default search action
BibTeX records: Stanislav Abaimov
@article{DBLP:journals/jocsap/Abaimov24, author = {Stanislav Abaimov}, title = {Understanding and Classifying Permanent Denial-of-Service Attacks}, journal = {J. Cybersecur. Priv.}, volume = {4}, number = {2}, pages = {324--339}, year = {2024}, url = {https://doi.org/10.3390/jcp4020016}, doi = {10.3390/JCP4020016}, timestamp = {Sat, 10 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocsap/Abaimov24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/AbaimovGSWSSR24, author = {Stanislav Abaimov and Joseph Gardiner and Emmanouil Samanis and Jacob Williams and Marios Samanis and Feras Shahbi and Awais Rashid}, editor = {Jianying Zhou and Sudipta Chattopadhyay}, title = {Capture The Industrial Flag: Lessons from hosting an {ICS} cybersecurity exercise}, booktitle = {Proceedings of the 10th {ACM} Cyber-Physical System Security Workshop, {CPSS} 2024, Singapore, 2 July 2024}, pages = {98--106}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626205.3659148}, doi = {10.1145/3626205.3659148}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpss/AbaimovGSWSSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-08095, author = {Iuliia Ganskaia and Stanislav Abaimov}, title = {Before and After: Machine learning for perioperative patient care}, journal = {CoRR}, volume = {abs/2201.08095}, year = {2022}, url = {https://arxiv.org/abs/2201.08095}, eprinttype = {arXiv}, eprint = {2201.08095}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-08095.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/array/AbaimovB21, author = {Stanislav Abaimov and Giuseppe Bianchi}, title = {A survey on the application of deep learning for code injection detection}, journal = {Array}, volume = {11}, pages = {100077}, year = {2021}, url = {https://doi.org/10.1016/j.array.2021.100077}, doi = {10.1016/J.ARRAY.2021.100077}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/array/AbaimovB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-06765, author = {Stanislav Abaimov}, title = {Towards a Privacy-preserving Deep Learning-based Network Intrusion Detection in Data Distribution Services}, journal = {CoRR}, volume = {abs/2106.06765}, year = {2021}, url = {https://arxiv.org/abs/2106.06765}, eprinttype = {arXiv}, eprint = {2106.06765}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-06765.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AbaimovB19, author = {Stanislav Abaimov and Giuseppe Bianchi}, title = {{CODDLE:} Code-Injection Detection With Deep Learning}, journal = {{IEEE} Access}, volume = {7}, pages = {128617--128627}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2939870}, doi = {10.1109/ACCESS.2019.2939870}, timestamp = {Mon, 18 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AbaimovB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiscram/MugaveroABS18, author = {Roberto Mugavero and Stanislav Abaimov and Federico Benolli and Valentina Sabato}, title = {Cyber Security Vulnerability Management in {CBRN} Industrial Control Systems {(ICS)}}, journal = {Int. J. Inf. Syst. Crisis Response Manag.}, volume = {10}, number = {2}, pages = {49--78}, year = {2018}, url = {https://doi.org/10.4018/IJISCRAM.2018040103}, doi = {10.4018/IJISCRAM.2018040103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiscram/MugaveroABS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/MartelliniAGW17, author = {Maurizio Martellini and Stanislav Abaimov and Sandro Gaycken and Clay Wilson}, title = {Information Security of Highly Critical Wireless Networks}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52905-9}, doi = {10.1007/978-3-319-52905-9}, isbn = {978-3-319-52904-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/MartelliniAGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.