Konstantin Kogos

Orcid: 0000-0002-8090-678X

According to our database1, Konstantin Kogos authored at least 22 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of six.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Covert channel limitation via special dummy traffic generating.
J. Comput. Virol. Hacking Tech., September, 2023

2022
On Hybrid Network Covert Channel Capacity.
Proceedings of the 2022 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2022

2020
Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics.
CoRR, 2020

Voice authentication based on the Russian-language dataset, MFCC method and the anomaly detection algorithm.
Proceedings of the 2020 Federated Conference on Computer Science and Information Systems, 2020

A Technique to Limit Hybrid Covert Channel Capacity via Random Increasing of Packets' Lengths.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

How to limit capacity of timing covert channel by adding extra delays.
Proceedings of the 2020 Annual International Conference on Brain-Inspired Cognitive Architectures for Artificial Intelligence, 2020

2019
Continuous Authentication of Smartphone Users via Swipes and Taps Analysis.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Mobile User Authentication Using Keystroke Dynamics.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Timing Covert Channels Detection Cases via Machine Learning.
Proceedings of the European Intelligence and Security Informatics Conference, 2019

Artificial Intelligence to Detect Timing Covert Channels.
Proceedings of the Biologically Inspired Cognitive Architectures 2019, 2019

On Way to Simplify the Reverse Engineering of UEFI Firmwares.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2018
Touch and Move: Incoming Call User Authentication.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

Incoming Call Implicit User Authentication - User Authentication via Hand Movement Pattern.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
A concept of continuous user authentication based on behavioral biometrics.
Proceedings of the 20th Conference of Open Innovations Association, 2017

2016
Packet Length Covert Channel Capacity Estimation.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Random Delays to Limit Timing Covert Channel.
Proceedings of the 2016 European Intelligence and Security Informatics Conference, 2016

2015
Study of countermeasures against covert channels in IP networks.
Autom. Control. Comput. Sci., 2015

Protection from binary and multi-symbol packet length covert channels.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Covert Channels Parameters Evaluation Using the Information Theory Statements.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

A Technique to Limit Packet Length Covert Channels.
Proceedings of the KMIS 2015, 2015

A Traffic Padding to Limit Packet Size Covert Channels.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

A random traffic padding to limit packet size covert channels.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015


  Loading...