|
|
Publications in Math-Net.Ru
-
Models and algorithms for protecting intrusion detection systems from attacks on machine learning components
Comp. nanotechnol., 12:1 (2025), 17–25
-
Attack and anomaly detection in containerized systems: approaches based on anomaly analysis and profiling
Artificial Intelligence and Decision Making, 2025, no. 2, 3–18
-
Attack and anomaly detection in containerized systems: signature and rule-based approaches
Artificial Intelligence and Decision Making, 2025, no. 1, 3–13
-
Analysis of modern research on protection against adversarial attacks in energy systems
Informatics and Automation, 24:6 (2025), 1751–1809
-
Invasive approach to verification of functional and structural specifications implemented in custom integrated circuits
Informatics and Automation, 24:2 (2025), 526–555
-
Methodology for assessing the reliability of software-defined networks under computer attacks
Journal of the Belarusian State University. Mathematics and Informatics, 3 (2024), 90–102
-
XXI National Conference on Artificial Intelligence
Artificial Intelligence and Decision Making, 2024, no. 1, 129–141
-
Artificial intelligence for cyber security: a new stage of confrontation in cyberspace
Artificial Intelligence and Decision Making, 2024, no. 1, 3–19
-
Features of the assessment of malicious activity in the Smart City infrastructure based on information granulation and fuzzy granular calculations
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2024, no. 3, 56–64
-
Methods of intelligent system event analysis for multistep cyber-attack detection: using machine learning methods
Artificial Intelligence and Decision Making, 2023, no. 3, 3–15
-
Twentieth National Conference on Artificial Intelligence
Artificial Intelligence and Decision Making, 2023, no. 2, 108–116
-
Methods of intelligent system event analysis for multistep cyber-attack detection: using knowledge bases
Artificial Intelligence and Decision Making, 2023, no. 2, 3–14
-
Analytical review of intelligent intrusion detection systems based on federated learning: advantages and open challenges
Informatics and Automation, 22:5 (2023), 1034–1082
-
Specific features of operational assessment of security of critical resources based on adaptive neural network filtering
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2023, no. 3, 55–64
-
Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods
Informatics and Automation, 21:6 (2022), 1328–1358
-
Information and telecommunication resources of critical infrastructures: features of interval security analysis
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2022, no. 2, 33–40
-
Intelligent system of analytical processing of digital network content for protection against inappropriate information
Informatics and Automation, 20:4 (2021), 755–792
-
Fuzzy management of information and security events: features of constructing membership functions
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2021, no. 3, 7–15
-
Problematic issues of information security of cyber-physical systems
Tr. SPIIRAN, 19:5 (2020), 1050–1088
-
Model of security information and event management system
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2020, no. 2, 84–94
-
Automated detection of assets and calculation of their criticality for the analysis of information system security
Tr. SPIIRAN, 18:5 (2019), 1182–1211
-
Verification of unreliable parameters of the malicious information detection model
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2019, no. 2, 7–18
-
Architecture of the parallel Big Data Processing system for security monitoring of Internet of Things networks
Tr. SPIIRAN, 59 (2018), 5–30
-
Improvement of attack graphs for cybersecurity monitoring: handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection
Tr. SPIIRAN, 57 (2018), 211–240
-
Automated adaptive monitoring of integrated security of information systems "Smart City": target functions of the conceptual model
Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2018, no. 3, 7–15
-
Methodology for disseminating information channels analysis in social networks
Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 14:4 (2018), 362–377
-
Assessment of cyber-resilience of computer networks based on simulation of cyber attacks by the stochastic networks conversion method
Tr. SPIIRAN, 55 (2017), 160–184
-
A system for collecting, storing and processing security information and events based on Elastic Stack tools
Tr. SPIIRAN, 54 (2017), 5–34
-
An analysis of security event correlation techniques in SIEM-systems. Part 2
Tr. SPIIRAN, 49 (2016), 208–225
-
Detection of Anomalous Activity in Mobile Money Transfer Services Using RadViz-Visualization
Tr. SPIIRAN, 48 (2016), 32–51
-
Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System
Tr. SPIIRAN, 48 (2016), 5–31
-
An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 1
Tr. SPIIRAN, 47 (2016), 5–27
-
Mathematical Models of Visualization in SIEM Systems
Tr. SPIIRAN, 46 (2016), 90–107
-
Analysis and Classification of Methods for Network Attack Detection
Tr. SPIIRAN, 45 (2016), 207–244
-
Using genetic optimization and visual analysis tools for access schema design in virtual local area networks
Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2015, no. 1, 33–46
-
Review of Methodological Primitives for the Phased Construction of Data Visualization Model
Tr. SPIIRAN, 42 (2015), 232–257
-
The use of expert knowledge for development of secure systems with embedded devices
Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2014, no. 4, 58–73
-
New generation of security information and event management systems
St. Petersburg Polytechnical University Journal. Computer Science. Telecommunication and Control Sys, 2014, no. 3(198), 7–18
-
Configuring embedded information protection systems within services providing complex security on rail transport
Tr. SPIIRAN, 30 (2013), 40–55
-
Dynamical recalculation of the security metrics on the example of attack potentiality
Tr. SPIIRAN, 30 (2013), 26–39
-
The construction of a multi-level intelligent information security system for automated systems of railway transport
Tr. SPIIRAN, 30 (2013), 7–25
-
Design of the ontology based data model for the network attack modeling system
Tr. SPIIRAN, 26 (2013), 26–39
-
Tools for development of neural components of intelligent security systems
Tr. SPIIRAN, 26 (2013), 7–25
-
Mathematical Methods, Models and Architectures for Computer Network Security: the review of perspective research directions according to the results of the International Conference MMM–ACNS–2012
Tr. SPIIRAN, 25 (2013), 148–170
-
Perspective data storage systems for security information monitoring and management
Tr. SPIIRAN, 25 (2013), 113–134
-
Scientific analysis and policy support for cyber security: the review of perspective research directions according to the results of the International Workshop SA&PS4CS 2012
Tr. SPIIRAN, 24 (2013), 66–88
-
Architecture of the system of intelligent information security services in critical infrastructures
Tr. SPIIRAN, 24 (2013), 21–40
-
Investigation of structural specificities of malicious documents by Data Mining
Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2012, no. 2, 76–92
-
Conception of adaptive protection of information and telecommunication systems based on the paradigms of nervous and neural networks
Tr. SPIIRAN, 23 (2012), 100–115
-
Methodology of iterative attack modelling in large computer networks
Tr. SPIIRAN, 23 (2012), 50–79
-
Analysis of the Visualization Techniques used for Information Security in the Computer Networks
Tr. SPIIRAN, 23 (2012), 7–29
-
Verification of security policy filtering rules with temporal parameters by Model Checking
Tr. SPIIRAN, 22 (2012), 113–138
-
Developing the system of intelligent services to protect information in cyber warfare
Tr. SPIIRAN, 22 (2012), 84–100
-
Simulation of protection mechanisms against infrastructure attacks based on the “nervous network system” approach
Tr. SPIIRAN, 22 (2012), 45–70
-
Methods and tools for attack modeling in large computer networks: state of the problem
Tr. SPIIRAN, 22 (2012), 5–30
-
Application of security information and event management technology for information security in critical infrastructures
Tr. SPIIRAN, 20 (2012), 27–56
-
Simulation of protection mechanisms against botnets
Tr. SPIIRAN, 19 (2011), 7–33
-
Analysis of bio-inspired approaches for protection of computer systems and networks
Tr. SPIIRAN, 18 (2011), 19–73
-
An aspect-oriented approach to realization of mobile module in the security model based on remote entrusting mechanism
Informatsionnye Tekhnologii i Vychslitel'nye Sistemy, 2009, no. 4, 67–76
-
Approach to detect malware based on postionally dependent information
Tr. SPIIRAN, 10 (2009), 132–147
-
Security protocols verification combining existing approaches and tools
Tr. SPIIRAN, 8 (2009), 292–310
-
Analytical review of the reports of the International Workshop «Scientific Analysis and Policy Support for Cyber Security» (SA&PS4CS 2010)
Tr. SPIIRAN, 13 (2010), 226–248
-
Analytical review of talks on the International Conference «Mathematical Methods, Models and Architectures for Computer Network Security» (MMM-ACNS-2010)
Tr. SPIIRAN, 13 (2010), 199–225
© , 2026