Victor A. Skormin
According to our database1,
Victor A. Skormin
authored at least 32 papers
between 1999 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs.
Proceedings of the Computer Network Security, 2017
Proceedings of the Computer Network Security, 2017
2016
J. Intell. Robotic Syst., 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
2014
Int. J. Bus. Process. Integr. Manag., 2014
2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013
2012
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks.
Proceedings of the Computer Network Security, 2012
Control System with High Robust Stability Characteristics Based on Catastrophe Function.
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012
Proceedings of the Applications of Evolutionary Computation, 2012
2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the MILCOM 2011, 2011
2010
Proceedings of the Computer Security, 2010
Behavioral Obfuscation in Malware and its Mitigation via Signature Generalization.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
Detection of Specific Semantic Functionalities, such as Self-Replication Mechanism, in Malware Using Colored Petri Nets.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets.
Proceedings of the 2008 IEEE International Performance, 2008
2007
Prevention of information attacks by run-time detection of self-replication in computer codes.
J. Comput. Secur., 2007
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2003
A Pspice Optimal Design Tool Utilizing Genetic Optimization.
Proceedings of the IASTED International Conference on Modelling and Simulation (MS 2003), 2003
Proceedings of the Computer Network Security, 2003
Biological Approach to System Information Security (BASIS): A Multi-agent Approach to Information Security.
Proceedings of the Multi-Agent Systems and Applications III, 2003
Springer, ISBN: 978-0-387-95533-9, 2003
2002
Proceedings of the 2002 Congress on Evolutionary Computation, 2002
2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Proceedings of the American Control Conference, 2001
2000
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
Proceedings of the New Directions in Rough Sets, 1999
Agent-based Model of Information Security System: Architecture and Framework for Coordinated Behavior Specification.
Proceedings of the 1st International Workshop of Central and Eastern Europe on Multi-Agent Systems, 1999