Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Igor V. Kotenko
@inproceedings{DBLP:conf/comsnets/KotenkoL24, author = {Igor V. Kotenko and Diana Levshun}, title = {Anomaly Detection in IoT Networks Based on Intelligent Security Event Correlation}, booktitle = {16th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2024, Bengaluru, India, January 3-7, 2024}, pages = {816--824}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/COMSNETS59351.2024.10426939}, doi = {10.1109/COMSNETS59351.2024.10426939}, timestamp = {Fri, 01 Mar 2024 14:04:41 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/KotenkoL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/air/LevshunK23, author = {Diana Levshun and Igor V. Kotenko}, title = {A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities}, journal = {Artif. Intell. Rev.}, volume = {56}, number = {8}, pages = {8547--8590}, year = {2023}, url = {https://doi.org/10.1007/s10462-022-10381-4}, doi = {10.1007/S10462-022-10381-4}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/air/LevshunK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/TushkanovaLBFNK23, author = {Olga Tushkanova and Dmitry Levshun and Alexander Branitskiy and Elena Fedorchenko and Evgenia Novikova and Igor V. Kotenko}, title = {Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation}, journal = {Algorithms}, volume = {16}, number = {2}, pages = {85}, year = {2023}, url = {https://doi.org/10.3390/a16020085}, doi = {10.3390/A16020085}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithms/TushkanovaLBFNK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bdcc/KotenkoSPL23, author = {Igor V. Kotenko and Igor Saenko and Andrei Privalov and Oleg Lauta}, title = {Ensuring {SDN} Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks}, journal = {Big Data Cogn. Comput.}, volume = {7}, number = {2}, pages = {66}, year = {2023}, url = {https://doi.org/10.3390/bdcc7020066}, doi = {10.3390/BDCC7020066}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bdcc/KotenkoSPL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/KotenkoIB23, author = {Igor V. Kotenko and Konstantin E. Izrailov and Mikhail Buinevich}, title = {The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices}, journal = {J. Sens. Actuator Networks}, volume = {12}, number = {1}, pages = {11}, year = {2023}, url = {https://doi.org/10.3390/jsan12010011}, doi = {10.3390/JSAN12010011}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/KotenkoIB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KotenkoFNJ23, author = {Igor V. Kotenko and Elena Fedorchenko and Evgenia Novikova and Ashish Jha}, title = {Cyber Attacker Profiling for Risk Analysis Based on Machine Learning}, journal = {Sensors}, volume = {23}, number = {4}, pages = {2028}, year = {2023}, url = {https://doi.org/10.3390/s23042028}, doi = {10.3390/S23042028}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KotenkoFNJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KolomeetsDKC23, author = {Maxim Kolomeets and Vasily Desnitsky and Igor V. Kotenko and Andrey Chechulin}, title = {Graph Visualization: Alternative Models Inspired by Bioinformatics}, journal = {Sensors}, volume = {23}, number = {7}, pages = {3747}, year = {2023}, url = {https://doi.org/10.3390/s23073747}, doi = {10.3390/S23073747}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KolomeetsDKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biostec/RaedYGKFP23, author = {Mhd. Wasim Raed and Semih Y{\"{o}}n and Ali G{\"{u}}nes and Igor V. Kotenko and Elena Fedorchenko and Anna Polubaryeva}, editor = {Ioanna Chouvarda and Ana L. N. Fred and Hugo Gamboa}, title = {An {RFID} Based Localization and Mental Stress Recognition System Using Wearable Sensors}, booktitle = {Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies, {BIOSTEC} 2023, Volume 4: BIOSIGNALS, Lisbon, Portugal, February 16-18, 2023}, pages = {325--331}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011796000003414}, doi = {10.5220/0011796000003414}, timestamp = {Thu, 23 Mar 2023 11:48:34 +0100}, biburl = {https://dblp.org/rec/conf/biostec/RaedYGKFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotais/KotenkoDN23, author = {Igor V. Kotenko and Vasily Desnitsky and Evgenia Novikova}, title = {Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset}, booktitle = {{IEEE} International Conference on Internet of Things and Intelligence Systems, IoTaIS 2023, Bali, Indonesia, November 28-30, 2023}, pages = {35--39}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IoTaIS60147.2023.10346064}, doi = {10.1109/IOTAIS60147.2023.10346064}, timestamp = {Fri, 09 Feb 2024 20:38:53 +0100}, biburl = {https://dblp.org/rec/conf/iotais/KotenkoDN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotais/KotenkoPD23, author = {Igor V. Kotenko and Igor Parashchuk and Vasily Desnitsky}, title = {Determination of the Transition Probability Matrix for an IoT Fuzzy Security Model}, booktitle = {{IEEE} International Conference on Internet of Things and Intelligence Systems, IoTaIS 2023, Bali, Indonesia, November 28-30, 2023}, pages = {40--44}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IoTaIS60147.2023.10346032}, doi = {10.1109/IOTAIS60147.2023.10346032}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iotais/KotenkoPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KotenkoGZ22, author = {Igor V. Kotenko and Diana Gaifulina and Igor Zelichenok}, title = {Systematic Literature Review of Security Event Correlation Methods}, journal = {{IEEE} Access}, volume = {10}, pages = {43387--43420}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3168976}, doi = {10.1109/ACCESS.2022.3168976}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KotenkoGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/Kotenko0PD22, author = {Igor V. Kotenko and Igor Saenko and Igor Parashchuk and Elena Doynikova}, title = {An approach for selecting countermeasures against harmful information based on uncertainty management}, journal = {Comput. Sci. Inf. Syst.}, volume = {19}, number = {1}, pages = {415--433}, year = {2022}, url = {https://doi.org/10.2298/csis210211057k}, doi = {10.2298/CSIS210211057K}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsis/Kotenko0PD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/KotenkoSLK22, author = {Igor V. Kotenko and Igor Saenko and Oleg Lauta and Aleksander Kribel}, title = {Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods}, journal = {Microprocess. Microsystems}, volume = {90}, pages = {104459}, year = {2022}, url = {https://doi.org/10.1016/j.micpro.2022.104459}, doi = {10.1016/J.MICPRO.2022.104459}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/KotenkoSLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KotenkoIB22, author = {Igor V. Kotenko and Konstantin E. Izrailov and Mikhail Buinevich}, title = {Analytical Modeling for Identification of the Machine Code Architecture of Cyberphysical Devices in Smart Homes}, journal = {Sensors}, volume = {22}, number = {3}, pages = {1017}, year = {2022}, url = {https://doi.org/10.3390/s22031017}, doi = {10.3390/S22031017}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/KotenkoIB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KotenkoIB22a, author = {Igor V. Kotenko and Konstantin E. Izrailov and Mikhail Buinevich}, title = {Static Analysis of Information Systems for IoT Cyber Security: {A} Survey of Machine Learning Approaches}, journal = {Sensors}, volume = {22}, number = {4}, pages = {1335}, year = {2022}, url = {https://doi.org/10.3390/s22041335}, doi = {10.3390/S22041335}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KotenkoIB22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/DesnitskyCK22, author = {Vasily Desnitsky and Andrey Chechulin and Igor V. Kotenko}, title = {Multi-Aspect Based Approach to Attack Detection in IoT Clouds}, journal = {Sensors}, volume = {22}, number = {5}, pages = {1831}, year = {2022}, url = {https://doi.org/10.3390/s22051831}, doi = {10.3390/S22051831}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/DesnitskyCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KuznetsovNKD22, author = {Mikhail Kuznetsov and Evgenia Novikova and Igor V. Kotenko and Elena Doynikova}, title = {Privacy Policies of IoT Devices: Collection and Analysis}, journal = {Sensors}, volume = {22}, number = {5}, pages = {1838}, year = {2022}, url = {https://doi.org/10.3390/s22051838}, doi = {10.3390/S22051838}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/KuznetsovNKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LevshunCK22, author = {Dmitry Levshun and Andrey Chechulin and Igor V. Kotenko}, title = {Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View}, journal = {Sensors}, volume = {22}, number = {13}, pages = {5063}, year = {2022}, url = {https://doi.org/10.3390/s22135063}, doi = {10.3390/S22135063}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LevshunCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/KotenkoSLK22, author = {Igor V. Kotenko and Igor Saenko and Oleg Lauta and Alexander Kribel}, title = {A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods}, journal = {Sensors}, volume = {22}, number = {19}, pages = {7506}, year = {2022}, url = {https://doi.org/10.3390/s22197506}, doi = {10.3390/S22197506}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/KotenkoSLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adiot/KryukovZFNK22, author = {Roman Kryukov and Vladimir Zima and Elena Fedorchenko and Evgenia Novikova and Igor V. Kotenko}, editor = {Wenjuan Li and Steven Furnell and Weizhi Meng}, title = {Mapping the Security Events to the {MITRE} {ATT} {\&}CK Attack Patterns to Forecast Attack Propagation (Extended Abstract)}, booktitle = {Attacks and Defenses for the Internet-of-Things - 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13745}, pages = {165--176}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-21311-3\_10}, doi = {10.1007/978-3-031-21311-3\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/adiot/KryukovZFNK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/Kotenko022, author = {Igor V. Kotenko and Igor Saenko}, editor = {Lars Braubach and Kai Jander and Costin Badica}, title = {Applying Machine Learning Methods to Detect Abnormal User Behavior in a University Data Center}, booktitle = {Intelligent Distributed Computing XV, 15th International Symposium on Intelligent Distributed Computing, {IDC} 2022, Virtual Event / Bremen, Germany, 14-15 September 2022}, series = {Studies in Computational Intelligence}, volume = {1089}, pages = {13--22}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29104-3\_2}, doi = {10.1007/978-3-031-29104-3\_2}, timestamp = {Mon, 15 Apr 2024 16:13:56 +0200}, biburl = {https://dblp.org/rec/conf/idc/Kotenko022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/GaifulinaBLDK22, author = {Diana Gaifulina and Alexander Branitskiy and Dmitry Levshun and Elena Doynikova and Igor V. Kotenko}, editor = {Lars Braubach and Kai Jander and Costin Badica}, title = {Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts}, booktitle = {Intelligent Distributed Computing XV, 15th International Symposium on Intelligent Distributed Computing, {IDC} 2022, Virtual Event / Bremen, Germany, 14-15 September 2022}, series = {Studies in Computational Intelligence}, volume = {1089}, pages = {203--212}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29104-3\_23}, doi = {10.1007/978-3-031-29104-3\_23}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/GaifulinaBLDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meco/MeleshkoDK22, author = {Alexey Meleshko and Vasily Desnitsky and Igor V. Kotenko}, title = {Simulation-based and Graph oriented Approach to Detection of Network Attacks}, booktitle = {11th Mediterranean Conference on Embedded Computing, {MECO} 2022, Budva, Montenegro, June 7-10, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MECO55406.2022.9797159}, doi = {10.1109/MECO55406.2022.9797159}, timestamp = {Fri, 01 Jul 2022 09:09:18 +0200}, biburl = {https://dblp.org/rec/conf/meco/MeleshkoDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KuznetsovNK22, author = {Mikhail Kuznetsov and Evgenia Novikova and Igor V. Kotenko}, editor = {Arturo Gonz{\'{a}}lez{-}Escribano and Jos{\'{e}} Daniel Garc{\'{\i}}a and Massimo Torquati and Amund Skavhaug}, title = {An approach to formal desription of the user notification scenarios in privacy policies}, booktitle = {30th Euromicro International Conference on Parallel, Distributed and Network-based Processing, {PDP} 2022, Valladolid, Spain, March 9-11, 2022}, pages = {275--282}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PDP55904.2022.00049}, doi = {10.1109/PDP55904.2022.00049}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/KuznetsovNK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/SaenkoK22, author = {Igor Saenko and Igor V. Kotenko}, editor = {Arturo Gonz{\'{a}}lez{-}Escribano and Jos{\'{e}} Daniel Garc{\'{\i}}a and Massimo Torquati and Amund Skavhaug}, title = {Towards Resilient and Efficient Big Data Storage: Evaluating a {SIEM} Repository Based on {HDFS}}, booktitle = {30th Euromicro International Conference on Parallel, Distributed and Network-based Processing, {PDP} 2022, Valladolid, Spain, March 9-11, 2022}, pages = {290--297}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/PDP55904.2022.00051}, doi = {10.1109/PDP55904.2022.00051}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/SaenkoK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobisec2/2021, editor = {Ilsun You and Hwankuk Kim and Taek{-}Young Youn and Francesco Palmieri and Igor V. Kotenko}, title = {Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1544}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-16-9576-6}, doi = {10.1007/978-981-16-9576-6}, isbn = {978-981-16-9575-9}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/VitkovaKC21, author = {Lidia Vitkova and Igor V. Kotenko and Andrey Chechulin}, title = {An Approach to Ranking the Sources of Information Dissemination in Social Networks}, journal = {Inf.}, volume = {12}, number = {10}, pages = {416}, year = {2021}, url = {https://doi.org/10.3390/info12100416}, doi = {10.3390/INFO12100416}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/VitkovaKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/BuinevichIKK21, author = {Mikhail V. Buinevich and Konstantin E. Izrailov and Igor V. Kotenko and Pavel A. Kurta}, title = {Method and algorithms of visual audit of program interaction}, journal = {J. Internet Serv. Inf. Secur.}, volume = {11}, number = {1}, pages = {16--43}, year = {2021}, url = {https://doi.org/10.22667/JISIS.2021.02.28.016}, doi = {10.22667/JISIS.2021.02.28.016}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/BuinevichIKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KolomeetsCK21, author = {Maxim Kolomeets and Andrey Chechulin and Igor V. Kotenko}, title = {Bot detection by friends graph in social networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {2}, pages = {141--159}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.06.30.141}, doi = {10.22667/JOWUA.2021.06.30.141}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KolomeetsCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/KotenkoKUI21, author = {Igor V. Kotenko and Andrey V. Krasov and Igor Ushakov and Konstantin E. Izrailov}, title = {An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database}, journal = {J. Sens. Actuator Networks}, volume = {10}, number = {2}, pages = {25}, year = {2021}, url = {https://doi.org/10.3390/jsan10020025}, doi = {10.3390/JSAN10020025}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsan/KotenkoKUI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/LevshunKC21, author = {Dmitry Levshun and Igor V. Kotenko and Andrey Chechulin}, title = {The application of the methodology for secure cyber-physical systems design to improve the semi-natural model of the railway infrastructure}, journal = {Microprocess. Microsystems}, volume = {87}, pages = {103482}, year = {2021}, url = {https://doi.org/10.1016/j.micpro.2020.103482}, doi = {10.1016/J.MICPRO.2020.103482}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/LevshunKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LevshunCK21, author = {Dmitry Levshun and Andrey Chechulin and Igor V. Kotenko}, title = {Design of Secure Microcontroller-Based Systems: Application to Mobile Robots for Perimeter Monitoring}, journal = {Sensors}, volume = {21}, number = {24}, pages = {8451}, year = {2021}, url = {https://doi.org/10.3390/s21248451}, doi = {10.3390/S21248451}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LevshunCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/DesnitskyK21, author = {Vasily Desnitsky and Igor V. Kotenko}, title = {Simulation and assessment of battery depletion attacks on unmanned aerial vehicles for crisis management infrastructures}, journal = {Simul. Model. Pract. Theory}, volume = {107}, pages = {102244}, year = {2021}, url = {https://doi.org/10.1016/j.simpat.2020.102244}, doi = {10.1016/J.SIMPAT.2020.102244}, timestamp = {Sat, 09 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/simpra/DesnitskyK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/KaratzaK21, author = {Helen D. Karatza and Igor V. Kotenko}, title = {Guest Editors' Introduction "Modeling and Simulation for Intelligent Distributed Computing"}, journal = {Simul. Model. Pract. Theory}, volume = {109}, pages = {102297}, year = {2021}, url = {https://doi.org/10.1016/j.simpat.2021.102297}, doi = {10.1016/J.SIMPAT.2021.102297}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpra/KaratzaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/BranitskiyKS21, author = {Alexander Branitskiy and Igor V. Kotenko and Igor Saenko}, title = {Applying machine learning and parallel data processing for attack detection in IoT}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {4}, pages = {1642--1653}, year = {2021}, url = {https://doi.org/10.1109/TETC.2020.3006351}, doi = {10.1109/TETC.2020.3006351}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/BranitskiyKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DoynikovaNMKGTL21, author = {Elena Doynikova and Evgenia Novikova and Ivan Murenin and Maxim Kolomeec and Diana Gaifulina and Olga Tushkanova and Dmitry Levshun and Alexey Meleshko and Igor V. Kotenko}, editor = {Sokratis K. Katsikas and Costas Lambrinoudakis and Nora Cuppens and John Mylopoulos and Christos Kalloniatis and Weizhi Meng and Steven Furnell and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge}, title = {Security Measuring System for IoT Devices}, booktitle = {Computer Security. {ESORICS} 2021 International Workshops - CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT{\&}SECOMANE, Darmstadt, Germany, October 4-8, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13106}, pages = {256--275}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95484-0\_16}, doi = {10.1007/978-3-030-95484-0\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DoynikovaNMKGTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/KotenkoSB21, author = {Igor V. Kotenko and Yash Sharma and Alexander Branitskiy}, title = {Predicting the Mental State of the Social Network Users based on the Latent Dirichlet Allocation and fastText}, booktitle = {2021 11th {IEEE} International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, September 22-25, 2021}, pages = {191--195}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IDAACS53288.2021.9661061}, doi = {10.1109/IDAACS53288.2021.9661061}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idaacs/KotenkoSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/UshakovDNK21, author = {Roman Ushakov and Elena Doynikova and Evgenia Novikova and Igor V. Kotenko}, title = {{CPE} and {CVE} based Technique for Software Security Risk Assessment}, booktitle = {2021 11th {IEEE} International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, September 22-25, 2021}, pages = {353--356}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IDAACS53288.2021.9660968}, doi = {10.1109/IDAACS53288.2021.9660968}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idaacs/UshakovDNK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/LevshunCK21, author = {Dmitry Levshun and Andrey Chechulin and Igor V. Kotenko}, editor = {David Camacho and Domenico Rosaci and Giuseppe M. L. Sarn{\'{e}} and Mario Versaci}, title = {A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems}, booktitle = {Intelligent Distributed Computing XIV, 14th International Symposium on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18 September 2021}, series = {Studies in Computational Intelligence}, volume = {1026}, pages = {397--406}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-96627-0\_36}, doi = {10.1007/978-3-030-96627-0\_36}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/LevshunCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/KotenkoAM021, author = {Igor V. Kotenko and Vladimir Avramenko and Albert Malikov and Igor Saenko}, editor = {David Camacho and Domenico Rosaci and Giuseppe M. L. Sarn{\'{e}} and Mario Versaci}, title = {An Approach to the Synthesis of a Neural Network System for Diagnosing Computer Incidents}, booktitle = {Intelligent Distributed Computing XIV, 14th International Symposium on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18 September 2021}, series = {Studies in Computational Intelligence}, volume = {1026}, pages = {407--416}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-96627-0\_37}, doi = {10.1007/978-3-030-96627-0\_37}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/KotenkoAM021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/KryukovDK21, author = {Roman Kryukov and Elena Doynikova and Igor V. Kotenko}, editor = {David Camacho and Domenico Rosaci and Giuseppe M. L. Sarn{\'{e}} and Mario Versaci}, title = {Security Analysis of Information Systems Based on Attack Sequences Generation and Testing}, booktitle = {Intelligent Distributed Computing XIV, 14th International Symposium on Intelligent Distributed Computing, {IDC} 2021, Virtual Event, 16-18 September 2021}, series = {Studies in Computational Intelligence}, volume = {1026}, pages = {427--437}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-96627-0\_39}, doi = {10.1007/978-3-030-96627-0\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/KryukovDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ihaw/DoynikovaBK21, author = {Elena Doynikova and Alexander Branitskiy and Igor V. Kotenko}, editor = {Edwige E. Pissaloux and George Angelos Papadopoulos and Achilleas Achilleos and Ramiro Vel{\'{a}}zquez}, title = {Detection and Monitoring of the Destructive Impacts in the Social Networks Using Machine Learning Methods}, booktitle = {{ICT} for Health, Accessibility and Wellbeing - First International Conference, {IHAW} 2021, Larnaca, Cyprus, November 8-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1538}, pages = {60--65}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-94209-0\_6}, doi = {10.1007/978-3-030-94209-0\_6}, timestamp = {Tue, 31 May 2022 15:50:21 +0200}, biburl = {https://dblp.org/rec/conf/ihaw/DoynikovaBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/meco/MeleshkoDKNS21, author = {Alexey Meleshko and Vasily Desnitsky and Igor V. Kotenko and Evgenia Novikova and Anton Shulepov}, title = {Combined Approach to Anomaly Detection in Wireless Sensor Networks on Example of Water Management System}, booktitle = {10th Mediterranean Conference on Embedded Computing, {MECO} 2021, Budva, Montenegro, June 7-10, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MECO52532.2021.9460237}, doi = {10.1109/MECO52532.2021.9460237}, timestamp = {Tue, 06 Jul 2021 12:03:09 +0200}, biburl = {https://dblp.org/rec/conf/meco/MeleshkoDKNS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/VorobevaKZK21, author = {Alisa A. Vorobeva and Guldar Khisaeva and Danil Zakoldaev and Igor V. Kotenko}, editor = {Ilsun You and Hwankuk Kim and Taek{-}Young Youn and Francesco Palmieri and Igor V. Kotenko}, title = {Detection of Business Email Compromise Attacks with Writing Style Analysis}, booktitle = {Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1544}, pages = {248--262}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-9576-6\_18}, doi = {10.1007/978-981-16-9576-6\_18}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/VorobevaKZK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/IzrailovLKC21, author = {Konstantin E. Izrailov and Dmitry Levshun and Igor V. Kotenko and Andrey Chechulin}, editor = {Ilsun You and Hwankuk Kim and Taek{-}Young Youn and Francesco Palmieri and Igor V. Kotenko}, title = {Classification and Analysis of Vulnerabilities in Mobile Device Infrastructure Interfaces}, booktitle = {Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1544}, pages = {301--319}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-9576-6\_21}, doi = {10.1007/978-981-16-9576-6\_21}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/IzrailovLKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/GaifulinaK21, author = {Diana Gaifulina and Igor V. Kotenko}, title = {Selection of Deep Neural Network Models for IoT Anomaly Detection Experiments}, booktitle = {29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2021, Valladolid, Spain, March 10-12, 2021}, pages = {260--265}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PDP52278.2021.00049}, doi = {10.1109/PDP52278.2021.00049}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/GaifulinaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoSKL21, author = {Igor V. Kotenko and Igor Saenko and Aleksander Kribel and Oleg Lauta}, title = {A technique for early detection of cyberattacks using the traffic self-similarity property and a statistical approach}, booktitle = {29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2021, Valladolid, Spain, March 10-12, 2021}, pages = {281--284}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PDP52278.2021.00052}, doi = {10.1109/PDP52278.2021.00052}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoSKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcai/SaenkoKSA21, author = {Igor Saenko and Igor V. Kotenko and Fadey Skorik and Mazen Al{-}Barri}, editor = {Sergei M. Kovalev and Sergei O. Kuznetsov and Aleksandr I. Panov}, title = {Detecting Anomalous Behavior of Users of Data Centers Based on the Application of Artificial Neural Networks}, booktitle = {Artificial Intelligence - 19th Russian Conference, {RCAI} 2021, Taganrog, Russia, October 11-16, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12948}, pages = {331--342}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86855-0\_23}, doi = {10.1007/978-3-030-86855-0\_23}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rcai/SaenkoKSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KotenkoSLK21, author = {Igor V. Kotenko and Igor Saenko and Oleg Lauta and Mikhail Karpov}, editor = {Naghmeh Moradpoor and Atilla El{\c{c}}i and Andrei Petrovski}, title = {Situational Control of a Computer Network Security System in Conditions of Cyber Attacks}, booktitle = {14th International Conference on Security of Information and Networks, {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SIN54109.2021.9699368}, doi = {10.1109/SIN54109.2021.9699368}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/KotenkoSLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/MureninDK21, author = {Ivan Murenin and Elena Doynikova and Igor V. Kotenko}, editor = {Naghmeh Moradpoor and Atilla El{\c{c}}i and Andrei Petrovski}, title = {Towards Security Decision Support for large-scale Heterogeneous Distributed Information Systems}, booktitle = {14th International Conference on Security of Information and Networks, {SIN} 2021, Edinburgh, United Kingdom, December 15-17, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SIN54109.2021.9699195}, doi = {10.1109/SIN54109.2021.9699195}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/MureninDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/KotenkoLKS21, author = {Igor V. Kotenko and Oleg Lauta and Kseniya Kribel and Igor Saenko}, editor = {Hamido Fujita and H{\'{e}}ctor P{\'{e}}rez{-}Meana}, title = {{LSTM} Neural Networks for Detecting Anomalies Caused by Web Application Cyber Attacks}, booktitle = {New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 20th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 202, Cancun, Mexico, 21-23 September, 2021}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {337}, pages = {127--140}, publisher = {{IOS} Press}, year = {2021}, url = {https://doi.org/10.3233/FAIA210014}, doi = {10.3233/FAIA210014}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/somet/KotenkoLKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wac2/IzrailovBKY21, author = {Konstantin E. Izrailov and Mikhail V. Buinevich and Igor V. Kotenko and Alexander Yaroshenko}, title = {Identifying characteristics of software vulnerabilities by their textual description using machine learning}, booktitle = {2021 World Automation Congress, {WAC} 2021, Taipei, Taiwan, August 1-5, 2021}, pages = {186--192}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/WAC50355.2021.9559470}, doi = {10.23919/WAC50355.2021.9559470}, timestamp = {Thu, 14 Oct 2021 16:58:47 +0200}, biburl = {https://dblp.org/rec/conf/wac2/IzrailovBKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aicom/KotenkoVSTB20, author = {Igor V. Kotenko and Lidiya Vitkova and Igor Saenko and Olga Tushkanova and Alexander Branitskiy}, title = {The intelligent system for detection and counteraction of malicious and inappropriate information on the Internet}, journal = {{AI} Commun.}, volume = {33}, number = {1}, pages = {13--25}, year = {2020}, url = {https://doi.org/10.3233/AIC-200647}, doi = {10.3233/AIC-200647}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aicom/KotenkoVSTB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/FakihBK20, author = {Bilal Fakih and Didier El Baz and Igor V. Kotenko}, title = {{GRIDHPC:} {A} decentralized environment for high performance computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {10}, year = {2020}, url = {https://doi.org/10.1002/cpe.5320}, doi = {10.1002/CPE.5320}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/FakihBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/MerelliLKD20, author = {Ivan Merelli and Pietro Li{\`{o}} and Igor V. Kotenko and Daniele D'Agostino}, title = {Latest advances in parallel, distributed, and network-based processing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {10}, year = {2020}, url = {https://doi.org/10.1002/cpe.5683}, doi = {10.1002/CPE.5683}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/MerelliLKD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/DoynikovaNK20, author = {Elena Doynikova and Evgenia Novikova and Igor V. Kotenko}, title = {Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: {A} Comparative Review and Prospects}, journal = {Inf.}, volume = {11}, number = {3}, pages = {168}, year = {2020}, url = {https://doi.org/10.3390/info11030168}, doi = {10.3390/INFO11030168}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/information/DoynikovaNK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GranadilloDGKF20, author = {Gustavo {Gonzalez Granadillo} and Elena Doynikova and Joaqu{\'{\i}}n Garc{\'{\i}}a and Igor V. Kotenko and Andrey Fedorchenko}, title = {Stateful RORI-based countermeasure selection using hypergraphs}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102541}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102541}, doi = {10.1016/J.JISA.2020.102541}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/GranadilloDGKF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/GranadilloDGKF20a, author = {Gustavo {Gonzalez Granadillo} and Elena Doynikova and Joaqu{\'{\i}}n Garc{\'{\i}}a and Igor V. Kotenko and Andrey Fedorchenko}, title = {Stateful RORI-based countermeasure selection using hypergraphs}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102562}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102562}, doi = {10.1016/J.JISA.2020.102562}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/GranadilloDGKF20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DoynikovaFK20, author = {Elena Doynikova and Andrey Fedorchenko and Igor V. Kotenko}, title = {A Semantic Model for Security Evaluation of Information Systems}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {301--330}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.925}, doi = {10.13052/JCSM2245-1439.925}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DoynikovaFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kotenko20, author = {Igor V. Kotenko}, title = {Guest Editorial: Intelligent Distributed Computing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {1--2}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.001}, doi = {10.22667/JOWUA.2020.06.30.001}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kotenko20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/FenzlRCDK20, author = {Florian Fenzl and Roland Rieke and Yannick Chevalier and Andreas Dominik and Igor V. Kotenko}, title = {Continuous fields: Enhanced in-vehicle anomaly detection using machine learning models}, journal = {Simul. Model. Pract. Theory}, volume = {105}, pages = {102143}, year = {2020}, url = {https://doi.org/10.1016/j.simpat.2020.102143}, doi = {10.1016/J.SIMPAT.2020.102143}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpra/FenzlRCDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/LevshunCKC20, author = {Dmitry Levshun and Yannick Chevalier and Igor V. Kotenko and Andrey Chechulin}, title = {Design and verification of a mobile robot based on the integrated model of cyber-Physical systems}, journal = {Simul. Model. Pract. Theory}, volume = {105}, pages = {102151}, year = {2020}, url = {https://doi.org/10.1016/j.simpat.2020.102151}, doi = {10.1016/J.SIMPAT.2020.102151}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/simpra/LevshunCKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/DoynikovaNGK20, author = {Elena Doynikova and Evgenia Novikova and Diana Gaifulina and Igor V. Kotenko}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jean Leneutre and Nora Cuppens and Reda Yaich}, title = {Towards Attacker Attribution for Risk Analysis}, booktitle = {Risks and Security of Internet and Systems - 15th International Conference, CRiSIS 2020, Paris, France, November 4-6, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12528}, pages = {347--353}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68887-5\_22}, doi = {10.1007/978-3-030-68887-5\_22}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crisis/DoynikovaNGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NovikovaDK20, author = {Evgenia Novikova and Elena Doynikova and Igor V. Kotenko}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Weizhi Meng and Steven Furnell}, title = {P2Onto: Making Privacy Policies Transparent}, booktitle = {Computer Security - {ESORICS} 2020 International Workshops, CyberICPS, SECPRE, and ADIoT, Guildford, UK, September 14-18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12501}, pages = {235--252}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64330-0\_15}, doi = {10.1007/978-3-030-64330-0\_15}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/esorics/NovikovaDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/KotenkoKUI20, author = {Igor V. Kotenko and Andrey V. Krasov and Igor Ushakov and Konstantin E. Izrailov}, title = {Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model}, booktitle = {{ICFNDS} '20: The 4th International Conference on Future Networks and Distributed Systems, St. Petersburg, Russia, 26-27 November, 2020}, pages = {19:1--19:8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3440749.3442612}, doi = {10.1145/3440749.3442612}, timestamp = {Fri, 28 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfnds/KotenkoKUI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfnds/BuinevichIKUV20, author = {Mikhail V. Buinevich and Konstantin E. Izrailov and Igor V. Kotenko and Igor Ushakov and Dmitry Vlasov}, title = {Approach to combining different methods for detecting insiders}, booktitle = {{ICFNDS} '20: The 4th International Conference on Future Networks and Distributed Systems, St. Petersburg, Russia, 26-27 November, 2020}, pages = {26:1--26:6}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3440749.3442619}, doi = {10.1145/3440749.3442619}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfnds/BuinevichIKUV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icstcc/KotenkoBTD20, author = {Igor V. Kotenko and Alexander Branitskiy and Artem Tishkov and Elena Doynikova}, editor = {Lucian{-}Florentin Barbulescu}, title = {Analysis of Formats of Young People's Communicative Behavior in Social Network}, booktitle = {24th International Conference on System Theory, Control and Computing, {ICSTCC} 2020, Sinaia, Romania, October 8-10, 2020}, pages = {439--444}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICSTCC50638.2020.9259747}, doi = {10.1109/ICSTCC50638.2020.9259747}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icstcc/KotenkoBTD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/inista/ParashchukDSK20, author = {Igor Parashchuk and Elena Doynikova and Igor Saenko and Igor V. Kotenko}, editor = {Mirjana Ivanovic and Tulay Yildirim and Goce Trajcevski and Costin Badica and Ladjel Bellatreche and Igor V. Kotenko and Amelia Badica and Burcu Erkmen and Milos Savic}, title = {Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty}, booktitle = {International Conference on INnovations in Intelligent SysTems and Applications, {INISTA} 2020, Novi Sad, Serbia, August 24-26, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INISTA49547.2020.9194680}, doi = {10.1109/INISTA49547.2020.9194680}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/inista/ParashchukDSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/PrivalovSKS20, author = {Andrei Privalov and Ekaterina Skudneva and Igor V. Kotenko and Igor Saenko}, title = {Graph-based evaluation of probability of disclosing the network structure by targeted attacks}, booktitle = {{NOMS} 2020 - {IEEE/IFIP} Network Operations and Management Symposium, Budapest, Hungary, April 20-24, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/NOMS47738.2020.9110299}, doi = {10.1109/NOMS47738.2020.9110299}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/noms/PrivalovSKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KolomeetsCZKG20, author = {Maxim Kolomeets and Andrey Chechulin and Ksenia Zhernova and Igor V. Kotenko and Diana Gaifulina}, title = {Augmented reality for visualizing security data for cybernetic and cyberphysical systems}, booktitle = {28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2020, V{\"{a}}ster{\aa}s, Sweden, March 11-13, 2020}, pages = {421--428}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/PDP50117.2020.00071}, doi = {10.1109/PDP50117.2020.00071}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/KolomeetsCZKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoSS20, author = {Igor V. Kotenko and Yury Sineshchuk and Igor Saenko}, title = {Optimizing Secure Information Interaction in Distributed Computing Systems by the Sequential Concessions Method}, booktitle = {28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2020, V{\"{a}}ster{\aa}s, Sweden, March 11-13, 2020}, pages = {429--432}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/PDP50117.2020.00072}, doi = {10.1109/PDP50117.2020.00072}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KalameyetsLSCK20, author = {Maksim Kalameyets and Dmitry Levshun and Sergei Soloviev and Andrey Chechulin and Igor V. Kotenko}, editor = {Siddika Berna {\"{O}}rs and Atilla El{\c{c}}i}, title = {Social networks bot detection using Benford's law}, booktitle = {{SIN} 2020: 13th International Conference on Security of Information and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020}, pages = {19:1--19:8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3433174.3433589}, doi = {10.1145/3433174.3433589}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/KalameyetsLSCK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KotenkoSS20, author = {Igor V. Kotenko and Igor Saenko and Fadey Skorik}, editor = {Siddika Berna {\"{O}}rs and Atilla El{\c{c}}i}, title = {Intelligent support for network administrator decisions based on combined neural networks}, booktitle = {{SIN} 2020: 13th International Conference on Security of Information and Networks, Virtual Event / Istanbul, Turkey, November 4-6, 2020}, pages = {31:1--31:8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3433174.3433602}, doi = {10.1145/3433174.3433602}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KotenkoSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isrl/KotenkoSB20, author = {Igor V. Kotenko and Igor Saenko and Alexander Branitskiy}, editor = {Leslie F. Sikos and Kim{-}Kwang Raymond Choo}, title = {Machine Learning and Big Data Processing for Cybersecurity Data Analysis}, booktitle = {Data Science in Cybersecurity and Cyberthreat Intelligence}, series = {Intelligent Systems Reference Library}, volume = {177}, pages = {61--85}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38788-4\_4}, doi = {10.1007/978-3-030-38788-4\_4}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/isrl/KotenkoSB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/idc/2019, editor = {Igor V. Kotenko and Costin Badica and Vasily Desnitsky and Didier El Baz and Mirjana Ivanovic}, title = {Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg, Russia, 7-9 October, 2019}, series = {Studies in Computational Intelligence}, volume = {868}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-32258-8}, doi = {10.1007/978-3-030-32258-8}, isbn = {978-3-030-32257-1}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/inista/2020, editor = {Mirjana Ivanovic and Tulay Yildirim and Goce Trajcevski and Costin Badica and Ladjel Bellatreche and Igor V. Kotenko and Amelia Badica and Burcu Erkmen and Milos Savic}, title = {International Conference on INnovations in Intelligent SysTems and Applications, {INISTA} 2020, Novi Sad, Serbia, August 24-26, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9184152/proceeding}, isbn = {978-1-7281-6799-2}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/inista/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobisec2/2019, editor = {Ilsun You and Hsing{-}Chung Chen and Fang{-}Yie Leu and Igor V. Kotenko}, title = {Mobile Internet Security - 4th International Symposium, MobiSec 2019, Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1121}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9609-4}, doi = {10.1007/978-981-15-9609-4}, isbn = {978-981-15-9608-7}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/accs/DoynikovaFK19, author = {Elena Doynikova and Andrey Fedorchenko and Igor V. Kotenko}, title = {Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions}, journal = {Autom. Control. Comput. Sci.}, volume = {53}, number = {8}, pages = {1029--1037}, year = {2019}, url = {https://doi.org/10.3103/S014641161908008X}, doi = {10.3103/S014641161908008X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/accs/DoynikovaFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/BranitskiyLKDKT19, author = {Alexander Branitskiy and Dmitry Levshun and Natalia Krasilnikova and Elena Doynikova and Igor V. Kotenko and Artem Tishkov and Nina Vanchakova and Andrey Chechulin}, title = {Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks}, journal = {J. Internet Serv. Inf. Secur.}, volume = {9}, number = {3}, pages = {1--20}, year = {2019}, url = {https://doi.org/10.22667/JISIS.2019.08.31.001}, doi = {10.22667/JISIS.2019.08.31.001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/BranitskiyLKDKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KolomeetsCK19, author = {Maxim Kolomeets and Andrey Chechulin and Igor V. Kotenko}, title = {Social networks analysis by graph algorithms on the example of the VKontakte social network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {2}, pages = {55--75}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.06.30.055}, doi = {10.22667/JOWUA.2019.06.30.055}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KolomeetsCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KolomeetsBBCSK19, author = {Maxim Kolomeets and Amira Benachour and Didier El Baz and Andrey Chechulin and Martin Strecker and Igor V. Kotenko}, title = {Reference architecture for social networks graph analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {109--125}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.109}, doi = {10.22667/JOWUA.2019.12.31.109}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KolomeetsBBCSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/FedorchenkoDK19, author = {Andrey Fedorchenko and Elena Doynikova and Igor V. Kotenko}, title = {Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits}, journal = {J. Univers. Comput. Sci.}, volume = {25}, number = {9}, pages = {1043--1065}, year = {2019}, url = {http://www.jucs.org/jucs\_25\_9/determination\_of\_system\_weaknesses}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/FedorchenkoDK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/KotenkoSA19, author = {Igor V. Kotenko and Igor Saenko and Sergey Ageev}, title = {Hierarchical fuzzy situational networks for online decision-making: Application to telecommunication systems}, journal = {Knowl. Based Syst.}, volume = {185}, year = {2019}, url = {https://doi.org/10.1016/j.knosys.2019.104935}, doi = {10.1016/J.KNOSYS.2019.104935}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/KotenkoSA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DoynikovaFK19, author = {Elena Doynikova and Andrey Fedorchenko and Igor V. Kotenko}, title = {Ontology of Metrics for Cyber Security Assessment}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {52:1--52:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3341496}, doi = {10.1145/3339252.3341496}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DoynikovaFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NovikovaBK19, author = {Evgenia Novikova and Mikhail Bestuzhev and Igor V. Kotenko}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Anomaly Detection in the {HVAC} System Operation by a RadViz Based Visualization-Driven Approach}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, pages = {402--418}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42048-2\_26}, doi = {10.1007/978-3-030-42048-2\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/NovikovaBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/SaenkoK19, author = {Igor Saenko and Igor V. Kotenko}, editor = {Manuel L{\'{o}}pez{-}Ib{\'{a}}{\~{n}}ez and Anne Auger and Thomas St{\"{u}}tzle}, title = {A role-base approach and a genetic algorithm for {VLAN} design in large critical infrastructures}, booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference Companion, {GECCO} 2019, Prague, Czech Republic, July 13-17, 2019}, pages = {1643--1650}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319619.3326853}, doi = {10.1145/3319619.3326853}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/SaenkoK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/BranitskiyFKS19, author = {Alexander Branitskiy and Andrey Fedorchenko and Igor V. Kotenko and Igor Saenko}, title = {An Approach to Intelligent Distributed Scanning and Analytical Processing of the Internet Inappropriate Information}, booktitle = {10th {IEEE} International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, {IDAACS} 2019, Metz, France, September 18-21, 2019}, pages = {146--151}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IDAACS.2019.8924380}, doi = {10.1109/IDAACS.2019.8924380}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idaacs/BranitskiyFKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/GaifulinaFK19, author = {Diana Gaifulina and Andrey Fedorchenko and Igor V. Kotenko}, title = {Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty}, booktitle = {10th {IEEE} International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, {IDAACS} 2019, Metz, France, September 18-21, 2019}, pages = {163--167}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IDAACS.2019.8924349}, doi = {10.1109/IDAACS.2019.8924349}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idaacs/GaifulinaFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/BranitskiyDKKLT19, author = {Alexander Branitskiy and Elena Doynikova and Igor V. Kotenko and Natalia Krasilnikova and Dmitry Levshun and Artem Tishkov and Nina Vanchakova}, editor = {Igor V. Kotenko and Costin Badica and Vasily Desnitsky and Didier El Baz and Mirjana Ivanovic}, title = {The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing}, booktitle = {Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg, Russia, 7-9 October, 2019}, series = {Studies in Computational Intelligence}, volume = {868}, pages = {302--310}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32258-8\_36}, doi = {10.1007/978-3-030-32258-8\_36}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/BranitskiyDKKLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/DesnitskyRK19, author = {Vasily Desnitsky and Nikolay Rudavin and Igor V. Kotenko}, editor = {Igor V. Kotenko and Costin Badica and Vasily Desnitsky and Didier El Baz and Mirjana Ivanovic}, title = {Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems}, booktitle = {Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg, Russia, 7-9 October, 2019}, series = {Studies in Computational Intelligence}, volume = {868}, pages = {323--332}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32258-8\_38}, doi = {10.1007/978-3-030-32258-8\_38}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/DesnitskyRK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/LevshunKC19, author = {Dmitry Levshun and Igor V. Kotenko and Andrey Chechulin}, editor = {Igor V. Kotenko and Costin Badica and Vasily Desnitsky and Didier El Baz and Mirjana Ivanovic}, title = {The Integrated Model of Secure Cyber-Physical Systems for Their Design and Verification}, booktitle = {Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg, Russia, 7-9 October, 2019}, series = {Studies in Computational Intelligence}, volume = {868}, pages = {333--343}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32258-8\_39}, doi = {10.1007/978-3-030-32258-8\_39}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/LevshunKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/ChevalierRFCK19, author = {Yannick Chevalier and Roland Rieke and Florian Fenzl and Andrey Chechulin and Igor V. Kotenko}, editor = {Igor V. Kotenko and Costin Badica and Vasily Desnitsky and Didier El Baz and Mirjana Ivanovic}, title = {ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection}, booktitle = {Intelligent Distributed Computing XIII, 13th International Symposium on Intelligent Distributed Computing, {IDC} 2019, St. Petersburg, Russia, 7-9 October, 2019}, series = {Studies in Computational Intelligence}, volume = {868}, pages = {495--504}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32258-8\_58}, doi = {10.1007/978-3-030-32258-8\_58}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/ChevalierRFCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/ZhernovaKKC19, author = {Ksenia Zhernova and Maxim Kolomeets and Igor V. Kotenko and Andrey Chechulin}, editor = {Ilsun You and Hsing{-}Chung Chen and Fang{-}Yie Leu and Igor V. Kotenko}, title = {Adaptive Touch Interface: Application for Mobile Internet Security}, booktitle = {Mobile Internet Security - 4th International Symposium, MobiSec 2019, Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1121}, pages = {53--72}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-9609-4\_5}, doi = {10.1007/978-981-15-9609-4\_5}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/ZhernovaKKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/LevshunBCK19, author = {Dmitry Levshun and Yurii Bakhtin and Andrey Chechulin and Igor V. Kotenko}, editor = {Ilsun You and Hsing{-}Chung Chen and Fang{-}Yie Leu and Igor V. Kotenko}, title = {Analysis of Attack Actions on the Railway Infrastructure Based on the Integrated Model}, booktitle = {Mobile Internet Security - 4th International Symposium, MobiSec 2019, Taichung, Taiwan, October 17-19, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1121}, pages = {145--162}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-9609-4\_11}, doi = {10.1007/978-981-15-9609-4\_11}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/LevshunBCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/DoynikovaFK19, author = {Elena Doynikova and Andrey Fedorchenko and Igor V. Kotenko}, title = {Automated Revealing of Organizational Assets Based on Event Correlation}, booktitle = {10th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2019, Canary Islands, Spain, June 24-26, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NTMS.2019.8763843}, doi = {10.1109/NTMS.2019.8763843}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/DoynikovaFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ntms/LevshunCKC19, author = {Dmitry Levshun and Andrey Chechulin and Igor V. Kotenko and Yannick Chevalier}, title = {Design and Verification Methodology for Secure and Distributed Cyber-Physical Systems}, booktitle = {10th {IFIP} International Conference on New Technologies, Mobility and Security, {NTMS} 2019, Canary Islands, Spain, June 24-26, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NTMS.2019.8763814}, doi = {10.1109/NTMS.2019.8763814}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ntms/LevshunCKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoSKB19, author = {Igor V. Kotenko and Igor Saenko and Alexey Kushnerevich and Alexander Branitskiy}, title = {Attack Detection in IoT Critical Infrastructures: {A} Machine Learning and Big Data Processing Approach}, booktitle = {27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2019, Pavia, Italy, February 13-15, 2019}, pages = {340--347}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EMPDP.2019.8671571}, doi = {10.1109/EMPDP.2019.8671571}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoSKB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KolomeetsCKS19, author = {Maxim Kolomeets and Andrey Chechulin and Igor V. Kotenko and Igor Saenko}, title = {Access Control Visualization Using Triangular Matrices}, booktitle = {27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2019, Pavia, Italy, February 13-15, 2019}, pages = {348--355}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EMPDP.2019.8671578}, doi = {10.1109/EMPDP.2019.8671578}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/KolomeetsCKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KotenkoSSKC19, author = {Igor V. Kotenko and Igor Saenko and Yury Sineshchuk and Valery Kuvatov and Oleg Chudakov}, editor = {Oleg B. Makarevich and Dmitry Popov and Ludmila K. Babenko and Pete Burnap and Atilla El{\c{c}}i and Ron Poet and Jaideep Vaidya and Mehmet A. Orgun and Manoj Singh Gaur and Rajveer Singh Shekhawat}, title = {Optimization of the cyber security system structure based on accounting of the prevented damage cost}, booktitle = {Proceedings of the 12th International Conference on Security of Information and Networks, {SIN} 2019, Sochi, Russian Federation, September 12-15, 2019}, pages = {7:1--7:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3357613.3357620}, doi = {10.1145/3357613.3357620}, timestamp = {Mon, 19 Dec 2022 17:02:17 +0100}, biburl = {https://dblp.org/rec/conf/sin/KotenkoSSKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KotenkoK19, author = {Igor V. Kotenko and Nikolay Komashinsky}, editor = {Oleg B. Makarevich and Dmitry Popov and Ludmila K. Babenko and Pete Burnap and Atilla El{\c{c}}i and Ron Poet and Jaideep Vaidya and Mehmet A. Orgun and Manoj Singh Gaur and Rajveer Singh Shekhawat}, title = {Combining spark and snort technologies for detection of network attacks and anomalies: assessment of performance for the big data framework}, booktitle = {Proceedings of the 12th International Conference on Security of Information and Networks, {SIN} 2019, Sochi, Russian Federation, September 12-15, 2019}, pages = {16:1--16:8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3357613.3357630}, doi = {10.1145/3357613.3357630}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/KotenkoK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/KotenkoBVS19, author = {Igor V. Kotenko and Pavel Budko and Alexey Vinogradenko and Igor Saenko}, editor = {Hamido Fujita and Ali Selamat}, title = {An Approach for Intelligent Evaluation of the State of Complex Autonomous Objects Based on the Wavelet Analysis}, booktitle = {Advancing Technology Industrialization Through Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 18th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques (SoMeT{\_}19), Kuching, Malaysia, 23-25 September 2019}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {318}, pages = {25--38}, publisher = {{IOS} Press}, year = {2019}, url = {https://doi.org/10.3233/FAIA190036}, doi = {10.3233/FAIA190036}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/somet/KotenkoBVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobisec2/2017, editor = {Ilsun You and Hsing{-}Chung Chen and Vishal Sharma and Igor V. Kotenko}, title = {Mobile Internet Security - Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {971}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-3732-1}, doi = {10.1007/978-981-13-3732-1}, isbn = {978-981-13-3731-4}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobisec2/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KotenkoSB18, author = {Igor V. Kotenko and Igor Saenko and Alexander Branitskiy}, title = {Framework for Mobile Internet of Things Security Monitoring Based on Big Data Processing and Machine Learning}, journal = {{IEEE} Access}, volume = {6}, pages = {72714--72723}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2881998}, doi = {10.1109/ACCESS.2018.2881998}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KotenkoSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/KotenkoFDC18, author = {Igor V. Kotenko and Andrey Fedorchenko and Elena Doynikova and Andrey Chechulin}, title = {An Ontology-based Storage of Security Information}, journal = {Inf. Technol. Control.}, volume = {47}, number = {4}, pages = {655--667}, year = {2018}, url = {https://doi.org/10.5755/j01.itc.47.4.20007}, doi = {10.5755/J01.ITC.47.4.20007}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itc/KotenkoFDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itl/GranadilloDKG18, author = {Gustavo {Gonzalez Granadillo} and Elena Doynikova and Igor V. Kotenko and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Hypergraph-driven mitigation of cyberattacks}, journal = {Internet Technol. Lett.}, volume = {1}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/itl2.38}, doi = {10.1002/ITL2.38}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itl/GranadilloDKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KotenkoSB18, author = {Igor V. Kotenko and Igor Saenko and Alexander Branitskiy}, title = {Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring}, journal = {J. Internet Serv. Inf. Secur.}, volume = {8}, number = {3}, pages = {54--63}, year = {2018}, url = {https://doi.org/10.22667/JISIS.2018.08.31.054}, doi = {10.22667/JISIS.2018.08.31.054}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/KotenkoSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kotenko18, author = {Igor V. Kotenko}, title = {Guest Editorial: Managing Insider Security Threats}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {1}, pages = {1--3}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.03.31.001}, doi = {10.22667/JOWUA.2018.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kotenko18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KotenkoKCC18, author = {Igor V. Kotenko and Maxim Kolomeets and Andrey Chechulin and Yannick Chevalier}, title = {A visual analytics approach for the cyber forensics based on different views of the network traffic}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {2}, pages = {57--73}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.06.30.057}, doi = {10.22667/JOWUA.2018.06.30.057}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KotenkoKCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/SaenkoK17, author = {Igor Saenko and Igor V. Kotenko}, title = {Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks}, journal = {{ACM} Trans. Internet Techn.}, volume = {18}, number = {3}, pages = {27:1--27:21}, year = {2018}, url = {https://doi.org/10.1145/3093898}, doi = {10.1145/3093898}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/SaenkoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DoynikovaFK18, author = {Elena Doynikova and Andrey Fedorchenko and Igor V. Kotenko}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {62:1--62:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3233260}, doi = {10.1145/3230833.3233260}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DoynikovaFK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BergerRKCK18, author = {Ivo Berger and Roland Rieke and Maxim Kolomeets and Andrey Chechulin and Igor V. Kotenko}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and John Mylopoulos and Christos Kalloniatis}, title = {Comparative Study of Machine Learning Methods for In-Vehicle Intrusion Detection}, booktitle = {Computer Security - {ESORICS} 2018 International Workshops, CyberICPS 2018 and {SECPRE} 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11387}, pages = {85--101}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12786-2\_6}, doi = {10.1007/978-3-030-12786-2\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BergerRKCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/KotenkoKMV18, author = {Igor V. Kotenko and Iuliia Kim and Anastasia Matveeva and Ilya I. Viksnin}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {Image Clustering Method based on Particle Swarm Optimization}, booktitle = {Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018, Pozna{\'{n}}, Poland, September 9-12, 2018}, series = {Annals of Computer Science and Information Systems}, volume = {15}, pages = {535--544}, year = {2018}, url = {https://doi.org/10.15439/2018F206}, doi = {10.15439/2018F206}, timestamp = {Mon, 07 Aug 2023 11:27:04 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/KotenkoKMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/SaenkoK18, author = {Igor Saenko and Igor V. Kotenko}, editor = {Hern{\'{a}}n E. Aguirre and Keiki Takadama}, title = {Genetic algorithms for role mining in critical infrastructure data spaces}, booktitle = {Proceedings of the Genetic and Evolutionary Computation Conference Companion, {GECCO} 2018, Kyoto, Japan, July 15-19, 2018}, pages = {1688--1695}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205651.3208283}, doi = {10.1145/3205651.3208283}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/SaenkoK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icphys/LevshunCK18, author = {Dmitry Levshun and Andrey Chechulin and Igor V. Kotenko}, title = {A technique for design of secure data transfer environment: Application for {I2C} protocol}, booktitle = {{IEEE} Industrial Cyber-Physical Systems, {ICPS} 2018, Saint Petersburg, Russia, May 15-18, 2018}, pages = {789--794}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICPHYS.2018.8390807}, doi = {10.1109/ICPHYS.2018.8390807}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icphys/LevshunCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icphys/KolomeetsCK18, author = {Maxim Kolomeets and Andrey Chechulin and Igor V. Kotenko}, title = {Visual analysis of {CAN} bus traffic injection using radial bar charts}, booktitle = {{IEEE} Industrial Cyber-Physical Systems, {ICPS} 2018, Saint Petersburg, Russia, May 15-18, 2018}, pages = {841--846}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICPHYS.2018.8390816}, doi = {10.1109/ICPHYS.2018.8390816}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icphys/KolomeetsCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/KotenkoS18, author = {Igor V. Kotenko and Igor Saenko}, editor = {Javier Del Ser and Eneko Osaba and Miren Nekane Bilbao and Javier J. S{\'{a}}nchez Medina and Massimo Vecchio and Xin{-}She Yang}, title = {Evolutionary Algorithms for Design of Virtual Private Networks}, booktitle = {Intelligent Distributed Computing XII, 12th International Symposium on Intelligent Distributed Computing, {IDC} 2018, Bilbao, Spain, 15-17 October 2018}, series = {Studies in Computational Intelligence}, volume = {798}, pages = {287--297}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99626-4\_25}, doi = {10.1007/978-3-319-99626-4\_25}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/KotenkoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/DesnitskyKR18, author = {Vasily Desnitsky and Igor V. Kotenko and Nikolay Rudavin}, editor = {Javier Del Ser and Eneko Osaba and Miren Nekane Bilbao and Javier J. S{\'{a}}nchez Medina and Massimo Vecchio and Xin{-}She Yang}, title = {Ensuring Availability of Wireless Mesh Networks for Crisis Management}, booktitle = {Intelligent Distributed Computing XII, 12th International Symposium on Intelligent Distributed Computing, {IDC} 2018, Bilbao, Spain, 15-17 October 2018}, series = {Studies in Computational Intelligence}, volume = {798}, pages = {344--353}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99626-4\_30}, doi = {10.1007/978-3-319-99626-4\_30}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/DesnitskyKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotais/KotenkoSA18, author = {Igor V. Kotenko and Igor Saenko and Sergey Ageev}, title = {Applying Intelligent Agents for Anomaly Detection of Network Traffic in Internet of Things Networks}, booktitle = {{IEEE} International Conference on Internet of Things and Intelligence System, {IOTAIS} 2018, Bali, Indonesia, November 1-3, 2018}, pages = {123--129}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IOTAIS.2018.8600867}, doi = {10.1109/IOTAIS.2018.8600867}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iotais/KotenkoSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotais/ChechulinK18, author = {Andrey Chechulin and Igor V. Kotenko}, title = {Application of Image Classification Methods for Protection against Inappropriate Information in the Internet}, booktitle = {{IEEE} International Conference on Internet of Things and Intelligence System, {IOTAIS} 2018, Bali, Indonesia, November 1-3, 2018}, pages = {167--173}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IOTAIS.2018.8600896}, doi = {10.1109/IOTAIS.2018.8600896}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iotais/ChechulinK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoFSK18, author = {Igor V. Kotenko and Andrey Fedorchenko and Igor Saenko and Alexey Kushnerevich}, editor = {Ivan Merelli and Pietro Li{\`{o}} and Igor V. Kotenko}, title = {Parallelization of Security Event Correlation Based on Accounting of Event Type Links}, booktitle = {26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, {PDP} 2018, Cambridge, United Kingdom, March 21-23, 2018}, pages = {462--469}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PDP2018.2018.00080}, doi = {10.1109/PDP2018.2018.00080}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoFSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/DoynikovaK18, author = {Elena Doynikova and Igor V. Kotenko}, editor = {Ivan Merelli and Pietro Li{\`{o}} and Igor V. Kotenko}, title = {The Multi-Layer Graph Based Technique for Proactive Automatic Response Against Cyber Attacks}, booktitle = {26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, {PDP} 2018, Cambridge, United Kingdom, March 21-23, 2018}, pages = {470--477}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PDP2018.2018.00081}, doi = {10.1109/PDP2018.2018.00081}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/DoynikovaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rndm/KotenkoSL18, author = {Igor V. Kotenko and Igor Saenko and Oleg Lauta}, title = {Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion}, booktitle = {10th International Workshop on Resilient Networks Design and Modeling, {RNDM} 2018, Longyearbyen, Svalbard, Norway, August 27-29, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/RNDM.2018.8489830}, doi = {10.1109/RNDM.2018.8489830}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rndm/KotenkoSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/BranitskiyK18, author = {Alexander Branitskiy and Igor V. Kotenko}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {12:1--12:8}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264488}, doi = {10.1145/3264437.3264488}, timestamp = {Thu, 17 Sep 2020 10:44:12 +0200}, biburl = {https://dblp.org/rec/conf/sin/BranitskiyK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/KotenkoAS18, author = {Igor V. Kotenko and Sergey Ageev and Igor Saenko}, editor = {Philipp Reinecke and Naghmeh Moradpoor and George Theodorakopoulos}, title = {Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems}, booktitle = {Proceedings of the 11th International Conference on Security of Information and Networks, {SIN} 2018, Cardiff, United Kingdom, September 10-12, 2018}, pages = {22:1--22:4}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264437.3264487}, doi = {10.1145/3264437.3264487}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sin/KotenkoAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socinfo/KotenkoSCDVP18, author = {Igor V. Kotenko and Igor Saenko and Andrey Chechulin and Vasily Desnitsky and Lidia Vitkova and Anton Pronoza}, editor = {Steffen Staab and Olessia Koltsova and Dmitry I. Ignatov}, title = {Monitoring and Counteraction to Malicious Influences in the Information Space of Social Networks}, booktitle = {Social Informatics - 10th International Conference, SocInfo 2018, St. Petersburg, Russia, September 25-28, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11186}, pages = {159--167}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01159-8\_15}, doi = {10.1007/978-3-030-01159-8\_15}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socinfo/KotenkoSCDVP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/somet/KotenkoSA18, author = {Igor V. Kotenko and Igor Saenko and Sergey Ageev}, editor = {Hamido Fujita and Enrique Herrera{-}Viedma}, title = {Hierarchical Fuzzy Situational Networks for Online Decision Support in Distributed Cyber-Physical Systems}, booktitle = {New Trends in Intelligent Software Methodologies, Tools and Techniques - Proceedings of the 17th International Conference SoMeT{\_}18, Granada, Spain, 26-28 September 2018}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {303}, pages = {623--636}, publisher = {{IOS} Press}, year = {2018}, url = {https://doi.org/10.3233/978-1-61499-900-3-623}, doi = {10.3233/978-1-61499-900-3-623}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/somet/KotenkoSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ccn/KotenkoDCF18, author = {Igor V. Kotenko and Elena Doynikova and Andrey Chechulin and Andrey Fedorchenko}, editor = {Simon Parkinson and Andrew Crampton and Richard Hill}, title = {{AI-} and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection}, booktitle = {Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach}, series = {Computer Communications and Networks}, pages = {101--130}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-92624-7\_5}, doi = {10.1007/978-3-319-92624-7\_5}, timestamp = {Sat, 05 Sep 2020 17:42:16 +0200}, biburl = {https://dblp.org/rec/series/ccn/KotenkoDCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mobisec2/2016, editor = {Ilsun You and Fang{-}Yie Leu and Hsing{-}Chung Chen and Igor V. Kotenko}, title = {Mobile Internet Security - First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {797}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-10-7850-7}, doi = {10.1007/978-981-10-7850-7}, isbn = {978-981-10-7849-1}, timestamp = {Wed, 17 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pdp/2018, editor = {Ivan Merelli and Pietro Li{\`{o}} and Igor V. Kotenko}, title = {26th Euromicro International Conference on Parallel, Distributed and Network-based Processing, {PDP} 2018, Cambridge, United Kingdom, March 21-23, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8369619/proceeding}, isbn = {978-1-5386-4975-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KotenkoCK17, author = {Igor V. Kotenko and Andrey Chechulin and Dmitry Komashinsky}, title = {Categorisation of web pages for protection against inappropriate content in the internet}, journal = {Int. J. Internet Protoc. Technol.}, volume = {10}, number = {1}, pages = {61--71}, year = {2017}, url = {https://doi.org/10.1504/IJIPT.2017.10003851}, doi = {10.1504/IJIPT.2017.10003851}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/KotenkoCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocs/BranitskiyK17, author = {Alexander Branitskiy and Igor V. Kotenko}, title = {Hybridization of computational intelligence methods for attack detection in computer networks}, journal = {J. Comput. Sci.}, volume = {23}, pages = {145--156}, year = {2017}, url = {https://doi.org/10.1016/j.jocs.2016.07.010}, doi = {10.1016/J.JOCS.2016.07.010}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jocs/BranitskiyK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KotenkoSK17, author = {Igor V. Kotenko and Igor Saenko and Alexey Kushnerevich}, title = {Parallel big data processing system for security monitoring in Internet of Things networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {4}, pages = {60--74}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.12.31.060}, doi = {10.22667/JOWUA.2017.12.31.060}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/KotenkoSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/GranadilloDKG17, author = {Gustavo {Gonzalez Granadillo} and Elena Doynikova and Igor V. Kotenko and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Abdessamad Imine and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion and Luigi Logrippo and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Attack Graph-Based Countermeasure Selection Using a Stateful Return on Investment Metric}, booktitle = {Foundations and Practice of Security - 10th International Symposium, {FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10723}, pages = {293--302}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75650-9\_19}, doi = {10.1007/978-3-319-75650-9\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/GranadilloDKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fruct/DoynikovaCK17, author = {Elena Doynikova and Andrey Chechulin and Igor V. Kotenko}, title = {Analytical attack modeling and security assessment based on the common vulnerability scoring system}, booktitle = {20th Conference of Open Innovations Association, {FRUCT} 2017, St. Petersburg, Russia, April 3-7, 2017}, pages = {53--61}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/FRUCT.2017.8071292}, doi = {10.23919/FRUCT.2017.8071292}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fruct/DoynikovaCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/SaenkoK17, author = {Igor Saenko and Igor V. Kotenko}, editor = {Peter A. N. Bosman}, title = {Administrating role-based access control by genetic algorithms}, booktitle = {Genetic and Evolutionary Computation Conference, Berlin, Germany, July 15-19, 2017, Companion Material Proceedings}, pages = {1463--1470}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3067695.3082509}, doi = {10.1145/3067695.3082509}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/SaenkoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/FedorchenkoKB17, author = {Andrey Fedorchenko and Igor V. Kotenko and Didier El Baz}, title = {Correlation of security events based on the analysis of structures of event types}, booktitle = {9th {IEEE} International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, {IDAACS} 2017, Bucharest, Romania, September 21-23, 2017}, pages = {270--276}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IDAACS.2017.8095089}, doi = {10.1109/IDAACS.2017.8095089}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idaacs/FedorchenkoKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/LevshunCK17, author = {Dmitry Levshun and Andrey Chechulin and Igor V. Kotenko}, title = {Design lifecycle for secure cyber-physical systems based on embedded devices}, booktitle = {9th {IEEE} International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, {IDAACS} 2017, Bucharest, Romania, September 21-23, 2017}, pages = {277--282}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IDAACS.2017.8095090}, doi = {10.1109/IDAACS.2017.8095090}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idaacs/LevshunCK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/KotenkoCDF17, author = {Igor V. Kotenko and Andrey Chechulin and Elena Doynikova and Andrey Fedorchenko}, editor = {Mirjana Ivanovic and Costin Badica and J{\"{u}}rgen Dix and Zoran Jovanovic and Michele Malgeri and Milos Savic}, title = {Ontological Hybrid Storage for Security Data}, booktitle = {Intelligent Distributed Computing {XI} - Proceedings of the 11th International Symposium on Intelligent Distributed Computing - {IDC} 2017, Belgrade, Serbia, October 11-13, 2017}, series = {Studies in Computational Intelligence}, volume = {737}, pages = {159--171}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66379-1\_15}, doi = {10.1007/978-3-319-66379-1\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/KotenkoCDF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/DesnitskyK17, author = {Vasily Desnitsky and Igor V. Kotenko}, editor = {Mirjana Ivanovic and Costin Badica and J{\"{u}}rgen Dix and Zoran Jovanovic and Michele Malgeri and Milos Savic}, title = {Modeling and Analysis of IoT Energy Resource Exhaustion Attacks}, booktitle = {Intelligent Distributed Computing {XI} - Proceedings of the 11th International Symposium on Intelligent Distributed Computing - {IDC} 2017, Belgrade, Serbia, October 11-13, 2017}, series = {Studies in Computational Intelligence}, volume = {737}, pages = {263--270}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66379-1\_23}, doi = {10.1007/978-3-319-66379-1\_23}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/DesnitskyK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KolomeecGDCKD17, author = {Maxim Kolomeec and Gustavo {Gonzalez Granadillo} and Elena Doynikova and Andrey Chechulin and Igor V. Kotenko and Herv{\'{e}} Debar}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Choosing Models for Security Metrics Visualization}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {75--87}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_7}, doi = {10.1007/978-3-319-65127-9\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/KolomeecGDCKD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BranitskiyK17, author = {Alexander Branitskiy and Igor V. Kotenko}, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers}, booktitle = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, pages = {143--157}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9\_12}, doi = {10.1007/978-3-319-65127-9\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BranitskiyK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/BranitskiyK17, author = {Alexander Branitskiy and Igor V. Kotenko}, editor = {Ilsun You and Hsing{-}Chung Chen and Vishal Sharma and Igor V. Kotenko}, title = {Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines}, booktitle = {Mobile Internet Security - Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {971}, pages = {1--16}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-13-3732-1\_1}, doi = {10.1007/978-981-13-3732-1\_1}, timestamp = {Mon, 22 Jun 2020 17:42:58 +0200}, biburl = {https://dblp.org/rec/conf/mobisec2/BranitskiyK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/KolomeetsCKS17, author = {Maxim Kolomeets and Andrey Chechulin and Igor V. Kotenko and Martin Strecker}, editor = {Ilsun You and Hsing{-}Chung Chen and Vishal Sharma and Igor V. Kotenko}, title = {Voronoi Maps for Planar Sensor Networks Visualization}, booktitle = {Mobile Internet Security - Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19-22, 2017, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {971}, pages = {96--109}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-13-3732-1\_7}, doi = {10.1007/978-981-13-3732-1\_7}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/KolomeetsCKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/SaenkoKK17, author = {Igor Saenko and Igor V. Kotenko and Alexey Kushnerevich}, editor = {Igor V. Kotenko and Yiannis Cotronis and Masoud Daneshtalab}, title = {Parallel Processing of Big Heterogeneous Data for Security Monitoring of IoT Networks}, booktitle = {25th Euromicro International Conference on Parallel, Distributed and Network-based Processing, {PDP} 2017, St. Petersburg, Russia, March 6-8, 2017}, pages = {329--336}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PDP.2017.45}, doi = {10.1109/PDP.2017.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/SaenkoKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/DoynikovaK17, author = {Elena Doynikova and Igor V. Kotenko}, editor = {Igor V. Kotenko and Yiannis Cotronis and Masoud Daneshtalab}, title = {CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection}, booktitle = {25th Euromicro International Conference on Parallel, Distributed and Network-based Processing, {PDP} 2017, St. Petersburg, Russia, March 6-8, 2017}, pages = {346--353}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PDP.2017.44}, doi = {10.1109/PDP.2017.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/DoynikovaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/DoynikovaK17, author = {Elena Doynikova and Igor V. Kotenko}, title = {Enhancement of probabilistic attack graphs for accurate cyber security monitoring}, booktitle = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco, CA, USA, August 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/UIC-ATC.2017.8397618}, doi = {10.1109/UIC-ATC.2017.8397618}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/DoynikovaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/KotenkoKU17, author = {Igor V. Kotenko and Artem Kuleshov and Igor Ushakov}, title = {Aggregation of elastic stack instruments for collecting, storing and processing of security information and events}, booktitle = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco, CA, USA, August 4-8, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/UIC-ATC.2017.8397627}, doi = {10.1109/UIC-ATC.2017.8397627}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uic/KotenkoKU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2017, editor = {Jacek Rak and John Bay and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin and Krzysztof Szczypiorski}, title = {Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2017, Warsaw, Poland, August 28-30, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10446}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65127-9}, doi = {10.1007/978-3-319-65127-9}, isbn = {978-3-319-65126-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pdp/2017, editor = {Igor V. Kotenko and Yiannis Cotronis and Masoud Daneshtalab}, title = {25th Euromicro International Conference on Parallel, Distributed and Network-based Processing, {PDP} 2017, St. Petersburg, Russia, March 6-8, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/7908435/proceeding}, isbn = {978-1-5090-6058-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/DesnitskyK16, author = {Vasily Desnitsky and Igor V. Kotenko}, title = {Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {7}, number = {5}, pages = {705--719}, year = {2016}, url = {https://doi.org/10.1007/s12652-016-0371-6}, doi = {10.1007/S12652-016-0371-6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/DesnitskyK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KolomeecCPK16, author = {Maxim Kolomeec and Andrey Chechulin and Anton Pronoza and Igor V. Kotenko}, title = {Technique of Data Visualization: Example of Network Topology Display for Security Monitoring}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {58--78}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.058}, doi = {10.22667/JOWUA.2016.03.31.058}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KolomeecCPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kotenko16, author = {Igor V. Kotenko}, title = {Guest Editorial: Advances in Secure Distributed and Network-Based Computing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.001}, doi = {10.22667/JOWUA.2016.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kotenko16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DesnitskyLCK16, author = {Vasily Desnitsky and Dmitry Levshun and Andrey Chechulin and Igor V. Kotenko}, title = {Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {60--80}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.060}, doi = {10.22667/JOWUA.2016.06.31.060}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/DesnitskyLCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KolomeetsCK16, author = {Maxim Kolomeets and Andrey Chechulin and Igor V. Kotenko}, editor = {Francesco Buccafurri and Andreas Holzinger and Peter Kieseberg and A Min Tjoa and Edgar R. Weippl}, title = {Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, {PAML} 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9817}, pages = {141--157}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45507-5\_10}, doi = {10.1007/978-3-319-45507-5\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KolomeetsCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecai/SaenkoK16, author = {Igor Saenko and Igor V. Kotenko}, title = {Using Genetic Algorithms for Design and Reconfiguration of {RBAC} Schemes}, booktitle = {Proceedings of the 1st International Workshop on {AI} for Privacy and Security, PrAISe@ECAI 2016, The Hague, Netherlands, August 29-30, 2016}, pages = {4:1--4:9}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2970030.2970033}, doi = {10.1145/2970030.2970033}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecai/SaenkoK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/SaenkoAK16, author = {Igor Saenko and Sergey Ageev and Igor V. Kotenko}, editor = {Costin Badica and Amal El Fallah Seghrouchni and Aur{\'{e}}lie Beynier and David Camacho and C{\'{e}}dric Herpson and Koen V. Hindriks and Paulo Novais}, title = {Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference}, booktitle = {Intelligent Distributed Computing {X} - Proceedings of the 10th International Symposium on Intelligent Distributed Computing - {IDC} 2016, Paris, France, October 10-12 2016}, series = {Studies in Computational Intelligence}, volume = {678}, pages = {79--88}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48829-5\_8}, doi = {10.1007/978-3-319-48829-5\_8}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/SaenkoAK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/SaenkoK16, author = {Igor Saenko and Igor V. Kotenko}, editor = {Costin Badica and Amal El Fallah Seghrouchni and Aur{\'{e}}lie Beynier and David Camacho and C{\'{e}}dric Herpson and Koen V. Hindriks and Paulo Novais}, title = {Reconfiguration of {RBAC} schemes by genetic algorithms}, booktitle = {Intelligent Distributed Computing {X} - Proceedings of the 10th International Symposium on Intelligent Distributed Computing - {IDC} 2016, Paris, France, October 10-12 2016}, series = {Studies in Computational Intelligence}, volume = {678}, pages = {89--98}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48829-5\_9}, doi = {10.1007/978-3-319-48829-5\_9}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/SaenkoK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/SaenkoSK16, author = {Igor Saenko and Fadey Skorik and Igor V. Kotenko}, editor = {Long Cheng and Qingshan Liu and Andrey Ronzhin}, title = {Application of Hybrid Neural Networks for Monitoring and Forecasting Computer Networks States}, booktitle = {Advances in Neural Networks - {ISNN} 2016 - 13th International Symposium on Neural Networks, {ISNN} 2016, St. Petersburg, Russia, July 6-8, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9719}, pages = {521--530}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40663-3\_60}, doi = {10.1007/978-3-319-40663-3\_60}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isnn/SaenkoSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/DoynikovaK16, author = {Elena Doynikova and Igor V. Kotenko}, editor = {Ilsun You and Fang{-}Yie Leu and Hsing{-}Chung Chen and Igor V. Kotenko}, title = {An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components}, booktitle = {Mobile Internet Security - First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {797}, pages = {95--106}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-7850-7\_9}, doi = {10.1007/978-981-10-7850-7\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/DoynikovaK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/KotenkoSLK16, author = {Igor V. Kotenko and Igor Saenko and Oleg Lauta and Mikhail Kocinyak}, editor = {Ilsun You and Fang{-}Yie Leu and Hsing{-}Chung Chen and Igor V. Kotenko}, title = {Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion}, booktitle = {Mobile Internet Security - First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {797}, pages = {107--117}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-981-10-7850-7\_10}, doi = {10.1007/978-981-10-7850-7\_10}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/KotenkoSLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoD16, author = {Igor V. Kotenko and Elena Doynikova}, title = {Dynamical Calculation of Security Metrics for Countermeasure Selection in Computer Networks}, booktitle = {24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2016, Heraklion, Crete, Greece, February 17-19, 2016}, pages = {558--565}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/PDP.2016.96}, doi = {10.1109/PDP.2016.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/DesnitskyCKLK16, author = {Vasily Desnitsky and Andrey Chechulin and Igor V. Kotenko and Dmitry Levshun and Maxim Kolomeec}, title = {Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System}, booktitle = {24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2016, Heraklion, Crete, Greece, February 17-19, 2016}, pages = {609--616}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/PDP.2016.99}, doi = {10.1109/PDP.2016.99}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/DesnitskyCKLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/KotenkoS16, author = {Igor V. Kotenko and Igor Saenko}, title = {An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization}, booktitle = {2016 Intl {IEEE} Conferences on Ubiquitous Intelligence {\&} Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France, July 18-21, 2016}, pages = {657--664}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0109}, doi = {10.1109/UIC-ATC-SCALCOM-CBDCOM-IOP-SMARTWORLD.2016.0109}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/KotenkoS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/accs/DesnitskiiK15, author = {V. A. Desnitskii and Igor V. Kotenko}, title = {Design and verification of protected systems with integrated devices based on expert knowledge}, journal = {Autom. Control. Comput. Sci.}, volume = {49}, number = {8}, pages = {648--652}, year = {2015}, url = {https://doi.org/10.3103/S0146411615080246}, doi = {10.3103/S0146411615080246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/accs/DesnitskiiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/accs/ChechulinK15, author = {Andrey Chechulin and Igor V. Kotenko}, title = {Attack tree-based approach for real-time security event processing}, journal = {Autom. Control. Comput. Sci.}, volume = {49}, number = {8}, pages = {701--704}, year = {2015}, url = {https://doi.org/10.3103/S0146411615080052}, doi = {10.3103/S0146411615080052}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/accs/ChechulinK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbic/KotenkoS15, author = {Igor V. Kotenko and Igor Saenko}, title = {Improved genetic algorithms for solving the optimisation tasks for design of access control schemes in computer networks}, journal = {Int. J. Bio Inspired Comput.}, volume = {7}, number = {2}, pages = {98--110}, year = {2015}, url = {https://doi.org/10.1504/IJBIC.2015.069291}, doi = {10.1504/IJBIC.2015.069291}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijbic/KotenkoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KolomeecCK15, author = {Maxim Kolomeec and Andrey Chechulin and Igor V. Kotenko}, title = {Methodological Primitives for Phased Construction of Data Visualization Models}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {4}, pages = {60--84}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.11.31.060}, doi = {10.22667/JISIS.2015.11.31.060}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KolomeecCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kotenko15, author = {Igor V. Kotenko}, title = {Guest Editorial: Security in Distributed and Network-Based Computing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {1--3}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.001}, doi = {10.22667/JOWUA.2015.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kotenko15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FedorchenkoKC15, author = {Andrey Fedorchenko and Igor V. Kotenko and Andrey Chechulin}, title = {Integrated Repository of Security Information for Network Security Evaluation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {41--57}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.041}, doi = {10.22667/JOWUA.2015.06.31.041}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FedorchenkoKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/DoynikovaK15, author = {Elena Doynikova and Igor V. Kotenko}, editor = {Costas Lambrinoudakis and Alban Gabillon}, title = {Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management}, booktitle = {Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9572}, pages = {107--124}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31811-0\_7}, doi = {10.1007/978-3-319-31811-0\_7}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crisis/DoynikovaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/BranitskiyK15, author = {Alexander Branitskiy and Igor V. Kotenko}, editor = {Christian Plessl and Didier El Baz and Guojing Cong and Jo{\~{a}}o M. P. Cardoso and Lu{\'{\i}}s Veiga and Thomas Rauber}, title = {Network Attack Detection Based on Combination of Neural, Immune and Neuro-Fuzzy Classifiers}, booktitle = {18th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2015, Porto, Portugal, October 21-23, 2015}, pages = {152--159}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSE.2015.26}, doi = {10.1109/CSE.2015.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/BranitskiyK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/KotenkoS15, author = {Igor V. Kotenko and Igor Saenko}, editor = {Christian Plessl and Didier El Baz and Guojing Cong and Jo{\~{a}}o M. P. Cardoso and Lu{\'{\i}}s Veiga and Thomas Rauber}, title = {The Genetic Approach for Design of Virtual Private Networks}, booktitle = {18th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2015, Porto, Portugal, October 21-23, 2015}, pages = {168--175}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSE.2015.23}, doi = {10.1109/CSE.2015.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/KotenkoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/BekenevaBSK15, author = {Yana A. Bekeneva and Konstantin Borisenko and Andrey Shorov and Igor V. Kotenko}, editor = {Ismail Khalil and Erich J. Neuhold and A Min Tjoa and Li Da Xu and Ilsun You}, title = {Investigation of DDoS Attacks by Hybrid Simulation}, booktitle = {Information and Communication Technology - Third {IFIP} {TC} 5/8 International Conference, ICT-EurAsia 2015, and 9th {IFIP} {WG} 8.9 Working Conference, {CONFENIS} 2015, Held as Part of {WCC} 2015, Daejeon, Korea, October 4-7, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9357}, pages = {179--189}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24315-3\_18}, doi = {10.1007/978-3-319-24315-3\_18}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/BekenevaBSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/KotenkoCK15, author = {Igor V. Kotenko and Andrey Chechulin and Dmitry Komashinsky}, title = {Evaluation of text classification techniques for inappropriate web content blocking}, booktitle = {{IEEE} 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, {IDAACS} 2015, Warsaw, Poland, September 24-26, 2015}, pages = {412--417}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IDAACS.2015.7340769}, doi = {10.1109/IDAACS.2015.7340769}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/idaacs/KotenkoCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/KotenkoD15, author = {Igor V. Kotenko and Elena Doynikova}, title = {The {CAPEC} based generator of attack scenarios for network security evaluation}, booktitle = {{IEEE} 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, {IDAACS} 2015, Warsaw, Poland, September 24-26, 2015}, pages = {436--441}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IDAACS.2015.7340774}, doi = {10.1109/IDAACS.2015.7340774}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idaacs/KotenkoD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/SaenkoK15, author = {Igor Saenko and Igor V. Kotenko}, editor = {Paulo Novais and David Camacho and Cesar Analide and Amal El Fallah Seghrouchni and Costin Badica}, title = {Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic Algorithms}, booktitle = {Intelligent Distributed Computing {IX} - Proceedings of the 9th International Symposium on Intelligent Distributed Computing - IDC'2015, Guimar{\~{a}}es, Portugal, October 2015}, series = {Studies in Computational Intelligence}, volume = {616}, pages = {155--165}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25017-5\_15}, doi = {10.1007/978-3-319-25017-5\_15}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/SaenkoK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/NovozhilovKC15, author = {Dmitry Novozhilov and Igor V. Kotenko and Andrey Chechulin}, editor = {Paulo Novais and David Camacho and Cesar Analide and Amal El Fallah Seghrouchni and Costin Badica}, title = {Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content}, booktitle = {Intelligent Distributed Computing {IX} - Proceedings of the 9th International Symposium on Intelligent Distributed Computing - IDC'2015, Guimar{\~{a}}es, Portugal, October 2015}, series = {Studies in Computational Intelligence}, volume = {616}, pages = {257--263}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25017-5\_24}, doi = {10.1007/978-3-319-25017-5\_24}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/NovozhilovKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/FedorchenkoKC15, author = {Andrey Fedorchenko and Igor V. Kotenko and Andrey Chechulin}, editor = {Masoud Daneshtalab and Marco Aldinucci and Ville Lepp{\"{a}}nen and Johan Lilius and Mats Brorsson}, title = {Design of Integrated Vulnerabilities Database for Computer Networks Security Analysis}, booktitle = {23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2015, Turku, Finland, March 4-6, 2015}, pages = {559--566}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PDP.2015.38}, doi = {10.1109/PDP.2015.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/FedorchenkoKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoD15, author = {Igor V. Kotenko and Elena Doynikova}, editor = {Masoud Daneshtalab and Marco Aldinucci and Ville Lepp{\"{a}}nen and Johan Lilius and Mats Brorsson}, title = {Countermeasure Selection in {SIEM} Systems Based on the Integrated Complex of Security Metrics}, booktitle = {23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2015, Turku, Finland, March 4-6, 2015}, pages = {567--574}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PDP.2015.34}, doi = {10.1109/PDP.2015.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KotenkoSA15, author = {Igor V. Kotenko and Igor Saenko and Sergey Ageev}, title = {Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic Inference}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {654--659}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.431}, doi = {10.1109/TRUSTCOM.2015.431}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KotenkoSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/NovikovaKF14, author = {Evgenia Novikova and Igor V. Kotenko and Evgenii Fedotov}, title = {Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {6}, number = {4}, pages = {73--97}, year = {2014}, url = {https://doi.org/10.4018/IJMCMC.2014100105}, doi = {10.4018/IJMCMC.2014100105}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/NovikovaKF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KotenkoC14, author = {Igor V. Kotenko and Andrey Chechulin}, title = {Fast Network Attack Modeling and Security Evaluation based on Attack Graphs}, journal = {J. Cyber Secur. Mobil.}, volume = {3}, number = {1}, pages = {27--46}, year = {2014}, url = {https://doi.org/10.13052/jcsm2245-1439.312}, doi = {10.13052/JCSM2245-1439.312}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KotenkoC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KotenkoD14, author = {Igor V. Kotenko and Elena Doynikova}, title = {Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {14--29}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.014}, doi = {10.22667/JOWUA.2014.09.31.014}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KotenkoD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SaenkoK14, author = {Igor Saenko and Igor V. Kotenko}, title = {Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {86--102}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.086}, doi = {10.22667/JOWUA.2014.12.31.086}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/SaenkoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/NovikovaK14, author = {Evgenia Novikova and Igor V. Kotenko}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {63--78}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_5}, doi = {10.1007/978-3-319-10975-6\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/NovikovaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DesnitskyK14, author = {Vasily Desnitsky and Igor V. Kotenko}, editor = {Stephanie Teufel and A Min Tjoa and Ilsun You and Edgar R. Weippl}, title = {Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices}, booktitle = {Availability, Reliability, and Security in Information Systems - {IFIP} {WG} 8.4, 8.9, {TC} 5 International Cross-Domain Conference, {CD-ARES} 2014 and 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, Fribourg, Switzerland, September 8-12, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8708}, pages = {194--210}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10975-6\_15}, doi = {10.1007/978-3-319-10975-6\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/DesnitskyK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KotenkoN14, author = {Igor V. Kotenko and Evgenia Novikova}, title = {Visualization of Security Metrics for Cyber Situation Awareness}, booktitle = {Ninth International Conference on Availability, Reliability and Security, {ARES} 2014, Fribourg, Switzerland, September 8-12, 2014}, pages = {506--513}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ARES.2014.75}, doi = {10.1109/ARES.2014.75}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KotenkoN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/KotenkoD14, author = {Igor V. Kotenko and Elena Doynikova}, title = {Security Evaluation for Cyber Situational Awareness}, booktitle = {2014 {IEEE} International Conference on High Performance Computing and Communications, 6th {IEEE} International Symposium on Cyberspace Safety and Security, 11th {IEEE} International Conference on Embedded Software and Systems, {HPCC/CSS/ICESS} 2014, Paris, France, August 20-22, 2014}, pages = {1197--1204}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/HPCC.2014.196}, doi = {10.1109/HPCC.2014.196}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/KotenkoD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/KotenkoD14, author = {Igor V. Kotenko and Elena Doynikova}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {Security Assessment of Computer Networks Based on Attack Graphs and Security Events}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {462--471}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_47}, doi = {10.1007/978-3-642-55032-4\_47}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/KotenkoD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/SaenkoK14, author = {Igor Saenko and Igor V. Kotenko}, editor = {David Camacho and Lars Braubach and Salvatore Venticinque and Costin Badica}, title = {A Genetic Approach for Virtual Computer Network Design}, booktitle = {Intelligent Distributed Computing {VIII} - Proceedings of the 8th International Symposium on Intelligent Distributed Computing, {IDC} 2014, Madrid, Spain, September 3-5, 2014}, series = {Studies in Computational Intelligence}, volume = {570}, pages = {95--105}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10422-5\_11}, doi = {10.1007/978-3-319-10422-5\_11}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idc/SaenkoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/KotenkoS14, author = {Igor V. Kotenko and Andrey Shorov}, editor = {David Camacho and Lars Braubach and Salvatore Venticinque and Costin Badica}, title = {Simulation of Bio-inspired Security Mechanisms against Network Infrastructure Attacks}, booktitle = {Intelligent Distributed Computing {VIII} - Proceedings of the 8th International Symposium on Intelligent Distributed Computing, {IDC} 2014, Madrid, Spain, September 3-5, 2014}, series = {Studies in Computational Intelligence}, volume = {570}, pages = {127--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10422-5\_14}, doi = {10.1007/978-3-319-10422-5\_14}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/KotenkoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incdm/KotenkoCSK14, author = {Igor V. Kotenko and Andrey Chechulin and Andrey Shorov and Dmitry Komashinsky}, editor = {Petra Perner}, title = {Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking}, booktitle = {Advances in Data Mining. Applications and Theoretical Aspects - 14th Industrial Conference, {ICDM} 2014, St. Petersburg, Russia, July 16-20, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8557}, pages = {39--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08976-8\_4}, doi = {10.1007/978-3-319-08976-8\_4}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incdm/KotenkoCSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoDC14, author = {Igor V. Kotenko and Elena Doynikova and Andrey Chechulin}, title = {Security Metrics Based on Attack Graphs for the Olympic Games Scenario}, booktitle = {22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2014, Torino, Italy, February 12-14, 2014}, pages = {561--568}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PDP.2014.113}, doi = {10.1109/PDP.2014.113}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoDC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/NesterukNK14, author = {Philipp Nesteruk and Lesya Nesteruk and Igor V. Kotenko}, title = {Creation of a Fuzzy Knowledge Base for Adaptive Security Systems}, booktitle = {22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2014, Torino, Italy, February 12-14, 2014}, pages = {574--577}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PDP.2014.115}, doi = {10.1109/PDP.2014.115}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/NesterukNK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/KotenkoPCS13, author = {Igor V. Kotenko and Olga Polubelova and Andrey Chechulin and Igor Saenko}, title = {Design and Implementation of a Hybrid Ontological-Relational Data Repository for {SIEM} Systems}, journal = {Future Internet}, volume = {5}, number = {3}, pages = {355--375}, year = {2013}, url = {https://doi.org/10.3390/fi5030355}, doi = {10.3390/FI5030355}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/KotenkoPCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KotenkoN13, author = {Igor V. Kotenko and Evgenia Novikova}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {VisSecAnalyzer: {A} Visual Analytics Tool for Network Security Assessment}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {345--360}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_24}, doi = {10.1007/978-3-642-40588-4\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KotenkoN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KotenkoPSD13, author = {Igor V. Kotenko and Olga Polubelova and Igor Saenko and Elena Doynikova}, title = {The Ontology of Metrics for Security Evaluation and Decision Support in {SIEM} Systems}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {638--645}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.84}, doi = {10.1109/ARES.2013.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/KotenkoPSD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cycon/KotenkoC13, author = {Igor V. Kotenko and Andrey Chechulin}, editor = {Karlis Podins and Jan Stinissen and Markus Maybaum}, title = {A Cyber Attack Modeling and Impact Assessment framework}, booktitle = {5th International Conference on Cyber Conflict, CyCon 2013, Tallinn, Estonia, June 4-7, 2013}, pages = {1--24}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6568374/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cycon/KotenkoC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecms/Kotenko13, author = {Igor V. Kotenko}, editor = {Webj{\o}rn Rekdalsbakken and Robin T. Bye and Houxiang Zhang}, title = {Experiments With Simulation Of Botnets And Defense Agent Teams}, booktitle = {Proceedings of the 27th European Conference on Modelling and Simulation, {ECMS} 2013, {\AA}lesund, Norway, May 27-30, 2013}, pages = {61--67}, publisher = {European Council for Modeling and Simulation}, year = {2013}, url = {https://doi.org/10.7148/2013-0061}, doi = {10.7148/2013-0061}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecms/Kotenko13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/KotenkoC13, author = {Igor V. Kotenko and Andrey Chechulin}, title = {Computer attack modeling and security evaluation based on attack graphs}, booktitle = {{IEEE} 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, {IDAACS} 2013, Berlin, Germany, September 12-14, 2013}, pages = {614--619}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IDAACS.2013.6662998}, doi = {10.1109/IDAACS.2013.6662998}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/idaacs/KotenkoC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/KotenkoD13, author = {Igor V. Kotenko and Elena Doynikova}, title = {Security metrics for risk assessment of distributed information systems}, booktitle = {{IEEE} 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, {IDAACS} 2013, Berlin, Germany, September 12-14, 2013}, pages = {646--650}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/IDAACS.2013.6663004}, doi = {10.1109/IDAACS.2013.6663004}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idaacs/KotenkoD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifgis/KotenkoPS13, author = {Igor V. Kotenko and Olga Polubelova and Igor Saenko}, editor = {Vasily V. Popovich and Christophe Claramunt and Manfred Schrenk and Kyrill V. Korolenko}, title = {Logical Inference Framework for Security Management in Geographical Information Systems}, booktitle = {Information Fusion and Geographic Information Systems, IF{\&}GIS 2013 - Environmental and Urban Challenges, May 12-15, 2013, St. Petersburg, Russia}, series = {Lecture Notes in Geoinformation and Cartography}, pages = {203--218}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-31833-7\_13}, doi = {10.1007/978-3-642-31833-7\_13}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifgis/KotenkoPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifgis/KotenkoSCN13, author = {Igor V. Kotenko and Andrey Shorov and Andrey Chechulin and Evgenia Novikova}, editor = {Vasily V. Popovich and Christophe Claramunt and Manfred Schrenk and Kyrill V. Korolenko}, title = {Dynamical Attack Simulation for Security Information and Event Management}, booktitle = {Information Fusion and Geographic Information Systems, IF{\&}GIS 2013 - Environmental and Urban Challenges, May 12-15, 2013, St. Petersburg, Russia}, series = {Lecture Notes in Geoinformation and Cartography}, pages = {219--234}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-31833-7\_14}, doi = {10.1007/978-3-642-31833-7\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifgis/KotenkoSCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/NovikovaK13, author = {Evgenia Novikova and Igor V. Kotenko}, title = {Analytical Visualization Techniques for Security Information and Event Management}, booktitle = {21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2013, Belfast, United Kingdom, February 27 - March 1, 2013}, pages = {519--525}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PDP.2013.84}, doi = {10.1109/PDP.2013.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/NovikovaK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoSN13, author = {Igor V. Kotenko and Andrey Shorov and Evgenia Novikova}, title = {Simulation of Protection Mechanisms Based on "Nervous Network System" against Infrastructure Attacks}, booktitle = {21st Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, {PDP} 2013, Belfast, United Kingdom, February 27 - March 1, 2013}, pages = {526--533}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PDP.2013.85}, doi = {10.1109/PDP.2013.85}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoSN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/KotenkoKS12, author = {Igor V. Kotenko and Alexey Konovalov and Andrey Shorov}, title = {Agent-based simulation of cooperative defence against botnets}, journal = {Concurr. Comput. Pract. Exp.}, volume = {24}, number = {6}, pages = {573--588}, year = {2012}, url = {https://doi.org/10.1002/cpe.1858}, doi = {10.1002/CPE.1858}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/KotenkoKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/greencom/KotenkoC12, author = {Igor V. Kotenko and Andrey Chechulin}, title = {Common Framework for Attack Modeling and Security Evaluation in {SIEM} Systems}, booktitle = {2012 {IEEE} International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, GreenCom/iThings/CPSCom 2012, Besancon, France, November 20-23, 2012}, pages = {94--101}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/GreenCom.2012.24}, doi = {10.1109/GREENCOM.2012.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/greencom/KotenkoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/greencom/KotenkoPS12, author = {Igor V. Kotenko and Olga Polubelova and Igor Saenko}, title = {The Ontological Approach for {SIEM} Data Repository Implementation}, booktitle = {2012 {IEEE} International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, GreenCom/iThings/CPSCom 2012, Besancon, France, November 20-23, 2012}, pages = {761--766}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/GreenCom.2012.125}, doi = {10.1109/GREENCOM.2012.125}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/greencom/KotenkoPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/ChechulinKD12, author = {Andrey Chechulin and Igor V. Kotenko and Vasily Desnitsky}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {An Approach for Network Information Flow Analysis for Systems of Embedded Components}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {146--155}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_13}, doi = {10.1007/978-3-642-33704-8\_13}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/ChechulinKD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KomashinskiyK12, author = {Dmitriy Komashinskiy and Igor V. Kotenko}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {254--269}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_22}, doi = {10.1007/978-3-642-33704-8\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KomashinskiyK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DesnitskyKC12, author = {Vasily Desnitsky and Igor V. Kotenko and Andrey Chechulin}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Configuration-Based Approach to Embedded Device Security}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {270--285}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_23}, doi = {10.1007/978-3-642-33704-8\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DesnitskyKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/RuizHMDKC12, author = {Jos{\'{e}} Fran. Ruiz and Rajesh Harjani and Antonio Mana and Vasily Desnitsky and Igor V. Kotenko and Andrey Chechulin}, editor = {Rainer Stotzka and Michael Schiffers and Yannis Cotronis}, title = {A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components}, booktitle = {Proceedings of the 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2012, Munich, Germany, February 15-17, 2012}, pages = {261--268}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/PDP.2012.36}, doi = {10.1109/PDP.2012.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/RuizHMDKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/SaenkoK12, author = {Igor Saenko and Igor V. Kotenko}, editor = {Rainer Stotzka and Michael Schiffers and Yannis Cotronis}, title = {Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem}, booktitle = {Proceedings of the 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2012, Munich, Germany, February 15-17, 2012}, pages = {269--274}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/PDP.2012.31}, doi = {10.1109/PDP.2012.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/SaenkoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KotenkoPS12, author = {Igor V. Kotenko and Olga Polubelova and Igor Saenko}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Data Repository for Security Information and Event Management in Service Infrastructures}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {308--313}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KotenkoPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KotenkoCN12, author = {Igor V. Kotenko and Andrey Chechulin and Evgenia Novikova}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Attack Modelling and Security Evaluation for Security Information and Event Management}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {391--394}, publisher = {SciTePress}, year = {2012}, timestamp = {Wed, 05 Nov 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KotenkoCN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/simultech/KotenkoS12, author = {Igor V. Kotenko and Andrey Shorov}, editor = {Nuno Pina and Janusz Kacprzyk and Mohammad S. Obaidat}, title = {Simulation of Protection Mechanisms against Botnets on the Basis of "Nervous Network" Framework}, booktitle = {{SIMULTECH} 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28 - 31 July, 2012}, pages = {164--169}, publisher = {SciTePress}, year = {2012}, timestamp = {Wed, 05 Nov 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/simultech/KotenkoS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/LeszczynaK12, author = {Rafal Leszczyna and Igor V. Kotenko}, editor = {Mohammad Essaaidi and Maria Ganzha and Marcin Paprzycki}, title = {Security and Anonymity in Agent Systems}, booktitle = {Software Agents, Agent Systems and Their Applications}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {32}, pages = {157--177}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-60750-818-2-157}, doi = {10.3233/978-1-60750-818-2-157}, timestamp = {Tue, 16 May 2017 14:24:21 +0200}, biburl = {https://dblp.org/rec/series/natosec/LeszczynaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/KotenkoL12, author = {Igor V. Kotenko and Rafal Leszczyna}, editor = {Mohammad Essaaidi and Maria Ganzha and Marcin Paprzycki}, title = {Software Agents for Computer Network Security}, booktitle = {Software Agents, Agent Systems and Their Applications}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {32}, pages = {260--285}, publisher = {{IOS} Press}, year = {2012}, url = {https://doi.org/10.3233/978-1-60750-818-2-260}, doi = {10.3233/978-1-60750-818-2-260}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/KotenkoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2012, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8}, doi = {10.1007/978-3-642-33704-8}, isbn = {978-3-642-33703-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idaacs/KotenkoP11, author = {Igor V. Kotenko and Olga Polubelova}, title = {Verification of security policy filtering rules by Model Checking}, booktitle = {{IEEE} 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, {IDAACS} 2011, Prague, Czech Republic, September 15-17, 2011, Volume 2}, pages = {706--710}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IDAACS.2011.6072862}, doi = {10.1109/IDAACS.2011.6072862}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/idaacs/KotenkoP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifgis/KotenkoCD11, author = {Igor V. Kotenko and Andrey Chechulin and Elena Doynikova}, editor = {Vasily V. Popovich and Christophe Claramunt and Thomas Devogele and Manfred Schrenk and Kyrill V. Korolenko}, title = {Combining of Scanning Protection Mechanisms in {GIS} and Corporate Information Systems}, booktitle = {Information Fusion and Geographic Information Systems, Towards the Digital Ocean, IF{\&}GIS 2011, Brest, France, May 10-11, 2011}, series = {Lecture Notes in Geoinformation and Cartography}, pages = {45--58}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19766-6\_5}, doi = {10.1007/978-3-642-19766-6\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifgis/KotenkoCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoSD11, author = {Igor V. Kotenko and Mikhail Stepashkin and Elena Doynikova}, editor = {Yiannis Cotronis and Marco Danelutto and George Angelos Papadopoulos}, title = {Security Analysis of Information Systems Taking into Account Social Engineering Attacks}, booktitle = {Proceedings of the 19th International Euromicro Conference on Parallel, Distributed and Network-based Processing, {PDP} 2011, Ayia Napa, Cyprus, 9-11 February 2011}, pages = {611--618}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PDP.2011.62}, doi = {10.1109/PDP.2011.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoSD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/SaenkoK11, author = {Igor Saenko and Igor V. Kotenko}, editor = {Yiannis Cotronis and Marco Danelutto and George Angelos Papadopoulos}, title = {Genetic Algorithms for Role Mining Problem}, booktitle = {Proceedings of the 19th International Euromicro Conference on Parallel, Distributed and Network-based Processing, {PDP} 2011, Ayia Napa, Cyprus, 9-11 February 2011}, pages = {646--650}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/PDP.2011.63}, doi = {10.1109/PDP.2011.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/SaenkoK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idc/KotenkoKS10, author = {Igor V. Kotenko and Alexey Konovalov and Andrey Shorov}, editor = {Mohammed Essaaidi and Michele Malgeri and Costin Badica}, title = {Simulation of Botnets: Agent-Based Approach}, booktitle = {Intelligent Distributed Computing {IV} - Proceedings of the 4th International Symposium on Intelligent Distributed Computing - {IDC} 2010, Tangier, Morocco, September 2010}, volume = {315}, pages = {247--252}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15211-5\_26}, doi = {10.1007/978-3-642-15211-5\_26}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/idc/KotenkoKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SaenkoK10, author = {Igor Saenko and Igor V. Kotenko}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Genetic Optimization of Access Control Schemes in Virtual Local Area Networks}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {209--216}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_16}, doi = {10.1007/978-3-642-14706-7\_16}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmmacns/SaenkoK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/DesnitskyK10, author = {Vasily Desnitsky and Igor V. Kotenko}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Security and Scalability of Remote Entrusting Protection}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {298--306}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_23}, doi = {10.1007/978-3-642-14706-7\_23}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/DesnitskyK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KomashinskiyK10, author = {Dmitriy Komashinskiy and Igor V. Kotenko}, editor = {Marco Danelutto and Julien Bourgeois and Tom Gross}, title = {Malware Detection by Data Mining Techniques Based on Positionally Dependent Features}, booktitle = {Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, {PDP} 2010, Pisa, Italy, February 17-19, 2010}, pages = {617--623}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PDP.2010.30}, doi = {10.1109/PDP.2010.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KomashinskiyK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2010, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7}, doi = {10.1007/978-3-642-14706-7}, isbn = {978-3-642-14705-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecms/Kotenko09, author = {Igor V. Kotenko}, editor = {Javier Otamendi and Andrzej Bargiela and Jos{\'{e}} Luis Isla Montes and Luis Miguel Doncel Pedrera}, title = {Simulation Of Agent Teams: Application Of {A} Domain-Independent Framework To Computer Network Security}, booktitle = {European Conference on Modelling and Simulation, {ECMS} 2009, Madrid, Spain, June 9-12, 2009}, pages = {137--143}, publisher = {European Council for Modeling and Simulation}, year = {2009}, url = {https://doi.org/10.7148/2009-0137-0143}, doi = {10.7148/2009-0137-0143}, timestamp = {Tue, 09 Feb 2021 08:33:04 +0100}, biburl = {https://dblp.org/rec/conf/ecms/Kotenko09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifgis/DesnitskyK09, author = {Vasily Desnitsky and Igor V. Kotenko}, editor = {Vasily V. Popovich and Manfred Schrenk and Christophe Claramunt and Kyrill V. Korolenko}, title = {Design of Entrusting Protocols for Software Protection}, booktitle = {Information Fusion and Geographic Information Systems, Proceedings of the Fourth International Workshop, IF{\&}GIS 2009, 17-20 May 2009, St. Petersburg, Russia}, series = {Lecture Notes in Geoinformation and Cartography}, pages = {301--316}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00304-2\_21}, doi = {10.1007/978-3-642-00304-2\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifgis/DesnitskyK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifgis/KomashinskiyK09, author = {Dmitriy Komashinskiy and Igor V. Kotenko}, editor = {Vasily V. Popovich and Manfred Schrenk and Christophe Claramunt and Kyrill V. Korolenko}, title = {Integrated Usage of Data Mining Methods for Malware Detection}, booktitle = {Information Fusion and Geographic Information Systems, Proceedings of the Fourth International Workshop, IF{\&}GIS 2009, 17-20 May 2009, St. Petersburg, Russia}, series = {Lecture Notes in Geoinformation and Cartography}, pages = {343--357}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00304-2\_24}, doi = {10.1007/978-3-642-00304-2\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifgis/KomashinskiyK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/Kotenko09, author = {Igor V. Kotenko}, editor = {Didier El Baz and Fran{\c{c}}ois Spies and Tom Gross}, title = {Framework for Integrated Proactive Network Worm Detection and Response}, booktitle = {Proceedings of the 17th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2009, Weimar, Germany, 18-20 Febuary 2009}, pages = {379--386}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/PDP.2009.52}, doi = {10.1109/PDP.2009.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/Kotenko09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoU08, author = {Igor V. Kotenko and Alexander Ulanov}, title = {Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks}, booktitle = {16th Euromicro International Conference on Parallel, Distributed and Network-Based Processing {(PDP} 2008), 13-15 February 2008, Toulouse, France}, pages = {565--572}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PDP.2008.65}, doi = {10.1109/PDP.2008.65}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoU08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aisadm/KotenkoU07, author = {Igor V. Kotenko and Alexander Ulanov}, editor = {Vladimir Gorodetsky and Chengqi Zhang and Victor A. Skormin and Longbing Cao}, title = {Multi-agent Framework for Simulation of Adaptive Cooperative Defense Against Internet Attacks}, booktitle = {Autonomous Intelligent Systems: Multi-Agents and Data Mining, Second International Workshop, {AIS-ADM} 2007, St. Petersburg, Russia, June 3-5, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4476}, pages = {212--228}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72839-9\_18}, doi = {10.1007/978-3-540-72839-9\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aisadm/KotenkoU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifgis/BourgeoisGKU07, author = {Julien Bourgeois and Abdoul Karim Ganame and Igor V. Kotenko and Alexander Ulanov}, editor = {Vasily V. Popovich and Manfred Schrenk and Kyrill V. Korolenko}, title = {Software Environment for Simulation and Evaluation of a Security Operation Center}, booktitle = {Third International Workshop on Information Fusion and Geographical Information Systems - IF{\&}GIS'07, St. Petersburg, Russia, May 27-29, 2007. Proceedings}, series = {Lecture Notes in Geoinformation and Cartography}, pages = {111--127}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-37629-3\_8}, doi = {10.1007/978-3-540-37629-3\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifgis/BourgeoisGKU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifgis/KotenkoTCS07, author = {Igor V. Kotenko and Artem Tishkov and Olga Chervatuk and Ekaterina Sidelnikova}, editor = {Vasily V. Popovich and Manfred Schrenk and Kyrill V. Korolenko}, title = {Security Policy Verification Tool for Geographical Information Systems}, booktitle = {Third International Workshop on Information Fusion and Geographical Information Systems - IF{\&}GIS'07, St. Petersburg, Russia, May 27-29, 2007. Proceedings}, series = {Lecture Notes in Geoinformation and Cartography}, pages = {128--146}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-37629-3\_9}, doi = {10.1007/978-3-540-37629-3\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifgis/KotenkoTCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/KotenkoCST07, author = {Igor V. Kotenko and Olga Chervatuk and Ekaterina Sidelnikova and Artem Tishkov}, title = {Hybrid Multi-module Security Policy Verification}, booktitle = {8th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy}, pages = {277}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/POLICY.2007.25}, doi = {10.1109/POLICY.2007.25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/policy/KotenkoCST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KotenkoU07, author = {Igor V. Kotenko and Alexander Ulanov}, editor = {Javier Hernando and Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek}, title = {Investigation of Cooperative Defense against DDoS}, booktitle = {{SECRYPT} 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {180--183}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Fri, 04 Sep 2009 13:27:09 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KotenkoU07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/KotenkoS06, author = {Igor V. Kotenko and Mikhail Stepashkin}, editor = {Herbert Leitold and Evangelos P. Markatos}, title = {Attack Graph Based Evaluation of Network Security}, booktitle = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4237}, pages = {216--227}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11909033\_20}, doi = {10.1007/11909033\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/KotenkoS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cw/KotenkoU06, author = {Igor V. Kotenko and Alexander Ulanov}, title = {Agent Teams in Cyberspace: Security Guards in the Global Internet}, booktitle = {5th International Conference on Cyberworlds {(CW} 2006), 28-29 November 2006, Lausanne, Switzerland}, pages = {133--140}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CW.2006.12}, doi = {10.1109/CW.2006.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cw/KotenkoU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/KotenkoU06, author = {Igor V. Kotenko and Alexander Ulanov}, title = {Antagonistic Agents in the Internet: Computer Network Warfare Simulation}, booktitle = {9th International Conference on Information Fusion, {FUSION} 2006, Florence, Italy, July 10-13, 2006}, pages = {1--8}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICIF.2006.301705}, doi = {10.1109/ICIF.2006.301705}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/fusion/KotenkoU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KotenkoU06, author = {Igor V. Kotenko and Alexander Ulanov}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Simulation of Internet DDoS Attacks and Defense}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {327--342}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_24}, doi = {10.1007/11836810\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KotenkoU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jckbse/KotenkoU06, author = {Igor V. Kotenko and Alexander Ulanov}, editor = {Enn Tyugu and Takahira Yamaguchi}, title = {Agent-based modeling and simulation of network softbots' competition}, booktitle = {Knowledge-Based Software Engineering, Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering, {JCKBSE} 2006, August 28-31, 2006, Tallinn, Estonia}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {140}, pages = {243--252}, publisher = {{IOS} Press}, year = {2006}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=1616}, timestamp = {Tue, 13 Mar 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/jckbse/KotenkoU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KotenkoS06, author = {Igor V. Kotenko and Mikhail Stepashkin}, editor = {Manu Malek and Eduardo Fern{\'{a}}ndez{-}Medina and Javier Hernando}, title = {Network Security Evaluation Based on Simulation of Malfactor's Behavior}, booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {339--344}, publisher = {{INSTICC} Press}, year = {2006}, timestamp = {Thu, 02 Nov 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KotenkoS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cimca/KotenkoU05, author = {Igor V. Kotenko and Alexander Ulanov}, title = {The Software Environment for Multi-agent Simulation of Defense Mechanisms against DDoS Attacks}, booktitle = {2005 International Conference on Computational Intelligence for Modelling Control and Automation {(CIMCA} 2005), International Conference on Intelligent Agents, Web Technologies and Internet Commerce {(IAWTIC} 2005), 28-30 November 2005, Vienna, Austria}, pages = {283--289}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CIMCA.2005.1631280}, doi = {10.1109/CIMCA.2005.1631280}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cimca/KotenkoU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KotenkoS05, author = {Igor V. Kotenko and Mikhail Stepashkin}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {311--324}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_24}, doi = {10.1007/11560326\_24}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KotenkoS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/TishkovKS05, author = {Artem Tishkov and Igor V. Kotenko and Ekaterina Sidelnikova}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Security Checker Architecture for Policy-Based Security Management}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {460--465}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_40}, doi = {10.1007/11560326\_40}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/TishkovKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmmacns/2005, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326}, doi = {10.1007/11560326}, isbn = {3-540-29113-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pik/LaskovSKM04, author = {Pavel Laskov and Christin Sch{\"{a}}fer and Igor V. Kotenko and Klaus{-}Robert M{\"{u}}ller}, title = {Intrusion Detection in Unlabeled Data with Quarter-sphere Support Vector Machines}, journal = {Prax. Inf.verarb. Kommun.}, volume = {27}, number = {4}, pages = {228--236}, year = {2004}, url = {https://doi.org/10.1515/PIKO.2004.228}, doi = {10.1515/PIKO.2004.228}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pik/LaskovSKM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/LaskovSK04, author = {Pavel Laskov and Christin Sch{\"{a}}fer and Igor V. Kotenko}, editor = {Ulrich Flegel and Michael Meier}, title = {Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines}, booktitle = {Detection of Intrusions and Malware {\&} Vulnerability Assessment, {GI} {SIG} {SIDAR} Workshop, {DIMVA} 2004, Dortmund, Germany, July 6.7, 2004, Proceedings}, series = {{LNI}}, volume = {{P-46}}, pages = {71--82}, publisher = {{GI}}, year = {2004}, url = {https://dl.gi.de/handle/20.500.12116/29207}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimva/LaskovSK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/GorodetskiKK03, author = {Vladimir I. Gorodetski and Igor V. Kotenko and Oleg Karsaev}, title = {Multi-agent technologies for computer network security: attack simulation, intrusion detection and intrusion detection learning}, journal = {Comput. Syst. Sci. Eng.}, volume = {18}, number = {4}, pages = {191--200}, year = {2003}, timestamp = {Wed, 05 May 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/GorodetskiKK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ceemas/Kotenko03, author = {Igor V. Kotenko}, editor = {Vladim{\'{\i}}r Mar{\'{\i}}k and J{\"{o}}rg P. M{\"{u}}ller and Michal Pechoucek}, title = {Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks}, booktitle = {Multi-Agent Systems and Applications III, 3rd International Central and Eastern European Conference on Multi-Agent Systems, {CEEMAS} 2003, Prague, Czech Republic, June 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2691}, pages = {464--474}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45023-8\_45}, doi = {10.1007/3-540-45023-8\_45}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ceemas/Kotenko03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/KotenkoAM03, author = {Igor V. Kotenko and Alexey Alexeev and Evgeny Man'kov}, title = {Formal Framework for Modeling and Simulation of DDoS Attacks Based on Teamwork of Hackers-Agents}, booktitle = {2003 {IEEE/WIC} International Conference on Intelligent Agent Technology {(IAT} 2003), 13-17 October 2003, Halifax, Canada}, pages = {507--510}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/IAT.2003.1241132}, doi = {10.1109/IAT.2003.1241132}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/KotenkoAM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/KotenkoM03, author = {Igor V. Kotenko and Evgeny Man'kov}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Experiments with Simulation of Attacks against Computer Networks}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {183--194}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_15}, doi = {10.1007/978-3-540-45215-7\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/KotenkoM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GorodetskiK02, author = {Vladimir I. Gorodetski and Igor V. Kotenko}, editor = {Andreas Wespi and Giovanni Vigna and Luca Deri}, title = {Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool}, booktitle = {Recent Advances in Intrusion Detection, 5th International Symposium, {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2516}, pages = {219--238}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36084-0\_12}, doi = {10.1007/3-540-36084-0\_12}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GorodetskiK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ceemas/GorodetskiKKK01, author = {Vladimir I. Gorodetski and Oleg Karsaev and Igor V. Kotenko and Alexey Khabalov}, editor = {Barbara Dunin{-}Keplicz and Edward Nawarecki}, title = {Software Development Kit for Multi-agent Systems Design and Implementation}, booktitle = {From Theory to Practice in Multi-Agent Systems, Second International Workshop of Central and Eastern Europe on Multi-Agent Systems, {CEEMAS} 2001 Cracow, Poland, September 26-29, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2296}, pages = {121--130}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45941-3\_13}, doi = {10.1007/3-540-45941-3\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ceemas/GorodetskiKKK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/GorodetskiKKKPS01, author = {Vladimir I. Gorodetski and Oleg Karsaev and Alexey Khabalov and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Agent-Based Model of Computer Network Security System: {A} Case Study}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {39--50}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_7}, doi = {10.1007/3-540-45116-1\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/GorodetskiKKKPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/GorodetskiS00, author = {Vladimir I. Gorodetski and Igor V. Kotenko and Victor A. Skormin}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {291--300}, publisher = {Kluwer}, year = {2000}, timestamp = {Fri, 25 Oct 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/GorodetskiS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ceemas/GorodetskiKPS99, author = {Vladimir I. Gorodetski and Igor V. Kotenko and Leonard J. Popyack and Victor A. Skormin}, title = {Agent-based Model of Information Security System: Architecture and Framework for Coordinated Behavior Specification}, booktitle = {1st International Workshop of Central and Eastern Europe on Multi-Agent Systems, St. Petersburg, Russia, 1-4 June, 1999}, year = {1999}, timestamp = {Fri, 09 Aug 2019 11:11:32 +0200}, biburl = {https://dblp.org/rec/conf/ceemas/GorodetskiKPS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ceemas/Kotenko99, author = {Igor V. Kotenko}, title = {Application of Hybrid Agent-Based Technology for Design of Telecommunication Systems}, booktitle = {1st International Workshop of Central and Eastern Europe on Multi-Agent Systems, St. Petersburg, Russia, 1-4 June, 1999}, year = {1999}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ceemas/Kotenko99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rsfdgrc/GorodetskiPKS99, author = {Vladimir I. Gorodetski and Leonard J. Popyack and Igor V. Kotenko and Victor A. Skormin}, editor = {Ning Zhong and Andrzej Skowron and Setsuo Ohsuga}, title = {Ontology-Based Multi-Agent Model of an Information Security System}, booktitle = {New Directions in Rough Sets, Data Mining, and Granular-Soft Computing, 7th International Workshop, RSFDGrC '99, Yamaguchi, Japan, November 9-11, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1711}, pages = {528--532}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48061-7\_65}, doi = {10.1007/978-3-540-48061-7\_65}, timestamp = {Sat, 19 Oct 2019 20:16:55 +0200}, biburl = {https://dblp.org/rec/conf/rsfdgrc/GorodetskiPKS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecis/Kotenko95, author = {Igor V. Kotenko}, editor = {Georgios I. Doukidis and Robert D. Galliers and Tawfik Jelassi and Helmut Krcmar and Frank Land}, title = {A framework for intelligent group decision support}, booktitle = {Proceedings of the Third European Conference on Information Systems, {ECIS} 1995, Athens, Greece, 1995}, pages = {635--648}, year = {1995}, timestamp = {Mon, 05 Dec 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecis/Kotenko95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ewhci/Kotenko94, author = {Igor V. Kotenko}, editor = {Brad Blumenthal and Juri Gornostaev and Claus Unger}, title = {Conflict Resolution in Computer-Supported Cooperative Design}, booktitle = {Human-Computer Interaction, 4th International Conference, {EWHCI} '94, St. Petersburg, Russia, August 2-5, 1994, Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {876}, pages = {152--163}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58648-2\_34}, doi = {10.1007/3-540-58648-2\_34}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/ewhci/Kotenko94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.