BibTeX records: Stanislav Abaimov

download as .bib file

@article{DBLP:journals/jocsap/Abaimov24,
  author       = {Stanislav Abaimov},
  title        = {Understanding and Classifying Permanent Denial-of-Service Attacks},
  journal      = {J. Cybersecur. Priv.},
  volume       = {4},
  number       = {2},
  pages        = {324--339},
  year         = {2024},
  url          = {https://doi.org/10.3390/jcp4020016},
  doi          = {10.3390/JCP4020016},
  timestamp    = {Sat, 10 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocsap/Abaimov24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpss/AbaimovGSWSSR24,
  author       = {Stanislav Abaimov and
                  Joseph Gardiner and
                  Emmanouil Samanis and
                  Jacob Williams and
                  Marios Samanis and
                  Feras Shahbi and
                  Awais Rashid},
  editor       = {Jianying Zhou and
                  Sudipta Chattopadhyay},
  title        = {Capture The Industrial Flag: Lessons from hosting an {ICS} cybersecurity
                  exercise},
  booktitle    = {Proceedings of the 10th {ACM} Cyber-Physical System Security Workshop,
                  {CPSS} 2024, Singapore, 2 July 2024},
  pages        = {98--106},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3626205.3659148},
  doi          = {10.1145/3626205.3659148},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpss/AbaimovGSWSSR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-08095,
  author       = {Iuliia Ganskaia and
                  Stanislav Abaimov},
  title        = {Before and After: Machine learning for perioperative patient care},
  journal      = {CoRR},
  volume       = {abs/2201.08095},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.08095},
  eprinttype    = {arXiv},
  eprint       = {2201.08095},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-08095.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/array/AbaimovB21,
  author       = {Stanislav Abaimov and
                  Giuseppe Bianchi},
  title        = {A survey on the application of deep learning for code injection detection},
  journal      = {Array},
  volume       = {11},
  pages        = {100077},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.array.2021.100077},
  doi          = {10.1016/J.ARRAY.2021.100077},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/array/AbaimovB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-06765,
  author       = {Stanislav Abaimov},
  title        = {Towards a Privacy-preserving Deep Learning-based Network Intrusion
                  Detection in Data Distribution Services},
  journal      = {CoRR},
  volume       = {abs/2106.06765},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.06765},
  eprinttype    = {arXiv},
  eprint       = {2106.06765},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-06765.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AbaimovB19,
  author       = {Stanislav Abaimov and
                  Giuseppe Bianchi},
  title        = {{CODDLE:} Code-Injection Detection With Deep Learning},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {128617--128627},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2939870},
  doi          = {10.1109/ACCESS.2019.2939870},
  timestamp    = {Mon, 18 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AbaimovB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiscram/MugaveroABS18,
  author       = {Roberto Mugavero and
                  Stanislav Abaimov and
                  Federico Benolli and
                  Valentina Sabato},
  title        = {Cyber Security Vulnerability Management in {CBRN} Industrial Control
                  Systems {(ICS)}},
  journal      = {Int. J. Inf. Syst. Crisis Response Manag.},
  volume       = {10},
  number       = {2},
  pages        = {49--78},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJISCRAM.2018040103},
  doi          = {10.4018/IJISCRAM.2018040103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijiscram/MugaveroABS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/MartelliniAGW17,
  author       = {Maurizio Martellini and
                  Stanislav Abaimov and
                  Sandro Gaycken and
                  Clay Wilson},
  title        = {Information Security of Highly Critical Wireless Networks},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52905-9},
  doi          = {10.1007/978-3-319-52905-9},
  isbn         = {978-3-319-52904-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/MartelliniAGW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}