Peter D. Zegzhda
Orcid: 0000-0002-2048-6189
According to our database1,
Peter D. Zegzhda
authored at least 42 papers
between 2001 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Autom. Control. Comput. Sci., December, 2023
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code.
Autom. Control. Comput. Sci., December, 2023
J. Comput. Virol. Hacking Tech., September, 2023
2021
Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity.
Autom. Control. Comput. Sci., 2021
2020
Approach to the Evaluation of the Efficiency of Information Security in Control Systems.
Autom. Control. Comput. Sci., 2020
Autom. Control. Comput. Sci., 2020
Building an Adaptive System for Collecting and Preparing Data for Security Monitoring.
Autom. Control. Comput. Sci., 2020
Autom. Control. Comput. Sci., 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
2019
Model and Method for Optimizing Computational Processes in Parallel Computing Systems.
Autom. Control. Comput. Sci., 2019
2018
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems.
Autom. Control. Comput. Sci., 2018
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks.
Autom. Control. Comput. Sci., 2018
Autom. Control. Comput. Sci., 2018
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model.
Autom. Control. Comput. Sci., 2018
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security.
Autom. Control. Comput. Sci., 2018
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code.
Autom. Control. Comput. Sci., 2018
The Problem of Innovative Development of Information Security Systems in the Transport Sector.
Autom. Control. Comput. Sci., 2018
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Proceedings of the Intelligent Systems and Applications, 2018
Proceedings of the IEEE Industrial Cyber-Physical Systems, 2018
Proceedings of the 2018 IEEE International Black Sea Conference on Communications and Networking, 2018
2017
The use of an artificial neural network to detect automatically managed accounts in social networks.
Autom. Control. Comput. Sci., 2017
Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects.
Autom. Control. Comput. Sci., 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Detecting Android application malicious behaviors based on the analysis of control flows and data flows.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
2016
Autom. Control. Comput. Sci., 2016
A risk-oriented approach to the control arrangement of security protection subsystems of information systems.
Autom. Control. Comput. Sci., 2016
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the International Conference on Information and Communication Technology Convergence, 2016
2015
Approach to the construction of the generalized functional-semantic cyber security model.
Autom. Control. Comput. Sci., 2015
Autom. Control. Comput. Sci., 2015
Autom. Control. Comput. Sci., 2015
2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Computer Network Security, 2012
2010
Proceedings of the Computer Network Security, 2010
2006
2005
Detection of the Operating System Configuration Vulnerabilities with Safety Evaluation Facility.
Proceedings of the Security in Information Systems, 2005
Proceedings of the Computer Network Security, 2005
2003
Proceedings of the Computer Network Security, 2003
2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001