Data-driven security for smart city systems: Carving a trail

N Mohamed, J Al-Jaroodi, I Jawhar… - IEEE Access, 2020 - ieeexplore.ieee.org
Smart cities rely heavily on collecting and using data. Smart systems are implemented and
deployed to provide intelligent features that help improve efficiency and quality of life. This …

[PDF][PDF] A visual analytics approach for the cyber forensics based on different views of the network traffic.

IV Kotenko, M Kolomeets, A Chechulin… - J. Wirel. Mob. Networks …, 2018 - academia.edu
Network forensics is based on the analysis of network traffic. Traffic analysis is a routine
procedure, but it allows one to not only identify the cause of the security breach, but also …

Методика выявления каналов распространения информации в социальных сетях

АА Проноза, ЛА Виткова, АА Чечулин… - Вестник Санкт …, 2018 - cyberleninka.ru
Целью работы является разработка методики выявления каналов распространения
информации в социальных сетях. Предложенная методика базируется на …

Visual analysis of information dissemination channels in social network for protection against inappropriate content

A Pronoza, L Vitkova, A Chechulin… - Proceedings of the Third …, 2019 - Springer
The paper presents an approach to a visual analysis of links in social networks for obtaining
information on channels of inappropriate information dissemination. The offered approach is …

Access control visualization using triangular matrices

M Kolomeets, A Chechulin, I Kotenko… - 2019 27th Euromicro …, 2019 - ieeexplore.ieee.org
The paper proposes an approach for visualization of access control systems based on
triangular matrices. The approach is used for visualization of access control security model …

Cybersecurity incident response: a socio-technical approach

B Al Sabbagh - 2019 - diva-portal.org
This thesis examines the cybersecurity incident response problem using a socio-technical
approach. The motivation of this work is the need to bridge the knowledge and practise gap …

[PDF][PDF] Social networks analysis by graph algorithms on the example of the VKontakte social network.

M Kolomeets, A Chechulin, IV Kotenko - J. Wirel. Mob. Networks …, 2019 - academia.edu
The development of social networks made it possible to form very complex structures of
users and their content. As new services are added for users, the number of vertex types and …

[图书][B] Advances in intelligent systems and computing

J Kacprzyk - 2012 - Springer
The Intelligent Human Computer Interaction conferences bring together scientists,
engineers, computer users, and students to exchange and share their experiences, new …

Visual analysis of CAN bus traffic injection using radial bar charts

M Kolomeets, A Chechulin… - 2018 IEEE Industrial …, 2018 - ieeexplore.ieee.org
The CAN bus protocol is used in modern vehicles to control dozens of devices. It is simple
enough, but this protocol lacks security mechanisms, and that is one of the main reasons …

Unmanned transport environment threats

M Kolomeets, K Zhernova, A Chechulin - … " ER (ZR) 2020, Ufa, Russia, 15 …, 2020 - Springer
Unmanned private and public transport may be susceptible to attacks through various
interfaces including networks and physical sensors. With the spread of smart transport and …