile Internet Security - Second International Symposium, 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the Computer Network Security, 2017
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017
Proceedings of the Intelligent Distributed Computing XI - Proceedings of the 11th International Symposium on Intelligent Distributed Computing, 2017
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Analytical attack modeling and security assessment based on the common vulnerability scoring system.
Proceedings of the 20th Conference of Open Innovations Association, 2017
Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
2016
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge.
J. Ambient Intell. Humaniz. Comput., 2016
An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016
Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion.
Proceedings of the Mobile Internet Security - First International Symposium, 2016
An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components.
Proceedings of the Mobile Internet Security - First International Symposium, 2016
Application of Hybrid Neural Networks for Monitoring and Forecasting Computer Networks States.
Proceedings of the Advances in Neural Networks - ISNN 2016, 2016
Proceedings of the Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing, 2016
Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference.
Proceedings of the Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing, 2016
Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
J. Internet Serv. Inf. Secur., 2015
Improved genetic algorithms for solving the optimisation tasks for design of access control schemes in computer networks.
Int. J. Bio Inspired Comput., 2015
Design and verification of protected systems with integrated devices based on expert knowledge.
Autom. Control. Comput. Sci., 2015
Autom. Control. Comput. Sci., 2015
Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015
Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015
Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic Algorithms.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015
Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content.
Proceedings of the Intelligent Distributed Computing IX - Proceedings of the 9th International Symposium on Intelligent Distributed Computing, 2015
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015
Proceedings of the Information and Communication Technology, 2015
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015
Network Attack Detection Based on Combination of Neural, Immune and Neuro-Fuzzy Classifiers.
Proceedings of the 18th IEEE International Conference on Computational Science and Engineering, 2015
Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management.
Proceedings of the Risks and Security of Internet and Systems, 2015
2014
Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
J. Cyber Secur. Mobil., 2014
Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services.
Int. J. Mob. Comput. Multim. Commun., 2014
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014
Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2014
Proceedings of the Intelligent Distributed Computing VIII, 2014
Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks.
Proceedings of the Intelligent Distributed Computing VIII, 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
Proceedings of the Ninth International Conference on Availability, 2014
Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
Int. J. Comput., 2013
Comprehensive Multilevel Security Risk Assessment of Distributed Information Systems.
Int. J. Comput., 2013
Int. J. Comput., 2013
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems.
Future Internet, 2013
Proceedings of the 21st Euromicro International Conference on Parallel, 2013
Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks.
Proceedings of the 21st Euromicro International Conference on Parallel, 2013
Proceedings of the Information Fusion and Geographic Information Systems, 2013
Logical Inference Framework for Security Management in Geographical Information Systems.
Proceedings of the Information Fusion and Geographic Information Systems, 2013
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013
Proceedings of the 27th European Conference on Modelling and Simulation, 2013
Proceedings of the 5th International Conference on Cyber Conflict, 2013
The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Proceedings of the Software Agents, Agent Systems and Their Applications, 2012
Proceedings of the Software Agents, Agent Systems and Their Applications, 2012
Concurr. Comput. Pract. Exp., 2012
Simulation of Protection Mechanisms against Botnets on the Basis of "Nervous Network" Framework.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012
Data Repository for Security Information and Event Management in Service Infrastructures.
Proceedings of the SECRYPT 2012, 2012
Attack Modelling and Security Evaluation for Security Information and Event Management.
Proceedings of the SECRYPT 2012, 2012
Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components.
Proceedings of the 20th Euromicro International Conference on Parallel, 2012
Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods.
Proceedings of the Computer Network Security, 2012
Proceedings of the Computer Network Security, 2012
An Approach for Network Information Flow Analysis for Systems of Embedded Components.
Proceedings of the Computer Network Security, 2012
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
2011
Proceedings of the 19th International Euromicro Conference on Parallel, 2011
Security Analysis of Information Systems Taking into Account Social Engineering Attacks.
Proceedings of the 19th International Euromicro Conference on Parallel, 2011
Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems.
Proceedings of the Information Fusion and Geographic Information Systems, 2011
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011
2010
Malware Detection by Data Mining Techniques Based on Positionally Dependent Features.
Proceedings of the 18th Euromicro Conference on Parallel, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Intelligent Distributed Computing IV - Proceedings of the 4th International Symposium on Intelligent Distributed Computing, 2010
2009
Proceedings of the 17th Euromicro International Conference on Parallel, 2009
Proceedings of the Information Fusion and Geographic Information Systems, 2009
Proceedings of the Information Fusion and Geographic Information Systems, 2009
Simulation Of Agent Teams: Application Of A Domain-Independent Framework To Computer Network Security.
Proceedings of the European Conference on Modelling and Simulation, 2009
2008
Int. J. Comput., 2008
Proceedings of the 16th Euromicro International Conference on Parallel, 2008
2007
Investigation of Cooperative Defense against DDoS.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the Third International Workshop on Information Fusion and Geographical Information Systems, 2007
Proceedings of the Third International Workshop on Information Fusion and Geographical Information Systems, 2007
Multi-agent Framework for Simulation of Adaptive Cooperative Defense Against Internet Attacks.
Proceedings of the Autonomous Intelligent Systems: Multi-Agents and Data Mining, 2007
2006
Network Security Evaluation Based on Simulation of Malfactor's Behavior.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the Knowledge-Based Software Engineering, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the 9th International Conference on Information Fusion, 2006
Proceedings of the 5th International Conference on Cyberworlds (CW 2006), 2006
Proceedings of the Communications and Multimedia Security, 2006
2005
Proceedings of the Computer Network Security, 2005
Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle.
Proceedings of the Computer Network Security, 2005
The Software Environment for Multi-agent Simulation of Defense Mechanisms against DDoS Attacks.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005
2004
Prax. Inf.verarb. Kommun., 2004
Proceedings of the Detection of Intrusions and Malware & Vulnerability Assessment, 2004
2003
Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning.
Comput. Syst. Sci. Eng., 2003
Proceedings of the Computer Network Security, 2003
Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003
Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks.
Proceedings of the Multi-Agent Systems and Applications III, 2003
2002
Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool.
Proceedings of the Recent Advances in Intrusion Detection, 5th International Symposium, 2002
2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Proceedings of the From Theory to Practice in Multi-Agent Systems, 2001
2000
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Proceedings of the New Directions in Rough Sets, 1999
Application of Hybrid Agent-Based Technology for Design of Telecommunication Systems.
Proceedings of the 1st International Workshop of Central and Eastern Europe on Multi-Agent Systems, 1999
Agent-based Model of Information Security System: Architecture and Framework for Coordinated Behavior Specification.
Proceedings of the 1st International Workshop of Central and Eastern Europe on Multi-Agent Systems, 1999
1995
A framework for intelligent group decision support.
Proceedings of the Third European Conference on Information Systems, 1995
1994
Proceedings of the Human-Computer Interaction, 4th International Conference, 1994