Open-source federated learning frameworks for IoT: A comparative review and analysis I Kholod, E Yanaki, D Fomichev, E Shalugin, E Novikova, E Filippov, ... Sensors 21 (1), 167, 2020 | 140 | 2020 |
Analytical visualization techniques for security information and event management E Novikova, I Kotenko 2013 21st Euromicro International Conference on Parallel, Distributed, and …, 2013 | 60 | 2013 |
Attack Modelling and Security Evaluation for Security Information and Event Management. IV Kotenko, A Chechulin, E Novikova SECRYPT 2012, 391-394, 2012 | 48 | 2012 |
Visualization of security metrics for cyber situation awareness I Kotenko, E Novikova 2014 Ninth International Conference on Availability, Reliability and …, 2014 | 44 | 2014 |
Attacker behaviour forecasting using methods of intelligent data analysis: A comparative review and prospects E Doynikova, E Novikova, I Kotenko Information 11 (3), 168, 2020 | 35 | 2020 |
Comparative review of the intrusion detection systems based on federated learning: Advantages and open challenges E Fedorchenko, E Novikova, A Shulepov Algorithms 15 (7), 247, 2022 | 32 | 2022 |
Detection of cyberattacks and anomalies in cyber-physical systems: Approaches, data sources, evaluation O Tushkanova, D Levshun, A Branitskiy, E Fedorchenko, E Novikova, ... Algorithms 16 (2), 85, 2023 | 28 | 2023 |
Anomaly detection in the HVAC system operation by a RadViz based visualization-driven approach E Novikova, M Bestuzhev, I Kotenko Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020 | 23 | 2020 |
Visual analytics for detecting anomalous activity in mobile money transfer services E Novikova, I Kotenko Availability, Reliability, and Security in Information Systems: IFIP WG 8.4 …, 2014 | 22 | 2014 |
Vissecanalyzer: A visual analytics tool for network security assessment I Kotenko, E Novikova Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013 | 20 | 2013 |
Federated learning for intrusion detection in the critical infrastructures: Vertically partitioned data use case E Novikova, E Doynikova, S Golubev Algorithms 15 (4), 104, 2022 | 18 | 2022 |
P2Onto: Making Privacy Policies Transparent E Novikova, E Doynikova, I Kotenko International Workshop on the Security of Industrial Control Systems and …, 2020 | 16 | 2020 |
Analysis of privacy-enhancing technologies in open-source federated learning frameworks for driver activity recognition E Novikova, D Fomichov, I Kholod, E Filippov Sensors 22 (8), 2983, 2022 | 15 | 2022 |
DDoS attacks detection in cloud computing using data mining techniques K Borisenko, A Smirnov, E Novikova, A Shorov Advances in Data Mining. Applications and Theoretical Aspects: 16th …, 2016 | 15 | 2016 |
CPE and CVE based technique for software security risk assessment R Ushakov, E Doynikova, E Novikova, I Kotenko 2021 11th IEEE International Conference on Intelligent Data Acquisition and …, 2021 | 14 | 2021 |
Visualizing anomalous activity in the movement of critical infrastructure employees ES Novikova, IN Murenin, AV Shorov 2017 IEEE Conference of Russian Young Researchers in Electrical and …, 2017 | 14 | 2017 |
Interactive multi-view visualization for fraud detection in mobile money transfer services E Novikova, I Kotenko, E Fedotov International Journal of Mobile Computing and Multimedia Communications …, 2014 | 13 | 2014 |
Privacy policies of IoT devices: collection and analysis M Kuznetsov, E Novikova, I Kotenko, E Doynikova Sensors 22 (5), 1838, 2022 | 12 | 2022 |
Towards attacker attribution for risk analysis E Doynikova, E Novikova, D Gaifulina, I Kotenko International Conference on Risks and Security of Internet and Systems, 347-353, 2020 | 11 | 2020 |
Visualization assisted approach to anomaly and attack detection in water treatment systems A Meleshko, A Shulepov, V Desnitsky, E Novikova, I Kotenko Water 14 (15), 2342, 2022 | 8 | 2022 |