A cyber attack modeling and impact assessment framework I Kotenko, A Chechulin 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-24, 2013 | 187 | 2013 |
Intrusion detection in unlabeled data with quarter-sphere support vector machines P Laskov, C Schäfer, I Kotenko, KR Müller Walter de Gruyter GmbH & Co. KG 27 (4), 228-236, 2004 | 142 | 2004 |
Attack graph based evaluation of network security I Kotenko, M Stepashkin Communications and Multimedia Security: 10th IFIP TC-6 TC-11 International …, 2006 | 140 | 2006 |
Attacks against computer network: Formal grammar-based framework and simulation tool V Gorodetski, I Kotenko International Workshop on Recent Advances in Intrusion Detection, 219-238, 2002 | 135 | 2002 |
Framework for mobile Internet of Things security monitoring based on big data processing and machine learning I Kotenko, I Saenko, A Branitskiy IEEE Access 6, 72714-72723, 2018 | 101 | 2018 |
Attack modeling and security evaluation in SIEM systems I Kotenko, A Chechulin International Transactions on Systems Science and Applications 8, 129-147, 2012 | 98 | 2012 |
Multi-agent technologies for computer network security: Attack simulation, intrusion detection and intrusion detection learning V Gorodetski, I Kotenko, O Karsaev Comput. Syst. Sci. Eng. 18 (4), 191-200, 2003 | 94 | 2003 |
Agent-based modeling and simulation of cyber-warfare between malefactors and security agents in internet I Kotenko 19th European Simulation Multiconference “Simulation in wider Europe, 2005 | 90 | 2005 |
Security analysis of information systems taking into account social engineering attacks I Kotenko, M Stepashkin, E Doynikova 2011 19th International Euromicro Conference on Parallel, Distributed and …, 2011 | 82 | 2011 |
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin 2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012 | 79 | 2012 |
Common framework for attack modeling and security evaluation in SIEM systems I Kotenko, A Chechulin 2012 IEEE International Conference on Green Computing and Communications, 94-101, 2012 | 78 | 2012 |
Software development kit for multi-agent systems design and implementation V Gorodetski, O Karsayev, I Kotenko, A Khabalov International Workshop of Central and Eastern Europe on Multi-Agent Systems …, 2001 | 75 | 2001 |
Agent-based modeling and simulation of botnets and botnet defense I Kotenko, A Konovalov, A Shorov Conference on Cyber Conflict. CCD COE Publications. Tallinn, Estonia, 21-44, 2010 | 71 | 2010 |
The ontology of metrics for security evaluation and decision support in SIEM systems I Kotenko, O Polubelova, I Saenko, E Doynikova 2013 International Conference on Availability, Reliability and Security, 638-645, 2013 | 70 | 2013 |
Hybridization of computational intelligence methods for attack detection in computer networks A Branitskiy, I Kotenko Journal of Computational Science 23, 145-156, 2017 | 68 | 2017 |
Security assessment of computer networks based on attack graphs and security events I Kotenko, E Doynikova Information and Communication Technology: Second IFIP TC5/8 International …, 2014 | 68 | 2014 |
Malware detection by data mining techniques based on positionally dependent features D Komashinskiy, I Kotenko 2010 18th Euromicro Conference on Parallel, Distributed and Network-based …, 2010 | 65 | 2010 |
Computer attack modeling and security evaluation based on attack graphs I Kotenko, A Chechulin 2013 IEEE 7th International Conference on Intelligent Data Acquisition and …, 2013 | 64 | 2013 |
Analytical visualization techniques for security information and event management E Novikova, I Kotenko 2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013 | 60 | 2013 |
The ontological approach for SIEM data repository implementation I Kotenko, O Polubelova, I Saenko 2012 IEEE International Conference on Green Computing and Communications …, 2012 | 60 | 2012 |