关注
Evgenia Novikova
Evgenia Novikova
снс, СПИИРАН
在 comsec.spb.ru 的电子邮件经过验证
标题
引用次数
引用次数
年份
Open-source federated learning frameworks for IoT: A comparative review and analysis
I Kholod, E Yanaki, D Fomichev, E Shalugin, E Novikova, E Filippov, ...
Sensors 21 (1), 167, 2020
1402020
Analytical visualization techniques for security information and event management
E Novikova, I Kotenko
2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013
602013
Attack Modelling and Security Evaluation for Security Information and Event Management.
IV Kotenko, A Chechulin, E Novikova
SECRYPT 2012, 391-394, 2012
482012
Visualization of security metrics for cyber situation awareness
I Kotenko, E Novikova
2014 Ninth International Conference on Availability, Reliability and …, 2014
442014
Attacker behaviour forecasting using methods of intelligent data analysis: A comparative review and prospects
E Doynikova, E Novikova, I Kotenko
Information 11 (3), 168, 2020
352020
Comparative review of the intrusion detection systems based on federated learning: Advantages and open challenges
E Fedorchenko, E Novikova, A Shulepov
Algorithms 15 (7), 247, 2022
322022
Detection of cyberattacks and anomalies in cyber-physical systems: Approaches, data sources, evaluation
O Tushkanova, D Levshun, A Branitskiy, E Fedorchenko, E Novikova, ...
Algorithms 16 (2), 85, 2023
282023
Anomaly detection in the HVAC system operation by a RadViz based visualization-driven approach
E Novikova, M Bestuzhev, I Kotenko
Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020
232020
Visual analytics for detecting anomalous activity in mobile money transfer services
E Novikova, I Kotenko
Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2014
222014
Vissecanalyzer: A visual analytics tool for network security assessment
I Kotenko, E Novikova
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
202013
Federated learning for intrusion detection in the critical infrastructures: Vertically partitioned data use case
E Novikova, E Doynikova, S Golubev
Algorithms 15 (4), 104, 2022
182022
P2Onto: Making Privacy Policies Transparent
E Novikova, E Doynikova, I Kotenko
International Workshop on the Security of Industrial Control Systems and …, 2020
162020
Analysis of privacy-enhancing technologies in open-source federated learning frameworks for driver activity recognition
E Novikova, D Fomichov, I Kholod, E Filippov
Sensors 22 (8), 2983, 2022
152022
DDoS attacks detection in cloud computing using data mining techniques
K Borisenko, A Smirnov, E Novikova, A Shorov
Advances in Data Mining. Applications and Theoretical Aspects: 16th …, 2016
152016
CPE and CVE based technique for software security risk assessment
R Ushakov, E Doynikova, E Novikova, I Kotenko
2021 11th IEEE International Conference on Intelligent Data Acquisition and …, 2021
142021
Visualizing anomalous activity in the movement of critical infrastructure employees
ES Novikova, IN Murenin, AV Shorov
2017 IEEE Conference of Russian Young Researchers in Electrical and …, 2017
142017
Interactive multi-view visualization for fraud detection in mobile money transfer services
E Novikova, I Kotenko, E Fedotov
International Journal of Mobile Computing and Multimedia Communications …, 2014
132014
Privacy policies of IoT devices: collection and analysis
M Kuznetsov, E Novikova, I Kotenko, E Doynikova
Sensors 22 (5), 1838, 2022
122022
Towards attacker attribution for risk analysis
E Doynikova, E Novikova, D Gaifulina, I Kotenko
International Conference on Risks and Security of Internet and Systems, 347-353, 2020
112020
Visualization assisted approach to anomaly and attack detection in water treatment systems
A Meleshko, A Shulepov, V Desnitsky, E Novikova, I Kotenko
Water 14 (15), 2342, 2022
82022
系统目前无法执行此操作,请稍后再试。
文章 1–20