2017 IEEE SMARTWORLD UBIQUITOUS INTELLIGENCE AND COMPUTING, ADVANCED AND TRUSTED COMPUTED, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF … E Doynikova, I Kotenko, T Sherwin, M Easte, KIK Wang, K Chapron, ... Argumentation 1, 7, 2017 | | 2017 |
2022 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)| 978-1-6654-6958-6/22/$31.00© 2022 IEEE| DOI: 10.1109/PDP55904. 2022.00052 ME Acacio, G Agapito, V Aggarwal, MAZ Alves, H Amano, F Amelia, ... | | |
3rd international workshop on secure information systems I Ahmad, S Bratus, NT Courtois, LJ Janczewski, I Kotenko, Z Kotulski, ... | | |
Анализ методов корреляции событий безопасности в Siem-системах. Часть 1 AV Fedorchenko, DS Levshun, AA Chechulin, IV Kotenko Труды СПИИРАН, 5-27, 2016 | | 2016 |
ДВАДЦАТЬ ПЕРВАЯ НАЦИОНАЛЬНАЯ КОНФЕРЕНЦИЯ ПО ИСКУССТВЕННОМУ ИНТЕЛЛЕКТУ С МЕЖДУНАРОДНЫМ УЧАСТИЕМ (КИИ-2023) H DONG, I KOTENKO Принт-Экспресс КОНФЕРЕНЦИЯ: ДВАДЦАТЬ ПЕРВАЯ НАЦИОНАЛЬНАЯ КОНФЕРЕНЦИЯ ПО …, 0 | | |
Динамическое оценивание защищенности компьютерных сетей в SIEM-системах ЕВ Дойникова, ИВ Котенко, АА Чечулин Безопасность информационных технологий 22 (3), 2015 | 7 | 2015 |
Построение графов атак для анализа событий безопасности АА Чечулин, ИВ Котенко Безопасность информационных технологий 21 (3), 2014 | 8 | 2014 |
Построение и тестирование безопасных встроенных систем ВА Десницкий, ИВ Котенко, АА Чечулин Региональная информатика (РИ-2010), 115-121, 2011 | 6 | 2011 |
Разработка сервиса доступа и управления интегрированной базой уязвимостей АВ Федорченко, ИВ Котенко, АА Чечулин Безопасность информационных технологий 22 (4), 26-32, 2015 | 3 | 2015 |
A Abramov, Maksim, 23 Afanasyev, Alexander, 161,369 Antipov, SG, 106 Averkin, Alexey N., 118 G Garani, Georgia, 31 Gibner, Yakov M., 291 Gladkikh, Anatoliy, 369 Gladkov, Leonid … L Babenko, AD Bakhmut, S Barkovskii, A Basan, E Basan, AF Berman, ... Proceedings of the Third International Scientific Conference “Intelligent …, 2018 | | 2018 |
A cyber attack modeling and impact assessment framework I Kotenko, A Chechulin 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-24, 2013 | 188 | 2013 |
A Fuzzy Model of the Security Event and Incident Management for Technological Processes and Objects I Kotenko, I Parashchuk Advances in Automation II: Proceedings of the International Russian …, 2021 | 1 | 2021 |
A genetic approach for virtual computer network design I Saenko, I Kotenko Intelligent Distributed Computing VIII, 95-105, 2015 | 9 | 2015 |
A Methodology for the Analysis and f S Modeling of Security Threats and Attacks for Systems of Embedded Attacks for Systems of Embedded Components A Chechulin, I Kotenko, JF Ruiz, R Harjani, A Maña, V Desnitsky | | |
A methodology for the analysis and modeling of security threats and attacks for systems of embedded components JF Ruiz, R Harjani, A Mana, V Desnitsky, I Kotenko, A Chechulin 2012 20th Euromicro International Conference on Parallel, Distributed and …, 2012 | 81 | 2012 |
A model checking based approach for verification of attribute-based access control policies in cloud infrastructures I Kotenko, I Saenko, D Levshun International Conference on Intelligent Information Technologies for …, 2019 | 2 | 2019 |
A proactive protection of smart power grids against cyberattacks on service data transfer protocols by computational intelligence methods I Kotenko, I Saenko, O Lauta, A Kribel Sensors 22 (19), 7506, 2022 | 3 | 2022 |
A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures I Saenko, I Kotenko Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2019 | 13 | 2019 |
A Semantic Model for Security Evaluation of Information Systems. E Doynikova, A Fedorchenko, IV Kotenko J. Cyber Secur. Mobil. 9 (2), 301-330, 2020 | 24 | 2020 |
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities D Levshun, I Kotenko Artificial Intelligence Review 56 (8), 8547-8590, 2023 | 23 | 2023 |