Sergey Butakov
Orcid: 0000-0001-6235-8858
According to our database1,
Sergey Butakov
authored at least 38 papers
between 2008 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Proceedings of the Computational Science and Its Applications - ICCSA 2022 Workshops, 2022
2021
Machine Learning Models for Malicious Traffic Detection in IoT Networks /IoT-23 Dataset/.
Proceedings of the Machine Learning for Networking - 4th International Conference, 2021
Proceedings of the Second International Conference on Intelligent Data Science Technologies and Applications, 2021
Proceedings of the Informatics and Intelligent Applications, 2021
Proceedings of the Informatics and Intelligent Applications, 2021
2020
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the IEEE Intl Conf on Dependable, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Applying ML Algorithms to improve traffic classification in Intrusion Detection Systems.
Proceedings of the 19th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2020
2018
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018
Proceedings of the 5th International Conference on Control, 2018
Proceedings of the 5th International Conference on Control, 2018
2017
Data Security and Privacy Assurance Considerations in Cloud Computing for Health Insurance Providers.
Int. J. Monit. Surveillance Technol. Res., 2017
IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider.
Ann. des Télécommunications, 2017
2016
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016
Security Controls for Monitored Use of USB Devices Based on the NIST Risk Management Framework.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Study of applicability of Chinese remainder theorem based group key management for cloud environment.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014
2013
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013
Proceedings of the 7th International Workshop on Information Filtering and Retrieval co-located with the 13th Conference of the Italian Association for Artificial Intelligence (AI*IA 2013), 2013
2012
Br. J. Educ. Technol., 2012
Applying artificial intelligence to the educational data: an example of syllabus quality analysis.
Proceedings of the Second International Conference on Learning Analytics and Knowledge, 2012
2011
Improving the browsing experience in a bandwidth limited environment through traffic management.
Inf. Technol. Dev., 2011
Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student.
Proceedings of the WOSIS 2011, 2011
2009
Proceedings of the 9th IEEE International Conference on Advanced Learning Technologies, 2009
Proceedings of the 15th Americas Conference on Information Systems, 2009
2008
Plagiarism Detection: The Tool And The Case Study.
Proceedings of the IADIS International Conference e-Learning 2008, 2008