关注
Konstantin Izrailov
Konstantin Izrailov
Saint Petersburg State University of Telecommunications
在 spbgut.ru 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Method and utility for recovering code algorithms of telecommunication devices for vulnerability search
M Buinevich, K Izrailov
16th International conference on advanced communication technology, 172-176, 2014
462014
Static analysis of information systems for IoT cyber security: a survey of machine learning approaches
I Kotenko, K Izrailov, M Buinevich
Sensors 22 (4), 1335, 2022
442022
The life cycle of vulnerabilities in the representations of software for telecommunication devices
M Buinevich, K Izrailov, A Vladyko
2016 18th International Conference on Advanced Communication Technology …, 2016
392016
Metric of vulnerability at the base of the life cycle of software representations
M Buinevich, K Izrailov, A Vladyko
2018 20th International Conference on Advanced Communication Technology …, 2018
272018
Testing of utilities for finding vulnerabilities in the machine code of telecommunication devices
M Buinevich, K Izrailov, A Vladyko
2017 19th International Conference on Advanced Communication Technology …, 2017
272017
Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search
M Buinevich, K Izrailov, A Vladyko
2016 18th International Conference on Advanced Communication Technology …, 2016
272016
Method for partial recovering source code of telecommunication devices for vulnerability search
M Buinevich, K Izrailov, A Vladyko
2015 17th International Conference on Advanced Communication Technology …, 2015
252015
Software defined internet of things: cyber antifragility and vulnerability forecast
M Buinevich, P Fabrikantov, E Stolyarova, K Izrailov, A Vladyko
2017 IEEE 11th international conference on application of information and …, 2017
222017
Digital cloud environment: present challenges and future forecast
S Mescheryakov, D Shchemelinin, K Izrailov, V Pokussov
Future Internet 12 (5), 82, 2020
182020
Combine method of forecasting VANET cybersecurity for application of high priority way
M Buinevich, K Izrailov, E Stolyarova, A Vladyko
2018 20th International Conference on Advanced Communication Technology …, 2018
142018
An approach for stego-insider detection based on a hybrid nosql database
I Kotenko, A Krasov, I Ushakov, K Izrailov
Journal of Sensor and Actuator Networks 10 (2), 25, 2021
132021
Generalized interaction model in the information system
MV Buinevich, KE Izrailov, VV Pokusov, SV Sharapov, SN Terekhin
International Journal of Pure and Applied Mathematics 119 (17), 1381-1385, 2018
122018
Classification and analysis of vulnerabilities in mobile device infrastructure interfaces
K Izrailov, D Levshun, I Kotenko, A Chechulin
International Symposium on Mobile Internet Security, 301-319, 2021
102021
Method and algorithms of visual audit of program interaction.
MV Buinevich, KE Izrailov, IV Kotenko, PA Kurta
J. Internet Serv. Inf. Secur. 11 (1), 16-43, 2021
102021
Threats classification method for the transport infrastructure of a smart city
K Izrailov, A Chechulin, L Vitkova
2020 IEEE 14th International Conference on Application of Information and …, 2020
102020
Modeling the development of energy network software, taking into account the detection and elimination of vulnerabilities
I Kotenko, K Izrailov, M Buinevich, I Saenko, R Shorey
Energies 16 (13), 5111, 2023
92023
Analytical modeling for identification of the machine code architecture of cyberphysical devices in smart homes
I Kotenko, K Izrailov, M Buinevich
Sensors 22 (3), 1017, 2022
92022
Detection of stego-insiders in corporate networks based on a hybrid NoSQL database model
I Kotenko, A Krasov, I Ushakov, K Izrailov
Proceedings of the 4th International Conference on Future Networks and …, 2020
82020
Approach to combining different methods for detecting insiders
M Buinevich, K Izrailov, I Kotenko, I Ushakov, D Vlasov
Proceedings of the 4th International Conference on Future Networks and …, 2020
72020
Identification of processor’s architecture of executable code based on machine learning. part 1. frequency byte model
M Buinevich, K Izrailov
Proc. Telecommun. Univ 6, 77-85, 2020
62020
系统目前无法执行此操作,请稍后再试。
文章 1–20