Security analysis of information systems taking into account social engineering attacks I Kotenko, M Stepashkin, E Doynikova 2011 19th International Euromicro Conference on Parallel, Distributed and …, 2011 | 82 | 2011 |
The ontology of metrics for security evaluation and decision support in SIEM systems I Kotenko, O Polubelova, I Saenko, E Doynikova 2013 International Conference on Availability, Reliability and Security, 638-645, 2013 | 70 | 2013 |
Security assessment of computer networks based on attack graphs and security events I Kotenko, E Doynikova Information and Communication Technology: Second IFIP TC5/8 International …, 2014 | 68 | 2014 |
CVSS-based probabilistic risk assessment for cyber situational awareness and countermeasure selection E Doynikova, I Kotenko 2017 25th Euromicro International Conference on Parallel, Distributed and …, 2017 | 47 | 2017 |
Ontology of metrics for cyber security assessment E Doynikova, A Fedorchenko, I Kotenko Proceedings of the 14th International Conference on Availability …, 2019 | 43 | 2019 |
The CAPEC based generator of attack scenarios for network security evaluation I Kotenko, E Doynikova 2015 IEEE 8th International Conference on Intelligent Data Acquisition and …, 2015 | 42 | 2015 |
Choosing models for security metrics visualization M Kolomeec, G Gonzalez-Granadillo, E Doynikova, A Chechulin, ... Computer Network Security: 7th International Conference on Mathematical …, 2017 | 41 | 2017 |
Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing. IV Kotenko, E Doynikova J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (3), 14-29, 2014 | 39 | 2014 |
Attacker behaviour forecasting using methods of intelligent data analysis: A comparative review and prospects E Doynikova, E Novikova, I Kotenko Information 11 (3), 168, 2020 | 36 | 2020 |
Dynamical calculation of security metrics for countermeasure selection in computer networks I Kotenko, E Doynikova 2016 24th Euromicro International Conference on Parallel, Distributed, and …, 2016 | 36 | 2016 |
Countermeasure selection based on the attack and service dependency graphs for security incident management E Doynikova, I Kotenko Risks and Security of Internet and Systems: 10th International Conference …, 2016 | 35 | 2016 |
Security metrics based on attack graphs for the Olympic Games scenario I Kotenko, E Doynikova, A Chechulin 2014 22nd Euromicro International Conference on Parallel, Distributed, and …, 2014 | 33 | 2014 |
Comparative review of the intrusion detection systems based on federated learning: Advantages and open challenges E Fedorchenko, E Novikova, A Shulepov Algorithms 15 (7), 247, 2022 | 25 | 2022 |
A Semantic Model for Security Evaluation of Information Systems. E Doynikova, A Fedorchenko, IV Kotenko J. Cyber Secur. Mobil. 9 (2), 301-330, 2020 | 24 | 2020 |
Selection of countermeasures against network attacks based on dynamical calculation of security metrics I Kotenko, E Doynikova The Journal of Defense Modeling and Simulation 15 (2), 181-204, 2018 | 22 | 2018 |
Detection of cyberattacks and anomalies in cyber-physical systems: Approaches, data sources, evaluation O Tushkanova, D Levshun, A Branitskiy, E Fedorchenko, E Novikova, ... Algorithms 16 (2), 85, 2023 | 21 | 2023 |
Attack graph-based countermeasure selection using a stateful return on investment metric G Gonzalez-Granadillo, E Doynikova, I Kotenko, J Garcia-Alfaro Foundations and Practice of Security: 10th International Symposium, FPS 2017 …, 2018 | 21 | 2018 |
Countermeasure selection in SIEM systems based on the integrated complex of security metrics I Kotenko, E Doynikova 2015 23rd Euromicro International Conference on Parallel, Distributed, and …, 2015 | 21 | 2015 |
Analytical attack modeling and security assessment based on the common vulnerability scoring system E Doynikova, A Chechulin, I Kotenko 2017 20th Conference of Open Innovations Association (FRUCT), 53-61, 2017 | 20 | 2017 |
Determination of Young Generation's Sensitivity to the Destructive Stimuli based on the Information in Social Networks. A Branitskiy, D Levshun, N Krasilnikova, E Doynikova, IV Kotenko, ... J. Internet Serv. Inf. Secur. 9 (3), 1-20, 2019 | 18 | 2019 |