关注
Igor Kotenko
Igor Kotenko
http://comsec.spb.ru/kotenko/
在 comsec.spb.ru 的电子邮件经过验证 - 首页
标题
引用次数
年份
2017 IEEE SMARTWORLD UBIQUITOUS INTELLIGENCE AND COMPUTING, ADVANCED AND TRUSTED COMPUTED, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF …
E Doynikova, I Kotenko, T Sherwin, M Easte, KIK Wang, K Chapron, ...
Argumentation 1, 7, 2017
2017
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)| 978-1-6654-6958-6/22/$31.00© 2022 IEEE| DOI: 10.1109/PDP55904. 2022.00052
ME Acacio, G Agapito, V Aggarwal, MAZ Alves, H Amano, F Amelia, ...
3rd international workshop on secure information systems
I Ahmad, S Bratus, NT Courtois, LJ Janczewski, I Kotenko, Z Kotulski, ...
Анализ методов корреляции событий безопасности в Siem-системах. Часть 1
AV Fedorchenko, DS Levshun, AA Chechulin, IV Kotenko
Труды СПИИРАН, 5-27, 2016
2016
ДВАДЦАТЬ ПЕРВАЯ НАЦИОНАЛЬНАЯ КОНФЕРЕНЦИЯ ПО ИСКУССТВЕННОМУ ИНТЕЛЛЕКТУ С МЕЖДУНАРОДНЫМ УЧАСТИЕМ (КИИ-2023)
H DONG, I KOTENKO
Принт-Экспресс КОНФЕРЕНЦИЯ: ДВАДЦАТЬ ПЕРВАЯ НАЦИОНАЛЬНАЯ КОНФЕРЕНЦИЯ ПО …, 0
Динамическое оценивание защищенности компьютерных сетей в SIEM-системах
ЕВ Дойникова, ИВ Котенко, АА Чечулин
Безопасность информационных технологий 22 (3), 2015
72015
Построение графов атак для анализа событий безопасности
АА Чечулин, ИВ Котенко
Безопасность информационных технологий 21 (3), 2014
82014
Построение и тестирование безопасных встроенных систем
ВА Десницкий, ИВ Котенко, АА Чечулин
Региональная информатика (РИ-2010), 115-121, 2011
62011
Разработка сервиса доступа и управления интегрированной базой уязвимостей
АВ Федорченко, ИВ Котенко, АА Чечулин
Безопасность информационных технологий 22 (4), 26-32, 2015
32015
A Abramov, Maksim, 23 Afanasyev, Alexander, 161,369 Antipov, SG, 106 Averkin, Alexey N., 118 G Garani, Georgia, 31 Gibner, Yakov M., 291 Gladkikh, Anatoliy, 369 Gladkov, Leonid …
L Babenko, AD Bakhmut, S Barkovskii, A Basan, E Basan, AF Berman, ...
Proceedings of the Third International Scientific Conference “Intelligent …, 2018
2018
A cyber attack modeling and impact assessment framework
I Kotenko, A Chechulin
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-24, 2013
1882013
A Fuzzy Model of the Security Event and Incident Management for Technological Processes and Objects
I Kotenko, I Parashchuk
Advances in Automation II: Proceedings of the International Russian …, 2021
12021
A genetic approach for virtual computer network design
I Saenko, I Kotenko
Intelligent Distributed Computing VIII, 95-105, 2015
92015
A Methodology for the Analysis and f S Modeling of Security Threats and Attacks for Systems of Embedded Attacks for Systems of Embedded Components
A Chechulin, I Kotenko, JF Ruiz, R Harjani, A Maña, V Desnitsky
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components
JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin
2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012
812012
A model checking based approach for verification of attribute-based access control policies in cloud infrastructures
I Kotenko, I Saenko, D Levshun
International Conference on Intelligent Information Technologies for …, 2019
22019
A proactive protection of smart power grids against cyberattacks on service data transfer protocols by computational intelligence methods
I Kotenko, I Saenko, O Lauta, A Kribel
Sensors 22 (19), 7506, 2022
32022
A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures
I Saenko, I Kotenko
Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2019
132019
A Semantic Model for Security Evaluation of Information Systems.
E Doynikova, A Fedorchenko, IV Kotenko
J. Cyber Secur. Mobil. 9 (2), 301-330, 2020
242020
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
D Levshun, I Kotenko
Artificial Intelligence Review 56 (8), 8547-8590, 2023
232023
系统目前无法执行此操作,请稍后再试。
文章 1–20