Mikhail Zolotukhin
Orcid: 0000-0001-8058-7902
According to our database1,
Mikhail Zolotukhin
authored at least 33 papers
between 2011 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
2022
IEEE Access, 2022
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2022
2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Linear Approximation Based Compression Algorithms Efficiency to Compress Environmental Data Sets.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
2018
On optimal deployment of low power nodes for high frequency next generation wireless systems.
Comput. Networks, 2018
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2018
2017
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks.
Proceedings of the Network and System Security - 11th International Conference, 2017
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2017
Proceedings of the 24th International Conference on Telecommunications, 2017
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2017
2016
On optimal placement of low power nodes for improved performance in heterogeneous networks.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Weighted Fuzzy Clustering for Online Detection of Application DDoS Attacks in Encrypted Network Traffic.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016
Proceedings of the International Symposium on Wireless Communication Systems, 2016
Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic.
Proceedings of the 23rd International Conference on Telecommunications, 2016
2015
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015
Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015
Energy efficient resource allocation in heterogeneous software defined network: A reverse combinatorial auction approach.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
2014
On optimal relay placement for improved performance in non-coverage limited scenarios.
Proceedings of the 17th ACM International Conference on Modeling, 2014
Proceedings of the IEEE 12th International Conference on Dependable, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
Detection of Anomalous HTTP Requests Based on Advanced N-gram Model and Clustering Techniques.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013
Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
2012
Growing Hierarchical Self-organising Maps for Online Anomaly Detection by using Network Logs.
Proceedings of the WEBIST 2012 - Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, 18, 2012
Growing Hierarchical Self-organizing Maps and Statistical Distribution Models for Online Detection of Web Attacks.
Proceedings of the Web Information Systems and Technologies - 8th International Conference, 2012
A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks.
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Online anomaly detection by using N-gram model and growing hierarchical self-organizing maps.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012
2011
Proceedings of the 2011 IEEE Swedish Communication Technologies Workshop, 2011
Proceedings of the Mobile Networks and Management - Third International ICST Conference, 2011