BibTeX records: Igor V. Kotenko

download as .bib file

@inproceedings{DBLP:conf/comsnets/KotenkoL24,
  author       = {Igor V. Kotenko and
                  Diana Levshun},
  title        = {Anomaly Detection in IoT Networks Based on Intelligent Security Event
                  Correlation},
  booktitle    = {16th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2024, Bengaluru, India, January 3-7, 2024},
  pages        = {816--824},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/COMSNETS59351.2024.10426939},
  doi          = {10.1109/COMSNETS59351.2024.10426939},
  timestamp    = {Fri, 01 Mar 2024 14:04:41 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/KotenkoL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/air/LevshunK23,
  author       = {Diana Levshun and
                  Igor V. Kotenko},
  title        = {A survey on artificial intelligence techniques for security event
                  correlation: models, challenges, and opportunities},
  journal      = {Artif. Intell. Rev.},
  volume       = {56},
  number       = {8},
  pages        = {8547--8590},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10462-022-10381-4},
  doi          = {10.1007/S10462-022-10381-4},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/air/LevshunK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithms/TushkanovaLBFNK23,
  author       = {Olga Tushkanova and
                  Dmitry Levshun and
                  Alexander Branitskiy and
                  Elena Fedorchenko and
                  Evgenia Novikova and
                  Igor V. Kotenko},
  title        = {Detection of Cyberattacks and Anomalies in Cyber-Physical Systems:
                  Approaches, Data Sources, Evaluation},
  journal      = {Algorithms},
  volume       = {16},
  number       = {2},
  pages        = {85},
  year         = {2023},
  url          = {https://doi.org/10.3390/a16020085},
  doi          = {10.3390/A16020085},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithms/TushkanovaLBFNK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdcc/KotenkoSPL23,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Andrei Privalov and
                  Oleg Lauta},
  title        = {Ensuring {SDN} Resilience under the Influence of Cyber Attacks: Combining
                  Methods of Topological Transformation of Stochastic Networks, Markov
                  Processes, and Neural Networks},
  journal      = {Big Data Cogn. Comput.},
  volume       = {7},
  number       = {2},
  pages        = {66},
  year         = {2023},
  url          = {https://doi.org/10.3390/bdcc7020066},
  doi          = {10.3390/BDCC7020066},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bdcc/KotenkoSPL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/KotenkoIB23,
  author       = {Igor V. Kotenko and
                  Konstantin E. Izrailov and
                  Mikhail Buinevich},
  title        = {The Method and Software Tool for Identification of the Machine Code
                  Architecture in Cyberphysical Devices},
  journal      = {J. Sens. Actuator Networks},
  volume       = {12},
  number       = {1},
  pages        = {11},
  year         = {2023},
  url          = {https://doi.org/10.3390/jsan12010011},
  doi          = {10.3390/JSAN12010011},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/KotenkoIB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KotenkoFNJ23,
  author       = {Igor V. Kotenko and
                  Elena Fedorchenko and
                  Evgenia Novikova and
                  Ashish Jha},
  title        = {Cyber Attacker Profiling for Risk Analysis Based on Machine Learning},
  journal      = {Sensors},
  volume       = {23},
  number       = {4},
  pages        = {2028},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23042028},
  doi          = {10.3390/S23042028},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KotenkoFNJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KolomeetsDKC23,
  author       = {Maxim Kolomeets and
                  Vasily Desnitsky and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {Graph Visualization: Alternative Models Inspired by Bioinformatics},
  journal      = {Sensors},
  volume       = {23},
  number       = {7},
  pages        = {3747},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23073747},
  doi          = {10.3390/S23073747},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KolomeetsDKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biostec/RaedYGKFP23,
  author       = {Mhd. Wasim Raed and
                  Semih Y{\"{o}}n and
                  Ali G{\"{u}}nes and
                  Igor V. Kotenko and
                  Elena Fedorchenko and
                  Anna Polubaryeva},
  editor       = {Ioanna Chouvarda and
                  Ana L. N. Fred and
                  Hugo Gamboa},
  title        = {An {RFID} Based Localization and Mental Stress Recognition System
                  Using Wearable Sensors},
  booktitle    = {Proceedings of the 16th International Joint Conference on Biomedical
                  Engineering Systems and Technologies, {BIOSTEC} 2023, Volume 4: BIOSIGNALS,
                  Lisbon, Portugal, February 16-18, 2023},
  pages        = {325--331},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011796000003414},
  doi          = {10.5220/0011796000003414},
  timestamp    = {Thu, 23 Mar 2023 11:48:34 +0100},
  biburl       = {https://dblp.org/rec/conf/biostec/RaedYGKFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotais/KotenkoDN23,
  author       = {Igor V. Kotenko and
                  Vasily Desnitsky and
                  Evgenia Novikova},
  title        = {Defect Detection in Industrial IoT-based Machines: Case of Small Training
                  Dataset},
  booktitle    = {{IEEE} International Conference on Internet of Things and Intelligence
                  Systems, IoTaIS 2023, Bali, Indonesia, November 28-30, 2023},
  pages        = {35--39},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IoTaIS60147.2023.10346064},
  doi          = {10.1109/IOTAIS60147.2023.10346064},
  timestamp    = {Fri, 09 Feb 2024 20:38:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iotais/KotenkoDN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotais/KotenkoPD23,
  author       = {Igor V. Kotenko and
                  Igor Parashchuk and
                  Vasily Desnitsky},
  title        = {Determination of the Transition Probability Matrix for an IoT Fuzzy
                  Security Model},
  booktitle    = {{IEEE} International Conference on Internet of Things and Intelligence
                  Systems, IoTaIS 2023, Bali, Indonesia, November 28-30, 2023},
  pages        = {40--44},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IoTaIS60147.2023.10346032},
  doi          = {10.1109/IOTAIS60147.2023.10346032},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iotais/KotenkoPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KotenkoGZ22,
  author       = {Igor V. Kotenko and
                  Diana Gaifulina and
                  Igor Zelichenok},
  title        = {Systematic Literature Review of Security Event Correlation Methods},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {43387--43420},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3168976},
  doi          = {10.1109/ACCESS.2022.3168976},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KotenkoGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/Kotenko0PD22,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Igor Parashchuk and
                  Elena Doynikova},
  title        = {An approach for selecting countermeasures against harmful information
                  based on uncertainty management},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {19},
  number       = {1},
  pages        = {415--433},
  year         = {2022},
  url          = {https://doi.org/10.2298/csis210211057k},
  doi          = {10.2298/CSIS210211057K},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsis/Kotenko0PD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/KotenkoSLK22,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Oleg Lauta and
                  Aleksander Kribel},
  title        = {Ensuring the survivability of embedded computer networks based on
                  early detection of cyber attacks by integrating fractal analysis and
                  statistical methods},
  journal      = {Microprocess. Microsystems},
  volume       = {90},
  pages        = {104459},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.micpro.2022.104459},
  doi          = {10.1016/J.MICPRO.2022.104459},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/KotenkoSLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KotenkoIB22,
  author       = {Igor V. Kotenko and
                  Konstantin E. Izrailov and
                  Mikhail Buinevich},
  title        = {Analytical Modeling for Identification of the Machine Code Architecture
                  of Cyberphysical Devices in Smart Homes},
  journal      = {Sensors},
  volume       = {22},
  number       = {3},
  pages        = {1017},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22031017},
  doi          = {10.3390/S22031017},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/KotenkoIB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KotenkoIB22a,
  author       = {Igor V. Kotenko and
                  Konstantin E. Izrailov and
                  Mikhail Buinevich},
  title        = {Static Analysis of Information Systems for IoT Cyber Security: {A}
                  Survey of Machine Learning Approaches},
  journal      = {Sensors},
  volume       = {22},
  number       = {4},
  pages        = {1335},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22041335},
  doi          = {10.3390/S22041335},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KotenkoIB22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/DesnitskyCK22,
  author       = {Vasily Desnitsky and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Multi-Aspect Based Approach to Attack Detection in IoT Clouds},
  journal      = {Sensors},
  volume       = {22},
  number       = {5},
  pages        = {1831},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22051831},
  doi          = {10.3390/S22051831},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/DesnitskyCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KuznetsovNKD22,
  author       = {Mikhail Kuznetsov and
                  Evgenia Novikova and
                  Igor V. Kotenko and
                  Elena Doynikova},
  title        = {Privacy Policies of IoT Devices: Collection and Analysis},
  journal      = {Sensors},
  volume       = {22},
  number       = {5},
  pages        = {1838},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22051838},
  doi          = {10.3390/S22051838},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/KuznetsovNKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LevshunCK22,
  author       = {Dmitry Levshun and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Security and Privacy Analysis of Smartphone-Based Driver Monitoring
                  Systems from the Developer's Point of View},
  journal      = {Sensors},
  volume       = {22},
  number       = {13},
  pages        = {5063},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22135063},
  doi          = {10.3390/S22135063},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LevshunCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/KotenkoSLK22,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Oleg Lauta and
                  Alexander Kribel},
  title        = {A Proactive Protection of Smart Power Grids against Cyberattacks on
                  Service Data Transfer Protocols by Computational Intelligence Methods},
  journal      = {Sensors},
  volume       = {22},
  number       = {19},
  pages        = {7506},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22197506},
  doi          = {10.3390/S22197506},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/KotenkoSLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adiot/KryukovZFNK22,
  author       = {Roman Kryukov and
                  Vladimir Zima and
                  Elena Fedorchenko and
                  Evgenia Novikova and
                  Igor V. Kotenko},
  editor       = {Wenjuan Li and
                  Steven Furnell and
                  Weizhi Meng},
  title        = {Mapping the Security Events to the {MITRE} {ATT} {\&}CK Attack
                  Patterns to Forecast Attack Propagation (Extended Abstract)},
  booktitle    = {Attacks and Defenses for the Internet-of-Things - 5th International
                  Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13745},
  pages        = {165--176},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-21311-3\_10},
  doi          = {10.1007/978-3-031-21311-3\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/adiot/KryukovZFNK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/Kotenko022,
  author       = {Igor V. Kotenko and
                  Igor Saenko},
  editor       = {Lars Braubach and
                  Kai Jander and
                  Costin Badica},
  title        = {Applying Machine Learning Methods to Detect Abnormal User Behavior
                  in a University Data Center},
  booktitle    = {Intelligent Distributed Computing XV, 15th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2022, Virtual Event /
                  Bremen, Germany, 14-15 September 2022},
  series       = {Studies in Computational Intelligence},
  volume       = {1089},
  pages        = {13--22},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29104-3\_2},
  doi          = {10.1007/978-3-031-29104-3\_2},
  timestamp    = {Mon, 15 Apr 2024 16:13:56 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/Kotenko022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/GaifulinaBLDK22,
  author       = {Diana Gaifulina and
                  Alexander Branitskiy and
                  Dmitry Levshun and
                  Elena Doynikova and
                  Igor V. Kotenko},
  editor       = {Lars Braubach and
                  Kai Jander and
                  Costin Badica},
  title        = {Sentiment Analysis of Social Network Posts for Detecting Potentially
                  Destructive Impacts},
  booktitle    = {Intelligent Distributed Computing XV, 15th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2022, Virtual Event /
                  Bremen, Germany, 14-15 September 2022},
  series       = {Studies in Computational Intelligence},
  volume       = {1089},
  pages        = {203--212},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29104-3\_23},
  doi          = {10.1007/978-3-031-29104-3\_23},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/GaifulinaBLDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meco/MeleshkoDK22,
  author       = {Alexey Meleshko and
                  Vasily Desnitsky and
                  Igor V. Kotenko},
  title        = {Simulation-based and Graph oriented Approach to Detection of Network
                  Attacks},
  booktitle    = {11th Mediterranean Conference on Embedded Computing, {MECO} 2022,
                  Budva, Montenegro, June 7-10, 2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MECO55406.2022.9797159},
  doi          = {10.1109/MECO55406.2022.9797159},
  timestamp    = {Fri, 01 Jul 2022 09:09:18 +0200},
  biburl       = {https://dblp.org/rec/conf/meco/MeleshkoDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KuznetsovNK22,
  author       = {Mikhail Kuznetsov and
                  Evgenia Novikova and
                  Igor V. Kotenko},
  editor       = {Arturo Gonz{\'{a}}lez{-}Escribano and
                  Jos{\'{e}} Daniel Garc{\'{\i}}a and
                  Massimo Torquati and
                  Amund Skavhaug},
  title        = {An approach to formal desription of the user notification scenarios
                  in privacy policies},
  booktitle    = {30th Euromicro International Conference on Parallel, Distributed and
                  Network-based Processing, {PDP} 2022, Valladolid, Spain, March 9-11,
                  2022},
  pages        = {275--282},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PDP55904.2022.00049},
  doi          = {10.1109/PDP55904.2022.00049},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/KuznetsovNK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/SaenkoK22,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Arturo Gonz{\'{a}}lez{-}Escribano and
                  Jos{\'{e}} Daniel Garc{\'{\i}}a and
                  Massimo Torquati and
                  Amund Skavhaug},
  title        = {Towards Resilient and Efficient Big Data Storage: Evaluating a {SIEM}
                  Repository Based on {HDFS}},
  booktitle    = {30th Euromicro International Conference on Parallel, Distributed and
                  Network-based Processing, {PDP} 2022, Valladolid, Spain, March 9-11,
                  2022},
  pages        = {290--297},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/PDP55904.2022.00051},
  doi          = {10.1109/PDP55904.2022.00051},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/SaenkoK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisec2/2021,
  editor       = {Ilsun You and
                  Hwankuk Kim and
                  Taek{-}Young Youn and
                  Francesco Palmieri and
                  Igor V. Kotenko},
  title        = {Mobile Internet Security - 5th International Symposium, MobiSec 2021,
                  Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1544},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-16-9576-6},
  doi          = {10.1007/978-981-16-9576-6},
  isbn         = {978-981-16-9575-9},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/VitkovaKC21,
  author       = {Lidia Vitkova and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {An Approach to Ranking the Sources of Information Dissemination in
                  Social Networks},
  journal      = {Inf.},
  volume       = {12},
  number       = {10},
  pages        = {416},
  year         = {2021},
  url          = {https://doi.org/10.3390/info12100416},
  doi          = {10.3390/INFO12100416},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/VitkovaKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/BuinevichIKK21,
  author       = {Mikhail V. Buinevich and
                  Konstantin E. Izrailov and
                  Igor V. Kotenko and
                  Pavel A. Kurta},
  title        = {Method and algorithms of visual audit of program interaction},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {16--43},
  year         = {2021},
  url          = {https://doi.org/10.22667/JISIS.2021.02.28.016},
  doi          = {10.22667/JISIS.2021.02.28.016},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/BuinevichIKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KolomeetsCK21,
  author       = {Maxim Kolomeets and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Bot detection by friends graph in social networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {2},
  pages        = {141--159},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.06.30.141},
  doi          = {10.22667/JOWUA.2021.06.30.141},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KolomeetsCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/KotenkoKUI21,
  author       = {Igor V. Kotenko and
                  Andrey V. Krasov and
                  Igor Ushakov and
                  Konstantin E. Izrailov},
  title        = {An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database},
  journal      = {J. Sens. Actuator Networks},
  volume       = {10},
  number       = {2},
  pages        = {25},
  year         = {2021},
  url          = {https://doi.org/10.3390/jsan10020025},
  doi          = {10.3390/JSAN10020025},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsan/KotenkoKUI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/LevshunKC21,
  author       = {Dmitry Levshun and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {The application of the methodology for secure cyber-physical systems
                  design to improve the semi-natural model of the railway infrastructure},
  journal      = {Microprocess. Microsystems},
  volume       = {87},
  pages        = {103482},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.micpro.2020.103482},
  doi          = {10.1016/J.MICPRO.2020.103482},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/LevshunKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LevshunCK21,
  author       = {Dmitry Levshun and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Design of Secure Microcontroller-Based Systems: Application to Mobile
                  Robots for Perimeter Monitoring},
  journal      = {Sensors},
  volume       = {21},
  number       = {24},
  pages        = {8451},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21248451},
  doi          = {10.3390/S21248451},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LevshunCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/DesnitskyK21,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko},
  title        = {Simulation and assessment of battery depletion attacks on unmanned
                  aerial vehicles for crisis management infrastructures},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {107},
  pages        = {102244},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.simpat.2020.102244},
  doi          = {10.1016/J.SIMPAT.2020.102244},
  timestamp    = {Sat, 09 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/simpra/DesnitskyK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/KaratzaK21,
  author       = {Helen D. Karatza and
                  Igor V. Kotenko},
  title        = {Guest Editors' Introduction "Modeling and Simulation for Intelligent
                  Distributed Computing"},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {109},
  pages        = {102297},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.simpat.2021.102297},
  doi          = {10.1016/J.SIMPAT.2021.102297},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpra/KaratzaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/BranitskiyKS21,
  author       = {Alexander Branitskiy and
                  Igor V. Kotenko and
                  Igor Saenko},
  title        = {Applying machine learning and parallel data processing for attack
                  detection in IoT},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {1642--1653},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETC.2020.3006351},
  doi          = {10.1109/TETC.2020.3006351},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/BranitskiyKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DoynikovaNMKGTL21,
  author       = {Elena Doynikova and
                  Evgenia Novikova and
                  Ivan Murenin and
                  Maxim Kolomeec and
                  Diana Gaifulina and
                  Olga Tushkanova and
                  Dmitry Levshun and
                  Alexey Meleshko and
                  Igor V. Kotenko},
  editor       = {Sokratis K. Katsikas and
                  Costas Lambrinoudakis and
                  Nora Cuppens and
                  John Mylopoulos and
                  Christos Kalloniatis and
                  Weizhi Meng and
                  Steven Furnell and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge},
  title        = {Security Measuring System for IoT Devices},
  booktitle    = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS,
                  SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt,
                  Germany, October 4-8, 2021, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13106},
  pages        = {256--275},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95484-0\_16},
  doi          = {10.1007/978-3-030-95484-0\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DoynikovaNMKGTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/KotenkoSB21,
  author       = {Igor V. Kotenko and
                  Yash Sharma and
                  Alexander Branitskiy},
  title        = {Predicting the Mental State of the Social Network Users based on the
                  Latent Dirichlet Allocation and fastText},
  booktitle    = {2021 11th {IEEE} International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications (IDAACS),
                  Cracow, Poland, September 22-25, 2021},
  pages        = {191--195},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IDAACS53288.2021.9661061},
  doi          = {10.1109/IDAACS53288.2021.9661061},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idaacs/KotenkoSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/UshakovDNK21,
  author       = {Roman Ushakov and
                  Elena Doynikova and
                  Evgenia Novikova and
                  Igor V. Kotenko},
  title        = {{CPE} and {CVE} based Technique for Software Security Risk Assessment},
  booktitle    = {2021 11th {IEEE} International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications (IDAACS),
                  Cracow, Poland, September 22-25, 2021},
  pages        = {353--356},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IDAACS53288.2021.9660968},
  doi          = {10.1109/IDAACS53288.2021.9660968},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idaacs/UshakovDNK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/LevshunCK21,
  author       = {Dmitry Levshun and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  editor       = {David Camacho and
                  Domenico Rosaci and
                  Giuseppe M. L. Sarn{\'{e}} and
                  Mario Versaci},
  title        = {A Technique for the Design of Abstract Models of Microcontroller-Based
                  Physical Security Systems},
  booktitle    = {Intelligent Distributed Computing XIV, 14th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18
                  September 2021},
  series       = {Studies in Computational Intelligence},
  volume       = {1026},
  pages        = {397--406},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96627-0\_36},
  doi          = {10.1007/978-3-030-96627-0\_36},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/LevshunCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/KotenkoAM021,
  author       = {Igor V. Kotenko and
                  Vladimir Avramenko and
                  Albert Malikov and
                  Igor Saenko},
  editor       = {David Camacho and
                  Domenico Rosaci and
                  Giuseppe M. L. Sarn{\'{e}} and
                  Mario Versaci},
  title        = {An Approach to the Synthesis of a Neural Network System for Diagnosing
                  Computer Incidents},
  booktitle    = {Intelligent Distributed Computing XIV, 14th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18
                  September 2021},
  series       = {Studies in Computational Intelligence},
  volume       = {1026},
  pages        = {407--416},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96627-0\_37},
  doi          = {10.1007/978-3-030-96627-0\_37},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/KotenkoAM021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/KryukovDK21,
  author       = {Roman Kryukov and
                  Elena Doynikova and
                  Igor V. Kotenko},
  editor       = {David Camacho and
                  Domenico Rosaci and
                  Giuseppe M. L. Sarn{\'{e}} and
                  Mario Versaci},
  title        = {Security Analysis of Information Systems Based on Attack Sequences
                  Generation and Testing},
  booktitle    = {Intelligent Distributed Computing XIV, 14th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18
                  September 2021},
  series       = {Studies in Computational Intelligence},
  volume       = {1026},
  pages        = {427--437},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-96627-0\_39},
  doi          = {10.1007/978-3-030-96627-0\_39},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/KryukovDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ihaw/DoynikovaBK21,
  author       = {Elena Doynikova and
                  Alexander Branitskiy and
                  Igor V. Kotenko},
  editor       = {Edwige E. Pissaloux and
                  George Angelos Papadopoulos and
                  Achilleas Achilleos and
                  Ramiro Vel{\'{a}}zquez},
  title        = {Detection and Monitoring of the Destructive Impacts in the Social
                  Networks Using Machine Learning Methods},
  booktitle    = {{ICT} for Health, Accessibility and Wellbeing - First International
                  Conference, {IHAW} 2021, Larnaca, Cyprus, November 8-9, 2021, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1538},
  pages        = {60--65},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-94209-0\_6},
  doi          = {10.1007/978-3-030-94209-0\_6},
  timestamp    = {Tue, 31 May 2022 15:50:21 +0200},
  biburl       = {https://dblp.org/rec/conf/ihaw/DoynikovaBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/meco/MeleshkoDKNS21,
  author       = {Alexey Meleshko and
                  Vasily Desnitsky and
                  Igor V. Kotenko and
                  Evgenia Novikova and
                  Anton Shulepov},
  title        = {Combined Approach to Anomaly Detection in Wireless Sensor Networks
                  on Example of Water Management System},
  booktitle    = {10th Mediterranean Conference on Embedded Computing, {MECO} 2021,
                  Budva, Montenegro, June 7-10, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MECO52532.2021.9460237},
  doi          = {10.1109/MECO52532.2021.9460237},
  timestamp    = {Tue, 06 Jul 2021 12:03:09 +0200},
  biburl       = {https://dblp.org/rec/conf/meco/MeleshkoDKNS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/VorobevaKZK21,
  author       = {Alisa A. Vorobeva and
                  Guldar Khisaeva and
                  Danil Zakoldaev and
                  Igor V. Kotenko},
  editor       = {Ilsun You and
                  Hwankuk Kim and
                  Taek{-}Young Youn and
                  Francesco Palmieri and
                  Igor V. Kotenko},
  title        = {Detection of Business Email Compromise Attacks with Writing Style
                  Analysis},
  booktitle    = {Mobile Internet Security - 5th International Symposium, MobiSec 2021,
                  Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1544},
  pages        = {248--262},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-9576-6\_18},
  doi          = {10.1007/978-981-16-9576-6\_18},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/VorobevaKZK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/IzrailovLKC21,
  author       = {Konstantin E. Izrailov and
                  Dmitry Levshun and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Ilsun You and
                  Hwankuk Kim and
                  Taek{-}Young Youn and
                  Francesco Palmieri and
                  Igor V. Kotenko},
  title        = {Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure
                  Interfaces},
  booktitle    = {Mobile Internet Security - 5th International Symposium, MobiSec 2021,
                  Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1544},
  pages        = {301--319},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-9576-6\_21},
  doi          = {10.1007/978-981-16-9576-6\_21},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/IzrailovLKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/GaifulinaK21,
  author       = {Diana Gaifulina and
                  Igor V. Kotenko},
  title        = {Selection of Deep Neural Network Models for IoT Anomaly Detection
                  Experiments},
  booktitle    = {29th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing, {PDP} 2021, Valladolid, Spain, March 10-12,
                  2021},
  pages        = {260--265},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PDP52278.2021.00049},
  doi          = {10.1109/PDP52278.2021.00049},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/GaifulinaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoSKL21,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Aleksander Kribel and
                  Oleg Lauta},
  title        = {A technique for early detection of cyberattacks using the traffic
                  self-similarity property and a statistical approach},
  booktitle    = {29th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing, {PDP} 2021, Valladolid, Spain, March 10-12,
                  2021},
  pages        = {281--284},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PDP52278.2021.00052},
  doi          = {10.1109/PDP52278.2021.00052},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoSKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rcai/SaenkoKSA21,
  author       = {Igor Saenko and
                  Igor V. Kotenko and
                  Fadey Skorik and
                  Mazen Al{-}Barri},
  editor       = {Sergei M. Kovalev and
                  Sergei O. Kuznetsov and
                  Aleksandr I. Panov},
  title        = {Detecting Anomalous Behavior of Users of Data Centers Based on the
                  Application of Artificial Neural Networks},
  booktitle    = {Artificial Intelligence - 19th Russian Conference, {RCAI} 2021, Taganrog,
                  Russia, October 11-16, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12948},
  pages        = {331--342},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86855-0\_23},
  doi          = {10.1007/978-3-030-86855-0\_23},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rcai/SaenkoKSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KotenkoSLK21,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Oleg Lauta and
                  Mikhail Karpov},
  editor       = {Naghmeh Moradpoor and
                  Atilla El{\c{c}}i and
                  Andrei Petrovski},
  title        = {Situational Control of a Computer Network Security System in Conditions
                  of Cyber Attacks},
  booktitle    = {14th International Conference on Security of Information and Networks,
                  {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SIN54109.2021.9699368},
  doi          = {10.1109/SIN54109.2021.9699368},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/KotenkoSLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/MureninDK21,
  author       = {Ivan Murenin and
                  Elena Doynikova and
                  Igor V. Kotenko},
  editor       = {Naghmeh Moradpoor and
                  Atilla El{\c{c}}i and
                  Andrei Petrovski},
  title        = {Towards Security Decision Support for large-scale Heterogeneous Distributed
                  Information Systems},
  booktitle    = {14th International Conference on Security of Information and Networks,
                  {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SIN54109.2021.9699195},
  doi          = {10.1109/SIN54109.2021.9699195},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/MureninDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/KotenkoLKS21,
  author       = {Igor V. Kotenko and
                  Oleg Lauta and
                  Kseniya Kribel and
                  Igor Saenko},
  editor       = {Hamido Fujita and
                  H{\'{e}}ctor P{\'{e}}rez{-}Meana},
  title        = {{LSTM} Neural Networks for Detecting Anomalies Caused by Web Application
                  Cyber Attacks},
  booktitle    = {New Trends in Intelligent Software Methodologies, Tools and Techniques
                  - Proceedings of the 20th International Conference on New Trends in
                  Intelligent Software Methodologies, Tools and Techniques, SoMeT 202,
                  Cancun, Mexico, 21-23 September, 2021},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {337},
  pages        = {127--140},
  publisher    = {{IOS} Press},
  year         = {2021},
  url          = {https://doi.org/10.3233/FAIA210014},
  doi          = {10.3233/FAIA210014},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/somet/KotenkoLKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wac2/IzrailovBKY21,
  author       = {Konstantin E. Izrailov and
                  Mikhail V. Buinevich and
                  Igor V. Kotenko and
                  Alexander Yaroshenko},
  title        = {Identifying characteristics of software vulnerabilities by their textual
                  description using machine learning},
  booktitle    = {2021 World Automation Congress, {WAC} 2021, Taipei, Taiwan, August
                  1-5, 2021},
  pages        = {186--192},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/WAC50355.2021.9559470},
  doi          = {10.23919/WAC50355.2021.9559470},
  timestamp    = {Thu, 14 Oct 2021 16:58:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wac2/IzrailovBKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aicom/KotenkoVSTB20,
  author       = {Igor V. Kotenko and
                  Lidiya Vitkova and
                  Igor Saenko and
                  Olga Tushkanova and
                  Alexander Branitskiy},
  title        = {The intelligent system for detection and counteraction of malicious
                  and inappropriate information on the Internet},
  journal      = {{AI} Commun.},
  volume       = {33},
  number       = {1},
  pages        = {13--25},
  year         = {2020},
  url          = {https://doi.org/10.3233/AIC-200647},
  doi          = {10.3233/AIC-200647},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aicom/KotenkoVSTB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/FakihBK20,
  author       = {Bilal Fakih and
                  Didier El Baz and
                  Igor V. Kotenko},
  title        = {{GRIDHPC:} {A} decentralized environment for high performance computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {10},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5320},
  doi          = {10.1002/CPE.5320},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/FakihBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/MerelliLKD20,
  author       = {Ivan Merelli and
                  Pietro Li{\`{o}} and
                  Igor V. Kotenko and
                  Daniele D'Agostino},
  title        = {Latest advances in parallel, distributed, and network-based processing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {10},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5683},
  doi          = {10.1002/CPE.5683},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/MerelliLKD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/DoynikovaNK20,
  author       = {Elena Doynikova and
                  Evgenia Novikova and
                  Igor V. Kotenko},
  title        = {Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis:
                  {A} Comparative Review and Prospects},
  journal      = {Inf.},
  volume       = {11},
  number       = {3},
  pages        = {168},
  year         = {2020},
  url          = {https://doi.org/10.3390/info11030168},
  doi          = {10.3390/INFO11030168},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/information/DoynikovaNK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GranadilloDGKF20,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Elena Doynikova and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Igor V. Kotenko and
                  Andrey Fedorchenko},
  title        = {Stateful RORI-based countermeasure selection using hypergraphs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102541},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102541},
  doi          = {10.1016/J.JISA.2020.102541},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/GranadilloDGKF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/GranadilloDGKF20a,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Elena Doynikova and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a and
                  Igor V. Kotenko and
                  Andrey Fedorchenko},
  title        = {Stateful RORI-based countermeasure selection using hypergraphs},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102562},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102562},
  doi          = {10.1016/J.JISA.2020.102562},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/GranadilloDGKF20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DoynikovaFK20,
  author       = {Elena Doynikova and
                  Andrey Fedorchenko and
                  Igor V. Kotenko},
  title        = {A Semantic Model for Security Evaluation of Information Systems},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {9},
  number       = {2},
  pages        = {301--330},
  year         = {2020},
  url          = {https://doi.org/10.13052/jcsm2245-1439.925},
  doi          = {10.13052/JCSM2245-1439.925},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DoynikovaFK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kotenko20,
  author       = {Igor V. Kotenko},
  title        = {Guest Editorial: Intelligent Distributed Computing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {1--2},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.001},
  doi          = {10.22667/JOWUA.2020.06.30.001},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kotenko20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/FenzlRCDK20,
  author       = {Florian Fenzl and
                  Roland Rieke and
                  Yannick Chevalier and
                  Andreas Dominik and
                  Igor V. Kotenko},
  title        = {Continuous fields: Enhanced in-vehicle anomaly detection using machine
                  learning models},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {105},
  pages        = {102143},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.simpat.2020.102143},
  doi          = {10.1016/J.SIMPAT.2020.102143},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpra/FenzlRCDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/LevshunCKC20,
  author       = {Dmitry Levshun and
                  Yannick Chevalier and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {Design and verification of a mobile robot based on the integrated
                  model of cyber-Physical systems},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {105},
  pages        = {102151},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.simpat.2020.102151},
  doi          = {10.1016/J.SIMPAT.2020.102151},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/simpra/LevshunCKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/DoynikovaNGK20,
  author       = {Elena Doynikova and
                  Evgenia Novikova and
                  Diana Gaifulina and
                  Igor V. Kotenko},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jean Leneutre and
                  Nora Cuppens and
                  Reda Yaich},
  title        = {Towards Attacker Attribution for Risk Analysis},
  booktitle    = {Risks and Security of Internet and Systems - 15th International Conference,
                  CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12528},
  pages        = {347--353},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68887-5\_22},
  doi          = {10.1007/978-3-030-68887-5\_22},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crisis/DoynikovaNGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NovikovaDK20,
  author       = {Evgenia Novikova and
                  Elena Doynikova and
                  Igor V. Kotenko},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Weizhi Meng and
                  Steven Furnell},
  title        = {P2Onto: Making Privacy Policies Transparent},
  booktitle    = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS,
                  SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12501},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64330-0\_15},
  doi          = {10.1007/978-3-030-64330-0\_15},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/NovikovaDK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfnds/KotenkoKUI20,
  author       = {Igor V. Kotenko and
                  Andrey V. Krasov and
                  Igor Ushakov and
                  Konstantin E. Izrailov},
  title        = {Detection of Stego-Insiders in Corporate Networks Based on a Hybrid
                  NoSQL Database Model},
  booktitle    = {{ICFNDS} '20: The 4th International Conference on Future Networks
                  and Distributed Systems, St. Petersburg, Russia, 26-27 November, 2020},
  pages        = {19:1--19:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3440749.3442612},
  doi          = {10.1145/3440749.3442612},
  timestamp    = {Fri, 28 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfnds/KotenkoKUI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfnds/BuinevichIKUV20,
  author       = {Mikhail V. Buinevich and
                  Konstantin E. Izrailov and
                  Igor V. Kotenko and
                  Igor Ushakov and
                  Dmitry Vlasov},
  title        = {Approach to combining different methods for detecting insiders},
  booktitle    = {{ICFNDS} '20: The 4th International Conference on Future Networks
                  and Distributed Systems, St. Petersburg, Russia, 26-27 November, 2020},
  pages        = {26:1--26:6},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3440749.3442619},
  doi          = {10.1145/3440749.3442619},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfnds/BuinevichIKUV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icstcc/KotenkoBTD20,
  author       = {Igor V. Kotenko and
                  Alexander Branitskiy and
                  Artem Tishkov and
                  Elena Doynikova},
  editor       = {Lucian{-}Florentin Barbulescu},
  title        = {Analysis of Formats of Young People's Communicative Behavior in Social
                  Network},
  booktitle    = {24th International Conference on System Theory, Control and Computing,
                  {ICSTCC} 2020, Sinaia, Romania, October 8-10, 2020},
  pages        = {439--444},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICSTCC50638.2020.9259747},
  doi          = {10.1109/ICSTCC50638.2020.9259747},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icstcc/KotenkoBTD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/inista/ParashchukDSK20,
  author       = {Igor Parashchuk and
                  Elena Doynikova and
                  Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Mirjana Ivanovic and
                  Tulay Yildirim and
                  Goce Trajcevski and
                  Costin Badica and
                  Ladjel Bellatreche and
                  Igor V. Kotenko and
                  Amelia Badica and
                  Burcu Erkmen and
                  Milos Savic},
  title        = {Selection of Countermeasures against Harmful Information based on
                  the Assessment of Semantic Content of Information Objects in the Conditions
                  of Uncertainty},
  booktitle    = {International Conference on INnovations in Intelligent SysTems and
                  Applications, {INISTA} 2020, Novi Sad, Serbia, August 24-26, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INISTA49547.2020.9194680},
  doi          = {10.1109/INISTA49547.2020.9194680},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/inista/ParashchukDSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/PrivalovSKS20,
  author       = {Andrei Privalov and
                  Ekaterina Skudneva and
                  Igor V. Kotenko and
                  Igor Saenko},
  title        = {Graph-based evaluation of probability of disclosing the network structure
                  by targeted attacks},
  booktitle    = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium,
                  Budapest, Hungary, April 20-24, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/NOMS47738.2020.9110299},
  doi          = {10.1109/NOMS47738.2020.9110299},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/noms/PrivalovSKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KolomeetsCZKG20,
  author       = {Maxim Kolomeets and
                  Andrey Chechulin and
                  Ksenia Zhernova and
                  Igor V. Kotenko and
                  Diana Gaifulina},
  title        = {Augmented reality for visualizing security data for cybernetic and
                  cyberphysical systems},
  booktitle    = {28th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing, {PDP} 2020, V{\"{a}}ster{\aa}s, Sweden,
                  March 11-13, 2020},
  pages        = {421--428},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/PDP50117.2020.00071},
  doi          = {10.1109/PDP50117.2020.00071},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/KolomeetsCZKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoSS20,
  author       = {Igor V. Kotenko and
                  Yury Sineshchuk and
                  Igor Saenko},
  title        = {Optimizing Secure Information Interaction in Distributed Computing
                  Systems by the Sequential Concessions Method},
  booktitle    = {28th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing, {PDP} 2020, V{\"{a}}ster{\aa}s, Sweden,
                  March 11-13, 2020},
  pages        = {429--432},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/PDP50117.2020.00072},
  doi          = {10.1109/PDP50117.2020.00072},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KalameyetsLSCK20,
  author       = {Maksim Kalameyets and
                  Dmitry Levshun and
                  Sergei Soloviev and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  editor       = {Siddika Berna {\"{O}}rs and
                  Atilla El{\c{c}}i},
  title        = {Social networks bot detection using Benford's law},
  booktitle    = {{SIN} 2020: 13th International Conference on Security of Information
                  and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020},
  pages        = {19:1--19:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3433174.3433589},
  doi          = {10.1145/3433174.3433589},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/KalameyetsLSCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KotenkoSS20,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Fadey Skorik},
  editor       = {Siddika Berna {\"{O}}rs and
                  Atilla El{\c{c}}i},
  title        = {Intelligent support for network administrator decisions based on combined
                  neural networks},
  booktitle    = {{SIN} 2020: 13th International Conference on Security of Information
                  and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020},
  pages        = {31:1--31:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3433174.3433602},
  doi          = {10.1145/3433174.3433602},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/KotenkoSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isrl/KotenkoSB20,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Alexander Branitskiy},
  editor       = {Leslie F. Sikos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Machine Learning and Big Data Processing for Cybersecurity Data Analysis},
  booktitle    = {Data Science in Cybersecurity and Cyberthreat Intelligence},
  series       = {Intelligent Systems Reference Library},
  volume       = {177},
  pages        = {61--85},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38788-4\_4},
  doi          = {10.1007/978-3-030-38788-4\_4},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/isrl/KotenkoSB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/idc/2019,
  editor       = {Igor V. Kotenko and
                  Costin Badica and
                  Vasily Desnitsky and
                  Didier El Baz and
                  Mirjana Ivanovic},
  title        = {Intelligent Distributed Computing XIII, 13th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg,
                  Russia, 7-9 October, 2019},
  series       = {Studies in Computational Intelligence},
  volume       = {868},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-32258-8},
  doi          = {10.1007/978-3-030-32258-8},
  isbn         = {978-3-030-32257-1},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/inista/2020,
  editor       = {Mirjana Ivanovic and
                  Tulay Yildirim and
                  Goce Trajcevski and
                  Costin Badica and
                  Ladjel Bellatreche and
                  Igor V. Kotenko and
                  Amelia Badica and
                  Burcu Erkmen and
                  Milos Savic},
  title        = {International Conference on INnovations in Intelligent SysTems and
                  Applications, {INISTA} 2020, Novi Sad, Serbia, August 24-26, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9184152/proceeding},
  isbn         = {978-1-7281-6799-2},
  timestamp    = {Wed, 23 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/inista/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisec2/2019,
  editor       = {Ilsun You and
                  Hsing{-}Chung Chen and
                  Fang{-}Yie Leu and
                  Igor V. Kotenko},
  title        = {Mobile Internet Security - 4th International Symposium, MobiSec 2019,
                  Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1121},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-9609-4},
  doi          = {10.1007/978-981-15-9609-4},
  isbn         = {978-981-15-9608-7},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/DoynikovaFK19,
  author       = {Elena Doynikova and
                  Andrey Fedorchenko and
                  Igor V. Kotenko},
  title        = {Detection of Weaknesses in Information Systems for Automatic Selection
                  of Security Actions},
  journal      = {Autom. Control. Comput. Sci.},
  volume       = {53},
  number       = {8},
  pages        = {1029--1037},
  year         = {2019},
  url          = {https://doi.org/10.3103/S014641161908008X},
  doi          = {10.3103/S014641161908008X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/accs/DoynikovaFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/BranitskiyLKDKT19,
  author       = {Alexander Branitskiy and
                  Dmitry Levshun and
                  Natalia Krasilnikova and
                  Elena Doynikova and
                  Igor V. Kotenko and
                  Artem Tishkov and
                  Nina Vanchakova and
                  Andrey Chechulin},
  title        = {Determination of Young Generation's Sensitivity to the Destructive
                  Stimuli based on the Information in Social Networks},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {1--20},
  year         = {2019},
  url          = {https://doi.org/10.22667/JISIS.2019.08.31.001},
  doi          = {10.22667/JISIS.2019.08.31.001},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/BranitskiyLKDKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KolomeetsCK19,
  author       = {Maxim Kolomeets and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Social networks analysis by graph algorithms on the example of the
                  VKontakte social network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {2},
  pages        = {55--75},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.06.30.055},
  doi          = {10.22667/JOWUA.2019.06.30.055},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KolomeetsCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KolomeetsBBCSK19,
  author       = {Maxim Kolomeets and
                  Amira Benachour and
                  Didier El Baz and
                  Andrey Chechulin and
                  Martin Strecker and
                  Igor V. Kotenko},
  title        = {Reference architecture for social networks graph analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {109--125},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.109},
  doi          = {10.22667/JOWUA.2019.12.31.109},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KolomeetsBBCSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/FedorchenkoDK19,
  author       = {Andrey Fedorchenko and
                  Elena Doynikova and
                  Igor V. Kotenko},
  title        = {Determination of System Weaknesses Based on the Analysis of Vulnerability
                  Indexes and the Source Code of Exploits},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {25},
  number       = {9},
  pages        = {1043--1065},
  year         = {2019},
  url          = {http://www.jucs.org/jucs\_25\_9/determination\_of\_system\_weaknesses},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/FedorchenkoDK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/KotenkoSA19,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Sergey Ageev},
  title        = {Hierarchical fuzzy situational networks for online decision-making:
                  Application to telecommunication systems},
  journal      = {Knowl. Based Syst.},
  volume       = {185},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.knosys.2019.104935},
  doi          = {10.1016/J.KNOSYS.2019.104935},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/KotenkoSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DoynikovaFK19,
  author       = {Elena Doynikova and
                  Andrey Fedorchenko and
                  Igor V. Kotenko},
  title        = {Ontology of Metrics for Cyber Security Assessment},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {52:1--52:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3341496},
  doi          = {10.1145/3339252.3341496},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DoynikovaFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NovikovaBK19,
  author       = {Evgenia Novikova and
                  Mikhail Bestuzhev and
                  Igor V. Kotenko},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Weizhi Meng and
                  Steven Furnell and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Anomaly Detection in the {HVAC} System Operation by a RadViz Based
                  Visualization-Driven Approach},
  booktitle    = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS,
                  SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27,
                  2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11980},
  pages        = {402--418},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42048-2\_26},
  doi          = {10.1007/978-3-030-42048-2\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NovikovaBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/SaenkoK19,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Manuel L{\'{o}}pez{-}Ib{\'{a}}{\~{n}}ez and
                  Anne Auger and
                  Thomas St{\"{u}}tzle},
  title        = {A role-base approach and a genetic algorithm for {VLAN} design in
                  large critical infrastructures},
  booktitle    = {Proceedings of the Genetic and Evolutionary Computation Conference
                  Companion, {GECCO} 2019, Prague, Czech Republic, July 13-17, 2019},
  pages        = {1643--1650},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319619.3326853},
  doi          = {10.1145/3319619.3326853},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/SaenkoK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/BranitskiyFKS19,
  author       = {Alexander Branitskiy and
                  Andrey Fedorchenko and
                  Igor V. Kotenko and
                  Igor Saenko},
  title        = {An Approach to Intelligent Distributed Scanning and Analytical Processing
                  of the Internet Inappropriate Information},
  booktitle    = {10th {IEEE} International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications, {IDAACS}
                  2019, Metz, France, September 18-21, 2019},
  pages        = {146--151},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IDAACS.2019.8924380},
  doi          = {10.1109/IDAACS.2019.8924380},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idaacs/BranitskiyFKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/GaifulinaFK19,
  author       = {Diana Gaifulina and
                  Andrey Fedorchenko and
                  Igor V. Kotenko},
  title        = {Network Protocols Determination Based on Raw Data Analysis for Security
                  Assesment under Uncertainty},
  booktitle    = {10th {IEEE} International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications, {IDAACS}
                  2019, Metz, France, September 18-21, 2019},
  pages        = {163--167},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IDAACS.2019.8924349},
  doi          = {10.1109/IDAACS.2019.8924349},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idaacs/GaifulinaFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/BranitskiyDKKLT19,
  author       = {Alexander Branitskiy and
                  Elena Doynikova and
                  Igor V. Kotenko and
                  Natalia Krasilnikova and
                  Dmitry Levshun and
                  Artem Tishkov and
                  Nina Vanchakova},
  editor       = {Igor V. Kotenko and
                  Costin Badica and
                  Vasily Desnitsky and
                  Didier El Baz and
                  Mirjana Ivanovic},
  title        = {The Common Approach to Determination of the Destructive Information
                  Impacts and Negative Personal Tendencies of Young Generation Using
                  the Neural Network Methods for the Internet Content Processing},
  booktitle    = {Intelligent Distributed Computing XIII, 13th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg,
                  Russia, 7-9 October, 2019},
  series       = {Studies in Computational Intelligence},
  volume       = {868},
  pages        = {302--310},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32258-8\_36},
  doi          = {10.1007/978-3-030-32258-8\_36},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/BranitskiyDKKLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/DesnitskyRK19,
  author       = {Vasily Desnitsky and
                  Nikolay Rudavin and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Costin Badica and
                  Vasily Desnitsky and
                  Didier El Baz and
                  Mirjana Ivanovic},
  title        = {Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial
                  Vehicles in Crisis Management Systems},
  booktitle    = {Intelligent Distributed Computing XIII, 13th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg,
                  Russia, 7-9 October, 2019},
  series       = {Studies in Computational Intelligence},
  volume       = {868},
  pages        = {323--332},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32258-8\_38},
  doi          = {10.1007/978-3-030-32258-8\_38},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/DesnitskyRK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/LevshunKC19,
  author       = {Dmitry Levshun and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Igor V. Kotenko and
                  Costin Badica and
                  Vasily Desnitsky and
                  Didier El Baz and
                  Mirjana Ivanovic},
  title        = {The Integrated Model of Secure Cyber-Physical Systems for Their Design
                  and Verification},
  booktitle    = {Intelligent Distributed Computing XIII, 13th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg,
                  Russia, 7-9 October, 2019},
  series       = {Studies in Computational Intelligence},
  volume       = {868},
  pages        = {333--343},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32258-8\_39},
  doi          = {10.1007/978-3-030-32258-8\_39},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/LevshunKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/ChevalierRFCK19,
  author       = {Yannick Chevalier and
                  Roland Rieke and
                  Florian Fenzl and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Costin Badica and
                  Vasily Desnitsky and
                  Didier El Baz and
                  Mirjana Ivanovic},
  title        = {ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection},
  booktitle    = {Intelligent Distributed Computing XIII, 13th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg,
                  Russia, 7-9 October, 2019},
  series       = {Studies in Computational Intelligence},
  volume       = {868},
  pages        = {495--504},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32258-8\_58},
  doi          = {10.1007/978-3-030-32258-8\_58},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/ChevalierRFCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/ZhernovaKKC19,
  author       = {Ksenia Zhernova and
                  Maxim Kolomeets and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Ilsun You and
                  Hsing{-}Chung Chen and
                  Fang{-}Yie Leu and
                  Igor V. Kotenko},
  title        = {Adaptive Touch Interface: Application for Mobile Internet Security},
  booktitle    = {Mobile Internet Security - 4th International Symposium, MobiSec 2019,
                  Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1121},
  pages        = {53--72},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-9609-4\_5},
  doi          = {10.1007/978-981-15-9609-4\_5},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/ZhernovaKKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/LevshunBCK19,
  author       = {Dmitry Levshun and
                  Yurii Bakhtin and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  editor       = {Ilsun You and
                  Hsing{-}Chung Chen and
                  Fang{-}Yie Leu and
                  Igor V. Kotenko},
  title        = {Analysis of Attack Actions on the Railway Infrastructure Based on
                  the Integrated Model},
  booktitle    = {Mobile Internet Security - 4th International Symposium, MobiSec 2019,
                  Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1121},
  pages        = {145--162},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-9609-4\_11},
  doi          = {10.1007/978-981-15-9609-4\_11},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/LevshunBCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/DoynikovaFK19,
  author       = {Elena Doynikova and
                  Andrey Fedorchenko and
                  Igor V. Kotenko},
  title        = {Automated Revealing of Organizational Assets Based on Event Correlation},
  booktitle    = {10th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2019, Canary Islands, Spain, June 24-26, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NTMS.2019.8763843},
  doi          = {10.1109/NTMS.2019.8763843},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/DoynikovaFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ntms/LevshunCKC19,
  author       = {Dmitry Levshun and
                  Andrey Chechulin and
                  Igor V. Kotenko and
                  Yannick Chevalier},
  title        = {Design and Verification Methodology for Secure and Distributed Cyber-Physical
                  Systems},
  booktitle    = {10th {IFIP} International Conference on New Technologies, Mobility
                  and Security, {NTMS} 2019, Canary Islands, Spain, June 24-26, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NTMS.2019.8763814},
  doi          = {10.1109/NTMS.2019.8763814},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ntms/LevshunCKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoSKB19,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Alexey Kushnerevich and
                  Alexander Branitskiy},
  title        = {Attack Detection in IoT Critical Infrastructures: {A} Machine Learning
                  and Big Data Processing Approach},
  booktitle    = {27th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing, {PDP} 2019, Pavia, Italy, February 13-15,
                  2019},
  pages        = {340--347},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EMPDP.2019.8671571},
  doi          = {10.1109/EMPDP.2019.8671571},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoSKB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KolomeetsCKS19,
  author       = {Maxim Kolomeets and
                  Andrey Chechulin and
                  Igor V. Kotenko and
                  Igor Saenko},
  title        = {Access Control Visualization Using Triangular Matrices},
  booktitle    = {27th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing, {PDP} 2019, Pavia, Italy, February 13-15,
                  2019},
  pages        = {348--355},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EMPDP.2019.8671578},
  doi          = {10.1109/EMPDP.2019.8671578},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/KolomeetsCKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KotenkoSSKC19,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Yury Sineshchuk and
                  Valery Kuvatov and
                  Oleg Chudakov},
  editor       = {Oleg B. Makarevich and
                  Dmitry Popov and
                  Ludmila K. Babenko and
                  Pete Burnap and
                  Atilla El{\c{c}}i and
                  Ron Poet and
                  Jaideep Vaidya and
                  Mehmet A. Orgun and
                  Manoj Singh Gaur and
                  Rajveer Singh Shekhawat},
  title        = {Optimization of the cyber security system structure based on accounting
                  of the prevented damage cost},
  booktitle    = {Proceedings of the 12th International Conference on Security of Information
                  and Networks, {SIN} 2019, Sochi, Russian Federation, September 12-15,
                  2019},
  pages        = {7:1--7:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3357613.3357620},
  doi          = {10.1145/3357613.3357620},
  timestamp    = {Mon, 19 Dec 2022 17:02:17 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/KotenkoSSKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KotenkoK19,
  author       = {Igor V. Kotenko and
                  Nikolay Komashinsky},
  editor       = {Oleg B. Makarevich and
                  Dmitry Popov and
                  Ludmila K. Babenko and
                  Pete Burnap and
                  Atilla El{\c{c}}i and
                  Ron Poet and
                  Jaideep Vaidya and
                  Mehmet A. Orgun and
                  Manoj Singh Gaur and
                  Rajveer Singh Shekhawat},
  title        = {Combining spark and snort technologies for detection of network attacks
                  and anomalies: assessment of performance for the big data framework},
  booktitle    = {Proceedings of the 12th International Conference on Security of Information
                  and Networks, {SIN} 2019, Sochi, Russian Federation, September 12-15,
                  2019},
  pages        = {16:1--16:8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3357613.3357630},
  doi          = {10.1145/3357613.3357630},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/KotenkoK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/KotenkoBVS19,
  author       = {Igor V. Kotenko and
                  Pavel Budko and
                  Alexey Vinogradenko and
                  Igor Saenko},
  editor       = {Hamido Fujita and
                  Ali Selamat},
  title        = {An Approach for Intelligent Evaluation of the State of Complex Autonomous
                  Objects Based on the Wavelet Analysis},
  booktitle    = {Advancing Technology Industrialization Through Intelligent Software
                  Methodologies, Tools and Techniques - Proceedings of the 18th International
                  Conference on New Trends in Intelligent Software Methodologies, Tools
                  and Techniques (SoMeT{\_}19), Kuching, Malaysia, 23-25 September 2019},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {318},
  pages        = {25--38},
  publisher    = {{IOS} Press},
  year         = {2019},
  url          = {https://doi.org/10.3233/FAIA190036},
  doi          = {10.3233/FAIA190036},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/somet/KotenkoBVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisec2/2017,
  editor       = {Ilsun You and
                  Hsing{-}Chung Chen and
                  Vishal Sharma and
                  Igor V. Kotenko},
  title        = {Mobile Internet Security - Second International Symposium, MobiSec
                  2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {971},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-13-3732-1},
  doi          = {10.1007/978-981-13-3732-1},
  isbn         = {978-981-13-3731-4},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec2/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KotenkoSB18,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Alexander Branitskiy},
  title        = {Framework for Mobile Internet of Things Security Monitoring Based
                  on Big Data Processing and Machine Learning},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {72714--72723},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2881998},
  doi          = {10.1109/ACCESS.2018.2881998},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KotenkoSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/KotenkoFDC18,
  author       = {Igor V. Kotenko and
                  Andrey Fedorchenko and
                  Elena Doynikova and
                  Andrey Chechulin},
  title        = {An Ontology-based Storage of Security Information},
  journal      = {Inf. Technol. Control.},
  volume       = {47},
  number       = {4},
  pages        = {655--667},
  year         = {2018},
  url          = {https://doi.org/10.5755/j01.itc.47.4.20007},
  doi          = {10.5755/J01.ITC.47.4.20007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itc/KotenkoFDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itl/GranadilloDKG18,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Elena Doynikova and
                  Igor V. Kotenko and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Hypergraph-driven mitigation of cyberattacks},
  journal      = {Internet Technol. Lett.},
  volume       = {1},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/itl2.38},
  doi          = {10.1002/ITL2.38},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itl/GranadilloDKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KotenkoSB18,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Alexander Branitskiy},
  title        = {Applying Big Data Processing and Machine Learning Methods for Mobile
                  Internet of Things Security Monitoring},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {8},
  number       = {3},
  pages        = {54--63},
  year         = {2018},
  url          = {https://doi.org/10.22667/JISIS.2018.08.31.054},
  doi          = {10.22667/JISIS.2018.08.31.054},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/KotenkoSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kotenko18,
  author       = {Igor V. Kotenko},
  title        = {Guest Editorial: Managing Insider Security Threats},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {1},
  pages        = {1--3},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.03.31.001},
  doi          = {10.22667/JOWUA.2018.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kotenko18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KotenkoKCC18,
  author       = {Igor V. Kotenko and
                  Maxim Kolomeets and
                  Andrey Chechulin and
                  Yannick Chevalier},
  title        = {A visual analytics approach for the cyber forensics based on different
                  views of the network traffic},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {2},
  pages        = {57--73},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.06.30.057},
  doi          = {10.22667/JOWUA.2018.06.30.057},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KotenkoKCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/SaenkoK17,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  title        = {Genetic Algorithms for Solving Problems of Access Control Design and
                  Reconfiguration in Computer Networks},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {18},
  number       = {3},
  pages        = {27:1--27:21},
  year         = {2018},
  url          = {https://doi.org/10.1145/3093898},
  doi          = {10.1145/3093898},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/SaenkoK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DoynikovaFK18,
  author       = {Elena Doynikova and
                  Andrey Fedorchenko and
                  Igor V. Kotenko},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Determination of Security Threat Classes on the basis of Vulnerability
                  Analysis for Automated Countermeasure Selection},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {62:1--62:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3233260},
  doi          = {10.1145/3230833.3233260},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DoynikovaFK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BergerRKCK18,
  author       = {Ivo Berger and
                  Roland Rieke and
                  Maxim Kolomeets and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis and
                  John Mylopoulos and
                  Christos Kalloniatis},
  title        = {Comparative Study of Machine Learning Methods for In-Vehicle Intrusion
                  Detection},
  booktitle    = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS
                  2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11387},
  pages        = {85--101},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12786-2\_6},
  doi          = {10.1007/978-3-030-12786-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BergerRKCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/KotenkoKMV18,
  author       = {Igor V. Kotenko and
                  Iuliia Kim and
                  Anastasia Matveeva and
                  Ilya I. Viksnin},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {Image Clustering Method based on Particle Swarm Optimization},
  booktitle    = {Proceedings of the 2018 Federated Conference on Computer Science and
                  Information Systems, FedCSIS 2018, Pozna{\'{n}}, Poland, September
                  9-12, 2018},
  series       = {Annals of Computer Science and Information Systems},
  volume       = {15},
  pages        = {535--544},
  year         = {2018},
  url          = {https://doi.org/10.15439/2018F206},
  doi          = {10.15439/2018F206},
  timestamp    = {Mon, 07 Aug 2023 11:27:04 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/KotenkoKMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/SaenkoK18,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Hern{\'{a}}n E. Aguirre and
                  Keiki Takadama},
  title        = {Genetic algorithms for role mining in critical infrastructure data
                  spaces},
  booktitle    = {Proceedings of the Genetic and Evolutionary Computation Conference
                  Companion, {GECCO} 2018, Kyoto, Japan, July 15-19, 2018},
  pages        = {1688--1695},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205651.3208283},
  doi          = {10.1145/3205651.3208283},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/SaenkoK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icphys/LevshunCK18,
  author       = {Dmitry Levshun and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {A technique for design of secure data transfer environment: Application
                  for {I2C} protocol},
  booktitle    = {{IEEE} Industrial Cyber-Physical Systems, {ICPS} 2018, Saint Petersburg,
                  Russia, May 15-18, 2018},
  pages        = {789--794},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICPHYS.2018.8390807},
  doi          = {10.1109/ICPHYS.2018.8390807},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icphys/LevshunCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icphys/KolomeetsCK18,
  author       = {Maxim Kolomeets and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Visual analysis of {CAN} bus traffic injection using radial bar charts},
  booktitle    = {{IEEE} Industrial Cyber-Physical Systems, {ICPS} 2018, Saint Petersburg,
                  Russia, May 15-18, 2018},
  pages        = {841--846},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICPHYS.2018.8390816},
  doi          = {10.1109/ICPHYS.2018.8390816},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icphys/KolomeetsCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/KotenkoS18,
  author       = {Igor V. Kotenko and
                  Igor Saenko},
  editor       = {Javier Del Ser and
                  Eneko Osaba and
                  Miren Nekane Bilbao and
                  Javier J. S{\'{a}}nchez Medina and
                  Massimo Vecchio and
                  Xin{-}She Yang},
  title        = {Evolutionary Algorithms for Design of Virtual Private Networks},
  booktitle    = {Intelligent Distributed Computing XII, 12th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2018, Bilbao, Spain, 15-17
                  October 2018},
  series       = {Studies in Computational Intelligence},
  volume       = {798},
  pages        = {287--297},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99626-4\_25},
  doi          = {10.1007/978-3-319-99626-4\_25},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/KotenkoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/DesnitskyKR18,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko and
                  Nikolay Rudavin},
  editor       = {Javier Del Ser and
                  Eneko Osaba and
                  Miren Nekane Bilbao and
                  Javier J. S{\'{a}}nchez Medina and
                  Massimo Vecchio and
                  Xin{-}She Yang},
  title        = {Ensuring Availability of Wireless Mesh Networks for Crisis Management},
  booktitle    = {Intelligent Distributed Computing XII, 12th International Symposium
                  on Intelligent Distributed Computing, {IDC} 2018, Bilbao, Spain, 15-17
                  October 2018},
  series       = {Studies in Computational Intelligence},
  volume       = {798},
  pages        = {344--353},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99626-4\_30},
  doi          = {10.1007/978-3-319-99626-4\_30},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/DesnitskyKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotais/KotenkoSA18,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Sergey Ageev},
  title        = {Applying Intelligent Agents for Anomaly Detection of Network Traffic
                  in Internet of Things Networks},
  booktitle    = {{IEEE} International Conference on Internet of Things and Intelligence
                  System, {IOTAIS} 2018, Bali, Indonesia, November 1-3, 2018},
  pages        = {123--129},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IOTAIS.2018.8600867},
  doi          = {10.1109/IOTAIS.2018.8600867},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iotais/KotenkoSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotais/ChechulinK18,
  author       = {Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Application of Image Classification Methods for Protection against
                  Inappropriate Information in the Internet},
  booktitle    = {{IEEE} International Conference on Internet of Things and Intelligence
                  System, {IOTAIS} 2018, Bali, Indonesia, November 1-3, 2018},
  pages        = {167--173},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IOTAIS.2018.8600896},
  doi          = {10.1109/IOTAIS.2018.8600896},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iotais/ChechulinK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoFSK18,
  author       = {Igor V. Kotenko and
                  Andrey Fedorchenko and
                  Igor Saenko and
                  Alexey Kushnerevich},
  editor       = {Ivan Merelli and
                  Pietro Li{\`{o}} and
                  Igor V. Kotenko},
  title        = {Parallelization of Security Event Correlation Based on Accounting
                  of Event Type Links},
  booktitle    = {26th Euromicro International Conference on Parallel, Distributed and
                  Network-based Processing, {PDP} 2018, Cambridge, United Kingdom, March
                  21-23, 2018},
  pages        = {462--469},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PDP2018.2018.00080},
  doi          = {10.1109/PDP2018.2018.00080},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoFSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/DoynikovaK18,
  author       = {Elena Doynikova and
                  Igor V. Kotenko},
  editor       = {Ivan Merelli and
                  Pietro Li{\`{o}} and
                  Igor V. Kotenko},
  title        = {The Multi-Layer Graph Based Technique for Proactive Automatic Response
                  Against Cyber Attacks},
  booktitle    = {26th Euromicro International Conference on Parallel, Distributed and
                  Network-based Processing, {PDP} 2018, Cambridge, United Kingdom, March
                  21-23, 2018},
  pages        = {470--477},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PDP2018.2018.00081},
  doi          = {10.1109/PDP2018.2018.00081},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/DoynikovaK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rndm/KotenkoSL18,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Oleg Lauta},
  title        = {Analytical modeling and assessment of cyber resilience on the base
                  of stochastic networks conversion},
  booktitle    = {10th International Workshop on Resilient Networks Design and Modeling,
                  {RNDM} 2018, Longyearbyen, Svalbard, Norway, August 27-29, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/RNDM.2018.8489830},
  doi          = {10.1109/RNDM.2018.8489830},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rndm/KotenkoSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/BranitskiyK18,
  author       = {Alexander Branitskiy and
                  Igor V. Kotenko},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Software Tool for Testing the Packet Analyzer of Network Attack Detection
                  Systems},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {12:1--12:8},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264488},
  doi          = {10.1145/3264437.3264488},
  timestamp    = {Thu, 17 Sep 2020 10:44:12 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/BranitskiyK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/KotenkoAS18,
  author       = {Igor V. Kotenko and
                  Sergey Ageev and
                  Igor Saenko},
  editor       = {Philipp Reinecke and
                  Naghmeh Moradpoor and
                  George Theodorakopoulos},
  title        = {Implementation of Intelligent Agents for Network Traffic and Security
                  Risk Analysis in Cyber-Physical Systems},
  booktitle    = {Proceedings of the 11th International Conference on Security of Information
                  and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12,
                  2018},
  pages        = {22:1--22:4},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264437.3264487},
  doi          = {10.1145/3264437.3264487},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sin/KotenkoAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socinfo/KotenkoSCDVP18,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Andrey Chechulin and
                  Vasily Desnitsky and
                  Lidia Vitkova and
                  Anton Pronoza},
  editor       = {Steffen Staab and
                  Olessia Koltsova and
                  Dmitry I. Ignatov},
  title        = {Monitoring and Counteraction to Malicious Influences in the Information
                  Space of Social Networks},
  booktitle    = {Social Informatics - 10th International Conference, SocInfo 2018,
                  St. Petersburg, Russia, September 25-28, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11186},
  pages        = {159--167},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01159-8\_15},
  doi          = {10.1007/978-3-030-01159-8\_15},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socinfo/KotenkoSCDVP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/somet/KotenkoSA18,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Sergey Ageev},
  editor       = {Hamido Fujita and
                  Enrique Herrera{-}Viedma},
  title        = {Hierarchical Fuzzy Situational Networks for Online Decision Support
                  in Distributed Cyber-Physical Systems},
  booktitle    = {New Trends in Intelligent Software Methodologies, Tools and Techniques
                  - Proceedings of the 17th International Conference SoMeT{\_}18, Granada,
                  Spain, 26-28 September 2018},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {303},
  pages        = {623--636},
  publisher    = {{IOS} Press},
  year         = {2018},
  url          = {https://doi.org/10.3233/978-1-61499-900-3-623},
  doi          = {10.3233/978-1-61499-900-3-623},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/somet/KotenkoSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ccn/KotenkoDCF18,
  author       = {Igor V. Kotenko and
                  Elena Doynikova and
                  Andrey Chechulin and
                  Andrey Fedorchenko},
  editor       = {Simon Parkinson and
                  Andrew Crampton and
                  Richard Hill},
  title        = {{AI-} and Metrics-Based Vulnerability-Centric Cyber Security Assessment
                  and Countermeasure Selection},
  booktitle    = {Guide to Vulnerability Analysis for Computer Networks and Systems
                  - An Artificial Intelligence Approach},
  series       = {Computer Communications and Networks},
  pages        = {101--130},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-92624-7\_5},
  doi          = {10.1007/978-3-319-92624-7\_5},
  timestamp    = {Sat, 05 Sep 2020 17:42:16 +0200},
  biburl       = {https://dblp.org/rec/series/ccn/KotenkoDCF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobisec2/2016,
  editor       = {Ilsun You and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen and
                  Igor V. Kotenko},
  title        = {Mobile Internet Security - First International Symposium, MobiSec
                  2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {797},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-10-7850-7},
  doi          = {10.1007/978-981-10-7850-7},
  isbn         = {978-981-10-7849-1},
  timestamp    = {Wed, 17 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pdp/2018,
  editor       = {Ivan Merelli and
                  Pietro Li{\`{o}} and
                  Igor V. Kotenko},
  title        = {26th Euromicro International Conference on Parallel, Distributed and
                  Network-based Processing, {PDP} 2018, Cambridge, United Kingdom, March
                  21-23, 2018},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8369619/proceeding},
  isbn         = {978-1-5386-4975-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/KotenkoCK17,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin and
                  Dmitry Komashinsky},
  title        = {Categorisation of web pages for protection against inappropriate content
                  in the internet},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {10},
  number       = {1},
  pages        = {61--71},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJIPT.2017.10003851},
  doi          = {10.1504/IJIPT.2017.10003851},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/KotenkoCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocs/BranitskiyK17,
  author       = {Alexander Branitskiy and
                  Igor V. Kotenko},
  title        = {Hybridization of computational intelligence methods for attack detection
                  in computer networks},
  journal      = {J. Comput. Sci.},
  volume       = {23},
  pages        = {145--156},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jocs.2016.07.010},
  doi          = {10.1016/J.JOCS.2016.07.010},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jocs/BranitskiyK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KotenkoSK17,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Alexey Kushnerevich},
  title        = {Parallel big data processing system for security monitoring in Internet
                  of Things networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {4},
  pages        = {60--74},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.12.31.060},
  doi          = {10.22667/JOWUA.2017.12.31.060},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/KotenkoSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/GranadilloDKG17,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Elena Doynikova and
                  Igor V. Kotenko and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Abdessamad Imine and
                  Jos{\'{e}} M. Fernandez and
                  Jean{-}Yves Marion and
                  Luigi Logrippo and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Attack Graph-Based Countermeasure Selection Using a Stateful Return
                  on Investment Metric},
  booktitle    = {Foundations and Practice of Security - 10th International Symposium,
                  {FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10723},
  pages        = {293--302},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75650-9\_19},
  doi          = {10.1007/978-3-319-75650-9\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/GranadilloDKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fruct/DoynikovaCK17,
  author       = {Elena Doynikova and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Analytical attack modeling and security assessment based on the common
                  vulnerability scoring system},
  booktitle    = {20th Conference of Open Innovations Association, {FRUCT} 2017, St.
                  Petersburg, Russia, April 3-7, 2017},
  pages        = {53--61},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/FRUCT.2017.8071292},
  doi          = {10.23919/FRUCT.2017.8071292},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fruct/DoynikovaCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/SaenkoK17,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Peter A. N. Bosman},
  title        = {Administrating role-based access control by genetic algorithms},
  booktitle    = {Genetic and Evolutionary Computation Conference, Berlin, Germany,
                  July 15-19, 2017, Companion Material Proceedings},
  pages        = {1463--1470},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3067695.3082509},
  doi          = {10.1145/3067695.3082509},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/SaenkoK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/FedorchenkoKB17,
  author       = {Andrey Fedorchenko and
                  Igor V. Kotenko and
                  Didier El Baz},
  title        = {Correlation of security events based on the analysis of structures
                  of event types},
  booktitle    = {9th {IEEE} International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications, {IDAACS}
                  2017, Bucharest, Romania, September 21-23, 2017},
  pages        = {270--276},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IDAACS.2017.8095089},
  doi          = {10.1109/IDAACS.2017.8095089},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idaacs/FedorchenkoKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/LevshunCK17,
  author       = {Dmitry Levshun and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Design lifecycle for secure cyber-physical systems based on embedded
                  devices},
  booktitle    = {9th {IEEE} International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications, {IDAACS}
                  2017, Bucharest, Romania, September 21-23, 2017},
  pages        = {277--282},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IDAACS.2017.8095090},
  doi          = {10.1109/IDAACS.2017.8095090},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idaacs/LevshunCK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/KotenkoCDF17,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin and
                  Elena Doynikova and
                  Andrey Fedorchenko},
  editor       = {Mirjana Ivanovic and
                  Costin Badica and
                  J{\"{u}}rgen Dix and
                  Zoran Jovanovic and
                  Michele Malgeri and
                  Milos Savic},
  title        = {Ontological Hybrid Storage for Security Data},
  booktitle    = {Intelligent Distributed Computing {XI} - Proceedings of the 11th International
                  Symposium on Intelligent Distributed Computing - {IDC} 2017, Belgrade,
                  Serbia, October 11-13, 2017},
  series       = {Studies in Computational Intelligence},
  volume       = {737},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66379-1\_15},
  doi          = {10.1007/978-3-319-66379-1\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/KotenkoCDF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/DesnitskyK17,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko},
  editor       = {Mirjana Ivanovic and
                  Costin Badica and
                  J{\"{u}}rgen Dix and
                  Zoran Jovanovic and
                  Michele Malgeri and
                  Milos Savic},
  title        = {Modeling and Analysis of IoT Energy Resource Exhaustion Attacks},
  booktitle    = {Intelligent Distributed Computing {XI} - Proceedings of the 11th International
                  Symposium on Intelligent Distributed Computing - {IDC} 2017, Belgrade,
                  Serbia, October 11-13, 2017},
  series       = {Studies in Computational Intelligence},
  volume       = {737},
  pages        = {263--270},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66379-1\_23},
  doi          = {10.1007/978-3-319-66379-1\_23},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/DesnitskyK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KolomeecGDCKD17,
  author       = {Maxim Kolomeec and
                  Gustavo {Gonzalez Granadillo} and
                  Elena Doynikova and
                  Andrey Chechulin and
                  Igor V. Kotenko and
                  Herv{\'{e}} Debar},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Choosing Models for Security Metrics Visualization},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {75--87},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_7},
  doi          = {10.1007/978-3-319-65127-9\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KolomeecGDCKD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BranitskiyK17,
  author       = {Alexander Branitskiy and
                  Igor V. Kotenko},
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Network Anomaly Detection Based on an Ensemble of Adaptive Binary
                  Classifiers},
  booktitle    = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9\_12},
  doi          = {10.1007/978-3-319-65127-9\_12},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BranitskiyK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/BranitskiyK17,
  author       = {Alexander Branitskiy and
                  Igor V. Kotenko},
  editor       = {Ilsun You and
                  Hsing{-}Chung Chen and
                  Vishal Sharma and
                  Igor V. Kotenko},
  title        = {Attack Detection in Mobile Internet and Networks Using the Graph-Based
                  Schemes for Combining the Support Vector Machines},
  booktitle    = {Mobile Internet Security - Second International Symposium, MobiSec
                  2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {971},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-13-3732-1\_1},
  doi          = {10.1007/978-981-13-3732-1\_1},
  timestamp    = {Mon, 22 Jun 2020 17:42:58 +0200},
  biburl       = {https://dblp.org/rec/conf/mobisec2/BranitskiyK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/KolomeetsCKS17,
  author       = {Maxim Kolomeets and
                  Andrey Chechulin and
                  Igor V. Kotenko and
                  Martin Strecker},
  editor       = {Ilsun You and
                  Hsing{-}Chung Chen and
                  Vishal Sharma and
                  Igor V. Kotenko},
  title        = {Voronoi Maps for Planar Sensor Networks Visualization},
  booktitle    = {Mobile Internet Security - Second International Symposium, MobiSec
                  2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {971},
  pages        = {96--109},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-13-3732-1\_7},
  doi          = {10.1007/978-981-13-3732-1\_7},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/KolomeetsCKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/SaenkoKK17,
  author       = {Igor Saenko and
                  Igor V. Kotenko and
                  Alexey Kushnerevich},
  editor       = {Igor V. Kotenko and
                  Yiannis Cotronis and
                  Masoud Daneshtalab},
  title        = {Parallel Processing of Big Heterogeneous Data for Security Monitoring
                  of IoT Networks},
  booktitle    = {25th Euromicro International Conference on Parallel, Distributed and
                  Network-based Processing, {PDP} 2017, St. Petersburg, Russia, March
                  6-8, 2017},
  pages        = {329--336},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PDP.2017.45},
  doi          = {10.1109/PDP.2017.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/SaenkoKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/DoynikovaK17,
  author       = {Elena Doynikova and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Yiannis Cotronis and
                  Masoud Daneshtalab},
  title        = {CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness
                  and Countermeasure Selection},
  booktitle    = {25th Euromicro International Conference on Parallel, Distributed and
                  Network-based Processing, {PDP} 2017, St. Petersburg, Russia, March
                  6-8, 2017},
  pages        = {346--353},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PDP.2017.44},
  doi          = {10.1109/PDP.2017.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/DoynikovaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/DoynikovaK17,
  author       = {Elena Doynikova and
                  Igor V. Kotenko},
  title        = {Enhancement of probabilistic attack graphs for accurate cyber security
                  monitoring},
  booktitle    = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco,
                  CA, USA, August 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/UIC-ATC.2017.8397618},
  doi          = {10.1109/UIC-ATC.2017.8397618},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/DoynikovaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/KotenkoKU17,
  author       = {Igor V. Kotenko and
                  Artem Kuleshov and
                  Igor Ushakov},
  title        = {Aggregation of elastic stack instruments for collecting, storing and
                  processing of security information and events},
  booktitle    = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco,
                  CA, USA, August 4-8, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/UIC-ATC.2017.8397627},
  doi          = {10.1109/UIC-ATC.2017.8397627},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/KotenkoKU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2017,
  editor       = {Jacek Rak and
                  John Bay and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin and
                  Krzysztof Szczypiorski},
  title        = {Computer Network Security - 7th International Conference on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10446},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65127-9},
  doi          = {10.1007/978-3-319-65127-9},
  isbn         = {978-3-319-65126-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pdp/2017,
  editor       = {Igor V. Kotenko and
                  Yiannis Cotronis and
                  Masoud Daneshtalab},
  title        = {25th Euromicro International Conference on Parallel, Distributed and
                  Network-based Processing, {PDP} 2017, St. Petersburg, Russia, March
                  6-8, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7908435/proceeding},
  isbn         = {978-1-5090-6058-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/DesnitskyK16,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko},
  title        = {Automated design, verification and testing of secure systems with
                  embedded devices based on elicitation of expert knowledge},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {7},
  number       = {5},
  pages        = {705--719},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12652-016-0371-6},
  doi          = {10.1007/S12652-016-0371-6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/DesnitskyK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KolomeecCPK16,
  author       = {Maxim Kolomeec and
                  Andrey Chechulin and
                  Anton Pronoza and
                  Igor V. Kotenko},
  title        = {Technique of Data Visualization: Example of Network Topology Display
                  for Security Monitoring},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {58--78},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.058},
  doi          = {10.22667/JOWUA.2016.03.31.058},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KolomeecCPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kotenko16,
  author       = {Igor V. Kotenko},
  title        = {Guest Editorial: Advances in Secure Distributed and Network-Based
                  Computing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.001},
  doi          = {10.22667/JOWUA.2016.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kotenko16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DesnitskyLCK16,
  author       = {Vasily Desnitsky and
                  Dmitry Levshun and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Design Technique for Secure Embedded Devices: Application for Creation
                  of Integrated Cyber-Physical Security System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {60--80},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.060},
  doi          = {10.22667/JOWUA.2016.06.31.060},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/DesnitskyLCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KolomeetsCK16,
  author       = {Maxim Kolomeets and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  editor       = {Francesco Buccafurri and
                  Andreas Holzinger and
                  Peter Kieseberg and
                  A Min Tjoa and
                  Edgar R. Weippl},
  title        = {Visualization Model for Monitoring of Computer Networks Security Based
                  on the Analogue of Voronoi Diagrams},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2016, and Workshop on Privacy Aware Machine Learning for Health Data
                  Science, {PAML} 2016, Salzburg, Austria, August 31 - September 2,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9817},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45507-5\_10},
  doi          = {10.1007/978-3-319-45507-5\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KolomeetsCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecai/SaenkoK16,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  title        = {Using Genetic Algorithms for Design and Reconfiguration of {RBAC}
                  Schemes},
  booktitle    = {Proceedings of the 1st International Workshop on {AI} for Privacy
                  and Security, PrAISe@ECAI 2016, The Hague, Netherlands, August 29-30,
                  2016},
  pages        = {4:1--4:9},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2970030.2970033},
  doi          = {10.1145/2970030.2970033},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecai/SaenkoK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/SaenkoAK16,
  author       = {Igor Saenko and
                  Sergey Ageev and
                  Igor V. Kotenko},
  editor       = {Costin Badica and
                  Amal El Fallah Seghrouchni and
                  Aur{\'{e}}lie Beynier and
                  David Camacho and
                  C{\'{e}}dric Herpson and
                  Koen V. Hindriks and
                  Paulo Novais},
  title        = {Detection of traffic anomalies in multi-service networks based on
                  a fuzzy logical inference},
  booktitle    = {Intelligent Distributed Computing {X} - Proceedings of the 10th International
                  Symposium on Intelligent Distributed Computing - {IDC} 2016, Paris,
                  France, October 10-12 2016},
  series       = {Studies in Computational Intelligence},
  volume       = {678},
  pages        = {79--88},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48829-5\_8},
  doi          = {10.1007/978-3-319-48829-5\_8},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/SaenkoAK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/SaenkoK16,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Costin Badica and
                  Amal El Fallah Seghrouchni and
                  Aur{\'{e}}lie Beynier and
                  David Camacho and
                  C{\'{e}}dric Herpson and
                  Koen V. Hindriks and
                  Paulo Novais},
  title        = {Reconfiguration of {RBAC} schemes by genetic algorithms},
  booktitle    = {Intelligent Distributed Computing {X} - Proceedings of the 10th International
                  Symposium on Intelligent Distributed Computing - {IDC} 2016, Paris,
                  France, October 10-12 2016},
  series       = {Studies in Computational Intelligence},
  volume       = {678},
  pages        = {89--98},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48829-5\_9},
  doi          = {10.1007/978-3-319-48829-5\_9},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/SaenkoK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isnn/SaenkoSK16,
  author       = {Igor Saenko and
                  Fadey Skorik and
                  Igor V. Kotenko},
  editor       = {Long Cheng and
                  Qingshan Liu and
                  Andrey Ronzhin},
  title        = {Application of Hybrid Neural Networks for Monitoring and Forecasting
                  Computer Networks States},
  booktitle    = {Advances in Neural Networks - {ISNN} 2016 - 13th International Symposium
                  on Neural Networks, {ISNN} 2016, St. Petersburg, Russia, July 6-8,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9719},
  pages        = {521--530},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40663-3\_60},
  doi          = {10.1007/978-3-319-40663-3\_60},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isnn/SaenkoSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/DoynikovaK16,
  author       = {Elena Doynikova and
                  Igor V. Kotenko},
  editor       = {Ilsun You and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen and
                  Igor V. Kotenko},
  title        = {An Automated Graph Based Approach to Risk Assessment for Computer
                  Networks with Mobile Components},
  booktitle    = {Mobile Internet Security - First International Symposium, MobiSec
                  2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {797},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-981-10-7850-7\_9},
  doi          = {10.1007/978-981-10-7850-7\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/DoynikovaK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/KotenkoSLK16,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Oleg Lauta and
                  Mikhail Kocinyak},
  editor       = {Ilsun You and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen and
                  Igor V. Kotenko},
  title        = {Assessment of Computer Network Resilience Under Impact of Cyber Attacks
                  on the Basis of Stochastic Networks Conversion},
  booktitle    = {Mobile Internet Security - First International Symposium, MobiSec
                  2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {797},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-981-10-7850-7\_10},
  doi          = {10.1007/978-981-10-7850-7\_10},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/KotenkoSLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoD16,
  author       = {Igor V. Kotenko and
                  Elena Doynikova},
  title        = {Dynamical Calculation of Security Metrics for Countermeasure Selection
                  in Computer Networks},
  booktitle    = {24th Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2016, Heraklion, Crete, Greece,
                  February 17-19, 2016},
  pages        = {558--565},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/PDP.2016.96},
  doi          = {10.1109/PDP.2016.96},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/DesnitskyCKLK16,
  author       = {Vasily Desnitsky and
                  Andrey Chechulin and
                  Igor V. Kotenko and
                  Dmitry Levshun and
                  Maxim Kolomeec},
  title        = {Application of a Technique for Secure Embedded Device Design Based
                  on Combining Security Components for Creation of a Perimeter Protection
                  System},
  booktitle    = {24th Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2016, Heraklion, Crete, Greece,
                  February 17-19, 2016},
  pages        = {609--616},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/PDP.2016.99},
  doi          = {10.1109/PDP.2016.99},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/DesnitskyCKLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/KotenkoS16,
  author       = {Igor V. Kotenko and
                  Igor Saenko},
  title        = {An Approach to Aggregation of Security Events in Internet-of-Things
                  Networks Based on Genetic Optimization},
  booktitle    = {2016 Intl {IEEE} Conferences on Ubiquitous Intelligence {\&} Computing,
                  Advanced and Trusted Computing, Scalable Computing and Communications,
                  Cloud and Big Data Computing, Internet of People, and Smart World
                  Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France,
                  July 18-21, 2016},
  pages        = {657--664},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0109},
  doi          = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP-SMARTWORLD.2016.0109},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/KotenkoS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/DesnitskiiK15,
  author       = {V. A. Desnitskii and
                  Igor V. Kotenko},
  title        = {Design and verification of protected systems with integrated devices
                  based on expert knowledge},
  journal      = {Autom. Control. Comput. Sci.},
  volume       = {49},
  number       = {8},
  pages        = {648--652},
  year         = {2015},
  url          = {https://doi.org/10.3103/S0146411615080246},
  doi          = {10.3103/S0146411615080246},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/accs/DesnitskiiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/accs/ChechulinK15,
  author       = {Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Attack tree-based approach for real-time security event processing},
  journal      = {Autom. Control. Comput. Sci.},
  volume       = {49},
  number       = {8},
  pages        = {701--704},
  year         = {2015},
  url          = {https://doi.org/10.3103/S0146411615080052},
  doi          = {10.3103/S0146411615080052},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/accs/ChechulinK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbic/KotenkoS15,
  author       = {Igor V. Kotenko and
                  Igor Saenko},
  title        = {Improved genetic algorithms for solving the optimisation tasks for
                  design of access control schemes in computer networks},
  journal      = {Int. J. Bio Inspired Comput.},
  volume       = {7},
  number       = {2},
  pages        = {98--110},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJBIC.2015.069291},
  doi          = {10.1504/IJBIC.2015.069291},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijbic/KotenkoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KolomeecCK15,
  author       = {Maxim Kolomeec and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Methodological Primitives for Phased Construction of Data Visualization
                  Models},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {60--84},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.11.31.060},
  doi          = {10.22667/JISIS.2015.11.31.060},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KolomeecCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kotenko15,
  author       = {Igor V. Kotenko},
  title        = {Guest Editorial: Security in Distributed and Network-Based Computing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {1--3},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.001},
  doi          = {10.22667/JOWUA.2015.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kotenko15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FedorchenkoKC15,
  author       = {Andrey Fedorchenko and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {Integrated Repository of Security Information for Network Security
                  Evaluation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {41--57},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.041},
  doi          = {10.22667/JOWUA.2015.06.31.041},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FedorchenkoKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/DoynikovaK15,
  author       = {Elena Doynikova and
                  Igor V. Kotenko},
  editor       = {Costas Lambrinoudakis and
                  Alban Gabillon},
  title        = {Countermeasure Selection Based on the Attack and Service Dependency
                  Graphs for Security Incident Management},
  booktitle    = {Risks and Security of Internet and Systems - 10th International Conference,
                  CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9572},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31811-0\_7},
  doi          = {10.1007/978-3-319-31811-0\_7},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/DoynikovaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/BranitskiyK15,
  author       = {Alexander Branitskiy and
                  Igor V. Kotenko},
  editor       = {Christian Plessl and
                  Didier El Baz and
                  Guojing Cong and
                  Jo{\~{a}}o M. P. Cardoso and
                  Lu{\'{\i}}s Veiga and
                  Thomas Rauber},
  title        = {Network Attack Detection Based on Combination of Neural, Immune and
                  Neuro-Fuzzy Classifiers},
  booktitle    = {18th {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2015, Porto, Portugal, October 21-23, 2015},
  pages        = {152--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSE.2015.26},
  doi          = {10.1109/CSE.2015.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/BranitskiyK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/KotenkoS15,
  author       = {Igor V. Kotenko and
                  Igor Saenko},
  editor       = {Christian Plessl and
                  Didier El Baz and
                  Guojing Cong and
                  Jo{\~{a}}o M. P. Cardoso and
                  Lu{\'{\i}}s Veiga and
                  Thomas Rauber},
  title        = {The Genetic Approach for Design of Virtual Private Networks},
  booktitle    = {18th {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2015, Porto, Portugal, October 21-23, 2015},
  pages        = {168--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSE.2015.23},
  doi          = {10.1109/CSE.2015.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/KotenkoS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/BekenevaBSK15,
  author       = {Yana A. Bekeneva and
                  Konstantin Borisenko and
                  Andrey Shorov and
                  Igor V. Kotenko},
  editor       = {Ismail Khalil and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Li Da Xu and
                  Ilsun You},
  title        = {Investigation of DDoS Attacks by Hybrid Simulation},
  booktitle    = {Information and Communication Technology - Third {IFIP} {TC} 5/8 International
                  Conference, ICT-EurAsia 2015, and 9th {IFIP} {WG} 8.9 Working Conference,
                  {CONFENIS} 2015, Held as Part of {WCC} 2015, Daejeon, Korea, October
                  4-7, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9357},
  pages        = {179--189},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24315-3\_18},
  doi          = {10.1007/978-3-319-24315-3\_18},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/BekenevaBSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/KotenkoCK15,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin and
                  Dmitry Komashinsky},
  title        = {Evaluation of text classification techniques for inappropriate web
                  content blocking},
  booktitle    = {{IEEE} 8th International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications, {IDAACS}
                  2015, Warsaw, Poland, September 24-26, 2015},
  pages        = {412--417},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IDAACS.2015.7340769},
  doi          = {10.1109/IDAACS.2015.7340769},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/idaacs/KotenkoCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/KotenkoD15,
  author       = {Igor V. Kotenko and
                  Elena Doynikova},
  title        = {The {CAPEC} based generator of attack scenarios for network security
                  evaluation},
  booktitle    = {{IEEE} 8th International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications, {IDAACS}
                  2015, Warsaw, Poland, September 24-26, 2015},
  pages        = {436--441},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IDAACS.2015.7340774},
  doi          = {10.1109/IDAACS.2015.7340774},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idaacs/KotenkoD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/SaenkoK15,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Paulo Novais and
                  David Camacho and
                  Cesar Analide and
                  Amal El Fallah Seghrouchni and
                  Costin Badica},
  title        = {Reconfiguration of Access Schemes in Virtual Networks of the Internet
                  of Things by Genetic Algorithms},
  booktitle    = {Intelligent Distributed Computing {IX} - Proceedings of the 9th International
                  Symposium on Intelligent Distributed Computing - IDC'2015, Guimar{\~{a}}es,
                  Portugal, October 2015},
  series       = {Studies in Computational Intelligence},
  volume       = {616},
  pages        = {155--165},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25017-5\_15},
  doi          = {10.1007/978-3-319-25017-5\_15},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/SaenkoK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/NovozhilovKC15,
  author       = {Dmitry Novozhilov and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Paulo Novais and
                  David Camacho and
                  Cesar Analide and
                  Amal El Fallah Seghrouchni and
                  Costin Badica},
  title        = {Improving the Categorization of Web Sites by Analysis of Html-Tags
                  Statistics to Block Inappropriate Content},
  booktitle    = {Intelligent Distributed Computing {IX} - Proceedings of the 9th International
                  Symposium on Intelligent Distributed Computing - IDC'2015, Guimar{\~{a}}es,
                  Portugal, October 2015},
  series       = {Studies in Computational Intelligence},
  volume       = {616},
  pages        = {257--263},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25017-5\_24},
  doi          = {10.1007/978-3-319-25017-5\_24},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/NovozhilovKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/FedorchenkoKC15,
  author       = {Andrey Fedorchenko and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Masoud Daneshtalab and
                  Marco Aldinucci and
                  Ville Lepp{\"{a}}nen and
                  Johan Lilius and
                  Mats Brorsson},
  title        = {Design of Integrated Vulnerabilities Database for Computer Networks
                  Security Analysis},
  booktitle    = {23rd Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2015, Turku, Finland, March 4-6,
                  2015},
  pages        = {559--566},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PDP.2015.38},
  doi          = {10.1109/PDP.2015.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/FedorchenkoKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoD15,
  author       = {Igor V. Kotenko and
                  Elena Doynikova},
  editor       = {Masoud Daneshtalab and
                  Marco Aldinucci and
                  Ville Lepp{\"{a}}nen and
                  Johan Lilius and
                  Mats Brorsson},
  title        = {Countermeasure Selection in {SIEM} Systems Based on the Integrated
                  Complex of Security Metrics},
  booktitle    = {23rd Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2015, Turku, Finland, March 4-6,
                  2015},
  pages        = {567--574},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PDP.2015.34},
  doi          = {10.1109/PDP.2015.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KotenkoSA15,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Sergey Ageev},
  title        = {Countermeasure Security Risks Management in the Internet of Things
                  Based on Fuzzy Logic Inference},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {654--659},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.431},
  doi          = {10.1109/TRUSTCOM.2015.431},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KotenkoSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/NovikovaKF14,
  author       = {Evgenia Novikova and
                  Igor V. Kotenko and
                  Evgenii Fedotov},
  title        = {Interactive Multi-View Visualization for Fraud Detection in Mobile
                  Money Transfer Services},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {6},
  number       = {4},
  pages        = {73--97},
  year         = {2014},
  url          = {https://doi.org/10.4018/IJMCMC.2014100105},
  doi          = {10.4018/IJMCMC.2014100105},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/NovikovaKF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KotenkoC14,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {Fast Network Attack Modeling and Security Evaluation based on Attack
                  Graphs},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {3},
  number       = {1},
  pages        = {27--46},
  year         = {2014},
  url          = {https://doi.org/10.13052/jcsm2245-1439.312},
  doi          = {10.13052/JCSM2245-1439.312},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KotenkoC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KotenkoD14,
  author       = {Igor V. Kotenko and
                  Elena Doynikova},
  title        = {Evaluation of Computer Network Security based on Attack Graphs and
                  Security Event Processing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {14--29},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.014},
  doi          = {10.22667/JOWUA.2014.09.31.014},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KotenkoD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SaenkoK14,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  title        = {Design of Virtual Local Area Network Scheme Based on Genetic Optimization
                  and Visual Analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {86--102},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.086},
  doi          = {10.22667/JOWUA.2014.12.31.086},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/SaenkoK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NovikovaK14,
  author       = {Evgenia Novikova and
                  Igor V. Kotenko},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Visual Analytics for Detecting Anomalous Activity in Mobile Money
                  Transfer Services},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_5},
  doi          = {10.1007/978-3-319-10975-6\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NovikovaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DesnitskyK14,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko},
  editor       = {Stephanie Teufel and
                  A Min Tjoa and
                  Ilsun You and
                  Edgar R. Weippl},
  title        = {Expert Knowledge Based Design and Verification of Secure Systems with
                  Embedded Devices},
  booktitle    = {Availability, Reliability, and Security in Information Systems - {IFIP}
                  {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES}
                  2014 and 4th International Workshop on Security and Cognitive Informatics
                  for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September
                  8-12, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8708},
  pages        = {194--210},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10975-6\_15},
  doi          = {10.1007/978-3-319-10975-6\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DesnitskyK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KotenkoN14,
  author       = {Igor V. Kotenko and
                  Evgenia Novikova},
  title        = {Visualization of Security Metrics for Cyber Situation Awareness},
  booktitle    = {Ninth International Conference on Availability, Reliability and Security,
                  {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014},
  pages        = {506--513},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ARES.2014.75},
  doi          = {10.1109/ARES.2014.75},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KotenkoN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/KotenkoD14,
  author       = {Igor V. Kotenko and
                  Elena Doynikova},
  title        = {Security Evaluation for Cyber Situational Awareness},
  booktitle    = {2014 {IEEE} International Conference on High Performance Computing
                  and Communications, 6th {IEEE} International Symposium on Cyberspace
                  Safety and Security, 11th {IEEE} International Conference on Embedded
                  Software and Systems, {HPCC/CSS/ICESS} 2014, Paris, France, August
                  20-22, 2014},
  pages        = {1197--1204},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/HPCC.2014.196},
  doi          = {10.1109/HPCC.2014.196},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/KotenkoD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/KotenkoD14,
  author       = {Igor V. Kotenko and
                  Elena Doynikova},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {Security Assessment of Computer Networks Based on Attack Graphs and
                  Security Events},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {462--471},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_47},
  doi          = {10.1007/978-3-642-55032-4\_47},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/KotenkoD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/SaenkoK14,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {David Camacho and
                  Lars Braubach and
                  Salvatore Venticinque and
                  Costin Badica},
  title        = {A Genetic Approach for Virtual Computer Network Design},
  booktitle    = {Intelligent Distributed Computing {VIII} - Proceedings of the 8th
                  International Symposium on Intelligent Distributed Computing, {IDC}
                  2014, Madrid, Spain, September 3-5, 2014},
  series       = {Studies in Computational Intelligence},
  volume       = {570},
  pages        = {95--105},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10422-5\_11},
  doi          = {10.1007/978-3-319-10422-5\_11},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/idc/SaenkoK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/KotenkoS14,
  author       = {Igor V. Kotenko and
                  Andrey Shorov},
  editor       = {David Camacho and
                  Lars Braubach and
                  Salvatore Venticinque and
                  Costin Badica},
  title        = {Simulation of Bio-inspired Security Mechanisms against Network Infrastructure
                  Attacks},
  booktitle    = {Intelligent Distributed Computing {VIII} - Proceedings of the 8th
                  International Symposium on Intelligent Distributed Computing, {IDC}
                  2014, Madrid, Spain, September 3-5, 2014},
  series       = {Studies in Computational Intelligence},
  volume       = {570},
  pages        = {127--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10422-5\_14},
  doi          = {10.1007/978-3-319-10422-5\_14},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/KotenkoS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incdm/KotenkoCSK14,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin and
                  Andrey Shorov and
                  Dmitry Komashinsky},
  editor       = {Petra Perner},
  title        = {Analysis and Evaluation of Web Pages Classification Techniques for
                  Inappropriate Content Blocking},
  booktitle    = {Advances in Data Mining. Applications and Theoretical Aspects - 14th
                  Industrial Conference, {ICDM} 2014, St. Petersburg, Russia, July 16-20,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8557},
  pages        = {39--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08976-8\_4},
  doi          = {10.1007/978-3-319-08976-8\_4},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incdm/KotenkoCSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoDC14,
  author       = {Igor V. Kotenko and
                  Elena Doynikova and
                  Andrey Chechulin},
  title        = {Security Metrics Based on Attack Graphs for the Olympic Games Scenario},
  booktitle    = {22nd Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2014, Torino, Italy, February
                  12-14, 2014},
  pages        = {561--568},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PDP.2014.113},
  doi          = {10.1109/PDP.2014.113},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoDC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/NesterukNK14,
  author       = {Philipp Nesteruk and
                  Lesya Nesteruk and
                  Igor V. Kotenko},
  title        = {Creation of a Fuzzy Knowledge Base for Adaptive Security Systems},
  booktitle    = {22nd Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2014, Torino, Italy, February
                  12-14, 2014},
  pages        = {574--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PDP.2014.115},
  doi          = {10.1109/PDP.2014.115},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/NesterukNK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/KotenkoPCS13,
  author       = {Igor V. Kotenko and
                  Olga Polubelova and
                  Andrey Chechulin and
                  Igor Saenko},
  title        = {Design and Implementation of a Hybrid Ontological-Relational Data
                  Repository for {SIEM} Systems},
  journal      = {Future Internet},
  volume       = {5},
  number       = {3},
  pages        = {355--375},
  year         = {2013},
  url          = {https://doi.org/10.3390/fi5030355},
  doi          = {10.3390/FI5030355},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/KotenkoPCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KotenkoN13,
  author       = {Igor V. Kotenko and
                  Evgenia Novikova},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {VisSecAnalyzer: {A} Visual Analytics Tool for Network Security Assessment},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {345--360},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_24},
  doi          = {10.1007/978-3-642-40588-4\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KotenkoN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KotenkoPSD13,
  author       = {Igor V. Kotenko and
                  Olga Polubelova and
                  Igor Saenko and
                  Elena Doynikova},
  title        = {The Ontology of Metrics for Security Evaluation and Decision Support
                  in {SIEM} Systems},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {638--645},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.84},
  doi          = {10.1109/ARES.2013.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KotenkoPSD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cycon/KotenkoC13,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Karlis Podins and
                  Jan Stinissen and
                  Markus Maybaum},
  title        = {A Cyber Attack Modeling and Impact Assessment framework},
  booktitle    = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn,
                  Estonia, June 4-7, 2013},
  pages        = {1--24},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6568374/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cycon/KotenkoC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecms/Kotenko13,
  author       = {Igor V. Kotenko},
  editor       = {Webj{\o}rn Rekdalsbakken and
                  Robin T. Bye and
                  Houxiang Zhang},
  title        = {Experiments With Simulation Of Botnets And Defense Agent Teams},
  booktitle    = {Proceedings of the 27th European Conference on Modelling and Simulation,
                  {ECMS} 2013, {\AA}lesund, Norway, May 27-30, 2013},
  pages        = {61--67},
  publisher    = {European Council for Modeling and Simulation},
  year         = {2013},
  url          = {https://doi.org/10.7148/2013-0061},
  doi          = {10.7148/2013-0061},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecms/Kotenko13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/KotenkoC13,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {Computer attack modeling and security evaluation based on attack graphs},
  booktitle    = {{IEEE} 7th International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems, {IDAACS} 2013, Berlin, Germany, September
                  12-14, 2013},
  pages        = {614--619},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IDAACS.2013.6662998},
  doi          = {10.1109/IDAACS.2013.6662998},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/idaacs/KotenkoC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/KotenkoD13,
  author       = {Igor V. Kotenko and
                  Elena Doynikova},
  title        = {Security metrics for risk assessment of distributed information systems},
  booktitle    = {{IEEE} 7th International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems, {IDAACS} 2013, Berlin, Germany, September
                  12-14, 2013},
  pages        = {646--650},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IDAACS.2013.6663004},
  doi          = {10.1109/IDAACS.2013.6663004},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idaacs/KotenkoD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifgis/KotenkoPS13,
  author       = {Igor V. Kotenko and
                  Olga Polubelova and
                  Igor Saenko},
  editor       = {Vasily V. Popovich and
                  Christophe Claramunt and
                  Manfred Schrenk and
                  Kyrill V. Korolenko},
  title        = {Logical Inference Framework for Security Management in Geographical
                  Information Systems},
  booktitle    = {Information Fusion and Geographic Information Systems, IF{\&}GIS
                  2013 - Environmental and Urban Challenges, May 12-15, 2013, St. Petersburg,
                  Russia},
  series       = {Lecture Notes in Geoinformation and Cartography},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-31833-7\_13},
  doi          = {10.1007/978-3-642-31833-7\_13},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifgis/KotenkoPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifgis/KotenkoSCN13,
  author       = {Igor V. Kotenko and
                  Andrey Shorov and
                  Andrey Chechulin and
                  Evgenia Novikova},
  editor       = {Vasily V. Popovich and
                  Christophe Claramunt and
                  Manfred Schrenk and
                  Kyrill V. Korolenko},
  title        = {Dynamical Attack Simulation for Security Information and Event Management},
  booktitle    = {Information Fusion and Geographic Information Systems, IF{\&}GIS
                  2013 - Environmental and Urban Challenges, May 12-15, 2013, St. Petersburg,
                  Russia},
  series       = {Lecture Notes in Geoinformation and Cartography},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-31833-7\_14},
  doi          = {10.1007/978-3-642-31833-7\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifgis/KotenkoSCN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/NovikovaK13,
  author       = {Evgenia Novikova and
                  Igor V. Kotenko},
  title        = {Analytical Visualization Techniques for Security Information and Event
                  Management},
  booktitle    = {21st Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2013, Belfast, United Kingdom,
                  February 27 - March 1, 2013},
  pages        = {519--525},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PDP.2013.84},
  doi          = {10.1109/PDP.2013.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/NovikovaK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoSN13,
  author       = {Igor V. Kotenko and
                  Andrey Shorov and
                  Evgenia Novikova},
  title        = {Simulation of Protection Mechanisms Based on "Nervous Network
                  System" against Infrastructure Attacks},
  booktitle    = {21st Euromicro International Conference on Parallel, Distributed,
                  and Network-Based Processing, {PDP} 2013, Belfast, United Kingdom,
                  February 27 - March 1, 2013},
  pages        = {526--533},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/PDP.2013.85},
  doi          = {10.1109/PDP.2013.85},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoSN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KotenkoKS12,
  author       = {Igor V. Kotenko and
                  Alexey Konovalov and
                  Andrey Shorov},
  title        = {Agent-based simulation of cooperative defence against botnets},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {24},
  number       = {6},
  pages        = {573--588},
  year         = {2012},
  url          = {https://doi.org/10.1002/cpe.1858},
  doi          = {10.1002/CPE.1858},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/KotenkoKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/greencom/KotenkoC12,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {Common Framework for Attack Modeling and Security Evaluation in {SIEM}
                  Systems},
  booktitle    = {2012 {IEEE} International Conference on Green Computing and Communications,
                  Conference on Internet of Things, and Conference on Cyber, Physical
                  and Social Computing, GreenCom/iThings/CPSCom 2012, Besancon, France,
                  November 20-23, 2012},
  pages        = {94--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/GreenCom.2012.24},
  doi          = {10.1109/GREENCOM.2012.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/greencom/KotenkoC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/greencom/KotenkoPS12,
  author       = {Igor V. Kotenko and
                  Olga Polubelova and
                  Igor Saenko},
  title        = {The Ontological Approach for {SIEM} Data Repository Implementation},
  booktitle    = {2012 {IEEE} International Conference on Green Computing and Communications,
                  Conference on Internet of Things, and Conference on Cyber, Physical
                  and Social Computing, GreenCom/iThings/CPSCom 2012, Besancon, France,
                  November 20-23, 2012},
  pages        = {761--766},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/GreenCom.2012.125},
  doi          = {10.1109/GREENCOM.2012.125},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/greencom/KotenkoPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/ChechulinKD12,
  author       = {Andrey Chechulin and
                  Igor V. Kotenko and
                  Vasily Desnitsky},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {An Approach for Network Information Flow Analysis for Systems of Embedded
                  Components},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {146--155},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_13},
  doi          = {10.1007/978-3-642-33704-8\_13},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/ChechulinKD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KomashinskiyK12,
  author       = {Dmitriy Komashinskiy and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Using Low-Level Dynamic Attributes for Malware Detection Based on
                  Data Mining Methods},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {254--269},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_22},
  doi          = {10.1007/978-3-642-33704-8\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KomashinskiyK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DesnitskyKC12,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Configuration-Based Approach to Embedded Device Security},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {270--285},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_23},
  doi          = {10.1007/978-3-642-33704-8\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DesnitskyKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/RuizHMDKC12,
  author       = {Jos{\'{e}} Fran. Ruiz and
                  Rajesh Harjani and
                  Antonio Mana and
                  Vasily Desnitsky and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  editor       = {Rainer Stotzka and
                  Michael Schiffers and
                  Yannis Cotronis},
  title        = {A Methodology for the Analysis and Modeling of Security Threats and
                  Attacks for Systems of Embedded Components},
  booktitle    = {Proceedings of the 20th Euromicro International Conference on Parallel,
                  Distributed and Network-Based Processing, {PDP} 2012, Munich, Germany,
                  February 15-17, 2012},
  pages        = {261--268},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/PDP.2012.36},
  doi          = {10.1109/PDP.2012.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/RuizHMDKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/SaenkoK12,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Rainer Stotzka and
                  Michael Schiffers and
                  Yannis Cotronis},
  title        = {Design and Performance Evaluation of Improved Genetic Algorithm for
                  Role Mining Problem},
  booktitle    = {Proceedings of the 20th Euromicro International Conference on Parallel,
                  Distributed and Network-Based Processing, {PDP} 2012, Munich, Germany,
                  February 15-17, 2012},
  pages        = {269--274},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/PDP.2012.31},
  doi          = {10.1109/PDP.2012.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/SaenkoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KotenkoPS12,
  author       = {Igor V. Kotenko and
                  Olga Polubelova and
                  Igor Saenko},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Data Repository for Security Information and Event Management in Service
                  Infrastructures},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {308--313},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KotenkoPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KotenkoCN12,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin and
                  Evgenia Novikova},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Attack Modelling and Security Evaluation for Security Information
                  and Event Management},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {391--394},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Wed, 05 Nov 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KotenkoCN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/simultech/KotenkoS12,
  author       = {Igor V. Kotenko and
                  Andrey Shorov},
  editor       = {Nuno Pina and
                  Janusz Kacprzyk and
                  Mohammad S. Obaidat},
  title        = {Simulation of Protection Mechanisms against Botnets on the Basis of
                  "Nervous Network" Framework},
  booktitle    = {{SIMULTECH} 2012 - Proceedings of the 2nd International Conference
                  on Simulation and Modeling Methodologies, Technologies and Applications,
                  Rome, Italy, 28 - 31 July, 2012},
  pages        = {164--169},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Wed, 05 Nov 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/simultech/KotenkoS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/LeszczynaK12,
  author       = {Rafal Leszczyna and
                  Igor V. Kotenko},
  editor       = {Mohammad Essaaidi and
                  Maria Ganzha and
                  Marcin Paprzycki},
  title        = {Security and Anonymity in Agent Systems},
  booktitle    = {Software Agents, Agent Systems and Their Applications},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {32},
  pages        = {157--177},
  publisher    = {{IOS} Press},
  year         = {2012},
  url          = {https://doi.org/10.3233/978-1-60750-818-2-157},
  doi          = {10.3233/978-1-60750-818-2-157},
  timestamp    = {Tue, 16 May 2017 14:24:21 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/LeszczynaK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/KotenkoL12,
  author       = {Igor V. Kotenko and
                  Rafal Leszczyna},
  editor       = {Mohammad Essaaidi and
                  Maria Ganzha and
                  Marcin Paprzycki},
  title        = {Software Agents for Computer Network Security},
  booktitle    = {Software Agents, Agent Systems and Their Applications},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {32},
  pages        = {260--285},
  publisher    = {{IOS} Press},
  year         = {2012},
  url          = {https://doi.org/10.3233/978-1-60750-818-2-260},
  doi          = {10.3233/978-1-60750-818-2-260},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/KotenkoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2012,
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8},
  doi          = {10.1007/978-3-642-33704-8},
  isbn         = {978-3-642-33703-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idaacs/KotenkoP11,
  author       = {Igor V. Kotenko and
                  Olga Polubelova},
  title        = {Verification of security policy filtering rules by Model Checking},
  booktitle    = {{IEEE} 6th International Conference on Intelligent Data Acquisition
                  and Advanced Computing Systems: Technology and Applications, {IDAACS}
                  2011, Prague, Czech Republic, September 15-17, 2011, Volume 2},
  pages        = {706--710},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IDAACS.2011.6072862},
  doi          = {10.1109/IDAACS.2011.6072862},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/idaacs/KotenkoP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifgis/KotenkoCD11,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin and
                  Elena Doynikova},
  editor       = {Vasily V. Popovich and
                  Christophe Claramunt and
                  Thomas Devogele and
                  Manfred Schrenk and
                  Kyrill V. Korolenko},
  title        = {Combining of Scanning Protection Mechanisms in {GIS} and Corporate
                  Information Systems},
  booktitle    = {Information Fusion and Geographic Information Systems, Towards the
                  Digital Ocean, IF{\&}GIS 2011, Brest, France, May 10-11, 2011},
  series       = {Lecture Notes in Geoinformation and Cartography},
  pages        = {45--58},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19766-6\_5},
  doi          = {10.1007/978-3-642-19766-6\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifgis/KotenkoCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoSD11,
  author       = {Igor V. Kotenko and
                  Mikhail Stepashkin and
                  Elena Doynikova},
  editor       = {Yiannis Cotronis and
                  Marco Danelutto and
                  George Angelos Papadopoulos},
  title        = {Security Analysis of Information Systems Taking into Account Social
                  Engineering Attacks},
  booktitle    = {Proceedings of the 19th International Euromicro Conference on Parallel,
                  Distributed and Network-based Processing, {PDP} 2011, Ayia Napa, Cyprus,
                  9-11 February 2011},
  pages        = {611--618},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PDP.2011.62},
  doi          = {10.1109/PDP.2011.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoSD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/SaenkoK11,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Yiannis Cotronis and
                  Marco Danelutto and
                  George Angelos Papadopoulos},
  title        = {Genetic Algorithms for Role Mining Problem},
  booktitle    = {Proceedings of the 19th International Euromicro Conference on Parallel,
                  Distributed and Network-based Processing, {PDP} 2011, Ayia Napa, Cyprus,
                  9-11 February 2011},
  pages        = {646--650},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/PDP.2011.63},
  doi          = {10.1109/PDP.2011.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/SaenkoK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idc/KotenkoKS10,
  author       = {Igor V. Kotenko and
                  Alexey Konovalov and
                  Andrey Shorov},
  editor       = {Mohammed Essaaidi and
                  Michele Malgeri and
                  Costin Badica},
  title        = {Simulation of Botnets: Agent-Based Approach},
  booktitle    = {Intelligent Distributed Computing {IV} - Proceedings of the 4th International
                  Symposium on Intelligent Distributed Computing - {IDC} 2010, Tangier,
                  Morocco, September 2010},
  volume       = {315},
  pages        = {247--252},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15211-5\_26},
  doi          = {10.1007/978-3-642-15211-5\_26},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/idc/KotenkoKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SaenkoK10,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Genetic Optimization of Access Control Schemes in Virtual Local Area
                  Networks},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {209--216},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_16},
  doi          = {10.1007/978-3-642-14706-7\_16},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SaenkoK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/DesnitskyK10,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Security and Scalability of Remote Entrusting Protection},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {298--306},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_23},
  doi          = {10.1007/978-3-642-14706-7\_23},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/DesnitskyK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KomashinskiyK10,
  author       = {Dmitriy Komashinskiy and
                  Igor V. Kotenko},
  editor       = {Marco Danelutto and
                  Julien Bourgeois and
                  Tom Gross},
  title        = {Malware Detection by Data Mining Techniques Based on Positionally
                  Dependent Features},
  booktitle    = {Proceedings of the 18th Euromicro Conference on Parallel, Distributed
                  and Network-based Processing, {PDP} 2010, Pisa, Italy, February 17-19,
                  2010},
  pages        = {617--623},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/PDP.2010.30},
  doi          = {10.1109/PDP.2010.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KomashinskiyK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2010,
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7},
  doi          = {10.1007/978-3-642-14706-7},
  isbn         = {978-3-642-14705-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecms/Kotenko09,
  author       = {Igor V. Kotenko},
  editor       = {Javier Otamendi and
                  Andrzej Bargiela and
                  Jos{\'{e}} Luis Isla Montes and
                  Luis Miguel Doncel Pedrera},
  title        = {Simulation Of Agent Teams: Application Of {A} Domain-Independent Framework
                  To Computer Network Security},
  booktitle    = {European Conference on Modelling and Simulation, {ECMS} 2009, Madrid,
                  Spain, June 9-12, 2009},
  pages        = {137--143},
  publisher    = {European Council for Modeling and Simulation},
  year         = {2009},
  url          = {https://doi.org/10.7148/2009-0137-0143},
  doi          = {10.7148/2009-0137-0143},
  timestamp    = {Tue, 09 Feb 2021 08:33:04 +0100},
  biburl       = {https://dblp.org/rec/conf/ecms/Kotenko09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifgis/DesnitskyK09,
  author       = {Vasily Desnitsky and
                  Igor V. Kotenko},
  editor       = {Vasily V. Popovich and
                  Manfred Schrenk and
                  Christophe Claramunt and
                  Kyrill V. Korolenko},
  title        = {Design of Entrusting Protocols for Software Protection},
  booktitle    = {Information Fusion and Geographic Information Systems, Proceedings
                  of the Fourth International Workshop, IF{\&}GIS 2009, 17-20 May
                  2009, St. Petersburg, Russia},
  series       = {Lecture Notes in Geoinformation and Cartography},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00304-2\_21},
  doi          = {10.1007/978-3-642-00304-2\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifgis/DesnitskyK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifgis/KomashinskiyK09,
  author       = {Dmitriy Komashinskiy and
                  Igor V. Kotenko},
  editor       = {Vasily V. Popovich and
                  Manfred Schrenk and
                  Christophe Claramunt and
                  Kyrill V. Korolenko},
  title        = {Integrated Usage of Data Mining Methods for Malware Detection},
  booktitle    = {Information Fusion and Geographic Information Systems, Proceedings
                  of the Fourth International Workshop, IF{\&}GIS 2009, 17-20 May
                  2009, St. Petersburg, Russia},
  series       = {Lecture Notes in Geoinformation and Cartography},
  pages        = {343--357},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00304-2\_24},
  doi          = {10.1007/978-3-642-00304-2\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifgis/KomashinskiyK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/Kotenko09,
  author       = {Igor V. Kotenko},
  editor       = {Didier El Baz and
                  Fran{\c{c}}ois Spies and
                  Tom Gross},
  title        = {Framework for Integrated Proactive Network Worm Detection and Response},
  booktitle    = {Proceedings of the 17th Euromicro International Conference on Parallel,
                  Distributed and Network-Based Processing, {PDP} 2009, Weimar, Germany,
                  18-20 Febuary 2009},
  pages        = {379--386},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/PDP.2009.52},
  doi          = {10.1109/PDP.2009.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/Kotenko09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoU08,
  author       = {Igor V. Kotenko and
                  Alexander Ulanov},
  title        = {Packet Level Simulation of Cooperative Distributed Defense against
                  Internet Attacks},
  booktitle    = {16th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing {(PDP} 2008), 13-15 February 2008, Toulouse,
                  France},
  pages        = {565--572},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PDP.2008.65},
  doi          = {10.1109/PDP.2008.65},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aisadm/KotenkoU07,
  author       = {Igor V. Kotenko and
                  Alexander Ulanov},
  editor       = {Vladimir Gorodetsky and
                  Chengqi Zhang and
                  Victor A. Skormin and
                  Longbing Cao},
  title        = {Multi-agent Framework for Simulation of Adaptive Cooperative Defense
                  Against Internet Attacks},
  booktitle    = {Autonomous Intelligent Systems: Multi-Agents and Data Mining, Second
                  International Workshop, {AIS-ADM} 2007, St. Petersburg, Russia, June
                  3-5, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4476},
  pages        = {212--228},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72839-9\_18},
  doi          = {10.1007/978-3-540-72839-9\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aisadm/KotenkoU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifgis/BourgeoisGKU07,
  author       = {Julien Bourgeois and
                  Abdoul Karim Ganame and
                  Igor V. Kotenko and
                  Alexander Ulanov},
  editor       = {Vasily V. Popovich and
                  Manfred Schrenk and
                  Kyrill V. Korolenko},
  title        = {Software Environment for Simulation and Evaluation of a Security Operation
                  Center},
  booktitle    = {Third International Workshop on Information Fusion and Geographical
                  Information Systems - IF{\&}GIS'07, St. Petersburg, Russia, May
                  27-29, 2007. Proceedings},
  series       = {Lecture Notes in Geoinformation and Cartography},
  pages        = {111--127},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-37629-3\_8},
  doi          = {10.1007/978-3-540-37629-3\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifgis/BourgeoisGKU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifgis/KotenkoTCS07,
  author       = {Igor V. Kotenko and
                  Artem Tishkov and
                  Olga Chervatuk and
                  Ekaterina Sidelnikova},
  editor       = {Vasily V. Popovich and
                  Manfred Schrenk and
                  Kyrill V. Korolenko},
  title        = {Security Policy Verification Tool for Geographical Information Systems},
  booktitle    = {Third International Workshop on Information Fusion and Geographical
                  Information Systems - IF{\&}GIS'07, St. Petersburg, Russia, May
                  27-29, 2007. Proceedings},
  series       = {Lecture Notes in Geoinformation and Cartography},
  pages        = {128--146},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-37629-3\_9},
  doi          = {10.1007/978-3-540-37629-3\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifgis/KotenkoTCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/KotenkoCST07,
  author       = {Igor V. Kotenko and
                  Olga Chervatuk and
                  Ekaterina Sidelnikova and
                  Artem Tishkov},
  title        = {Hybrid Multi-module Security Policy Verification},
  booktitle    = {8th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy},
  pages        = {277},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/POLICY.2007.25},
  doi          = {10.1109/POLICY.2007.25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/policy/KotenkoCST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KotenkoU07,
  author       = {Igor V. Kotenko and
                  Alexander Ulanov},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Investigation of Cooperative Defense against DDoS},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {180--183},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KotenkoU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/KotenkoS06,
  author       = {Igor V. Kotenko and
                  Mikhail Stepashkin},
  editor       = {Herbert Leitold and
                  Evangelos P. Markatos},
  title        = {Attack Graph Based Evaluation of Network Security},
  booktitle    = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
                  19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4237},
  pages        = {216--227},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11909033\_20},
  doi          = {10.1007/11909033\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/KotenkoS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cw/KotenkoU06,
  author       = {Igor V. Kotenko and
                  Alexander Ulanov},
  title        = {Agent Teams in Cyberspace: Security Guards in the Global Internet},
  booktitle    = {5th International Conference on Cyberworlds {(CW} 2006), 28-29 November
                  2006, Lausanne, Switzerland},
  pages        = {133--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CW.2006.12},
  doi          = {10.1109/CW.2006.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cw/KotenkoU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/KotenkoU06,
  author       = {Igor V. Kotenko and
                  Alexander Ulanov},
  title        = {Antagonistic Agents in the Internet: Computer Network Warfare Simulation},
  booktitle    = {9th International Conference on Information Fusion, {FUSION} 2006,
                  Florence, Italy, July 10-13, 2006},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICIF.2006.301705},
  doi          = {10.1109/ICIF.2006.301705},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/KotenkoU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KotenkoU06,
  author       = {Igor V. Kotenko and
                  Alexander Ulanov},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Simulation of Internet DDoS Attacks and Defense},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {327--342},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_24},
  doi          = {10.1007/11836810\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KotenkoU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/jckbse/KotenkoU06,
  author       = {Igor V. Kotenko and
                  Alexander Ulanov},
  editor       = {Enn Tyugu and
                  Takahira Yamaguchi},
  title        = {Agent-based modeling and simulation of network softbots' competition},
  booktitle    = {Knowledge-Based Software Engineering, Proceedings of the Seventh Joint
                  Conference on Knowledge-Based Software Engineering, {JCKBSE} 2006,
                  August 28-31, 2006, Tallinn, Estonia},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {140},
  pages        = {243--252},
  publisher    = {{IOS} Press},
  year         = {2006},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1616},
  timestamp    = {Tue, 13 Mar 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/jckbse/KotenkoU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KotenkoS06,
  author       = {Igor V. Kotenko and
                  Mikhail Stepashkin},
  editor       = {Manu Malek and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Javier Hernando},
  title        = {Network Security Evaluation Based on Simulation of Malfactor's Behavior},
  booktitle    = {{SECRYPT} 2006, Proceedings of the International Conference on Security
                  and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
                  {SECRYPT} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  pages        = {339--344},
  publisher    = {{INSTICC} Press},
  year         = {2006},
  timestamp    = {Thu, 02 Nov 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KotenkoS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cimca/KotenkoU05,
  author       = {Igor V. Kotenko and
                  Alexander Ulanov},
  title        = {The Software Environment for Multi-agent Simulation of Defense Mechanisms
                  against DDoS Attacks},
  booktitle    = {2005 International Conference on Computational Intelligence for Modelling
                  Control and Automation {(CIMCA} 2005), International Conference on
                  Intelligent Agents, Web Technologies and Internet Commerce {(IAWTIC}
                  2005), 28-30 November 2005, Vienna, Austria},
  pages        = {283--289},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CIMCA.2005.1631280},
  doi          = {10.1109/CIMCA.2005.1631280},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cimca/KotenkoU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KotenkoS05,
  author       = {Igor V. Kotenko and
                  Mikhail Stepashkin},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Analyzing Vulnerabilities and Measuring Security Level at Design and
                  Exploitation Stages of Computer Network Life Cycle},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {311--324},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_24},
  doi          = {10.1007/11560326\_24},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KotenkoS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/TishkovKS05,
  author       = {Artem Tishkov and
                  Igor V. Kotenko and
                  Ekaterina Sidelnikova},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Security Checker Architecture for Policy-Based Security Management},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {460--465},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_40},
  doi          = {10.1007/11560326\_40},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/TishkovKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2005,
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326},
  doi          = {10.1007/11560326},
  isbn         = {3-540-29113-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pik/LaskovSKM04,
  author       = {Pavel Laskov and
                  Christin Sch{\"{a}}fer and
                  Igor V. Kotenko and
                  Klaus{-}Robert M{\"{u}}ller},
  title        = {Intrusion Detection in Unlabeled Data with Quarter-sphere Support
                  Vector Machines},
  journal      = {Prax. Inf.verarb. Kommun.},
  volume       = {27},
  number       = {4},
  pages        = {228--236},
  year         = {2004},
  url          = {https://doi.org/10.1515/PIKO.2004.228},
  doi          = {10.1515/PIKO.2004.228},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pik/LaskovSKM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/LaskovSK04,
  author       = {Pavel Laskov and
                  Christin Sch{\"{a}}fer and
                  Igor V. Kotenko},
  editor       = {Ulrich Flegel and
                  Michael Meier},
  title        = {Intrusion detection in unlabeled data with quarter-sphere Support
                  Vector Machines},
  booktitle    = {Detection of Intrusions and Malware {\&} Vulnerability Assessment,
                  {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July
                  6.7, 2004, Proceedings},
  series       = {{LNI}},
  volume       = {{P-46}},
  pages        = {71--82},
  publisher    = {{GI}},
  year         = {2004},
  url          = {https://dl.gi.de/handle/20.500.12116/29207},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/LaskovSK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/GorodetskiKK03,
  author       = {Vladimir I. Gorodetski and
                  Igor V. Kotenko and
                  Oleg Karsaev},
  title        = {Multi-agent technologies for computer network security: attack simulation,
                  intrusion detection and intrusion detection learning},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {18},
  number       = {4},
  pages        = {191--200},
  year         = {2003},
  timestamp    = {Wed, 05 May 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/GorodetskiKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceemas/Kotenko03,
  author       = {Igor V. Kotenko},
  editor       = {Vladim{\'{\i}}r Mar{\'{\i}}k and
                  J{\"{o}}rg P. M{\"{u}}ller and
                  Michal Pechoucek},
  title        = {Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated
                  Distributed Attacks on Computer Networks},
  booktitle    = {Multi-Agent Systems and Applications III, 3rd International Central
                  and Eastern European Conference on Multi-Agent Systems, {CEEMAS} 2003,
                  Prague, Czech Republic, June 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2691},
  pages        = {464--474},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45023-8\_45},
  doi          = {10.1007/3-540-45023-8\_45},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ceemas/Kotenko03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/KotenkoAM03,
  author       = {Igor V. Kotenko and
                  Alexey Alexeev and
                  Evgeny Man'kov},
  title        = {Formal Framework for Modeling and Simulation of DDoS Attacks Based
                  on Teamwork of Hackers-Agents},
  booktitle    = {2003 {IEEE/WIC} International Conference on Intelligent Agent Technology
                  {(IAT} 2003), 13-17 October 2003, Halifax, Canada},
  pages        = {507--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/IAT.2003.1241132},
  doi          = {10.1109/IAT.2003.1241132},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/KotenkoAM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/KotenkoM03,
  author       = {Igor V. Kotenko and
                  Evgeny Man'kov},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Experiments with Simulation of Attacks against Computer Networks},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {183--194},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_15},
  doi          = {10.1007/978-3-540-45215-7\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/KotenkoM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GorodetskiK02,
  author       = {Vladimir I. Gorodetski and
                  Igor V. Kotenko},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Attacks Against Computer Network: Formal Grammar-Based Framework and
                  Simulation Tool},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {219--238},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_12},
  doi          = {10.1007/3-540-36084-0\_12},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GorodetskiK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceemas/GorodetskiKKK01,
  author       = {Vladimir I. Gorodetski and
                  Oleg Karsaev and
                  Igor V. Kotenko and
                  Alexey Khabalov},
  editor       = {Barbara Dunin{-}Keplicz and
                  Edward Nawarecki},
  title        = {Software Development Kit for Multi-agent Systems Design and Implementation},
  booktitle    = {From Theory to Practice in Multi-Agent Systems, Second International
                  Workshop of Central and Eastern Europe on Multi-Agent Systems, {CEEMAS}
                  2001 Cracow, Poland, September 26-29, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2296},
  pages        = {121--130},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45941-3\_13},
  doi          = {10.1007/3-540-45941-3\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ceemas/GorodetskiKKK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/GorodetskiKKKPS01,
  author       = {Vladimir I. Gorodetski and
                  Oleg Karsaev and
                  Alexey Khabalov and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Agent-Based Model of Computer Network Security System: {A} Case Study},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_7},
  doi          = {10.1007/3-540-45116-1\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/GorodetskiKKKPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/GorodetskiS00,
  author       = {Vladimir I. Gorodetski and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {Integrated Multi-Agent Approach to Network Security Assurance: Models
                  of Agents' Community},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {291--300},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Fri, 25 Oct 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/GorodetskiS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceemas/GorodetskiKPS99,
  author       = {Vladimir I. Gorodetski and
                  Igor V. Kotenko and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Agent-based Model of Information Security System: Architecture and
                  Framework for Coordinated Behavior Specification},
  booktitle    = {1st International Workshop of Central and Eastern Europe on Multi-Agent
                  Systems, St. Petersburg, Russia, 1-4 June, 1999},
  year         = {1999},
  timestamp    = {Fri, 09 Aug 2019 11:11:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ceemas/GorodetskiKPS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceemas/Kotenko99,
  author       = {Igor V. Kotenko},
  title        = {Application of Hybrid Agent-Based Technology for Design of Telecommunication
                  Systems},
  booktitle    = {1st International Workshop of Central and Eastern Europe on Multi-Agent
                  Systems, St. Petersburg, Russia, 1-4 June, 1999},
  year         = {1999},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ceemas/Kotenko99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rsfdgrc/GorodetskiPKS99,
  author       = {Vladimir I. Gorodetski and
                  Leonard J. Popyack and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  editor       = {Ning Zhong and
                  Andrzej Skowron and
                  Setsuo Ohsuga},
  title        = {Ontology-Based Multi-Agent Model of an Information Security System},
  booktitle    = {New Directions in Rough Sets, Data Mining, and Granular-Soft Computing,
                  7th International Workshop, RSFDGrC '99, Yamaguchi, Japan, November
                  9-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1711},
  pages        = {528--532},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48061-7\_65},
  doi          = {10.1007/978-3-540-48061-7\_65},
  timestamp    = {Sat, 19 Oct 2019 20:16:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rsfdgrc/GorodetskiPKS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecis/Kotenko95,
  author       = {Igor V. Kotenko},
  editor       = {Georgios I. Doukidis and
                  Robert D. Galliers and
                  Tawfik Jelassi and
                  Helmut Krcmar and
                  Frank Land},
  title        = {A framework for intelligent group decision support},
  booktitle    = {Proceedings of the Third European Conference on Information Systems,
                  {ECIS} 1995, Athens, Greece, 1995},
  pages        = {635--648},
  year         = {1995},
  timestamp    = {Mon, 05 Dec 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecis/Kotenko95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewhci/Kotenko94,
  author       = {Igor V. Kotenko},
  editor       = {Brad Blumenthal and
                  Juri Gornostaev and
                  Claus Unger},
  title        = {Conflict Resolution in Computer-Supported Cooperative Design},
  booktitle    = {Human-Computer Interaction, 4th International Conference, {EWHCI}
                  '94, St. Petersburg, Russia, August 2-5, 1994, Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {876},
  pages        = {152--163},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58648-2\_34},
  doi          = {10.1007/3-540-58648-2\_34},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ewhci/Kotenko94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics