Maxim O. Kalinin
Orcid: 0000-0002-9732-0099
According to our database1,
Maxim O. Kalinin
authored at least 60 papers
between 2003 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory.
Autom. Control. Comput. Sci., December, 2023
A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction.
Autom. Control. Comput. Sci., December, 2023
Autom. Control. Comput. Sci., December, 2023
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems.
Autom. Control. Comput. Sci., December, 2023
A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure.
Sensors, October, 2023
J. Comput. Virol. Hacking Tech., March, 2023
2022
Adaptive Control System for Detecting Computer Attacks on Objects of Critical Information Infrastructure.
Autom. Control. Comput. Sci., December, 2022
Mathematical Model of the Spread of Computer Attacks on Critical Information Infrastructure.
Autom. Control. Comput. Sci., December, 2022
Symmetry, 2022
2021
Autom. Control. Comput. Sci., 2021
Autom. Control. Comput. Sci., 2021
2020
Development of the Intrusion Detection System for the Internet of Things Based on a Sequence Alignment Algorithm.
Autom. Control. Comput. Sci., 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Application and improvement of sequence alignment algorithms for intrusion detection in the Internet of Things.
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020
2019
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series.
Autom. Control. Comput. Sci., 2019
Autom. Control. Comput. Sci., 2019
Autom. Control. Comput. Sci., 2019
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users.
Autom. Control. Comput. Sci., 2019
Hybrid neural network framework for detection of cyber attacks at smart infrastructures.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019
Conceptual Data Modeling Using Aggregates to Ensure Large-Scale Distributed Data Management Systems Security.
Proceedings of the Intelligent Distributed Computing XIII, 2019
Proceedings of the 7th IEEE International Black Sea Conference on Communications and Networking BlackSeaCom 2019, 2019
2018
Autom. Control. Comput. Sci., 2018
Prevention of Attacks on Dynamic Routing in Self-Organizing Adhoc Networks Using Swarm Intelligence.
Autom. Control. Comput. Sci., 2018
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series.
Autom. Control. Comput. Sci., 2018
Autom. Control. Comput. Sci., 2018
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model.
Autom. Control. Comput. Sci., 2018
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security.
Autom. Control. Comput. Sci., 2018
Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
Proceedings of the 2018 IEEE International Black Sea Conference on Communications and Networking, 2018
2017
Autom. Control. Comput. Sci., 2017
Autom. Control. Comput. Sci., 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
2016
Autom. Control. Comput. Sci., 2016
Autom. Control. Comput. Sci., 2016
Autom. Control. Comput. Sci., 2016
Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates.
Autom. Control. Comput. Sci., 2016
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016
2015
Autom. Control. Comput. Sci., 2015
Maintenance of sustainable operation of pipeline-parallel computing systems in the cloud environment.
Autom. Control. Comput. Sci., 2015
Autom. Control. Comput. Sci., 2015
Increasing the fault tolerance and availability of software defined networks using network equipment control based on multiobjective optimization by service quality parameters.
Autom. Control. Comput. Sci., 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
2012
Proceedings of the Computer Network Security, 2012
2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Permanent protection of information systems with method of automated security and integrity control.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the Computer Network Security, 2010
Proceedings of the Computer Network Security, 2010
2008
"Linux over OSMOS": the Secure Hybrid Operating System.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008
The Use of Conference Control to Design a Protected Videoconference System.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008
Security Assurance for the Attribute-Based Access Control Systems.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2008
2007
Logical Security Evaluation of Real-World Operating Systems.
Proceedings of the International Conference on Enterprise Information Systems and Web Technologies, 2007
2006
2005
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Computer Network Security, 2005
2003
Proceedings of the Computer Network Security, 2003