Computer network security, including security policy management, access control, authentication, network security analysis, intrusion detection, firewalls, deception systems, malware protection, verification of security systems, digital right management, modeling, simulation and visualization technologies for counteraction to cyber terrorism, artificial intelligence, including multi-agent frameworks and systems, agent-based modeling and simulation, soft and evolutionary computing, machine learning, data mining, data and information fusion, telecommunications, including decision making and planning for telecommunication systems.
Main publications:
Kotenko I.V., Ulanov A.V., “Multi-agent Framework for Simulation of Adaptive Cooperative Defense against Internet Attacks”, Lecture Notes in Artificial Intelligence, 4476 (2007), 212–228
Kotenko I., Tishkov A., Chervatuk O., Sidelnikova E., “Security Policy Verification Tool for Geographical Information Systems”, Lecture Notes in Geoinformation and Cartography, 2007, 128–146
Bogdanov V., Kotenko I., “Policy-based Proactive Monitoring of Security Policy Performance”, Communications in Computer and Information Science (CCIS), 1 (2007), 197–212
Kotenko I., “Multi-agent Simulation of Attacks and Defense Mechanisms in Computer Networks”, The Journal of Computing, 7:2 (2008), 35–43
Saenko I., Kotenko I., “Genetic Optimization of Access Control Schemes in Virtual Local Area Networks”, Lecture Notes in Computer Science, 6258 (2010), 209–216