RUS  ENG
Full version
PEOPLE

Kotenko Igor Vital'evich

Publications in Math-Net.Ru

  1. Models and algorithms for protecting intrusion detection systems from attacks on machine learning components

    Comp. nanotechnol., 12:1 (2025),  17–25
  2. Attack and anomaly detection in containerized systems: approaches based on anomaly analysis and profiling

    Artificial Intelligence and Decision Making, 2025, no. 2,  3–18
  3. Attack and anomaly detection in containerized systems: signature and rule-based approaches

    Artificial Intelligence and Decision Making, 2025, no. 1,  3–13
  4. Analysis of modern research on protection against adversarial attacks in energy systems

    Informatics and Automation, 24:6 (2025),  1751–1809
  5. Invasive approach to verification of functional and structural specifications implemented in custom integrated circuits

    Informatics and Automation, 24:2 (2025),  526–555
  6. Methodology for assessing the reliability of software-defined networks under computer attacks

    Journal of the Belarusian State University. Mathematics and Informatics, 3 (2024),  90–102
  7. XXI National Conference on Artificial Intelligence

    Artificial Intelligence and Decision Making, 2024, no. 1,  129–141
  8. Artificial intelligence for cyber security: a new stage of confrontation in cyberspace

    Artificial Intelligence and Decision Making, 2024, no. 1,  3–19
  9. Features of the assessment of malicious activity in the Smart City infrastructure based on information granulation and fuzzy granular calculations

    Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2024, no. 3,  56–64
  10. Methods of intelligent system event analysis for multistep cyber-attack detection: using machine learning methods

    Artificial Intelligence and Decision Making, 2023, no. 3,  3–15
  11. Twentieth National Conference on Artificial Intelligence

    Artificial Intelligence and Decision Making, 2023, no. 2,  108–116
  12. Methods of intelligent system event analysis for multistep cyber-attack detection: using knowledge bases

    Artificial Intelligence and Decision Making, 2023, no. 2,  3–14
  13. Analytical review of intelligent intrusion detection systems based on federated learning: advantages and open challenges

    Informatics and Automation, 22:5 (2023),  1034–1082
  14. Specific features of operational assessment of security of critical resources based on adaptive neural network filtering

    Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2023, no. 3,  55–64
  15. Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods

    Informatics and Automation, 21:6 (2022),  1328–1358
  16. Information and telecommunication resources of critical infrastructures: features of interval security analysis

    Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2022, no. 2,  33–40
  17. Intelligent system of analytical processing of digital network content for protection against inappropriate information

    Informatics and Automation, 20:4 (2021),  755–792
  18. Fuzzy management of information and security events: features of constructing membership functions

    Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2021, no. 3,  7–15
  19. Problematic issues of information security of cyber-physical systems

    Tr. SPIIRAN, 19:5 (2020),  1050–1088
  20. Model of security information and event management system

    Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2020, no. 2,  84–94
  21. Automated detection of assets and calculation of their criticality for the analysis of information system security

    Tr. SPIIRAN, 18:5 (2019),  1182–1211
  22. Verification of unreliable parameters of the malicious information detection model

    Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2019, no. 2,  7–18
  23. Architecture of the parallel Big Data Processing system for security monitoring of Internet of Things networks

    Tr. SPIIRAN, 59 (2018),  5–30
  24. Improvement of attack graphs for cybersecurity monitoring: handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection

    Tr. SPIIRAN, 57 (2018),  211–240
  25. Automated adaptive monitoring of integrated security of information systems "Smart City": target functions of the conceptual model

    Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2018, no. 3,  7–15
  26. Methodology for disseminating information channels analysis in social networks

    Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 14:4 (2018),  362–377
  27. Assessment of cyber-resilience of computer networks based on simulation of cyber attacks by the stochastic networks conversion method

    Tr. SPIIRAN, 55 (2017),  160–184
  28. A system for collecting, storing and processing security information and events based on Elastic Stack tools

    Tr. SPIIRAN, 54 (2017),  5–34
  29. An analysis of security event correlation techniques in SIEM-systems. Part 2

    Tr. SPIIRAN, 49 (2016),  208–225
  30. Detection of Anomalous Activity in Mobile Money Transfer Services Using RadViz-Visualization

    Tr. SPIIRAN, 48 (2016),  32–51
  31. Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System

    Tr. SPIIRAN, 48 (2016),  5–31
  32. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 1

    Tr. SPIIRAN, 47 (2016),  5–27
  33. Mathematical Models of Visualization in SIEM Systems

    Tr. SPIIRAN, 46 (2016),  90–107
  34. Analysis and Classification of Methods for Network Attack Detection

    Tr. SPIIRAN, 45 (2016),  207–244
  35. Using genetic optimization and visual analysis tools for access schema design in virtual local area networks

    Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2015, no. 1,  33–46
  36. Review of Methodological Primitives for the Phased Construction of Data Visualization Model

    Tr. SPIIRAN, 42 (2015),  232–257
  37. The use of expert knowledge for development of secure systems with embedded devices

    Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2014, no. 4,  58–73
  38. New generation of security information and event management systems

    St. Petersburg Polytechnical University Journal. Computer Science. Telecommunication and Control Sys, 2014, no. 3(198),  7–18
  39. Configuring embedded information protection systems within services providing complex security on rail transport

    Tr. SPIIRAN, 30 (2013),  40–55
  40. Dynamical recalculation of the security metrics on the example of attack potentiality

    Tr. SPIIRAN, 30 (2013),  26–39
  41. The construction of a multi-level intelligent information security system for automated systems of railway transport

    Tr. SPIIRAN, 30 (2013),  7–25
  42. Design of the ontology based data model for the network attack modeling system

    Tr. SPIIRAN, 26 (2013),  26–39
  43. Tools for development of neural components of intelligent security systems

    Tr. SPIIRAN, 26 (2013),  7–25
  44. Mathematical Methods, Models and Architectures for Computer Network Security: the review of perspective research directions according to the results of the International Conference MMM–ACNS–2012

    Tr. SPIIRAN, 25 (2013),  148–170
  45. Perspective data storage systems for security information monitoring and management

    Tr. SPIIRAN, 25 (2013),  113–134
  46. Scientific analysis and policy support for cyber security: the review of perspective research directions according to the results of the International Workshop SA&PS4CS 2012

    Tr. SPIIRAN, 24 (2013),  66–88
  47. Architecture of the system of intelligent information security services in critical infrastructures

    Tr. SPIIRAN, 24 (2013),  21–40
  48. Investigation of structural specificities of malicious documents by Data Mining

    Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2012, no. 2,  76–92
  49. Conception of adaptive protection of information and telecommunication systems based on the paradigms of nervous and neural networks

    Tr. SPIIRAN, 23 (2012),  100–115
  50. Methodology of iterative attack modelling in large computer networks

    Tr. SPIIRAN, 23 (2012),  50–79
  51. Analysis of the Visualization Techniques used for Information Security in the Computer Networks

    Tr. SPIIRAN, 23 (2012),  7–29
  52. Verification of security policy filtering rules with temporal parameters by Model Checking

    Tr. SPIIRAN, 22 (2012),  113–138
  53. Developing the system of intelligent services to protect information in cyber warfare

    Tr. SPIIRAN, 22 (2012),  84–100
  54. Simulation of protection mechanisms against infrastructure attacks based on the “nervous network system” approach

    Tr. SPIIRAN, 22 (2012),  45–70
  55. Methods and tools for attack modeling in large computer networks: state of the problem

    Tr. SPIIRAN, 22 (2012),  5–30
  56. Application of security information and event management technology for information security in critical infrastructures

    Tr. SPIIRAN, 20 (2012),  27–56
  57. Simulation of protection mechanisms against botnets

    Tr. SPIIRAN, 19 (2011),  7–33
  58. Analysis of bio-inspired approaches for protection of computer systems and networks

    Tr. SPIIRAN, 18 (2011),  19–73
  59. An aspect-oriented approach to realization of mobile module in the security model based on remote entrusting mechanism

    Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2009, no. 4,  67–76
  60. Approach to detect malware based on postionally dependent information

    Tr. SPIIRAN, 10 (2009),  132–147
  61. Security protocols verification combining existing approaches and tools

    Tr. SPIIRAN, 8 (2009),  292–310

  62. Analytical review of the reports of the International Workshop «Scientific Analysis and Policy Support for Cyber Security» (SA&PS4CS 2010)

    Tr. SPIIRAN, 13 (2010),  226–248
  63. Analytical review of talks on the International Conference «Mathematical Methods, Models and Architectures for Computer Network Security» (MMM-ACNS-2010)

    Tr. SPIIRAN, 13 (2010),  199–225


© Steklov Math. Inst. of RAS, 2026