Sergey Butakov

Orcid: 0000-0001-6235-8858

According to our database1, Sergey Butakov authored at least 38 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Security Evaluation Criteria of Open-Source Libraries.
Proceedings of the Computational Science and Its Applications - ICCSA 2022 Workshops, 2022

2021
Machine Learning Models for Malicious Traffic Detection in IoT Networks /IoT-23 Dataset/.
Proceedings of the Machine Learning for Networking - 4th International Conference, 2021

Using Machine Learning for malware traffic prediction in IoT networks.
Proceedings of the Second International Conference on Intelligent Data Science Technologies and Applications, 2021

Privacy Protection in Geolocation Monitoring Applications.
Proceedings of the Informatics and Intelligent Applications, 2021

Exploring the Security of Software Defined Network Controllers.
Proceedings of the Informatics and Intelligent Applications, 2021

2020
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Behavioral Study of Malware Affecting Financial Institutions and Clients.
Proceedings of the IEEE Intl Conf on Dependable, 2020

Experimental Study of ModSecurity Web Application Firewalls.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Machine Learning based Intrusion Detection System for Web-Based Attacks.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

SLA as a mechanism to manage risks related to chatbot services.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Detection Efficiency of Static Analyzers against Obfuscated Android Malware.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Applying ML Algorithms to improve traffic classification in Intrusion Detection Systems.
Proceedings of the 19th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2020

2018
Information Security Considerations for Wireless Infusion Pumps.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Analysing Data Security Requirements of Android Mobile Banking Application.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018

Analysis of Overhead Caused by Security Mechanisms in IaaS Cloud.
Proceedings of the 5th International Conference on Control, 2018

Using Fault Tree Analysis with Cobit 5 Risk Scenarios.
Proceedings of the 5th International Conference on Control, 2018

2017
Data Security and Privacy Assurance Considerations in Cloud Computing for Health Insurance Providers.
Int. J. Monit. Surveillance Technol. Res., 2017

IT governance and risk mitigation approach for private cloud adoption: case study of provincial healthcare provider.
Ann. des Télécommunications, 2017

2016
Enhancing Relational Database Security by Metadata Segregation.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

Security Controls for Monitored Use of USB Devices Based on the NIST Risk Management Framework.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Study of compliance of Android location APIs with Geopriv.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Study of applicability of Chinese remainder theorem based group key management for cloud environment.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

SCAP benchmark for Cisco router security configuration compliance.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

Applicability of Probablistic Data Structures for Filtering Tasks in Data Loss Prevention Systems.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Crowdcrawling approach for community based plagiarism detection service.
Proceedings of the 23rd International World Wide Web Conference, 2014

Using COBIT 5 for Risk to Develop Cloud Computing SLA Evaluation Templates.
Proceedings of the Service-Oriented Computing - ICSOC 2014 Workshops, 2014

2013
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Integration Platform for a Learning Environment.
Proceedings of the IEEE 13th International Conference on Advanced Learning Technologies, 2013

Using Bloom Filters in Data Leak Protection Applications.
Proceedings of the 7th International Workshop on Information Filtering and Retrieval co-located with the 13th Conference of the Italian Association for Artificial Intelligence (AI*IA 2013), 2013

2012
Protecting student intellectual property in plagiarism detection process.
Br. J. Educ. Technol., 2012

Applying artificial intelligence to the educational data: an example of syllabus quality analysis.
Proceedings of the Second International Conference on Learning Analytics and Knowledge, 2012

2011
Improving the browsing experience in a bandwidth limited environment through traffic management.
Inf. Technol. Dev., 2011

Architecture of Plagiarism Detection Service that Does Not Violate Intellectual Property of the Student.
Proceedings of the WOSIS 2011, 2011

2009
The toolbox for local and global plagiarism detection.
Comput. Educ., 2009

On the Number of Search Queries Required for Internet Plagiarism Detection.
Proceedings of the 9th IEEE International Conference on Advanced Learning Technologies, 2009

Web content usage behavior: a case study of a university in Sub-Saharan Africa.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Plagiarism Detection: The Tool And The Case Study.
Proceedings of the IADIS International Conference e-Learning 2008, 2008


  Loading...