Method and utility for recovering code algorithms of telecommunication devices for vulnerability search M Buinevich, K Izrailov 16th International conference on advanced communication technology, 172-176, 2014 | 46 | 2014 |
Static analysis of information systems for IoT cyber security: a survey of machine learning approaches I Kotenko, K Izrailov, M Buinevich Sensors 22 (4), 1335, 2022 | 44 | 2022 |
The life cycle of vulnerabilities in the representations of software for telecommunication devices M Buinevich, K Izrailov, A Vladyko 2016 18th International Conference on Advanced Communication Technology …, 2016 | 39 | 2016 |
Metric of vulnerability at the base of the life cycle of software representations M Buinevich, K Izrailov, A Vladyko 2018 20th International Conference on Advanced Communication Technology …, 2018 | 27 | 2018 |
Testing of utilities for finding vulnerabilities in the machine code of telecommunication devices M Buinevich, K Izrailov, A Vladyko 2017 19th International Conference on Advanced Communication Technology …, 2017 | 27 | 2017 |
Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search M Buinevich, K Izrailov, A Vladyko 2016 18th International Conference on Advanced Communication Technology …, 2016 | 27 | 2016 |
Method for partial recovering source code of telecommunication devices for vulnerability search M Buinevich, K Izrailov, A Vladyko 2015 17th International Conference on Advanced Communication Technology …, 2015 | 25 | 2015 |
Software defined internet of things: cyber antifragility and vulnerability forecast M Buinevich, P Fabrikantov, E Stolyarova, K Izrailov, A Vladyko 2017 IEEE 11th international conference on application of information and …, 2017 | 22 | 2017 |
Digital cloud environment: present challenges and future forecast S Mescheryakov, D Shchemelinin, K Izrailov, V Pokussov Future Internet 12 (5), 82, 2020 | 18 | 2020 |
Combine method of forecasting VANET cybersecurity for application of high priority way M Buinevich, K Izrailov, E Stolyarova, A Vladyko 2018 20th International Conference on Advanced Communication Technology …, 2018 | 14 | 2018 |
An approach for stego-insider detection based on a hybrid nosql database I Kotenko, A Krasov, I Ushakov, K Izrailov Journal of Sensor and Actuator Networks 10 (2), 25, 2021 | 13 | 2021 |
Generalized interaction model in the information system MV Buinevich, KE Izrailov, VV Pokusov, SV Sharapov, SN Terekhin International Journal of Pure and Applied Mathematics 119 (17), 1381-1385, 2018 | 12 | 2018 |
Classification and analysis of vulnerabilities in mobile device infrastructure interfaces K Izrailov, D Levshun, I Kotenko, A Chechulin International Symposium on Mobile Internet Security, 301-319, 2021 | 10 | 2021 |
Method and algorithms of visual audit of program interaction. MV Buinevich, KE Izrailov, IV Kotenko, PA Kurta J. Internet Serv. Inf. Secur. 11 (1), 16-43, 2021 | 10 | 2021 |
Threats classification method for the transport infrastructure of a smart city K Izrailov, A Chechulin, L Vitkova 2020 IEEE 14th International Conference on Application of Information and …, 2020 | 10 | 2020 |
Modeling the development of energy network software, taking into account the detection and elimination of vulnerabilities I Kotenko, K Izrailov, M Buinevich, I Saenko, R Shorey Energies 16 (13), 5111, 2023 | 9 | 2023 |
Analytical modeling for identification of the machine code architecture of cyberphysical devices in smart homes I Kotenko, K Izrailov, M Buinevich Sensors 22 (3), 1017, 2022 | 9 | 2022 |
Detection of stego-insiders in corporate networks based on a hybrid NoSQL database model I Kotenko, A Krasov, I Ushakov, K Izrailov Proceedings of the 4th International Conference on Future Networks and …, 2020 | 8 | 2020 |
Approach to combining different methods for detecting insiders M Buinevich, K Izrailov, I Kotenko, I Ushakov, D Vlasov Proceedings of the 4th International Conference on Future Networks and …, 2020 | 7 | 2020 |
Identification of processor’s architecture of executable code based on machine learning. part 1. frequency byte model M Buinevich, K Izrailov Proc. Telecommun. Univ 6, 77-85, 2020 | 6 | 2020 |