default search action
Igor V. Kotenko
Person information
- affiliation: St. Petersburg Institute for Informatics and Automation (SPIIRAS)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j80]Diana Levshun, Dmitry Levshun, Elena Doynikova, Alexander Branitskiy, Igor V. Kotenko:
Considerations on sentiment of social network posts as a feature of destructive impacts. AI Commun. 37(4): 585-598 (2024) - [j79]Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko:
Modelling user notification scenarios in privacy policies. Cybersecur. 7(1): 41 (2024) - [j78]Huiyao Dong, Igor V. Kotenko:
Multi-task learning for IoT traffic classification: A comparative analysis of deep autoencoders. Future Gener. Comput. Syst. 158: 242-254 (2024) - [j77]Huiyao Dong, Igor V. Kotenko:
Image-based malware analysis for enhanced IoT security in smart cities. Internet Things 27: 101258 (2024) - [c184]Huiyao Dong, Igor V. Kotenko:
Hybrid Multi-Task Deep Learning for Improved IoT Network Intrusion Detection: Exploring Different CNN Structures. COMSNETS 2024: 7-12 - [c183]Igor V. Kotenko, Diana Levshun:
Anomaly Detection in IoT Networks Based on Intelligent Security Event Correlation. COMSNETS 2024: 816-824 - [i1]Murshedul Arifeen, Andrei Petrovski, Md Junayed Hasan, Igor V. Kotenko, Maksim Sletov, Phil Hassard:
DataDRILL: Formation Pressure Prediction and Kick Detection for Drilling Rigs. CoRR abs/2409.19724 (2024) - 2023
- [j76]Diana Levshun, Igor V. Kotenko:
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities. Artif. Intell. Rev. 56(8): 8547-8590 (2023) - [j75]Olga Tushkanova, Dmitry Levshun, Alexander Branitskiy, Elena Fedorchenko, Evgenia Novikova, Igor V. Kotenko:
Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation. Algorithms 16(2): 85 (2023) - [j74]Igor V. Kotenko, Igor Saenko, Andrei Privalov, Oleg Lauta:
Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks. Big Data Cogn. Comput. 7(2): 66 (2023) - [j73]Igor V. Kotenko, Igor Saenko, Alexey Vinogradenko, Nikita Budko:
Intelligent state assessment of complex autonomous objects based on wavelet analysis. Eng. Appl. Artif. Intell. 126: 106869 (2023) - [j72]Igor V. Kotenko, Konstantin E. Izrailov, Mikhail Buinevich:
The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices. J. Sens. Actuator Networks 12(1): 11 (2023) - [j71]Igor V. Kotenko, Elena Fedorchenko, Evgenia Novikova, Ashish Jha:
Cyber Attacker Profiling for Risk Analysis Based on Machine Learning. Sensors 23(4): 2028 (2023) - [j70]Maxim Kolomeets, Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:
Graph Visualization: Alternative Models Inspired by Bioinformatics. Sensors 23(7): 3747 (2023) - [c182]Mhd. Wasim Raed, Semih Yön, Ali Günes, Igor V. Kotenko, Elena Fedorchenko, Anna Polubaryeva:
An RFID Based Localization and Mental Stress Recognition System Using Wearable Sensors. BIOSIGNALS 2023: 325-331 - [c181]Huiyao Dong, Igor V. Kotenko:
VAE-GAN for Robust IoT Malware Detection and Classification in Intelligent Urban Environments: An Image Analysis Approach. CRiSIS 2023: 200-215 - [c180]Evgenia Novikova, Marat Bukhtiarov, Igor V. Kotenko, Elena Fedorchenko, Igor Saenko:
Towards Application of the Tabular Data Transformation to Images in the Intrusion Detection Tasks Using Deep Learning Techniques. IDC 2023: 85-100 - [c179]Konstantin E. Izrailov, Nikita Romanov, Andrey Chechulin, Alexander Yaroshenko, Igor V. Kotenko:
Intelligent Selection of Requirements for a Secure Design of Smart City Transport Infrastructure Interfaces. IDC 2023: 135-148 - [c178]Igor V. Kotenko, Vasily Desnitsky, Evgenia Novikova:
Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset. IoTaIS 2023: 35-39 - [c177]Igor V. Kotenko, Igor B. Parashchuk, Vasily Desnitsky:
Determination of the Transition Probability Matrix for an IoT Fuzzy Security Model. IoTaIS 2023: 40-44 - [c176]Huiyao Dong, Igor V. Kotenko:
Autoencoder-based Malware Analysis: An Imagery Analysis Approach to Enhance the Security of Smart City IoT. ISCAI 2023: 56-59 - 2022
- [j69]Igor V. Kotenko, Diana Gaifulina, Igor Zelichenok:
Systematic Literature Review of Security Event Correlation Methods. IEEE Access 10: 43387-43420 (2022) - [j68]Igor V. Kotenko, Igor Saenko, Igor B. Parashchuk, Elena Doynikova:
An approach for selecting countermeasures against harmful information based on uncertainty management. Comput. Sci. Inf. Syst. 19(1): 415-433 (2022) - [j67]Igor V. Kotenko, Igor Saenko, Oleg Lauta, Aleksander Kribel:
Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods. Microprocess. Microsystems 90: 104459 (2022) - [j66]Igor V. Kotenko, Konstantin E. Izrailov, Mikhail Buinevich:
Analytical Modeling for Identification of the Machine Code Architecture of Cyberphysical Devices in Smart Homes. Sensors 22(3): 1017 (2022) - [j65]Igor V. Kotenko, Konstantin E. Izrailov, Mikhail Buinevich:
Static Analysis of Information Systems for IoT Cyber Security: A Survey of Machine Learning Approaches. Sensors 22(4): 1335 (2022) - [j64]Vasily Desnitsky, Andrey Chechulin, Igor V. Kotenko:
Multi-Aspect Based Approach to Attack Detection in IoT Clouds. Sensors 22(5): 1831 (2022) - [j63]Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko, Elena Doynikova:
Privacy Policies of IoT Devices: Collection and Analysis. Sensors 22(5): 1838 (2022) - [j62]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View. Sensors 22(13): 5063 (2022) - [j61]Igor V. Kotenko, Igor Saenko, Oleg Lauta, Alexander Kribel:
A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods. Sensors 22(19): 7506 (2022) - [c175]Roman Kryukov, Vladimir Zima, Elena Fedorchenko, Evgenia Novikova, Igor V. Kotenko:
Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract). ADIoT 2022: 165-176 - [c174]Igor V. Kotenko, Igor Saenko:
Applying Machine Learning Methods to Detect Abnormal User Behavior in a University Data Center. IDC 2022: 13-22 - [c173]Diana Gaifulina, Alexander Branitskiy, Dmitry Levshun, Elena Doynikova, Igor V. Kotenko:
Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts. IDC 2022: 203-212 - [c172]Alexey Meleshko, Vasily Desnitsky, Igor V. Kotenko:
Simulation-based and Graph oriented Approach to Detection of Network Attacks. MECO 2022: 1-4 - [c171]Mikhail Kuznetsov, Evgenia Novikova, Igor V. Kotenko:
An approach to formal desription of the user notification scenarios in privacy policies. PDP 2022: 275-282 - [c170]Igor Saenko, Igor V. Kotenko:
Towards Resilient and Efficient Big Data Storage: Evaluating a SIEM Repository Based on HDFS. PDP 2022: 290-297 - [e12]Ilsun You, Hwankuk Kim, Taek-Young Youn, Francesco Palmieri, Igor V. Kotenko:
Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers. Communications in Computer and Information Science 1544, Springer 2022, ISBN 978-981-16-9575-9 [contents] - 2021
- [j60]Igor V. Kotenko, Igor B. Parashchuk:
Specification of Quality Indicators for Security Event and Incident Management in the Supply Chain. Int. J. Comput. 20(1): 22-30 (2021) - [j59]Lidia Vitkova, Igor V. Kotenko, Andrey Chechulin:
An Approach to Ranking the Sources of Information Dissemination in Social Networks. Inf. 12(10): 416 (2021) - [j58]Mikhail V. Buinevich, Konstantin E. Izrailov, Igor V. Kotenko, Pavel A. Kurta:
Method and algorithms of visual audit of program interaction. J. Internet Serv. Inf. Secur. 11(1): 16-43 (2021) - [j57]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Bot detection by friends graph in social networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 141-159 (2021) - [j56]Igor V. Kotenko, Andrey V. Krasov, Igor Ushakov, Konstantin E. Izrailov:
An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database. J. Sens. Actuator Networks 10(2): 25 (2021) - [j55]Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure. Microprocess. Microsystems 87: 103482 (2021) - [j54]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring. Sensors 21(24): 8451 (2021) - [j53]Vasily Desnitsky, Igor V. Kotenko:
Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures. Simul. Model. Pract. Theory 107: 102244 (2021) - [j52]Helen D. Karatza, Igor V. Kotenko:
Guest Editors' Introduction "Modeling and Simulation for Intelligent Distributed Computing". Simul. Model. Pract. Theory 109: 102297 (2021) - [j51]Alexander Branitskiy, Igor V. Kotenko, Igor Saenko:
Applying machine learning and parallel data processing for attack detection in IoT. IEEE Trans. Emerg. Top. Comput. 9(4): 1642-1653 (2021) - [c169]Elena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor V. Kotenko:
Security Measuring System for IoT Devices. CyberICPS/SECPRE/ADIoT/SPOSE/CPS4CIP/CDT&SECOMANE@ESORICS 2021: 256-275 - [c168]Igor V. Kotenko, Yash Sharma, Alexander Branitskiy:
Predicting the Mental State of the Social Network Users based on the Latent Dirichlet Allocation and fastText. IDAACS 2021: 191-195 - [c167]Roman Ushakov, Elena Doynikova, Evgenia Novikova, Igor V. Kotenko:
CPE and CVE based Technique for Software Security Risk Assessment. IDAACS 2021: 353-356 - [c166]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems. IDC 2021: 397-406 - [c165]Igor V. Kotenko, Vladimir Avramenko, Albert Malikov, Igor Saenko:
An Approach to the Synthesis of a Neural Network System for Diagnosing Computer Incidents. IDC 2021: 407-416 - [c164]Roman Kryukov, Elena Doynikova, Igor V. Kotenko:
Security Analysis of Information Systems Based on Attack Sequences Generation and Testing. IDC 2021: 427-437 - [c163]Elena Doynikova, Alexander Branitskiy, Igor V. Kotenko:
Detection and Monitoring of the Destructive Impacts in the Social Networks Using Machine Learning Methods. IHAW 2021: 60-65 - [c162]Alexey Meleshko, Vasily Desnitsky, Igor V. Kotenko, Evgenia Novikova, Anton Shulepov:
Combined Approach to Anomaly Detection in Wireless Sensor Networks on Example of Water Management System. MECO 2021: 1-4 - [c161]Alisa A. Vorobeva, Guldar Khisaeva, Danil Zakoldaev, Igor V. Kotenko:
Detection of Business Email Compromise Attacks with Writing Style Analysis. MobiSec 2021: 248-262 - [c160]Konstantin E. Izrailov, Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces. MobiSec 2021: 301-319 - [c159]Diana Gaifulina, Igor V. Kotenko:
Selection of Deep Neural Network Models for IoT Anomaly Detection Experiments. PDP 2021: 260-265 - [c158]Igor V. Kotenko, Igor Saenko, Aleksander Kribel, Oleg Lauta:
A technique for early detection of cyberattacks using the traffic self-similarity property and a statistical approach. PDP 2021: 281-284 - [c157]Igor Saenko, Igor V. Kotenko, Fadey Skorik, Mazen Al-Barri:
Detecting Anomalous Behavior of Users of Data Centers Based on the Application of Artificial Neural Networks. RCAI 2021: 331-342 - [c156]Igor V. Kotenko, Igor Saenko, Oleg Lauta, Mikhail Karpov:
Situational Control of a Computer Network Security System in Conditions of Cyber Attacks. SIN 2021: 1-8 - [c155]Ivan Murenin, Elena Doynikova, Igor V. Kotenko:
Towards Security Decision Support for large-scale Heterogeneous Distributed Information Systems. SIN 2021: 1-8 - [c154]Igor V. Kotenko, Oleg Lauta, Kseniya Kribel, Igor Saenko:
LSTM Neural Networks for Detecting Anomalies Caused by Web Application Cyber Attacks. SoMeT 2021: 127-140 - [c153]Konstantin E. Izrailov, Mikhail V. Buinevich, Igor V. Kotenko, Alexander Yaroshenko:
Identifying characteristics of software vulnerabilities by their textual description using machine learning. WAC 2021: 186-192 - 2020
- [j50]Igor V. Kotenko, Lidiya Vitkova, Igor Saenko, Olga Tushkanova, Alexander Branitskiy:
The intelligent system for detection and counteraction of malicious and inappropriate information on the Internet. AI Commun. 33(1): 13-25 (2020) - [j49]Bilal Fakih, Didier El Baz, Igor V. Kotenko:
GRIDHPC: A decentralized environment for high performance computing. Concurr. Comput. Pract. Exp. 32(10) (2020) - [j48]Ivan Merelli, Pietro Liò, Igor V. Kotenko, Daniele D'Agostino:
Latest advances in parallel, distributed, and network-based processing. Concurr. Comput. Pract. Exp. 32(10) (2020) - [j47]Vyacheslav Efimov, Igor V. Kotenko, Igor Saenko:
Network Application-Layer Protocol Classification based on fuzzy Data and Neural Network Processing. Int. J. Comput. 19: 335-346 (2020) - [j46]Elena Doynikova, Evgenia Novikova, Igor V. Kotenko:
Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects. Inf. 11(3): 168 (2020) - [j45]Gustavo Gonzalez Granadillo, Elena Doynikova, Joaquín García, Igor V. Kotenko, Andrey Fedorchenko:
Stateful RORI-based countermeasure selection using hypergraphs. J. Inf. Secur. Appl. 54: 102541 (2020) - [j44]Gustavo Gonzalez Granadillo, Elena Doynikova, Joaquín García, Igor V. Kotenko, Andrey Fedorchenko:
Stateful RORI-based countermeasure selection using hypergraphs. J. Inf. Secur. Appl. 54: 102562 (2020) - [j43]Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
A Semantic Model for Security Evaluation of Information Systems. J. Cyber Secur. Mobil. 9(2): 301-330 (2020) - [j42]Igor V. Kotenko:
Guest Editorial: Intelligent Distributed Computing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(2): 1-2 (2020) - [j41]Florian Fenzl, Roland Rieke, Yannick Chevalier, Andreas Dominik, Igor V. Kotenko:
Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models. Simul. Model. Pract. Theory 105: 102143 (2020) - [j40]Dmitry Levshun, Yannick Chevalier, Igor V. Kotenko, Andrey Chechulin:
Design and verification of a mobile robot based on the integrated model of cyber-Physical systems. Simul. Model. Pract. Theory 105: 102151 (2020) - [c152]Elena Doynikova, Evgenia Novikova, Diana Gaifulina, Igor V. Kotenko:
Towards Attacker Attribution for Risk Analysis. CRiSIS 2020: 347-353 - [c151]Evgenia Novikova, Elena Doynikova, Igor V. Kotenko:
P2Onto: Making Privacy Policies Transparent. CyberICPS/SECPRE/ADIoT@ESORICS 2020: 235-252 - [c150]Igor V. Kotenko, Andrey V. Krasov, Igor Ushakov, Konstantin E. Izrailov:
Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model. ICFNDS 2020: 19:1-19:8 - [c149]Mikhail V. Buinevich, Konstantin E. Izrailov, Igor V. Kotenko, Igor Ushakov, Dmitry Vlasov:
Approach to combining different methods for detecting insiders. ICFNDS 2020: 26:1-26:6 - [c148]Igor V. Kotenko, Alexander Branitskiy, Artem Tishkov, Elena Doynikova:
Analysis of Formats of Young People's Communicative Behavior in Social Network. ICSTCC 2020: 439-444 - [c147]Igor B. Parashchuk, Elena Doynikova, Igor Saenko, Igor V. Kotenko:
Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty. INISTA 2020: 1-7 - [c146]Andrei Privalov, Ekaterina Skudneva, Igor V. Kotenko, Igor Saenko:
Graph-based evaluation of probability of disclosing the network structure by targeted attacks. NOMS 2020: 1-6 - [c145]Maxim Kolomeets, Andrey Chechulin, Ksenia Zhernova, Igor V. Kotenko, Diana Gaifulina:
Augmented reality for visualizing security data for cybernetic and cyberphysical systems. PDP 2020: 421-428 - [c144]Igor V. Kotenko, Yury Sineshchuk, Igor Saenko:
Optimizing Secure Information Interaction in Distributed Computing Systems by the Sequential Concessions Method. PDP 2020: 429-432 - [c143]Maksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin, Igor V. Kotenko:
Social networks bot detection using Benford's law. SIN 2020: 19:1-19:8 - [c142]Igor V. Kotenko, Igor Saenko, Fadey Skorik:
Intelligent support for network administrator decisions based on combined neural networks. SIN 2020: 31:1-31:8 - [p4]Igor V. Kotenko, Igor Saenko, Alexander Branitskiy:
Machine Learning and Big Data Processing for Cybersecurity Data Analysis. Data Science in Cybersecurity and Cyberthreat Intelligence 2020: 61-85 - [e11]Igor V. Kotenko, Costin Badica, Vasily Desnitsky, Didier El Baz, Mirjana Ivanovic:
Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, IDC 2019, St. Petersburg, Russia, 7-9 October, 2019. Studies in Computational Intelligence 868, Springer 2020, ISBN 978-3-030-32257-1 [contents] - [e10]Mirjana Ivanovic, Tulay Yildirim, Goce Trajcevski, Costin Badica, Ladjel Bellatreche, Igor V. Kotenko, Amelia Badica, Burcu Erkmen, Milos Savic:
International Conference on INnovations in Intelligent SysTems and Applications, INISTA 2020, Novi Sad, Serbia, August 24-26, 2020. IEEE 2020, ISBN 978-1-7281-6799-2 [contents] - [e9]Ilsun You, Hsing-Chung Chen, Fang-Yie Leu, Igor V. Kotenko:
Mobile Internet Security - 4th International Symposium, MobiSec 2019, Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers. Communications in Computer and Information Science 1121, Springer 2020, ISBN 978-981-15-9608-7 [contents]
2010 – 2019
- 2019
- [j39]Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions. Autom. Control. Comput. Sci. 53(8): 1029-1037 (2019) - [j38]Alexander Branitskiy, Dmitry Levshun, Natalia Krasilnikova, Elena Doynikova, Igor V. Kotenko, Artem Tishkov, Nina Vanchakova, Andrey Chechulin:
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks. J. Internet Serv. Inf. Secur. 9(3): 1-20 (2019) - [j37]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Social networks analysis by graph algorithms on the example of the VKontakte social network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(2): 55-75 (2019) - [j36]Maxim Kolomeets, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker, Igor V. Kotenko:
Reference architecture for social networks graph analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10(4): 109-125 (2019) - [j35]Andrey Fedorchenko, Elena Doynikova, Igor V. Kotenko:
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits. J. Univers. Comput. Sci. 25(9): 1043-1065 (2019) - [j34]Igor V. Kotenko, Igor Saenko, Sergey Ageev:
Hierarchical fuzzy situational networks for online decision-making: Application to telecommunication systems. Knowl. Based Syst. 185 (2019) - [c141]Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
Ontology of Metrics for Cyber Security Assessment. ARES 2019: 52:1-52:8 - [c140]Evgenia Novikova, Mikhail Bestuzhev, Igor V. Kotenko:
Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 402-418 - [c139]Igor Saenko, Igor V. Kotenko:
A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures. GECCO (Companion) 2019: 1643-1650 - [c138]Alexander Branitskiy, Andrey Fedorchenko, Igor V. Kotenko, Igor Saenko:
An Approach to Intelligent Distributed Scanning and Analytical Processing of the Internet Inappropriate Information. IDAACS 2019: 146-151 - [c137]Diana Gaifulina, Andrey Fedorchenko, Igor V. Kotenko:
Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty. IDAACS 2019: 163-167 - [c136]Alexander Branitskiy, Elena Doynikova, Igor V. Kotenko, Natalia Krasilnikova, Dmitry Levshun, Artem Tishkov, Nina Vanchakova:
The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing. IDC 2019: 302-310 - [c135]Vasily Desnitsky, Nikolay Rudavin, Igor V. Kotenko:
Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems. IDC 2019: 323-332 - [c134]Dmitry Levshun, Igor V. Kotenko, Andrey Chechulin:
The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification. IDC 2019: 333-343 - [c133]Yannick Chevalier, Roland Rieke, Florian Fenzl, Andrey Chechulin, Igor V. Kotenko:
ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection. IDC 2019: 495-504 - [c132]Ksenia Zhernova, Maxim Kolomeets, Igor V. Kotenko, Andrey Chechulin:
Adaptive Touch Interface: Application for Mobile Internet Security. MobiSec 2019: 53-72 - [c131]Dmitry Levshun, Yurii Bakhtin, Andrey Chechulin, Igor V. Kotenko:
Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model. MobiSec 2019: 145-162 - [c130]Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
Automated Revealing of Organizational Assets Based on Event Correlation. NTMS 2019: 1-5 - [c129]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko, Yannick Chevalier:
Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems. NTMS 2019: 1-5 - [c128]Igor V. Kotenko, Igor Saenko, Alexey Kushnerevich, Alexander Branitskiy:
Attack Detection in IoT Critical Infrastructures: A Machine Learning and Big Data Processing Approach. PDP 2019: 340-347 - [c127]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko, Igor Saenko:
Access Control Visualization Using Triangular Matrices. PDP 2019: 348-355 - [c126]Igor V. Kotenko, Igor Saenko, Yury Sineshchuk, Valery Kuvatov, Oleg Chudakov:
Optimization of the cyber security system structure based on accounting of the prevented damage cost. SIN 2019: 7:1-7:8 - [c125]Igor V. Kotenko, Nikolay Komashinsky:
Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework. SIN 2019: 16:1-16:8 - [c124]Igor V. Kotenko, Pavel Budko, Alexey Vinogradenko, Igor Saenko:
An Approach for Intelligent Evaluation of the State of Complex Autonomous Objects Based on the Wavelet Analysis. SoMeT 2019: 25-38 - [e8]Ilsun You, Hsing-Chung Chen, Vishal Sharma, Igor V. Kotenko:
Mobile Internet Security - Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers. Communications in Computer and Information Science 971, Springer 2019, ISBN 978-981-13-3731-4 [contents] - 2018
- [j33]Igor V. Kotenko, Igor Saenko, Alexander Branitskiy:
Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning. IEEE Access 6: 72714-72723 (2018) - [j32]Igor V. Kotenko, Andrey Fedorchenko, Elena Doynikova, Andrey Chechulin:
An Ontology-based Storage of Security Information. Inf. Technol. Control. 47(4): 655-667 (2018) - [j31]Gustavo Gonzalez Granadillo, Elena Doynikova, Igor V. Kotenko, Joaquín García-Alfaro:
Hypergraph-driven mitigation of cyberattacks. Internet Technol. Lett. 1(3) (2018) - [j30]Igor V. Kotenko, Igor Saenko, Alexander Branitskiy:
Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring. J. Internet Serv. Inf. Secur. 8(3): 54-63 (2018) - [j29]Igor V. Kotenko:
Guest Editorial: Managing Insider Security Threats. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(1): 1-3 (2018) - [j28]Igor V. Kotenko, Maxim Kolomeets, Andrey Chechulin, Yannick Chevalier:
A visual analytics approach for the cyber forensics based on different views of the network traffic. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 57-73 (2018) - [j27]Igor Saenko, Igor V. Kotenko:
Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks. ACM Trans. Internet Techn. 18(3): 27:1-27:21 (2018) - [c123]Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko:
Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection. ARES 2018: 62:1-62:8 - [c122]Ivo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection. CyberICPS/SECPRE@ESORICS 2018: 85-101 - [c121]Igor V. Kotenko, Iuliia Kim, Anastasia Matveeva, Ilya I. Viksnin:
Image Clustering Method based on Particle Swarm Optimization. FedCSIS 2018: 535-544 - [c120]Igor Saenko, Igor V. Kotenko:
Genetic algorithms for role mining in critical infrastructure data spaces. GECCO (Companion) 2018: 1688-1695 - [c119]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
A technique for design of secure data transfer environment: Application for I2C protocol. ICPS 2018: 789-794 - [c118]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Visual analysis of CAN bus traffic injection using radial bar charts. ICPS 2018: 841-846 - [c117]Igor V. Kotenko, Igor Saenko:
Evolutionary Algorithms for Design of Virtual Private Networks. IDC 2018: 287-297 - [c116]Vasily Desnitsky, Igor V. Kotenko, Nikolay Rudavin:
Ensuring Availability of Wireless Mesh Networks for Crisis Management. IDC 2018: 344-353 - [c115]Igor V. Kotenko, Igor Saenko, Sergey Ageev:
Applying Intelligent Agents for Anomaly Detection of Network Traffic in Internet of Things Networks. IOTAIS 2018: 123-129 - [c114]Andrey Chechulin, Igor V. Kotenko:
Application of Image Classification Methods for Protection against Inappropriate Information in the Internet. IOTAIS 2018: 167-173 - [c113]Igor V. Kotenko, Andrey Fedorchenko, Igor Saenko, Alexey Kushnerevich:
Parallelization of Security Event Correlation Based on Accounting of Event Type Links. PDP 2018: 462-469 - [c112]Elena Doynikova, Igor V. Kotenko:
The Multi-Layer Graph Based Technique for Proactive Automatic Response Against Cyber Attacks. PDP 2018: 470-477 - [c111]Igor V. Kotenko, Igor Saenko, Oleg Lauta:
Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion. RNDM 2018: 1-8 - [c110]Alexander Branitskiy, Igor V. Kotenko:
Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems. SIN 2018: 12:1-12:8 - [c109]Igor V. Kotenko, Sergey Ageev, Igor Saenko:
Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems. SIN 2018: 22:1-22:4 - [c108]Igor V. Kotenko, Igor Saenko, Andrey Chechulin, Vasily Desnitsky, Lidia Vitkova, Anton Pronoza:
Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks. SocInfo (2) 2018: 159-167 - [c107]Igor V. Kotenko, Igor Saenko, Sergey Ageev:
Hierarchical Fuzzy Situational Networks for Online Decision Support in Distributed Cyber-Physical Systems. SoMeT 2018: 623-636 - [p3]Igor V. Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko:
AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 101-130 - [e7]Ilsun You, Fang-Yie Leu, Hsing-Chung Chen, Igor V. Kotenko:
Mobile Internet Security - First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers. Communications in Computer and Information Science 797, Springer 2018, ISBN 978-981-10-7849-1 [contents] - [e6]Ivan Merelli, Pietro Liò, Igor V. Kotenko:
26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2018, Cambridge, United Kingdom, March 21-23, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-4975-6 [contents] - 2017
- [j26]Igor V. Kotenko, Andrey Chechulin, Dmitry Komashinsky:
Categorisation of web pages for protection against inappropriate content in the internet. Int. J. Internet Protoc. Technol. 10(1): 61-71 (2017) - [j25]Alexander Branitskiy, Igor V. Kotenko:
Hybridization of computational intelligence methods for attack detection in computer networks. J. Comput. Sci. 23: 145-156 (2017) - [j24]Igor V. Kotenko, Igor Saenko, Alexey Kushnerevich:
Parallel big data processing system for security monitoring in Internet of Things networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 8(4): 60-74 (2017) - [c106]Gustavo Gonzalez Granadillo, Elena Doynikova, Igor V. Kotenko, Joaquín García-Alfaro:
Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric. FPS 2017: 293-302 - [c105]Elena Doynikova, Andrey Chechulin, Igor V. Kotenko:
Analytical attack modeling and security assessment based on the common vulnerability scoring system. FRUCT 2017: 53-61 - [c104]Igor Saenko, Igor V. Kotenko:
Administrating role-based access control by genetic algorithms. GECCO (Companion) 2017: 1463-1470 - [c103]Andrey Fedorchenko, Igor V. Kotenko, Didier El Baz:
Correlation of security events based on the analysis of structures of event types. IDAACS 2017: 270-276 - [c102]Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design lifecycle for secure cyber-physical systems based on embedded devices. IDAACS 2017: 277-282 - [c101]Igor V. Kotenko, Andrey Chechulin, Elena Doynikova, Andrey Fedorchenko:
Ontological Hybrid Storage for Security Data. IDC 2017: 159-171 - [c100]Vasily Desnitsky, Igor V. Kotenko:
Modeling and Analysis of IoT Energy Resource Exhaustion Attacks. IDC 2017: 263-270 - [c99]Maxim Kolomeec, Gustavo Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor V. Kotenko, Hervé Debar:
Choosing Models for Security Metrics Visualization. MMM-ACNS 2017: 75-87 - [c98]Alexander Branitskiy, Igor V. Kotenko:
Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers. MMM-ACNS 2017: 143-157 - [c97]Alexander Branitskiy, Igor V. Kotenko:
Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines. MobiSec 2017: 1-16 - [c96]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko, Martin Strecker:
Voronoi Maps for Planar Sensor Networks Visualization. MobiSec 2017: 96-109 - [c95]Igor Saenko, Igor V. Kotenko, Alexey Kushnerevich:
Parallel Processing of Big Heterogeneous Data for Security Monitoring of IoT Networks. PDP 2017: 329-336 - [c94]Elena Doynikova, Igor V. Kotenko:
CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection. PDP 2017: 346-353 - [c93]Elena Doynikova, Igor V. Kotenko:
Enhancement of probabilistic attack graphs for accurate cyber security monitoring. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c92]Igor V. Kotenko, Artem Kuleshov, Igor Ushakov:
Aggregation of elastic stack instruments for collecting, storing and processing of security information and events. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - [e5]Jacek Rak, John Bay, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin, Krzysztof Szczypiorski:
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings. Lecture Notes in Computer Science 10446, Springer 2017, ISBN 978-3-319-65126-2 [contents] - [e4]Igor V. Kotenko, Yiannis Cotronis, Masoud Daneshtalab:
25th Euromicro International Conference on Parallel, Distributed and Network-based Processing, PDP 2017, St. Petersburg, Russia, March 6-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-6058-0 [contents] - 2016
- [j23]Vasily Desnitsky, Igor V. Kotenko:
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge. J. Ambient Intell. Humaniz. Comput. 7(5): 705-719 (2016) - [j22]Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, Igor V. Kotenko:
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(1): 58-78 (2016) - [j21]Igor V. Kotenko:
Guest Editorial: Advances in Secure Distributed and Network-Based Computing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(2): 1-2 (2016) - [j20]Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(2): 60-80 (2016) - [c91]Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams. CD-ARES 2016: 141-157 - [c90]Igor Saenko, Igor V. Kotenko:
Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes. PrAISe@ECAI 2016: 4:1-4:9 - [c89]Igor Saenko, Sergey Ageev, Igor V. Kotenko:
Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference. IDC 2016: 79-88 - [c88]Igor Saenko, Igor V. Kotenko:
Reconfiguration of RBAC schemes by genetic algorithms. IDC 2016: 89-98 - [c87]Igor Saenko, Fadey Skorik, Igor V. Kotenko:
Application of Hybrid Neural Networks for Monitoring and Forecasting Computer Networks States. ISNN 2016: 521-530 - [c86]Elena Doynikova, Igor V. Kotenko:
An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components. MobiSec 2016: 95-106 - [c85]Igor V. Kotenko, Igor Saenko, Oleg Lauta, Mikhail Kocinyak:
Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion. MobiSec 2016: 107-117 - [c84]Igor V. Kotenko, Elena Doynikova:
Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks. PDP 2016: 558-565 - [c83]Vasily Desnitsky, Andrey Chechulin, Igor V. Kotenko, Dmitry Levshun, Maxim Kolomeec:
Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System. PDP 2016: 609-616 - [c82]Igor V. Kotenko, Igor Saenko:
An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 657-664 - 2015
- [j19]V. A. Desnitskii, Igor V. Kotenko:
Design and verification of protected systems with integrated devices based on expert knowledge. Autom. Control. Comput. Sci. 49(8): 648-652 (2015) - [j18]Andrey Chechulin, Igor V. Kotenko:
Attack tree-based approach for real-time security event processing. Autom. Control. Comput. Sci. 49(8): 701-704 (2015) - [j17]Igor V. Kotenko, Igor Saenko:
Improved genetic algorithms for solving the optimisation tasks for design of access control schemes in computer networks. Int. J. Bio Inspired Comput. 7(2): 98-110 (2015) - [j16]Maxim Kolomeec, Andrey Chechulin, Igor V. Kotenko:
Methodological Primitives for Phased Construction of Data Visualization Models. J. Internet Serv. Inf. Secur. 5(4): 60-84 (2015) - [j15]Igor V. Kotenko:
Guest Editorial: Security in Distributed and Network-Based Computing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 1-3 (2015) - [j14]Andrey Fedorchenko, Igor V. Kotenko, Andrey Chechulin:
Integrated Repository of Security Information for Network Security Evaluation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6(2): 41-57 (2015) - [c81]Elena Doynikova, Igor V. Kotenko:
Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management. CRiSIS 2015: 107-124 - [c80]Alexander Branitskiy, Igor V. Kotenko:
Network Attack Detection Based on Combination of Neural, Immune and Neuro-Fuzzy Classifiers. CSE 2015: 152-159 - [c79]Igor V. Kotenko, Igor Saenko:
The Genetic Approach for Design of Virtual Private Networks. CSE 2015: 168-175 - [c78]Yana A. Bekeneva, Konstantin Borisenko, Andrey Shorov, Igor V. Kotenko:
Investigation of DDoS Attacks by Hybrid Simulation. ICT-EurAsia/CONFENIS 2015: 179-189 - [c77]Igor V. Kotenko, Andrey Chechulin, Dmitry Komashinsky:
Evaluation of text classification techniques for inappropriate web content blocking. IDAACS 2015: 412-417 - [c76]Igor V. Kotenko, Elena Doynikova:
The CAPEC based generator of attack scenarios for network security evaluation. IDAACS 2015: 436-441 - [c75]Igor Saenko, Igor V. Kotenko:
Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic Algorithms. IDC 2015: 155-165 - [c74]Dmitry Novozhilov, Igor V. Kotenko, Andrey Chechulin:
Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content. IDC 2015: 257-263 - [c73]Andrey Fedorchenko, Igor V. Kotenko, Andrey Chechulin:
Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis. PDP 2015: 559-566 - [c72]Igor V. Kotenko, Elena Doynikova:
Countermeasure Selection in SIEM Systems Based on the Integrated Complex of Security Metrics. PDP 2015: 567-574 - [c71]Igor V. Kotenko, Igor Saenko, Sergey Ageev:
Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference. TrustCom/BigDataSE/ISPA (1) 2015: 654-659 - 2014
- [j13]Evgenia Novikova, Igor V. Kotenko, Evgenii Fedotov:
Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services. Int. J. Mob. Comput. Multim. Commun. 6(4): 73-97 (2014) - [j12]Igor V. Kotenko, Andrey Chechulin:
Fast Network Attack Modeling and Security Evaluation based on Attack Graphs. J. Cyber Secur. Mobil. 3(1): 27-46 (2014) - [j11]Igor V. Kotenko, Elena Doynikova:
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 14-29 (2014) - [j10]Igor Saenko, Igor V. Kotenko:
Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 86-102 (2014) - [c70]Evgenia Novikova, Igor V. Kotenko:
Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services. CD-ARES 2014: 63-78 - [c69]Vasily Desnitsky, Igor V. Kotenko:
Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices. CD-ARES 2014: 194-210 - [c68]Igor V. Kotenko, Evgenia Novikova:
Visualization of Security Metrics for Cyber Situation Awareness. ARES 2014: 506-513 - [c67]Igor V. Kotenko, Elena Doynikova:
Security Evaluation for Cyber Situational Awareness. HPCC/CSS/ICESS 2014: 1197-1204 - [c66]Igor V. Kotenko, Elena Doynikova:
Security Assessment of Computer Networks Based on Attack Graphs and Security Events. ICT-EurAsia 2014: 462-471 - [c65]Igor Saenko, Igor V. Kotenko:
A Genetic Approach for Virtual Computer Network Design. IDC 2014: 95-105 - [c64]Igor V. Kotenko, Andrey Shorov:
Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks. IDC 2014: 127-133 - [c63]Igor V. Kotenko, Andrey Chechulin, Andrey Shorov, Dmitry Komashinsky:
Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking. ICDM 2014: 39-54 - [c62]Igor V. Kotenko, Elena Doynikova, Andrey Chechulin:
Security Metrics Based on Attack Graphs for the Olympic Games Scenario. PDP 2014: 561-568 - [c61]Philipp G. Nesteruk, Lesya Nesteruk, Igor V. Kotenko:
Creation of a Fuzzy Knowledge Base for Adaptive Security Systems. PDP 2014: 574-577 - 2013
- [j9]Igor V. Kotenko, Olga Polubelova, Andrey Chechulin, Igor Saenko:
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems. Future Internet 5(3): 355-375 (2013) - [j8]Dmitry Komashinsky, Igor V. Kotenko:
интеллектуальный анализ данных для выявления вредоносных программ. Int. J. Comput. 12(1): 63-74 (2013) - [j7]Igor V. Kotenko, Filipp G. Nesteruk, Andrey V. Shorov:
Conception of a Hybrid Ad Aptive Protectionof Information Systems. Int. J. Comput. 12(1): 86-98 (2013) - [j6]Igor V. Kotenko, Elena Doynikova:
Comprehensive Multilevel Security Risk Assessment of Distributed Information Systems. Int. J. Comput. 12(3): 217-225 (2013) - [c60]Igor V. Kotenko, Evgenia Novikova:
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment. CD-ARES Workshops 2013: 345-360 - [c59]Igor V. Kotenko, Olga Polubelova, Igor Saenko, Elena Doynikova:
The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. ARES 2013: 638-645 - [c58]Igor V. Kotenko, Andrey Chechulin:
A Cyber Attack Modeling and Impact Assessment framework. CyCon 2013: 1-24 - [c57]Igor V. Kotenko:
Experiments With Simulation Of Botnets And Defense Agent Teams. ECMS 2013: 61-67 - [c56]Igor V. Kotenko, Andrey Chechulin:
Computer attack modeling and security evaluation based on attack graphs. IDAACS 2013: 614-619 - [c55]Igor V. Kotenko, Elena Doynikova:
Security metrics for risk assessment of distributed information systems. IDAACS 2013: 646-650 - [c54]Igor V. Kotenko, Olga Polubelova, Igor Saenko:
Logical Inference Framework for Security Management in Geographical Information Systems. IF&GIS 2013: 203-218 - [c53]Igor V. Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova:
Dynamical Attack Simulation for Security Information and Event Management. IF&GIS 2013: 219-234 - [c52]Evgenia Novikova, Igor V. Kotenko:
Analytical Visualization Techniques for Security Information and Event Management. PDP 2013: 519-525 - [c51]Igor V. Kotenko, Andrey Shorov, Evgenia Novikova:
Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks. PDP 2013: 526-533 - 2012
- [j5]Igor V. Kotenko, Alexey Konovalov, Andrey Shorov:
Agent-based simulation of cooperative defence against botnets. Concurr. Comput. Pract. Exp. 24(6): 573-588 (2012) - [c50]Igor V. Kotenko, Andrey Chechulin:
Common Framework for Attack Modeling and Security Evaluation in SIEM Systems. GreenCom 2012: 94-101 - [c49]Igor V. Kotenko, Olga Polubelova, Igor Saenko:
The Ontological Approach for SIEM Data Repository Implementation. GreenCom 2012: 761-766 - [c48]Andrey Chechulin, Igor V. Kotenko, Vasily Desnitsky:
An Approach for Network Information Flow Analysis for Systems of Embedded Components. MMM-ACNS 2012: 146-155 - [c47]Dmitriy Komashinskiy, Igor V. Kotenko:
Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods. MMM-ACNS 2012: 254-269 - [c46]Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:
Configuration-Based Approach to Embedded Device Security. MMM-ACNS 2012: 270-285 - [c45]José Fran. Ruiz, Rajesh Harjani, Antonio Mana, Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin:
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components. PDP 2012: 261-268 - [c44]Igor Saenko, Igor V. Kotenko:
Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem. PDP 2012: 269-274 - [c43]Igor V. Kotenko, Olga Polubelova, Igor Saenko:
Data Repository for Security Information and Event Management in Service Infrastructures. SECRYPT 2012: 308-313 - [c42]Igor V. Kotenko, Andrey Chechulin, Evgenia Novikova:
Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012: 391-394 - [c41]Igor V. Kotenko, Andrey Shorov:
Simulation of Protection Mechanisms against Botnets on the Basis of "Nervous Network" Framework. SIMULTECH 2012: 164-169 - [p2]Rafal Leszczyna, Igor V. Kotenko:
Security and Anonymity in Agent Systems. Software Agents, Agent Systems and Their Applications 2012: 157-177 - [p1]Igor V. Kotenko, Rafal Leszczyna:
Software Agents for Computer Network Security. Software Agents, Agent Systems and Their Applications 2012: 260-285 - [e3]Igor V. Kotenko, Victor A. Skormin:
Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings. Lecture Notes in Computer Science 7531, Springer 2012, ISBN 978-3-642-33703-1 [contents] - 2011
- [c40]Igor V. Kotenko, Olga Polubelova:
Verification of security policy filtering rules by Model Checking. IDAACS (2) 2011: 706-710 - [c39]Igor V. Kotenko, Andrey Chechulin, Elena Doynikova:
Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems. IF&GIS 2011: 45-58 - [c38]Igor V. Kotenko, Mikhail Stepashkin, Elena Doynikova:
Security Analysis of Information Systems Taking into Account Social Engineering Attacks. PDP 2011: 611-618 - [c37]Igor Saenko, Igor V. Kotenko:
Genetic Algorithms for Role Mining Problem. PDP 2011: 646-650 - 2010
- [c36]Igor V. Kotenko, Alexey Konovalov, Andrey Shorov:
Simulation of Botnets: Agent-Based Approach. IDC 2010: 247-252 - [c35]Igor Saenko, Igor V. Kotenko:
Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. MMM-ACNS 2010: 209-216 - [c34]Vasily Desnitsky, Igor V. Kotenko:
Security and Scalability of Remote Entrusting Protection. MMM-ACNS 2010: 298-306 - [c33]Dmitriy Komashinskiy, Igor V. Kotenko:
Malware Detection by Data Mining Techniques Based on Positionally Dependent Features. PDP 2010: 617-623 - [e2]Igor V. Kotenko, Victor A. Skormin:
Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings. Lecture Notes in Computer Science 6258, Springer 2010, ISBN 978-3-642-14705-0 [contents]
2000 – 2009
- 2009
- [c32]Igor V. Kotenko:
Simulation Of Agent Teams: Application Of A Domain-Independent Framework To Computer Network Security. ECMS 2009: 137-143 - [c31]Vasily Desnitsky, Igor V. Kotenko:
Design of Entrusting Protocols for Software Protection. IF&GIS 2009: 301-316 - [c30]Dmitriy Komashinskiy, Igor V. Kotenko:
Integrated Usage of Data Mining Methods for Malware Detection. IF&GIS 2009: 343-357 - [c29]Igor V. Kotenko:
Framework for Integrated Proactive Network Worm Detection and Response. PDP 2009: 379-386 - 2008
- [j4]Igor V. Kotenko:
Multi-Agent simulation of Attacks and Defense Mechanisms in Computer Networks. Int. J. Comput. 7(2): 35-43 (2008) - [c28]Igor V. Kotenko, Alexander Ulanov:
Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks. PDP 2008: 565-572 - 2007
- [c27]Igor V. Kotenko, Alexander Ulanov:
Multi-agent Framework for Simulation of Adaptive Cooperative Defense Against Internet Attacks. AIS-ADM 2007: 212-228 - [c26]Julien Bourgeois, Abdoul Karim Ganame, Igor V. Kotenko, Alexander Ulanov:
Software Environment for Simulation and Evaluation of a Security Operation Center. IF&GIS 2007: 111-127 - [c25]Igor V. Kotenko, Artem Tishkov, Olga Chervatuk, Ekaterina Sidelnikova:
Security Policy Verification Tool for Geographical Information Systems. IF&GIS 2007: 128-146 - [c24]Igor V. Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov:
Hybrid Multi-module Security Policy Verification. POLICY 2007: 277 - [c23]Igor V. Kotenko, Alexander Ulanov:
Investigation of Cooperative Defense against DDoS. SECRYPT 2007: 180-183 - 2006
- [c22]Igor V. Kotenko, Mikhail Stepashkin:
Attack Graph Based Evaluation of Network Security. Communications and Multimedia Security 2006: 216-227 - [c21]Igor V. Kotenko, Alexander Ulanov:
Agent Teams in Cyberspace: Security Guards in the Global Internet. CW 2006: 133-140 - [c20]Igor V. Kotenko, Alexander Ulanov:
Antagonistic Agents in the Internet: Computer Network Warfare Simulation. FUSION 2006: 1-8 - [c19]Igor V. Kotenko, Alexander Ulanov:
Simulation of Internet DDoS Attacks and Defense. ISC 2006: 327-342 - [c18]Igor V. Kotenko, Alexander Ulanov:
Agent-based modeling and simulation of network softbots' competition. JCKBSE 2006: 243-252 - [c17]Igor V. Kotenko, Mikhail Stepashkin:
Network Security Evaluation Based on Simulation of Malfactor's Behavior. SECRYPT 2006: 339-344 - 2005
- [j3]Igor V. Kotenko, Alexander Ulanov:
Agent-based simulation of DDoS Attacks and Defense Mechanisms. Int. J. Comput. 4(2): 113-123 (2005) - [c16]Igor V. Kotenko, Alexander Ulanov:
The Software Environment for Multi-agent Simulation of Defense Mechanisms against DDoS Attacks. CIMCA/IAWTIC 2005: 283-289 - [c15]Igor V. Kotenko, Mikhail Stepashkin:
Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. MMM-ACNS 2005: 311-324 - [c14]Artem Tishkov, Igor V. Kotenko, Ekaterina Sidelnikova:
Security Checker Architecture for Policy-Based Security Management. MMM-ACNS 2005: 460-465 - [e1]Vladimir Gorodetsky, Igor V. Kotenko, Victor A. Skormin:
Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings. Lecture Notes in Computer Science 3685, Springer 2005, ISBN 3-540-29113-X [contents] - 2004
- [j2]Pavel Laskov, Christin Schäfer, Igor V. Kotenko, Klaus-Robert Müller:
Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines. Prax. Inf.verarb. Kommun. 27(4): 228-236 (2004) - [c13]Pavel Laskov, Christin Schäfer, Igor V. Kotenko:
Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines. DIMVA 2004: 71-82 - 2003
- [j1]Vladimir I. Gorodetski, Igor V. Kotenko, Oleg Karsaev:
Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning. Comput. Syst. Sci. Eng. 18(4): 191-200 (2003) - [c12]Igor V. Kotenko:
Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks. CEEMAS 2003: 464-474 - [c11]Igor V. Kotenko, Alexey Alexeev, Evgeny Man'kov:
Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents. IAT 2003: 507-510 - [c10]Igor V. Kotenko, Evgeny Man'kov:
Experiments with Simulation of Attacks against Computer Networks. MMM-ACNS 2003: 183-194 - 2002
- [c9]Vladimir I. Gorodetski, Igor V. Kotenko:
Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool. RAID 2002: 219-238 - 2001
- [c8]Vladimir I. Gorodetski, Oleg Karsaev, Igor V. Kotenko, Alexey Khabalov:
Software Development Kit for Multi-agent Systems Design and Implementation. CEEMAS 2001: 121-130 - [c7]Vladimir I. Gorodetski, Oleg Karsaev, Alexey Khabalov, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin:
Agent-Based Model of Computer Network Security System: A Case Study. MMM-ACNS 2001: 39-50 - 2000
- [c6]Vladimir I. Gorodetski, Igor V. Kotenko, Victor A. Skormin:
Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community. SEC 2000: 291-300
1990 – 1999
- 1999
- [c5]Vladimir I. Gorodetski, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin:
Agent-based Model of Information Security System: Architecture and Framework for Coordinated Behavior Specification. CEEMAS 1999 - [c4]Igor V. Kotenko:
Application of Hybrid Agent-Based Technology for Design of Telecommunication Systems. CEEMAS 1999 - [c3]Vladimir I. Gorodetski, Leonard J. Popyack, Igor V. Kotenko, Victor A. Skormin:
Ontology-Based Multi-Agent Model of an Information Security System. RSFDGrC 1999: 528-532 - 1995
- [c2]Igor V. Kotenko:
A framework for intelligent group decision support. ECIS 1995: 635-648 - 1994
- [c1]Igor V. Kotenko:
Conflict Resolution in Computer-Supported Cooperative Design. EWHCI 1994: 152-163
Coauthor Index
aka: Elena Doynikova
aka: Maxim Kolomeec
aka: Diana Gaifulina
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint