|
|
Publications in Math-Net.Ru
-
Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis
Informatics and Automation, 20:4 (2021), 845–868
-
Problematic issues of information security of cyber-physical systems
Tr. SPIIRAN, 19:5 (2020), 1050–1088
-
Methodology for disseminating information channels analysis in social networks
Vestnik S.-Petersburg Univ. Ser. 10. Prikl. Mat. Inform. Prots. Upr., 14:4 (2018), 362–377
-
An analysis of security event correlation techniques in SIEM-systems. Part 2
Tr. SPIIRAN, 49 (2016), 208–225
-
Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System
Tr. SPIIRAN, 48 (2016), 5–31
-
An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 1
Tr. SPIIRAN, 47 (2016), 5–27
-
Mathematical Models of Visualization in SIEM Systems
Tr. SPIIRAN, 46 (2016), 90–107
-
Review of Methodological Primitives for the Phased Construction of Data Visualization Model
Tr. SPIIRAN, 42 (2015), 232–257
-
Investigation of Heuristic Approach to Attacks on the Telecommunications Nnetwork Detection Based on Data Mining Techniques
Tr. SPIIRAN, 37 (2014), 208–224
-
Dynamical recalculation of the security metrics on the example of attack potentiality
Tr. SPIIRAN, 30 (2013), 26–39
-
Technique of rapid construction, modification and analysis of attack trees
Tr. SPIIRAN, 26 (2013), 40–53
-
Design of the ontology based data model for the network attack modeling system
Tr. SPIIRAN, 26 (2013), 26–39
-
Application of security information and event management technology for information security in critical infrastructures
Tr. SPIIRAN, 20 (2012), 27–56
© , 2026