Maxim O. Kalinin

Orcid: 0000-0002-9732-0099

According to our database1, Maxim O. Kalinin authored at least 60 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory.
Autom. Control. Comput. Sci., December, 2023

A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction.
Autom. Control. Comput. Sci., December, 2023

Protection of Computational Machine Learning Models against Extraction Threat.
Autom. Control. Comput. Sci., December, 2023

Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems.
Autom. Control. Comput. Sci., December, 2023

A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure.
Sensors, October, 2023

Security intrusion detection using quantum machine learning techniques.
J. Comput. Virol. Hacking Tech., March, 2023

2022
Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure.
Autom. Control. Comput. Sci., December, 2022

Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure.
Autom. Control. Comput. Sci., December, 2022

Application of the Learning Automaton Model for Ensuring Cyber Resiliency.
Symmetry, 2022

2021
Analysis of a Huge Amount of Network Traffic Based on Quantum Machine Learning.
Autom. Control. Comput. Sci., 2021

Application of Neuro-Fuzzy Inference to Detect Network Scanning.
Autom. Control. Comput. Sci., 2021

2020
Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm.
Autom. Control. Comput. Sci., 2020

AI-based Security for the Smart Networks.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Application and improvement of sequence alignment algorithms for intrusion detection in the Internet of Things.
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020

2019
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series.
Autom. Control. Comput. Sci., 2019

Big Data Management System Security Threat Model.
Autom. Control. Comput. Sci., 2019

Modeling Big Data Management Systems in Information Security.
Autom. Control. Comput. Sci., 2019

Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems.
Autom. Control. Comput. Sci., 2019

Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users.
Autom. Control. Comput. Sci., 2019

Hybrid neural network framework for detection of cyber attacks at smart infrastructures.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Conceptual Data Modeling Using Aggregates to Ensure Large-Scale Distributed Data Management Systems Security.
Proceedings of the Intelligent Distributed Computing XIII, 2019

Prevention of false data injections in smart infrastructures.
Proceedings of the 7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, 2019

2018
Using Neural Networks to Detect Internal Intruders in VANETs.
Autom. Control. Comput. Sci., 2018

Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence.
Autom. Control. Comput. Sci., 2018

Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series.
Autom. Control. Comput. Sci., 2018

Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks.
Autom. Control. Comput. Sci., 2018

Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model.
Autom. Control. Comput. Sci., 2018

Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security.
Autom. Control. Comput. Sci., 2018

Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Synthetic datasets generation for intrusion detection in VANET.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Artificial swarm algorithm for VANET protection against routing attacks.
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018

Role-Based Access Control for Vehicular Adhoc Networks.
Proceedings of the 2018 IEEE International Black Sea Conference on Communications and Networking, 2018

2017
Security evaluation of a wireless ad-hoc network with dynamic topology.
Autom. Control. Comput. Sci., 2017

Architectures for building secure vehicular networks based on SDN technology.
Autom. Control. Comput. Sci., 2017

Network security architectures for VANET.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2016
Technology of security services virtualization for high-speed computer networks.
Autom. Control. Comput. Sci., 2016

Tasks of providing information security in distributed computing networks.
Autom. Control. Comput. Sci., 2016

Access control system for distributed computing networks.
Autom. Control. Comput. Sci., 2016

Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates.
Autom. Control. Comput. Sci., 2016

Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Software defined security for vehicular ad hoc networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016

2015
Automatic security management of computer systems.
Autom. Control. Comput. Sci., 2015

Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment.
Autom. Control. Comput. Sci., 2015

Access control method in distributed grid computing networks.
Autom. Control. Comput. Sci., 2015

Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters.
Autom. Control. Comput. Sci., 2015

Information security in computer networks with dynamic topology.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2013
Security policy verification in grid systems.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2012
Security Modeling of Grid Systems Using Petri Nets.
Proceedings of the Computer Network Security, 2012

2010
Homogeneity analysis of power consumption for information security purposes.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Permanent protection of information systems with method of automated security and integrity control.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Clarifying Integrity Control at the Trusted Information Environment.
Proceedings of the Computer Network Security, 2010

Intellectual Intrusion Detection with Sequences Alignment Methods.
Proceedings of the Computer Network Security, 2010

2008
"Linux over OSMOS": the Secure Hybrid Operating System.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008

The Use of Conference Control to Design a Protected Videoconference System.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008

Security Assurance for the Attribute-Based Access Control Systems.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008

2007
Logical Security Evaluation of Real-World Operating Systems.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2007

2006
Formal Verification of Security Model Using SPR Tool.
Comput. Artif. Intell., 2006

2005
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility.
Proceedings of the Security in Information Systems, 2005

Vulnerabilities Detection in the Configurations of MS Windows Operating System.
Proceedings of the Computer Network Security, 2005

2003
Logical Resolving for Security Evaluation.
Proceedings of the Computer Network Security, 2003


  Loading...