Natalia Stakhanova
Orcid: 0000-0003-1923-319X
According to our database1,
Natalia Stakhanova
authored at least 68 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Guest Editorial: Special section on Networks, Systems, and Services Operations and Management Through Intelligence.
IEEE Trans. Netw. Serv. Manag., June, 2024
Authenticated Range Querying of Historical Blockchain Healthcare Data Using Authenticated Multi-Version Index.
Distributed Ledger Technol. Res. Pract., June, 2024
IEEE Trans. Software Eng., April, 2024
ACM Trans. Internet Techn., February, 2024
Large Language Model vs. Stack Overflow in Addressing Android Permission Related Challenges.
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Proceedings of the Information Security - 27th International Conference, 2024
Decoding Android Permissions: A Study of Developer Challenges and Solutions on Stack Overflow.
Proceedings of the 18th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2024
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
2023
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Investigating Software Developers' Challenges for Android Permissions in Stack Overflow.
CoRR, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Enhancing Code Security Through Open-Source Large Language Models: A Comparative Study.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022
Automated Security Assessment Framework for Wearable BLE-enabled Health Monitoring Devices.
ACM Trans. Internet Techn., 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Authenticated Multi-Version Index for Blockchain-based Range Queries on Historical Data.
Proceedings of the IEEE International Conference on Blockchain, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Int. J. Netw. Manag., 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
EtherProv: Provenance-Aware Detection, Analysis, and Mitigation of Ethereum Smart Contract Security Issues.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
Proceedings of the 36th IEEE International Conference on Data Engineering Workshops, 2020
2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 15th International Conference on Network and Service Management, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019
2018
Understanding Android Financial MalwareAttacks: Taxonomy, Characterization, and Challenges.
J. Cyber Secur. Mobil., 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2017
Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling.
Comput. Networks, 2017
2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
2015
Int. J. Inf. Comput. Secur., 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the Eighth European Workshop on System Security, 2015
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015
A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Towards effective feature selection in machine learning-based botnet detection approaches.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014
2013
J. Comput. Virol. Hacking Tech., 2013
2012
J. Comput. Secur., 2012
2011
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011
2010
IEEE Trans. Syst. Man Cybern. Part C, 2010
Comput. Secur., 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Third European Workshop on System Security, 2010
Proceedings of the Detection of Intrusions and Malware, 2010
2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Software fault tree and coloured Petri net-based specification, design and implementation of agent-based intrusion detection systems.
Int. J. Inf. Comput. Secur., 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
2004
A Reputation-based Trust Management in Peer-to-Peer Network Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004