| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |
  

Main publications

Books and Chapters in Books

  1. I.B. Saenko, I.B. Paraschuk, Yu. V. Kondrashov, O.S. Lauta, Ya.A. Dombrovsky, A.I. Popov, E.S. Kryukova. Modeling and design of systems. Textbook. – St. Petersburg: VAS, 2023. – 472 p. // https://elibrary.ru/item.asp?id=65507916
  2. M.V. Buinevich, K.E. Izrailov. Fundamentals of cybersecurity: methods of protection from program analysis // Textbook for students of higher educational institutions in an enlarged group of specialties and directions "Information security" / St. Petersburg, 2022., 76 ð. // https://elibrary.ru/yfdezh // https://elibrary.ru/item.asp?id=49180160
  3. S.V. Meshcheryakov, D.A. Shchemelinin, K.E. Izrailov. Principles of organization and monitoring of cloud multiservice systems // Monograph. P. 165, Saint Petersburg, 2022. // https://elibrary.ru/item.asp?id=48508667
  4. M.V. Buinevich, K.E. Izrailov. Fundamentals of cybersecurity: methods of program analysis // Textbook for students of higher educational institutions in an enlarged group of specialties and directions "Information security" P.92, St. Petersburg, 2022. // https://www.elibrary.ru/item.asp?id=49178863
  5. Elena Doynikova, Igor Kotenko. Assessment of security and choice of countermeasures for cybersecurity management // Moscow, 2021. Monograph. 184 p. // https://elibrary.ru/item.asp?id=47416769
  6. T.I. Abdullin, V.D. Baev, M.V. Buinevich, D.D. Burzunov, I.N. Vasilyeva, E.F. Galiullina, U.A. Gatchin, I.G. Gnidenko, N.A. Gorokhov, I.V. Gorstkin, A.B. Dolzhenko, I. V. Egorova, L.A. Enikeeva, V.S. Efimov, A.R. Zhirov, K.E. Izrailov, E.V. Krasilnikova, A.M. Krasnenkov, A.S. Laskus, A. I. Loknov, E.V. Mayorova, O.D. Merdina, S.K. Morozov, V. G. Petrov, A.M. Polegenko, A.A. Prostak, V.N. Rodin, N.A. Savelyeva, V. Salnikov, E.S. Sidorov, N.S. Smirnov, T.V. Smirnova, S.A. Sokolovskaya, A.V. Solodyannikov, V.L. Stelmashonok, E.V. Stelmashonok, V.V. Sukhostat, N.I. Syasin, I.S. Tveritin, D.Yu. Fedorov, V.D. Filippov, G.M. Chernoknizhny, D.I. Yakushev, V.V. Trofimov. Digital Technologies and problems of information security // St. Petersburg State University of Economics. 2021.monograph 163p. // https://elibrary.ru/item.asp?id=45735887
  7. M.V. Buinevich, K.E. Izrailov, A.V. Krasov. Protection of programs and data. Methods of analysis // Textbook. Federal Communications Agency, Federal State Budgetary Educational Institution of Higher Education "St. Petersburg State University of Telecommunications named after Prof. M. A. Bonch-Bruevich" (SPbSUT). St. Petersburg, 2020. - 72 p., Document code in the NEB 000199_000009_010520755
  8. Vasily Desnitsky, Dmitry Sakharov, Andrey Chechulin, Igor Ushakov, Tatiana Zakharova. Information Security for Data Centers. Tutorial. SPb.: SPbSUT, 2019. - 92 pages. // https://elibrary.ru/item.asp?id=38554623
  9. Igor Kotenko, Igor Saenko, Andrey Chechulin, Olga Polubelova, Evgenia Novikova, Elena Doinikova, Andrey Shorov, Vasily Desnitsky. Intelligent information security services in critical infrastructures. Monography / Ed. Igor Kotenko and Igor Sayenko. St. Petersburg: BHV Publishing House, 2019. 400ð. ISBN 978-5-9775-3968-5 https://www.elibrary.ru/item.asp?id=42927796 // https://elibrary.ru/item.asp?id=42927796
  10. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova. Data analytics for security management of complex heterogeneous systems: event correlation and security assessment tasks // Chapter in book “Advances in Cyber Security Analytics”. Shishir K. Shandilya (Ed.). Springer. 2019. (WoS and Scopus).
  11. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Towards Intelligent Data Processing for Automated Determination of Information System Assets // Chapter in book “Handbook of Research on Intelligent Data Processing and Information Security Systems”. IGI Global. 2019. ISBN13: 9781799812906. ISBN10: 1799812901. EISBN13: 9781799812920. pp. 147-160. DOI: 10.4018/978-1-7998-1290-6.ch007. (Scopus)
  12. Kotenko I., Saenko I., Branitskiy A. Machine Learning and Big Data Processing for Cybersecurity Data Analysis // Chapter in book “Data Science in Cybersecurity and Cyberthreat Intelligence”. Leslie F. Sikos and Kim-Kwang Raymond Choo (Eds.). Springer. 2019.
  13. Alexander Branitskiy, Igor Kotenko I. Applying Artificial Intelligence Methods to Network Attack Detection // AI in Cybersecurity. Springer, Cham. 2019. pp. 115-149.
  14. Andrey Krasov, Artem Gelfand, Valery Korzhik, Igor Kotenko, Roman Petriv, Dmitry Sakharov, Igor Ushakov, Pavel Sharikov, Dmitry Yurkin. Building a trusted computer environment // Saint Petersburg, 2019. monograph, number of pages: 108 ISBN 978-5-6043143-2-6 // https://www.elibrary.ru/item.asp?id=41448110
  15. I.V. Kotenko, I.B. Saenko. Generation of access-control schemes in computer networks based on genetic algorithms // Â êíèãå: Nature-Inspired Cyber Security and Resiliency. 2019. Ñ. 409-438. DOI: 10.1049/PBSE010E_ch16 // https://www.elibrary.ru/item.asp?id=47517901
  16. Igor Kotenko, Elena Doynikova, Andrey Chechulin, Andrey Fedorchenko. AI- and Metrics-Based Vulnerability-Centric Cyber Security Assessment and Countermeasure Selection: An Artificial Intelligence Approach //Chapter in book: Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach. S. Parkinson, A. Crampton, R. Hill (eds). Springer, Cham, 2018. P.101-130. DOI: https://doi.org/10.1007/978-3-319-92624-7_5. Print ISBN 978-3-319-92623-0. Online ISBN 978-3-319-92624-7 (WoS and Scopus).
  17. Igor Kotenko, Igor Saenko, Oleg Lauta. Modeling the Impact of Cyber Attacks // Chapter in book: Cyber Resilience of Systems and Networks, Risk, Systems and Decisions, A. Kott, I. Linkov (eds.), Springer, First Online: 30 May 2018. P.135-169. https://doi.org/10.1007/978-3-319-77492-3_7 (WoS and Scopus).
  18. Evgenia Novikova, Igor Kotenko. Visualization-Driven Approach to Fraud Detection in the Mobile Money Transfer Services // Chapter in book: Algorithms, Methods and Applications in Mobile Computing and Communications. IGI Global. Release Date: July, 2018. P.205-236. DOI: 10.4018/978-1-5225-5693-0.ch009 (WoS and Scopus).
  19. Alexander Branitskiy, Igor Kotenko. Applying Artificial Intelligence Methods to Network Attack Detection // Chapter in book: AI in Cybersecurity, L. F. Sikos (ed.), Springer, Intelligent Systems Reference Library, 2019, Vol.151. P.115–149. https://doi.org/10.1007/978-3-319-98842-9_5(WoS and Scopus).
  20. Andrey Fedorchenko, Igor Kotenko. Iot security event correlation based on the analysis of event types // Â êíèãå: Dependable IoT for Human and Industry: Modeling, Architecting, Implementation. 2018. Ñ. 147-168. // https://elibrary.ru/item.asp?id=41627299 (WoS and Scopus).
  21. V.V. Sazonov, I.B. Paraschuk, V.A. Loginov, V.V. Elizarov. Mathematical support of automated control systems by troops. Study guide / Edited by Prof. I.B. Paraschuk. – St. Petersburg: VAS, 2018 – 256 p. // https://elibrary.ru/item.asp?id=59456532
  22. Kotenko I.V., Saenko I.B., Chechulin A.A. Protection against unwanted and malicious information in global information networks // Information-psychological and cognitive security. Collective monograph / Ed. I. F. Kefeli, R. M. Yusupova. St. Petersburg .: Publishing house "Aurora" 2017. 300 P. - 175-194 // https://pure.spbu.ru/ws/portalfiles/portal/9364702 // https://elibrary.ru/item.asp?id=37414463
  23. M.V. Buinevich, I.N. Vasilyeva, T.M. Vorobyev, I.G. Gnidenko, I.V. Egorova, L.A. Enikeeva, S.G. Zelman, K.E. Izrailov, S.R. Ishankhanov, V.I. Kuvatov, O.V Loktionov, P.A. Malakhova, O.D. Merdina, A.M. Polegenko, M.A. Popov, A.I. Primakin, T.G. Semenova, S.O. Semenova, A.I. Solov'ev, S.A. Solov'ev, etc. Information protection in computer systems // Saint Petersburg, 2017. Monograph. 163 p.// https://elibrary.ru/item.asp?id=32254007
  24. A.F. Volynsky, V.P, Lavrov, T.V. Averyanova, I.A. Arkhipova, A.A. Bokov, N.T. Vedernikov, Yu.V. Gavrilin, A.Yu.Golovin, V.N. Grigoriev, V.A. Zhbankov, A.M. Zinin, Yu.G. Korukhov, A.M. Kustov, V.O. Lapin, N.P. Mailis, T.F. Moiseeva, A.S. Podshibyakin, L.N. Poselskaya, I.V. Tishutina, O.N. Tushkanova, etc. Criminalistics // Textbook for university students / Ser. Law and law. (2nd edition, revised and expanded) Moscow, 2015. 943p. // https://elibrary.ru/item.asp?id=36908316
  25. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Discrete-Event Simulation of Botnet Protection Mechanisms. Discrete Event Simulations - Development and Applications. Edited by Eldin Wee Chuan Lim. Rijeka, Croatia: InTech. 2012 P.143-168.
  26. Igor Kotenko, Rafal Leszczyna. Software agents for network security. NATO Science for Peace and Security Series, Software Agents, Agent Systems and Their Applications, Volume 32, 2012. Edited by M.Essaaidi, M.Ganzha, and M.Paprzycki. Amsterdam, Netherlands: IOS Press. IOS Press. 2012. P. 260-285.
  27. Leszczyna R., Kotenko I. Security and anonymity of agent systems // NATO Science for Peace and Security Series, Software Agents, Agent Systems and Their Applications, Volume 32, 2012. Edited by M.Essaaidi, M.Ganzha, and M.Paprzycki. Amsterdam, Netherlands: IOS Press. IOS Press. 2012. P. 157-177.
  28. New information technologies in control systems for military use: A Textbook. I.B.Saenko, A.V.Avramenko, J.M.Kopchak, V.F. Schjotka and others / Edited by I.B.Saenko. SPb.: MCA, 2010. 518 p. (in Russian).
  29. I.B. Paraschuk, S.M. Odoevsky, D.V. Salyuk, V.O. Rashich, A.V. Bogovik, A.V. Skoropad, A.G. Nesterenko. New information and network technologies in military control systems // Part 1 New network technologies in military control systems. Saint Petersburg, 2010. 432 p. Study guide // https://www.elibrary.ru/item.asp?id=36757453
  30. I.B. Paraschuk, Yu. N. Ivanov, P.G. Romanenko. Neural network methods for modeling and analyzing the performance of communication networks // Educational and methodical manual. - St. Petersburg: VAS, 2010. - 104 p. // https://elibrary.ru/item.asp?id=36636643
  31. Programming. Application development environment UI "Designer" of Operating System MSMF: Textbook. I.B. Saenko, V.V. Solomatin, S.M. Manyashin, Y.I. Zhukov, etc./ Edited by I.B. Saenko. SPb.: MSA, 2008. 128 pp.
  32. Nesteruk F.G, Suhanov A.V, Nesteruk L.G., Nesteruk G.F. Adaptive means of ensuring the security of information systems.Monograph. Ed. By L.G Osovetskiy. SPb.: Univ Polytechnic University, 2008. 626 p.
  33. I.B. Paraschuk, Yu. V. Borodakiy, A.V. Bogovik, V.I. Kurnosov, Yu. G. Lobodinsky, V.V. Masanovets. Fundamentals of control theory in special-purpose systems // Moscow, 2008. 400 c. // https://elibrary.ru/item.asp?id=36636753
  34. V.V. Solomatin, S.M. Manyashin, I.Yu. Zhukov, D.V. Efanov, V.G. Shulkevich, I.B. Saenko, V.V. Efimov, A.V. Ershov. Operating systems. network administration of the MSVS 3.0 OS, 303 p. // St. Petersburg, 2008. // https://www.elibrary.ru/item.asp?id=39959092
  35. Information Technology in Science and Education: Textbooks for higher education. P.1. Theoretical basis. I.B. Saenko, S.N. Bushuev, S.N. Nogin, A.J. Ivanov, etc./ Edited by I.B. Saenko. SPb.: MSA, 2007. 280 pp.
  36. Information Technology in Science and Education: Textbooks for higher education. P.1. Practical application.. I.B. Saenko, S.N. Bushuev, S.N. Nogin, A.J. Ivanov, etc./ Edited by I.B. Saenko. SPb.: MSA, 2007. 284 pp.
  37. Recent developments in control of the forces of the Navy. Monograph. S.M. Dotsenko, I.B. Saenko, I.V. Solovyev, V.V. Gekov, etc. SPb.: Politechnika. 2006. 432 pp.
  38. I.B. Saenko, M.V. Bochkov, S.N. Bushuev, V.S. Avramenko. Adaptive protection of information in computer networks for military purposes. Monograph / Edited by I.B. Saenko. SPb.: MSA, 2004. 210 pp.
  39. New information technologies in control systems for military use. Textbook. I.B. Saenko, S.N. Bushuev, , A.Y. Ivanov, A.I. Obrezkov, etc./ Edited by I.B. Saenko. SPb.: MSA, 2003. 160 pp.
  40. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. The control theory in military systems. I.V.Kotenko (ed.). Moscow, MD, 2001. 312 p. (in Russian).
  41. I.B. Saenko. The theoretical basis of the multidimensional / relational data and their application to build a database AMS of connection. Monograph / Edited by V.F. Komarovich. . SPb.: MSU, 2001. 176 pp.
  42. V.E. Kuznetsov, A.M. Likhachev, I.B. Paraschuk, S.P. Prisyazhnyuk. Telecommunications. Explanatory dictionary of basic terms and abbreviations. Educational and methodical manual / Ed. Likhacheva A.M., Prisyazhnyuka S.P. - St. Petersburg: AIN RF, Institute of Telecommunications, 2001 – 798p. ISBN: 5-279-00367-0 // https://spblib.ru/en/catalog/-/books/11188959-telekommunikatsii
  43. I.B. Paraschuk, I.P. Bobrik. Fuzzy sets in problems of analysis of communication networks //St. Petersburg, 2001. 80 p.// https://www.elibrary.ru/item.asp?edn=snyddn
  44. I.V.Kotenko, M.M.Kotuchov, A.S.Markov, etc. Legislative, legal, organizational and technical support of information security of automated systems and networks. I.V.Kotenko (ed.). SPb., MSU, 2000. 190 p. (in Russian) // https://elibrary.ru/item.asp?id=23269674
  45. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. Foundations of the control theory in military systems. Part 2. A.Y. Runeev and I.V.Kotenko (ed.). SPb., MSU, 2000. 200 p. (in Russian).
  46. I.V.Kotenko, A.V.Bogovik, Kovalev I.S., etc. Foundations of the control theory in military systems. Part 1. A.Y. Runeev and I.V.Kotenko (ed.). SPb., MSU, 2000. 192 p. (in Russian).
  47. I.B. Paraschuk. Dictionary of international telecommunication abbreviations. An educational and methodological guide. - St. Petersburg: VUS, 2000 – 176 p. // https://elibrary.ru/item.asp?id=65507758
  48. I.B. Saenko, A.Y. Ivanov, A.I. Obrezkov. Development of relational databases with the help of MicroSoft Access. Textbook. SPb.: MSA, 1999. 70pp.
  49. I.V.Kotenko. The theory and practice of construction of the systems of information and computing support of communication planning processes on the basis of new information technologies. SPb., MSA, 1998. 404 p. (in Russian).
  50. I.B. Saenko, A.Y. Ivanov. Basic construction and design of relational databases. Textbook. SPb.: MSA, 1998. 80pp.
  51. I.B. Paraschuk. A concise dictionary of international telecommunication abbreviations: an educational and methodological guide. - St. Petersburg: VUS, 1998 – 78 p. // https://www.elibrary.ru/item.asp?id=58116803
  52. I.V.Kotenko, G.A.Rybov, I.B.Saenko. Intelligent systems for telecommunication control. N.I.Burenin (ed.). SPb., MSA, 1996. 150 p. (in Russian).
  53. I.B.Saenko, A.I. Obrezkov. Fundamentals of design and quality evaluation of databases. Textbook. Ulyanovsk: UHMIUC, 1996. 25 pp.
  54. I.B. Saenko, A.I. Obrezkov. DBMS Paradox for Windows version 4.5. Textbook. Ulyanovsk: UHMIUC, 1996. 40pp.
  55. I.V.Kotenko, I.P.Janchenko, A.V.Bogovik. Automation of the telecommunication documents development. A.Y. Runeev (ed.). SPb., MSA, 1995. 150 p. (in Russian).
  56. I.V.Kotenko. Object-oriented programming: Smalltalk/V and Smalltalk/V 286. Application for automation of telecommunication control processes. SPb., MSA, 1995. 294 p. (in Russian).
  57. I.B.Saenko, A.V.Lebedev. Programming in INTEREKSPERT. Textbook. Ulyanovsk: UHMIUC, 1995. 40 pp.
  58. I.V.Kotenko. Logic programming in Prolog. TURBO and PDC PROLOG. SPb., MSA, 1994. 412 p. (in Russian).
  59. I.V.Kotenko. Methods of reasoning in expert systems under the incomplete and contradictory information. SPb., MSA, 1992. 77 p. (in Russian).
  60. I.V.Kotenko. Diagnostics of telecommunication networks. SPb., MSA, 1992. 219 p. (in Russian).
  61. V.I.Antuhov, I.V.Kotenko. Knowledge bases. SPb., MSA, 1991. 86 p. (in Russian).
  62. Programming in Pascal. Textbook. Y.A. Bukhartsev, V.A. Kulikov, A. G. Gutnik, Y.I. Didenko, I.B. Saenko. L.: MSU, 1991. 108pp.

Papers

2024

  1. R.O. Kryukov, E.V. Fedorchenko, I.V. Kotenko, E.S. Novikova, V.M. Zima. Security assessment based on attack graphs using nvd and mitre ATT & CK database for heterogeneous infrastructures // Information and Control Systems. 2024. ¹ 2 (129). Ñ. 39-50. DOI: 10.31799/1684-8853-2024-2-39-50 // https://elibrary.ru/item.asp?id=65679939
  2. M. Kolomeets, O. Tushkanova, V. Desnitsky, L. Vitkova, A. Chechulin. Experimental evaluation: can humans recognise social media bots? // Big Data and Cognitive Computing. 2024. Ò. 8. ¹ 3. Ñ. 24. DOI: 10.3390/bdcc8030024 // https://elibrary.ru/item.asp?id=66173046
  3. E. Novikova, E. Fedorchenko, A. Danilov, I. Saenko. Dataset generation methodology: towards application of machine learning in industrial water treatment security // SN Computer Science. 2024. Ò. 5. ¹ 4. Ñ. 373. DOI: 10.1007/s42979-024-02704-9 // https://elibrary.ru/item.asp?id=66603049
  4. D. Klishin, A. Chechulin. Methodology for Analyzing the Impact of Digital Transformation of the Information Security Management Process on the Enterprise Architecture // Lecture Notes in Electrical Engineering. 2024. V. 1130. Ð. 435-443.
  5. H. Dong, I. Kotenko I. Image-based malware analysis for enhanced iot security in smart cities // Internet of Things (Netherlands). 2024. Ò. 27. Ñ. 101258. DOI: 10.1016/j.iot.2024.101258 // https://www.elibrary.ru/item.asp?id=68999750
  6. H. Dong, I. Kotenko. Multi-task learning for iot traffic classification: a comparative analysis of deep autoencoders // Future Generation Computer Systems. 2024. Ò. 158. Ñ. 242-254. DOI: 10.1016/j.future.2024.04.005 // https://elibrary.ru/item.asp?id=67669749
  7. S. Verevkin, E. Fedorchenko. the testbed for definition of the exploit’s execution features to detect and score cyber attacks // E3S Web of Conferences. 2024. Ò. 471. Ñ. 04021. DOI: 10.1051/e3sconf/202447104021 // https://elibrary.ru/item.asp?id=64993550
  8. D.A. Levshun, D.S. Levshun, E.V. Doynikova, A.A. Branitskiy A., I.V. Kotenko. Considerations on sentiment of social network posts as a feature of destructive impacts // AI Communications. 2024. Ò. 37. ¹ 4. Ñ. 585-598. DOI: 10.3233/aic-230154 // https://elibrary.ru/item.asp?id=74004030
  9. M. Kuznetsov, E. Novikova, I. Kotenko. Modelling user notification scenarios in privacy policies Cybersecurity. 2024. Ò. 7. ¹ 1. Ñ. 41. DOI: 10.1186/s42400-024-00234-8 // https://elibrary.ru/item.asp?id=73611396
  10. I.V. Kotenko, I.B. Saenko, O.S. Lauta, N.A. Vasilev, Sadovnikov V.E. Approach to detecting attacks against machine learning systems with a generative adversarial network // Pattern Recognition and Image Analysis. Advances in Mathematical Theory and Applications. 2024. Ò. 34. ¹ 3. Ñ. 589-596. DOI: 10.1134/S1054661824700408 // https://elibrary.ru/item.asp?id=73532021
  11. H. Dong, I.V. Kotenko. Convolutional variational autoencoders and resampling techniques with generative adversarial network for enhancing internet of thing security // Pattern Recognition and Image Analysis. Advances in Mathematical Theory and Applications. 2024. Ò. 34. ¹ 3. Ñ. 562-569. DOI: 10.1134/S1054661824700366 // https://elibrary.ru/item.asp?id=73532016
  12. Elena Doynikova, Evgenia Novikova, Alexandr Danilov, Igor Saenko. Towards the Testbed and Dataset for Analysis of Water Treatment Systems Security // Conference: International Conference on Data Science and Applications. 2024. DOI:10.1007/978-981-99-7814-4_37
  13. Uneneibotejit Otokwala; Andrey Petrovskiy; Igor Kotenko. Enhancing Intrusion Detection Through Data Perturbation Augmentation Strategy // 2024 IEEE (Institute of Electrical and Electronics Engineers) Ural-Siberian conference on biomedical engineering, radioelectronics and information technology (USBEREIT 2024) DOI: 10.1109/USBEREIT61901.2024.10584007
  14. D. Levshun, D. Vesnin. Exploring BERT for Predicting Vulnerability Categories in Device Configurations // Proceedings of the 10th International Conference on Information Systems Security and Privacy (ICISSP 2024). February 26-28, Rome, Italy. 2024. P. 452-461. DOI: 10.5220/0012471800003648
  15. Vladimir Avramenko, Igor Saenko, Igor Kotenko. Forecasting information security in information and communication systems based on recurrent neural networks // 2024 International Russian Automation Conference (RusAutoCon). file:///C:/Users/79291/Downloads/Forecasting%20Information%20Security-RusAutoCon-2024.pdf
  16. A. Meleshko, V. Desnitsky. The modeling and detection of attacks in role-based self-organized decentralized wireless sensor networks // Telecom. 2024. Ò. 5. ¹ 1. Ñ. 145-175. DOI: 10.3390/telecom5010008 // https://www.elibrary.ru/item.asp?id=66500161
  17. A.V. Mikhaylichenko, I.B. Paraschuk. The essence and content of proactive control of the reliability of data storage and processing facilities for ground-based robotic complexes for special purposes in conditions of unreliability and incompleteness of control and diagnostic information //Extreme robotics. 2024. No. 1 (34). pp. 12-18.// https://elibrary.ru/item.asp?id=59758903 (in Russian).
  18. V.A. Sayarkin, E.S. Kryukova, I.B. Paraschuk. Time interval average security assessment and information security risk analysis of robot and operator interaction interfaces // Extreme robotics. 2024. No. 1 (34). pp. 19-26.// https://elibrary.ru/item.asp?id=59758904 (in Russian).
  19. Igor Kotenko, Igor Saenko, Oleg Lauta , Nikita Vasilyev, Vladimir Sadovnikov. Attacks and defense methods in machine learning systems: analysis of modern research // Cybersecurity issues. 2024. No. 1 (59). pp. 24-37. DOI: 10.21681/2311-2024-1-24-37 // https://elibrary.ru/item.asp?id=59932750 (in Russian).
  20. K.E. Izrailov. The genetic de-evolution concept of program representations. Part 1 // Cybersecurity issues. 2024. No. 1 (59). pp. 61-66. DOI: 10.21681/2311-3456-2024-1-61-66 // https://elibrary.ru/item.asp?id=59932753 (in Russian).
  21. A.A. Dalek, A.A. Chechulin, V/O. Popova. Creating and analyzing datasets using ebpftechnology in container infrastructures // Informatization and communications. 2024. No. 1. pp. 107-112. DOI: 10.34219/2078-8320-2024-15-107-112 // https://elibrary.ru/item.asp?id=60028825 (in Russian).
  22. M.D. Gorda, A.A. Chechulin. Methodology of investigationphishing attacks // Informatization and communications. 2024. No. 2. pp. 109-116. DOI: 10.34219/2078-8320-2024-15-2-109-116 // https://elibrary.ru/item.asp?id=60775782 (in Russian).
  23. E.S. Novikova, V.A. Desnitsky. Analysis of visualisation of multidimensional data on the base of glyphs by using chernoff faces // Informatization and communication. 2024. No. 1. pp. 76-83. DOI: 10.34219/2078-8320-2024-15-76-83 // https://www.elibrary.ru/item.asp?id=60028821 (in Russian).
  24. K.I. Izrailov. Methodology for reverse engineering of machine code. Part 3. Dynamic investigation and documentation // Proceedings of educational institutions of communications. 2024. Vol. 10. No. 1. pp. 86-96. DOI: 10.31854/1813-324X-2024-10-1-86-96 // https://www.elibrary.ru/item.asp?id=62236374 (in Russian).
  25. E.S. Novikova, A.V. Meleshko. Methodology for evaluating the effectiveness of intrusion detection system based on federated learning // Informatization and communications. 2024. No. 2. pp. 100-108. DOI: 10.34219/2078-8320-2024-15-2-100-108 // https://www.elibrary.ru/item.asp?id=60775781 (in Russian).
  26. A.A. Chechulin. Calculation of computer network securitymetrics based on analytical modeling methods // Informatization and communications. 2024. No. 3. pp. 99-104. DOI: 10.34219/2078-8320-2024-15-3-99-104 // https://elibrary.ru/item.asp?id=63648824 (in Russian).
  27. I.V. Kotenko. Artificial intelligence for cyber security: a new stage of confrontation in cyberspace // Artificial intelligence and decision-making. 2024. No. 1. pp. 3-19. DOI: 10.14357/20718594240101 // https://elibrary.ru/item.asp?id=64897769 (in Russian).
  28. I.V. Kotenko, H. Dong . Detecting attacks on the Internet of Things based on multitasking learning and hybrid sampling methods // Cybersecurity issues. 2024. No. 2 (60). pp. 10-21. DOI: 10.21681/2311-3456-2024-2-10-21 // https://elibrary.ru/item.asp?id=65314207 (in Russian).
  29. K.E. Izrailov. The genetic de-evolution concept of program representations. Part 2 // Cybersecurity issues. 2024. No. 2 (60). pp. 81-86. DOI: 10.21681/2311-3456-2024-2-81-86 // https://elibrary.ru/item.asp?id=65314215 (in Russian).
  30. D.S. Levshun. Architecture of the system for vulnerabilities detection and prediction in information systems based on artificial intelligence methods // Informatization and communications. 2024. No. 3. pp. 91-98. DOI: 10.34219/2078-8320-2024-15-3-91-98 // https://elibrary.ru/item.asp?id=63648823 (in Russian).
  31. L.A. Sayarkin, I.B. Paraschuk, E.S. Vladimirova. Stages and features of the development of a methodology for improving the quality of information retrieval on the resources of modern data centers using fuzzy preference and comparison relationships of alternatives // Information and Cosmos. 2024. No. 1. pp. 38-45. // https://elibrary.ru/item.asp?id=65116381 (in Russian).
  32. I.B. Saenko, M.H. Al-Barry, S.A. Ryumina. Using a visual programming system to detect sql attacks on databases using machine learning methods // Information and Space. 2024. No. 1. pp. 55-64. // https://elibrary.ru/item.asp?id=65116383 (in Russian).
  33. B.A. Kobrinsky, A.N. Averkin, V.V. Gribova, A.P. Yeremeev, M.I. Zabezhailo, I.V. Kotenko, M.A. Mikheenkova, B.V. Palyukh, A.G. Podesovsky, G.V. Rybina, Yu. F. Telnov, E.A. Shalfeeva. XXI National Conference on Artificial Intelligence // Artificial Intelligence and adoption solutions. 2024. No. 1. pp. 129-141. DOI: 10.14357/20718594240111 // https://www.elibrary.ru/item.asp?id=64897785 (in Russian).
  34. V.A. Desnitskiy, E.S. Novikova. Fault detection in industrial products using small training datasets // Bulletin of the Voronezh State University. Series: System analysis and Information Technology. 2024. No. 1. pp. 49-61. DOI: 10.17308/seit/1995-5499/2024/1/49-61 // https://www.elibrary.ru/item.asp?id=65383568 (in Russian).
  35. D.S. Levshun, D.V. Vesnin, I.V. Kotenko. Prediction of vulnerability categories in configurations of devices using artificial intelligence methods // Questions of cybersecurity. 2024. No. 3 (61). pp. 33-39. DOI: 10.21681/2311-3456-2024-3-33-39 // https://elibrary.ru/download/elibrary_67219948_70034463.pdf // https://elibrary.ru/item.asp?id=67219948 (in Russian).
  36. I.B. Paraschuk, A.V. Mikhaylichenko, L.A. Samarkin. Implementation of search information queries in large data centers using mathematical methods of the theory of fuzzy sets // Synchronization systems, signal generation and processing. 2024. Vol. 15. No. 3. pp. 20-27. // https://elibrary.ru/item.asp?id=65656243 // https://elibrary.ru/download/elibrary_65656243_16684853.pdf (in Russian).
  37. I.V. Kotenko, I.B. Saenko, R.I. Zakharchenko, D.V. Velichko. A dynamic functioning control model for preventing computer attacks // Legal Informatics. 2024. No. 2. pp. 35-43. DOI: 10.21681/1994-1404-2024-2-35-43 // https://www.elibrary.ru/item.asp?id=68564498 (in Russian).
  38. N.A. Busko, E.V. Fedorchenko, I.V. Kotenko. Automatic exploit assessment based on deep learning methods // The ontology of design. 2024. Vol. 14. No. 3 (53). pp. 408-420. DOI: 10.18287/2223-9537-2024-14-3-408-420 // https://www.elibrary.ru/item.asp?id=68527168 (in Russian).
  39. V.A. Desnitsky, I.V. Kotenko. Analysis and modeling of vampire attacks in self-organized wireless sensor networks // International Conference on Soft Signs and Changes 2024. Vol. 1. pp. 465-468. // https://www.elibrary.ru/item.asp?id=67959708 (in Russian).
  40. E.V. Fedorchenko, I.V. Kotenko, G.B.Wu, Y. Li. Application of the hypergame theory to security analysis and decision support for security incident response // International Conference on Soft Computing and Measurements. 2024. Vol. 1. pp. 325-328. // https://elibrary.ru/item.asp?id=67959677 (in Russian).
  41. I.V. Kotenko, I.B. Paraschuk. Information granulation for the tasks of evaluating malicious activity in the infrastructure of a smart city // Mathematical methods in technologies and engineering. 2024. No. 2. pp. 79-82. // https://elibrary.ru/item.asp?id=67952753 (in Russian).
  42. A.A. Chechulin. Evaluation of visual interfaces in information security management systems // Proceedings of educational institutions of communications. 2024. Vol. 10. No. 3. pp. 116-126. DOI: 10.31854/1813-324X-2024-10-3-116-126 // https://elibrary.ru/item.asp?id=68450283 (in Russian).
  43. A.A. Chechulin. Modeling of the intruder, infrastructure, and attacks in information security systems // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2024. No. 2. pp. 70-79. DOI: 10.61260/2218-130X-2024-2-70-79 // https://elibrary.ru/item.asp?id=68004585 (in Russian).
  44. D.V. Klishin, A.A. Chechulin. Lidentification of quantitative indicators of processes to assess the level of information security // Information protection. Insider. 2024. No. 3 (117). pp. 10-18. // https://elibrary.ru/item.asp?id=67355845 (in Russian).
  45. Yu.I. Sineshchuk, I.B. Saenko, A.V. Ermakov. Information security in the digital economy as a factor of national security // Telecommunication. 2024. No. 5. pp. 47-52. DOI: 10.34832/ELSV.2024.54.5.007 //https://elibrary.ru/item.asp?id=68504691 (in Russian).
  46. V.V. Nikolaev, I..B. Saenko. Optimization of information resources distribution in common information space // Proceedingsof educational institutions of communications. 2024. Vol. 10. No. 3. pp. 87-103. DOI: 10.31854/1813-324X-2024-10-3-87-103 // https://elibrary.ru/item.asp?id=68450281 (in Russian).
  47. V.V. Nikolaev, I.B. Saenko, A.V. Ermakov. Methodology for optimizing the information resources distribution plan in a common information space// Telecommunication. 2024. No. 4. pp. 50-54. DOI: 10.34832/ELSV.2024.53.4.008 // https://elibrary.ru/item.asp?id=67968794 (in Russian).
  48. I.B. Saenko, A.P. Sokolov, O.S. Lauta, P.M. Gubsky. method of target distribution during group flight of MINI-UAVS to targets // Information and Space. 2024. No. 2. pp. 113-120.// https://elibrary.ru/item.asp?id=67919130 (in Russian).
  49. K.E. Izrailov. Predicting the size of the source code of a binary program in the interests of its intellectual reverse engineering // Issues of cybersecurity. 2024. No. 4 (62). pp. 13-25. DOI: 10.21681/2311-3456-2024-4-13-25 // https://elibrary.ru/item.asp?id=68490039 (in Russian).
  50. T.K. Zhukabayeva, V.A. Desnitsky, E.M. Mardenov. A technique for collection, preprocessing and analysis of data in wireless sensor networks // Proceedings of the National Academy of Sciences of the Republic of Kazakhstan. The series is physical and mathematical. 2024. Vol. 2. No. 350. pp. 163-176. DOI: 10.32014/2024.2518-1726.274 // https://elibrary.ru/item.asp?id=68756865
  51. V.A. Desnitsky. Simulation-based attack modeling on a flotation water purification system // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2024. No. 1. pp. 28-35. DOI: 10.46418/2079-8199_2024_1_5 // https://elibrary.ru/item.asp?id=68607241 (in Russian).
  52. E.S. Novikova, A.V. Meleshko, Yu. Chen. Evaluation of data heterogeneity in fl environment // International Conference on Soft Computing and Measurements. 2024. vol. 1. pp. 447-450 // https://elibrary.ru/item.asp?id=67959704 (in Russian).
  53. I.V. Kotenko, I.B. Paraschuk. Features of the assessment of malicious activity in the smart city infrastructure based on information granulation and fuzzy granular calculations // Bulletin of the Astrakhan State Technical University. Series: Management, Computer Engineering and Computer Science. 2024. No. 3. pp. 56-64. DOI: 10.24143/2072-9502-2024-3-56-64 // https://elibrary.ru/item.asp?id=69156432 (in Russian).
  54. I.V. Kotenko, G.T. Abramenko. Using large language models for cyber threat hunting based on deep learning methods: analysis of modern research // Legal Informatics. 2024. No. 3. pp. 32-42. DOI: 10.24682/1994-1404-2024-3-32-42 // https://www.elibrary.ru/item.asp?id=74509296 (in Russian).
  55. S.E. Adadurov, I.V. Kotenko, I.V. Saenko, A.P. Glukhov. Using supercomputers to information security data analyse // Automation, communications, computer science. 2024. No. 11. pp. 14-17. DOI: 10.62994/AT.2024.11.11.002 // https://www.elibrary.ru/item.asp?id=74496042 (in Russian).
  56. V.E. Sadovnikov, I.B. Saenko. Improving the accuracy of object recognition in images after adversarial attacks by adding noise and using neural cleanse technology // Methods and technical means of ensuring information security. 2024. No. 33. pp. 53-54 // https://www.elibrary.ru/item.asp?id=69162858 (in Russian).
  57. E.S. Novikova, E.V. Fedorchenko, M.A. Bukhtiyarov, I.B. Saenko. Anomaly detection in wastewater treatment process for cyber resilience risks evaluation // Notes of the Mining Institute. 2024. Vol. 267. pp. 488-500 // https://www.elibrary.ru/item.asp?id=69157589 (in Russian).
  58. I.B. Saenko, S.L. Lebedev, I.M. Zhdanova, S.K. Mustivy, A.V. Ermakov. Information security policy of telecommunication equipment used in public communication networks // Telecommunication. 2024. No. 2. pp. 8-13. DOI: 10.34832/ELSV.2024.51.2.002 // https://elibrary.ru/item.asp?id=67261695 (in Russian).
  59. I.B. Saenko, O.S. Lauta, S.L. Lebedev, S.K. Mustivy, A.V. Fedorov. Generalized protection profile of telecommunications equipment resistant to information security threats // Telecommunication. 2024. No. 2. pp. 2-7. DOI: 10.34832/ELSV.2024.51.2.001 // https://elibrary.ru/item.asp?id=67261693 (in Russian).
  60. A.A. Chechulin, M.D. Gorda, A.A. Kotov. Key aspects of developing an interdisciplinary methodology for internal cybercrime investigations // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2024. No. 3. pp. 70-85. DOI: 10.61260/2218-130X-2024-3-70-85 // https://elibrary.ru/item.asp?id=73732575 (in Russian).
  61. K.E. Izrailov. Constant values distribution investigation in the c programs source code // Proceedings of educational institutions of communication. 2024. Vol. 10. No. 5. pp. 119-129. DOI: 10.31854/1813-324X-2024-10-5-118-128 // https://elibrary.ru/item.asp?id=74517470 (in Russian).
  62. I.B. Paraschuk, E.S. Kryukova, E.S. Vladimirova. Analysis and categorization of modern approaches to assessing the information security level of electronic libraries content // In the collection: Modern technologies: problems and prospects. collection of articles of the All-Russian scientific and practical conference for graduate students, students and young scientists. Sevastopol, 2024. pp. 201-206.// https://elibrary.ru/item.asp?id=72585153 (in Russian).
  63. I.B. Paraschuk, A.V. Mikhaylichenko, L.A. Sayarkin. The choice of a hardware and software module for trusted download to ensure protection from unauthorized access of an automated workplace of a special-purpose data center operator // Methods and technical means of ensuring information security. 2024. No. 33. pp. 147-149.// https://elibrary.ru/item.asp?id=69162907 (in Russian).
  64. V.A. Desnitsky V.A. Approach to construction of decentralized control protocol in wireless sensor networks // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2024. No. 3. pp. 35-44. DOI: 10.61260/2218-130X-2024-3-35-44 // https://www.elibrary.ru/item.asp?id=73732572 (in Russian).
  65. D.A. Levshun. Approach for darknet traffic analysysbased on graph neural networks // Informatization and communication. 2024. No. 4. pp. 102-108. DOI: 10.34219/2078-8320-2024-15-102-108 // https://www.elibrary.ru/item.asp?id=73603871 (in Russian).
  66. K.N. Zhernova. Rapid visualization of large arraysof heterogeneous data of cyber security events // Informatization and communications. 2024. No. 1. pp. 98-106. DOI: 10.34219/2078-8320-2024-15-98-106 // https://www.elibrary.ru/item.asp?id=60028824 (in Russian).
  67. A.V. Meleshko, V.A. Desnitsky. Analysis of the applicability of blockchain technology for detecting attacks in self-organizing decentralized wireless sensor networks // In the book: Mathematical and computer Modeling. collection of materials of the XI International Scientific Conference dedicated to the memory of V.A. Romankov. Omsk, 2024. pp. 246-248. // https://www.elibrary.ru/item.asp?id=65597859 (in Russian).
  68. E.S. Novikova. On the methodology of designing systems that process personal data // In the book: Mathematical and computer modeling. collection of materials of the XI International Scientific Conference dedicated to the memory of V.A. Romankov. Omsk, 2024. pp. 255-257. // https://www.elibrary.ru/item.asp?id=65597862 (in Russian).
  69. M.D. Gorda, A.A. Chechulin. Approach to the collection of digital evidence for the investigation of cyber attacks // In the collection: Criminalistics science without borders: traditions and innovations. Materials of the international scientific and practical conference. St. Petersburg, 2024. pp. 487-491. // https://elibrary.ru/item.asp?id=65643803 (in Russian).
  70. A.A. Chechulin, M.V. Kolomiets. An approach to detecting malicious bots in the vkontakte social network and evaluating their parameters // Proceedings of educational institutions of communications. 2024. Vol. 10. No. 2. pp. 92-101. DOI: 10.31854/1813-324X-2024-10-2-92-101 // https://elibrary.ru/item.asp?id=65846418 (in Russian).
  71. M.D. Gorda, A.A. Kotov, A.A. Chechulin. Features of digital evidence collection in the investigation of cybercrimes // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 246-250. // https://elibrary.ru/item.asp?id=67337378 (in Russian).
  72. A.S. Dayneko, A.P. Kyuner, A.A. Chechulin A.A. Social engineering. attacker and attacked model // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 263-266. // https://elibrary.ru/item.asp?id=67337381 (in Russian).
  73. N.D. Dubotolkov, A.A. Chechulin. Review and systematization of attacks on container systems // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 302-306.// https://elibrary.ru/item.asp?id=67337389 (in Russian).
  74. D.V. Klishin, A.A. Chechulin. Determining quantitative indicators for assessing information security processes // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 435-439. // https://elibrary.ru/item.asp?id=67337413 (in Russian).
  75. G.T. Abramenko, I.V. Kotenko. Proactive threat search and application of LLM // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 12-17. // https://elibrary.ru/item.asp?id=67337336 (in Russian).
  76. V.A. Desnitsky, I.V. Kotenko, D.S. Levshun., I.B. Saenko. Concept of solving the issue of detecting malicious activity in the infrastructure of an industrial smart city // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 272-276. // https://elibrary.ru/item.asp?id=67337383 (in Russian).
  77. E.A. Donskov, I.V. Kotenko. Approaches to detecting attacks on the blockchain layer in intelligent transport networks // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 292-296. // https://elibrary.ru/item.asp?id=67337387 (in Russian).
  78. I.Yu. Zelichenok, I.V. Kotenko. Machine learning and big data processing technologies in detecting multistep attacks // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 352-357.// https://elibrary.ru/item.asp?id=67337398 (in Russian).
  79. E.A. Ichetovkin, I.V. Kotenko. Test bench for simulating attacks on machine learning components of intrusion detection systems // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 381-385.// https://elibrary.ru/item.asp?id=67337403 (in Russian).
  80. {.V. Kotenko, M.V. Melnik. Study of the use of an autoencoder in problems of detecting anomalous behavior in container systems // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 475-480. // https://elibrary.ru/item.asp?id=67337421 (in Russian).
  81. I.V. Kotenko, I.B. Paraschuk, I.B. Saenko. Stages of methodology and basic levels of architecture of subsystem of operational analysis of information security of departmental telecommunication networks // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 481-485. // https://elibrary.ru/item.asp?id=67337422 (in Russian).
  82. I.V. Kotenko, I.A. Popkov. Methodology for developing a security operation center to the top level of the proactive threat hunting maturity model // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 486-490. // https://elibrary.ru/item.asp?id=67337423 (in Russian).
  83. I.V. Kotenko, M.A. Slyotov. Analyzing research on automated penetration testing of computer systems // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 491-496.// https://elibrary.ru/item.asp?id=67337424 (in Russian).
  84. I.V. Kotenko, P.S. Sobolev. Detection of attacks on web applications: analysis of modern approaches // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 497-501. // https://elibrary.ru/item.asp?id=67337425 (in Russian).
  85. P.V. Bortniker, I.B. Saenko. Comparative analysis of the use of haar, daubechies, and "mexican hat" wavelets for intrusion detection in information systems // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. p.126-130 // https://elibrary.ru/item.asp?id=67337355&pff=1 (in Russian).
  86. L.A. Vitkova, R.R. Ismailov, M.A. Pepp. Automation of identification of information security vulnerabilities // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 186-189 // https://elibrary.ru/item.asp?id=67337365&pff=1 (in Russian).
  87. L.A. Vitkova, V.V. Puchkov, I.D. Shadrin. The effectiveness of using the IDS SURICATA intrusion detection system to detect A MAN-IN-THE-MIDDLE (MITM) attack // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. p.190-194 // https://elibrary.ru/item.asp?id=67337366&pff=1 (in Russian).
  88. K.N. Zhernova. Neural networks in the field of information security // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 341-343 // https://elibrary.ru/item.asp?id=67337465&pff=1 (in Russian).
  89. K.N. Zhernova. A brief overview of neural network security issues // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. p.344-346 // https://elibrary.ru/item.asp?id=67337396&pff=1 (in Russian).
  90. D.S. Ivantsov, I.B. Saenko. Markov model for assessing the stability of distributed data storage of SIEM-systems // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 376-380 // https://elibrary.ru/item.asp?id=67337402&pff=1 (in Russian).
  91. I.S. Kovalev, I.B. Paraschuk, R.V. Yarovoy. The main directions and potential problems of using computer vision to ensure security and improve the quality of management of modern infocommunication networks // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 440-444 // https://www.elibrary.ru/item.asp?id=67337414&pff=1 (in Russian).
  92. E.S. Kryukova, S.B. Nogin, I.B. Paraschuk. The quality of content as a set of information objects and semantic information filling of electronic educational resources // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 511-514 // https://www.elibrary.ru/item.asp?id=67337428&pff=1 (in Russian).
  93. D.S. Levshun. Architecture of a system for detecting and predicting vulnerabilities in information systems based on artificial intelligence methods // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 535-538 // https://www.elibrary.ru/item.asp?id=67337432&pff=1 (in Russian).
  94. V.V. Lavrentiev, D.C. Levshun. System architecture for automating the detection of vulnerabilities in large language models // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 539-543 // https://www.elibrary.ru/item.asp?id=67337433&pff=1 (in Russian).
  95. D.A. Levshun D.A. Application of machine learning methods in darknet traffic analysis // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 547-551 // https://www.elibrary.ru/item.asp?id=67337435&pff=1 (in Russian).
  96. A.V. Mikhaylichenko, N.V. Mikhaylichenko, I.B. Paraschuk. Proactive assessment as a tool for predicting the reliability and quality of data centers // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 571-574 // https://www.elibrary.ru/item.asp?id=67337438&pff=1 (in Russian).
  97. I.O. Pantyukhin, I.B. Paraschuk, V.A. Markin. On the issue of building an intelligent system of integrated assessment of the security of infocommunication networks // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 582-585 // https://www.elibrary.ru/item.asp?id=67337440&pff=1 (in Russian).
  98. I.B. Paraschuk, L.A. Markin, A.V. Seleznev. Improving the quality of search query implementation in distributed data storage systems // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 592-596 // https://www.elibrary.ru/item.asp?id=67337442&pff=1 (in Russian).
  99. V.E. Sadovnikov, I.B. Saenko. The use of generative-adversarial neural networks to detect and counter botnets in information and communication networks // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 614-618 // https://www.elibrary.ru/item.asp?id=67337447&pff=1 (in Russian).
  100. I.B. Saenko, A.V. Udaltsov. Models for organizing customer iteration with distributed database // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 619-624 // https://www.elibrary.ru/item.asp?id=67337448&pff=1 (in Russian).
  101. Ya.A. Dombrovsky, A.A. Renskov, I.B. Paraschuk. Topical issues of building and using electronic libraries based on a distributed interconnected network of data centers for institutions of higher professional education // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 676-679 // https://www.elibrary.ru/item.asp?id=67337459&pff=1 (in Russian).
  102. E.V. Fedorchenko, I.B. Paraschuk. Forecasting information security risks of critical infrastructures using neuro-fuzzy anomaly identification // In the collection: Current problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. p.680-684 // https://elibrary.ru/item.asp?id=67337460 (in Russian).
  103. E.S. Vladimirova, I.B. Paraschuk. Conversion of noisy and heterogeneous diagnostic information about the current values of data center reliability parameters // In the collection: Actual problems of infotelecommunications in science and education (Apino 2024). Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 685-688 // https://www.elibrary.ru/item.asp?id=67337461&pff=1 (in Russian).
  104. M.D. Gorod, A.A. Chechulin. Problems of initiation of the spread of cybercrimes within an organization and their solutions // in the collection: St. Petersburg International Forensic Forum Materials of the international scientific and practical conference St. Petersburg, 2024. pp. 623-625. // https://elibrary.ru/item.asp?id=67359523 (in Russian).
  105. I.B. Saenko, V.E. Sadovnikov. An approach for detecting attacks on machine learning systems using neural-cleanse technology and JPEG compression algorithm // In the collection: Current problems of protection and security. Proceedings of the XXVII All-Russian Scientific and Practical Conference. St. Petersburg, 2024. pp. 325-328. // https://elibrary.ru/item.asp?id=68534382 (in Russian).
  106. K.E. Izrailov, V.E. Mishin, A.V. Shestakov. Overview of attacks on artificial intelligence: monitoring the information security of big data // In the collection: Fire safety: modern challenges. Problems and solutions. Materials of the All-Russian scientific and practical conference. St. Petersburg, 2024. pp. 22-28. // https://elibrary.ru/item.asp?id=67879719 (in Russian).
  107. D.P. Spiridonov, E.V. Fedorchenko. Modeling attacks based on MICROSOFT kubernetes threat matrix // In the collection: Actual problems of infotelecommunications in science and education (APINO 2024). Materials of the XIII International Scientific, technical and scientific-methodical Conference. St. Petersburg, 2024. pp. 555-557. // https://elibrary.ru/item.asp?id=68550796 (in Russian).
  108. S.A. Verevkin, E.V. Fedorchenko. Analysis of methods for detecting signs of exploits // In the collection: Actual problems of infotelecommunications in science and education. Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 152-158. // https://elibrary.ru/item.asp?id=67337360 (in Russian).
  109. I.V. Kotenko, I.B. Saenko, I.B. Paraschuk, V.P. Kochin. Detection of malicious activity in the infrastructure of a smart city based on hybrid intelligent systems with components of explicable deep learning: a Russian-Belarusian project // Complex information protection. Collection of materials of the XXIX scientific and practical conference / St. Petersburg, 2024, pp. 90-95 // https://elibrary.ru/item.asp?id=72755099 (in Russian).
  110. I.V. Kotenko, I.B. Saenko, V.E. Sadovnikov. Adversarial attacks on machine learning systems and methods of combating them // Complex information protection // Collection of materials of the XXIX scientific and practical conference / St. Petersburg, 2024, pp. 96-100 // https://elibrary.ru/item.asp?id=72792713 (in Russian).
  111. Igor Kotenko, Igor Parashchuk. Identifying the Signs of Malicious Activity in the Infrastructure of Industrial Automation Systems Using the Dominance Relation of Elements of Fuzzy Sets // 2024 International Russian Automation Conference (RusAutoCon). P.230-235. https://ieeexplore.ieee.org/document/10694062
  112. I.V. Kotenko, V.A. Desnitsky, I.B. Parashchuk. Optimal Filtering and Extrapolation in Problems of Quick Security Assessment of Critical Information and Telecommunication Resources // Published in: 2024 International Russian Smart Industry Conference (SmartIndustryCon-2024). pp. 167-172. https://ieeexplore.ieee.org/document/10515987 // https://elibrary.ru/item.asp?id=73018208
  113. I.V. Kotenko, I.B. Paraschuk. Fuzzy neural networks for monitoring signs of malicious activity in the network traffic of a "Smart city"// In the collection: Integrated models and soft computing in artificial intelligence (IMI-2024). Collection of scientific papers of the XII International Scientific and Practical Conference. In 2 volumes. Smolensk, 2024. pp. 170-181 // https://elibrary.ru/item.asp?id=74479288 (in Russian).
  114. I.V. Kotenko, S.S. Khmyrov. Cybersecurity intruder model for apt attacks on critical infrastructure facilities // In the collection: Current problems of infotelecommunications in science and education (APINO 2024). Materials of the XIII International Scientific, technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2024. pp. 736-740 // https://elibrary.ru/item.asp?id=69407644 (in Russian).
  115. P.V. Bortniker, I.B. Saenko. Comparative analysis of the use of Haar, Dobeshi and "Mexican hat" wavelets for detecting intrusions into information systems // In the collection: Current problems of infotelecommunications in science and education. Collection of scientific articles of the XIII International Scientific, technical and scientific-methodical conference in 4 volumes.. St. Petersburg, 2024. pp. 126-130. // https://elibrary.ru/item.asp?id=67337355 (in Russian).
  116. V.A. Baboshin, I.B. Paraschuk, S.N. Bushuev. On the issue of justification of the relevance of the development of tools and methods for adaptive monitoring of telecommunication networks of transport objects and transport infrastructure // In the collection: Development of theory and practice of transport construction, information support of transport systems. collection of articles of the All-Russian scientific and practical conference. St. Petersburg, Peterhof, 2024. pp. 109-116.// https://elibrary.ru/item.asp?id=72106968 (in Russian).

2023

  1. Maxim Kolomeets, Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Graph Visualization: Alternative Models Inspired by Bioinformatics // Sensors. 2023. Ò. 23. ¹ 7. Ñ. 3747. DOI: 10.3390/s23073747 // https://elibrary.ru/item.asp?id=61798233
  2. Dmitry Vesnin, Dmitry Levshun, Andrey Chechulin. Trademark Similarity Evaluation Using a Combination of ViT and Local Features // Information (Switzerland). 2023. Ò. 14. ¹ 7. Ñ. 398. DOI: 10.3390/info14070398 // DOI: 10.20944/preprints202306.0192.v1 // https://elibrary.ru/item.asp?id=63188086
  3. Maxim Kolomeets, Andrey Chechulin. Social bot metrics // Social Network Analysis and Mining. 2023. Ò. 13. ¹ 1. Ñ. 36. DOI:10.1007/s13278-023-01038-3 // https://elibrary.ru/item.asp?id=61272319
  4. Dmitry Levshun, Olga Tushkanova, Andrey Chechulin. Two-model active learning approach for inappropriate information classification in social networks // International Journal of Information Security. 2023. Ò. 22. ¹ 6. Ñ. 1921-1936. DOI:10.1007/s10207-023-00726-7 // https://elibrary.ru/item.asp?id=63329930
  5. D.S. Levshun, A.A. Chechulin. Vulnerability categorization for fast multistep attack modelling // Conference of Open Innovations Association, FRUCT. 2023. ¹ 33. Ñ. 169-175. DOI:10.23919/FRUCT58615.2023.10143048 // https://elibrary.ru/item.asp?id=53943919
  6. I. Kotenko, K. Izrailov, M. Buinevich. The Method and Software Tool for Identification of the Machine Code Architecture in Cyberphysical Devices // Journal of Sensor and Actuator Networks. 2023. Vol. 12(1), pp. 11. DOI: 10.3390/jsan12010011. // https://www.elibrary.ru/item.asp?id=60636071
  7. Diana Levshun, Igor Kotenko. A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities // Artificial Intelligence Review. 2023. Vol.56, ¹ 8, pp. 8547-8590, DOI: 10.1007/s10462-022-10381-4, https://doi.org/10.21203/rs.3.rs-1975426/v1 // https://www.elibrary.ru/item.asp?id=60364090
  8. Maxim Kolomeets, Andrey Chechulin, Lidia Vitkova. Technique for Investigating Attacks on a Company’s Reputation on a Social Media Platform. Studies in Computational Intelligence, 2022, 1089 SCI, P. 234–243. DOI:10.1007/978-3-031-29104-3_26
  9. I. Kotenko, K. Izrailov, M. Buinevich, I. Saenko, R. Shorey. Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities // Energies. 2023. Vol. 16. Iss. 13. PP. 5111. DOI:10.3390/en16135111 // https://elibrary.ru/item.asp?id=62899231
  10. O. Tushkanova, D. Levshun, A. Branitskiy, E. Fedorchenko, E. Novikova, I. Kotenko. Detection of Cyberattacks and Anomalies in Cyber-Physical Systems: Approaches, Data Sources, Evaluation // Algorithms, vol. 16, no. 2, 2023, pp. 85. DOI: 10.3390/a16020085.// https://www.elibrary.ru/item.asp?id=60517408
  11. Kotenko I.V., Saenko I.B. Exploring opportunities to identify abnormal behavior of data center users based on machine learning models // Pattern Recognition and Image Analysis. Advances in Mathematical Theory and Applications. 2023. Ò. 33. ¹ 3. Ñ. 368-372. DOI: 10.1134/S1054661823030227 // https://www.elibrary.ru/item.asp?id=55186589
  12. Igor Kotenko, Igor Saenko, Alexey Vinogradenko, Nikita Budko. Intelligent state assessment of complex autonomous objects based on wavelet analysis // Engineering Applications of Artificial Intelligence. 2023. 126. pp. 106869. DOI: 10.1016/j.engappai.2023.106869 // https://elibrary.ru/item.asp?id=64030245
  13. Elena Fedorchenko, Evgenia Novikova, Andrey Fedorchenko, Sergei Verevkin. An Analytical Review of the Source Code Models for Exploit Analysis // Information. 2023. 14, 9. pp. 497. DOI: 10.3390/info14090497 // https://elibrary.ru/item.asp?id=64436987
  14. Igor Kotenko, Igor Saenko, Andrey Privalov, Oleg Lauta. Ensuring SDN Resilience under the Influence of Cyber Attacks: Combining Methods of Topological Transformation of Stochastic Networks, Markov Processes, and Neural Networks // Big Data and Cognitive Computing. 2023. 7(2). pp. 66. DOI: 10.3390/bdcc7020066 // https://elibrary.ru/item.asp?id=61156050
  15. Igor Kotenko, Elena Fedorchenko, Evgenia Novikova, Ashish Jha. Cyber Attacker Profiling for Risk Analysis Based on Machine Learning // Sensors. 2023. 23(4). pp. 2028. DOI: 10.3390/s23042028 // https://elibrary.ru/item.asp?id=61089909
  16. D.A. Levshun, I.V. Kotenko. Application of Intelligent Methods of Correlation of System Events in Predictive Analysis of Security States of Objects of Critical Infrastructure // Pattern Recognition and Image Analysis. 2023. 33(3). pp. 389-397. DOI: 10.1134/S1054661823030264 // https://elibrary.ru/item.asp?id=55186592
  17. Vasily Desnitsky, Diana Levshun, Igor Kotenko. An Approach to Attack Detection on Graph-Based Modeling of States in Critical Infrastructures // 2023 International Russian Automation Conference (RusAutoCon). 2023. DOI: 10.1109/RusAutoCon58002.2023.10272943
  18. Igor Kotenko, Igor Parashchuk. Analysis of Threats to Information Security of Industrial Automation Systems Using Euclidean and Hamming Distances between Fuzzy Sets // 2023 International Russian Automation Conference (RusAutoCon). 2023, pp. 13-18 // DOI: 10.1109/RusAutoCon58002 // DOI: 10.1109/RusAutoCon58002.2023.10272922 // https://ieeexplore.ieee.org/document/10272922 // https://elibrary.ru/item.asp?id=73018170
  19. Evgenia Novikova, Elena Fedorchenko, Igor Saenko. Methodology for Dataset Generation for Research in Security of Industrial Water Treatment Facilities // 2023 International Russian Automation Conference (RusAutoCon). 2023. pp. 953-958. DOI: 10.1109/RusAutoCon58002.2023.10272930 // https://www.elibrary.ru/item.asp?id=72913806
  20. Sergey Golubev, Evgenia Novikova. Transformation of Network Flow Data into Images for Intrusion Detection Using Convolutional Neural Networks // 2023 International Russian Automation Conference (RusAutoCon). 2023. pp. 948- 952. DOI: 10.1109/RusAutoCon58002.2023.10272890 // https://www.elibrary.ru/item.asp?id=72868436
  21. Igor Saenko, Oleg Lauta, Nikita Vasiliev, Vladimir Sadovnikov. An Approach to Effective Processing of Information from Smart Home Sensors using Machine Learning Methods // V International Conference on Control in Technical Systems (CTS). 2023. pp. 189-192. DOI: 10.1109/CTS59431.2023.10288887
  22. Elena Fedorchenko, Evgenia Novikova, Igor Saenko. Attack Model for the Industrial Water Treatment Systems // V International Conference on Control in Technical Systems (CTS). 2023. pp. 209-212. DOI: 10.1109/CTS59431.2023.10288930
  23. Evgenia Novikova, Sergey Golubev. Federated Learning Based Approach to Intrusion Detection // V International Conference on Control in Technical Systems (CTS). 2023. DOI: 10.1109/CTS59431.2023.10289088
  24. Huiyao Dong, Igor Kotenko. An Autoencoder-based Multi-task Learning for Intrusion Detection in IoT Networks // 2023 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). 2023., P.1-4. DOI: 10.1109/USBEREIT58508.2023.10158807
  25. Mhd Raed, Semih Yön, Ali Güneş, Igor Kotenko, Elena Fedorchenko, Anna Polubaryeva. An RFID Based Localization and Mental Stress Recognition System Using Wearable Sensors // Proceedings of the 16th International Joint Conference on Biomedical Engineering Systems and Technologies. 2023. 4. pp. 325-331. DOI: 10.5220/0011796000003414
  26. Igor Kotenko, Igor Saenko. Applying Machine Learning Methods to Detect Abnormal User Behavior in a University Data Center // Intelligent Distributed Computing XV. Studies in Computational Intelligence. 2023. pp. 13-22. DOI: 10.1007/978-3-031-29104-3_2
  27. Sergei Golubev, Evgenia Novikova. Image-Based Intrusion Detection in Network Traffic // Intelligent Distributed Computing XV. Studies in Computational Intelligence. 2023. pp. 51-60. DOI: 10.1007/978-3-031-29104-3_6
  28. Diana Gaifulina, Alexander Branitskiy, Dmitry Levshun, Elena Doynikova, Igor Kotenko. Sentiment Analysis of Social Network Posts for Detecting Potentially Destructive Impacts // Intelligent Distributed Computing XV. Studies in Computational Intelligence. 2023. pp. 203-212. DOI: 10.1007/978-3-031-29104-3_23
  29. Igor Kotenko, Igor Saenko, Oleg Lauta, Nikita Vasiliev, Dmitry Iatsenko. Attacks Against Machine Learning Systems: Analysis and GAN-based Approach to Protection // Proceedings of the Seventh International Scientific Conference «Intelligent Information Technologies for Industry» (IITI’23). Lecture Notes in Networks and Systems. 2023. pp. 49-59. DOI: 10.1007/978-3-031-43792-2_5
  30. Diana Levshun, Igor Kotenko. Intelligent Graph-Based Correlation of Security Events in Cyber-Physical Systems // Proceedings of the Seventh International Scientific Conference «Intelligent Information Technologies for Industry» (IITI’23). Lecture Notes in Networks and Systems. 2023. pp. 115-124. DOI: 10.1007/978-3-031-43792-2_12
  31. Ksenia Namytova, Dmitry Gavra, Lidia Vitkova. Methodology for Detecting and Feature Selection of an Information Attack in the Process of Mediatization // Proceedings of the Seventh International Scientific Conference «Intelligent Information Technologies for Industry» (IITI’23). Lecture Notes in Networks and Systems. 2023. pp. 55-64. DOI: 10.1007/978-3-031-43789-2_5
  32. Ksenia Zhernova, Andrey Chechulin. Security Evaluation Method for Perspective Types of Human-Computer Interfaces // Proceedings of the Seventh International Scientific Conference «Intelligent Information Technologies for Industry» (IITI’23). Lecture Notes in Networks and Systems. 2023. V. 776 (1), pp. 39-48. DOI: 10.1007/978-3-031-43792-2_4 // ISBN: 978-3-031-43788-5
  33. Huiyao Dong, Igor Kotenko. Train Without Label: A Self-supervised One-Class Classification Approach for IoT Anomaly Detection // Proceedings of the Seventh International Scientific Conference «Intelligent Information Technologies for Industry» (IITI’23). Lecture Notes in Networks and Systems. 2023. pp. 81-89. DOI: 10.1007/978-3-031-43792-2_8
  34. Dmitry Levshun . Comparative Analysis of Machine Learning Methods in Vulnerability Metrics Transformation // Proceedings of the Seventh International Scientific Conference «Intelligent Information Technologies for Industry» (IITI’23). Lecture Notes in Networks and Systems. 2023. pp. 60-70. DOI: 10.1007/978-3-031-43792-2_6
  35. Igor Saenko, Peter Bortniker, Oleg Lauta, Inna Zhdanova, Nikita Vasiliev. An Approach to Early Computer Network Intrusion Detection Based on the Wavelet Transform Energy Spectra Analysis // Proceedings of the Seventh International Scientific Conference «Intelligent Information Technologies for Industry» (IITI’23). Lecture Notes in Networks and Systems. 2023. pp. 71-80. DOI: 10.1007/978-3-031-43792-2_7
  36. Dmitrii Gavra, Ekaterina Akimovich, Liudmila Balakhonskaya, Lidia Vitkova, Vitaly Balakhonsky. Communication Strategies of Wide Mediatization of a Sports Incident in Pluralistic Media Space // 2023 Communication Strategies in Digital Society Seminar (ComSDS). 2023. pp. 29-36. DOI: 10.1109/ComSDS58064.2023.10130415
  37. Igor Kotenko, Igor Parashchuk, Vasily Desnitsky. Determination of the Transition Probability Matrix for an IoT Fuzzy Security Model // 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS). 2023. pp. 40-44. DOI: 10.1109/IoTaIS60147.2023.10346032
  38. Igor Kotenko, Vasily Desnitsky, Evgenia Novikova. Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset // 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS). 2023. DOI: 10.1109/IoTaIS60147.2023.10346064
  39. Igor Kotenko, Igor Parashchuk. Interval Analysis of Security for Information and Telecommunication Resources of Critical Infrastructures // Society 5.0. Studies in Systems, Decision and Control. 2023. 2023. 437. pp. 241-250. DOI: 10.1007/978-3-031-35875-3_19
  40. Igor Kotenko, Igor Saenko, Fadey Skorik. IoT Network Administration by Intelligent Decision Support Based on Combined Neural Networks // Internet of Things / Security, Trust and Privacy Models, and Architectures in IoT Environments. 2023. pp. 1-24. DOI: 10.1007/978-3-031-21940-5_1
  41. Vasily Desnitsky. Modeling and Detection of Denial-of-Sleep Attacks on Autonomous IoT Devices in Wireless Sensor Networks // Internet of Things / Security, Trust and Privacy Models, and Architectures in IoT Environments. 2023. pp. 77-97. DOI: 10.1007/978-3-031-21940-5_5
  42. Igor Saenko, Oleg Lauta, Dmitry Iatsenko. The Use of Dynamic Characteristics in Handwriting Recognition Tasks // 2023 International Ural Conference on Electrical Power Engineering (UralCon). 2023. pp. 609-614. DOI: 10.1109/uralcon59258.2023.10291131
  43. Vasily Desnitsky, Igor Kotenko, Igor Paraschuk, Elena Fedorchenko. Metrics and Indicators of Security of Critical Resources in State and Corporate Objects and Processes // Òðóäû Ñåìèíàðà Information Computing and Processing. 2023. DOI: 10.1109/ICP60417.2023.10397416
  44. Huiyao Dong, Igor Kotenko. Intrusion Detection with Uncertainty Based Loss Optimized Multi-Task Learning // Conference: 2023 Seminar on Information Systems Theory and Practice (ISTP), DOI:10.1109/ISTP60767.2023.10427065
  45. D. Levshun. Comparative analysis of machine learning methods in vulnerability categories prediction based on configuration similarity // Proceedings of the 16th International Symposium on Intelligent Distributed Computing (IDC-2023). September 13-15, Hamburg, Germany. 2023. P. 70-81
  46. Evgenia Novikova, Marat Bukhtiarov, Igor Kotenko, Elena Fedorchenko, Igor Saenko. Towards Application of the Tabular Data Transformation to Images in the Intrusion Detection Tasks Using Deep Learning Techniques // Proceedings of the 16th International Symposium on Intelligent Distributed Computing (IDC-2023). September 13-15, Hamburg, Germany. 2023. P. Pages 85-100
  47. Konstantin Izrailov, Nikita Romanov, Andrey Chechulin, Alexander Yaroshenko, Igor Kotenko. Intelligent Selection of Requirements for a Secure Design of Smart City Transport Infrastructure Interfaces // Proceedings of the 16th International Symposium on Intelligent Distributed Computing (IDC-2023). September 13-15, Hamburg, Germany. 2023. P. Pages 135-148
  48. K.E. Izrailov. Modeling a program with vulnerabilities in the terms of its representations evolution. Part 1. Life cycle scheme // Proceedings of educational institutions of communication. 2023. Vol. 9. No. 1. pp. 75-93. DOI: 10.31854/1813-324X-2023-9-1-75-93 // https://elibrary.ru/item.asp?id=50416979 (in Russian).
  49. K.E. Izrailov, A.K. Makarova, A.V. Shestakov. Generalized model of protection against cyberattacks on VOIP // Cybersecurity issues. 2023. No. 2 (54). pp. 109-121. DOI: 10.21681/2311-3456-2023-2-109-121 // https://elibrary.ru/item.asp?id=54282358 (in Russian).
  50. M.V. Kolomeets, A.A. Chechulin. Properties of malicious social bots // Proceedings of educational institutions of communications. 2023. Vol. 9. No. 1. pp. 94-104. DOI: 10.31854/1813-324X-2023-9-1-94-104 // https://elibrary.ru/item.asp?id=50416980 (in Russian).
  51. Andrey Chechulin. The issues of collecting correct and consistentinformation about a computer network // Informatization and communication. 2023. No. 1. pp. 91-94. DOI: 10.34219/2078-8320-2023-14-1-91-94 // https://elibrary.ru/item.asp?id=50516480 (in Russian).
  52. Dmitry Klishin, Andrey Chechulin. Analysis of information security standards // Data analysis and processing systems. 2023. No. 1 (89). pp. 37-54. DOI: 10.17212/2782-2001-2023-1-37-54 // https://elibrary.ru/item.asp?id=50493133 (in Russian).
  53. I.V. Kotenko, D.A. Levshun. Methods of intelligent system event analysis for multistep cyber-attack detection: using knowledge bases // Artificial intelligence and decision-making. 2023. No. 2. pp. 3-14. DOI: 10.14357/20718594230201 // https://elibrary.ru/item.asp?id=54105805 (in Russian).
  54. I.V. Kotenko, I.B. Saenko, M.H. Al-Barry. Detecting abnormal behaviour of users of data processing centres of higher education institutions // Legal Informatics. 2023. No. 1. pp. 62-71. DOI: 10.21681/1994-1404-2023-1-62-71 // https://www.elibrary.ru/item.asp?id=53761618 (in Russian).
  55. I.B. Saenko, I.V. Kotenko, O.S. Lauta, .Yu. Skorobogatov. Computer attack models on software-configurable networks // High-tech technologies in space research of the Earth. 2023. Vol. 15. No. 1. pp. 37-47.DOI: 10.36724/2409-5419-2023-15-1-37-47 // https://www.elibrary.ru/item.asp?id=50759958 (in Russian).
  56. I.V. Kotenko, I.B. Paraschuk. Adaptive neural network filtering in the interests of operational assessment of the security of critical resources // Mathematical methods in technologies and engineering. 2023. No. 1. pp. 58-61. DOI: 10.52348/2712-8873_MTT_2023_1_58 // https://www.elibrary.ru/item.asp?id=50386136 (in Russian).
  57. I.V. Kotenko, I.B. Saenko, R.I. Zakharchenk, D.V. Velichko. Subsystem for prevention of computer attacks against objects of critical information infrastructure: analysis of functioning and implementation // Cybersecurity issues. 2023. No. 1 (53). pp. 13-27. DOI: 10.21681/2311-3456-2023-1-13-27 // https://elibrary.ru/item.asp?id=50337100 (in Russian).
  58. E.S. Novikova, E.V. Fedorchenko, I.V. Kotenko, I.I. Kholod. Analytical review of intelligent intrusion detection systems based on federated learning: advantages and open challenges // Informatics and Automation. 2023. Vol. 22. No. 5. pp. 1034-1082. DOI: 10.15622/ia.22.5.4 // https://www.elibrary.ru/item.asp?id=54515310 (in Russian).
  59. V.I. Borisov, E.V. Fedorchenko. Method of normalization of fields of external sources of the mitre cti cyberattack data repository // Engineering Bulletin of the Don. 2023. No. 6 (102). pp. 212-221. // https://www.elibrary.ru/item.asp?id=54206663 (in Russian).
  60. S.A. Verevkin, E.V. Fedorchenko. Comparative analysis of the security databases mitre att&ck and capec // Technical sciences. 2023. No. 4. pp. 29-39. DOI: 10.24412/2071-6168-2023-4-29-39 // https://www.elibrary.ru/item.asp?id=53964263 (in Russian).
  61. D.S. Levshun. Hierarchical model for the design of microcontroller-based systems protected from cyber-physical attacks // Proceedings of educational institutions of Communications. 2023. Vol. 9. No. 1. pp. 105-115. DOI: 10.31854/1813-324X-2023-9-1-105-115 // https://elibrary.ru/item.asp?id=50416981 (in Russian).
  62. I.V. Kotenko, D.A. Levshun. Methods of intelligent system event analysis for multistep cyber-attack detection: using machine learning methods // Artificial intelligence and decision-making. 2023. No. 3. pp. 3-15. DOI: 10.14357/20718594230301 // https://elibrary.ru/item.asp?id=54684774 (in Russian).
  63. D.A. Levshun, D.S. Levshun. Approach for keylogger detection based on artificial intelligence methods // Informatization and Communications. 2023. No. 3. pp. 85-91. DOI: 10.34219/2078-8320-2023-14-3-85-91 // https://elibrary.ru/item.asp?id=54668230 (in Russian).
  64. Maxim Kolomeets, Ksenia Zhernova, Andrey Chechulin. Analysis of threats to interfacesof unmanned vehicles // Informatization and communication. 2023. No. 3. P. 62-75. DOI: 10.34219/2078-8320-2023-14-3-62-75 // https://elibrary.ru/item.asp?id=54668228 (in Russian).
  65. Maxim Gorda, Andrey Chechulin. Cybercrime investigation model // Informatization and communication. 2023. No. 3. P. 92-97. DOI: 10.34219/2078-8320-2023-14-3-92-97 // https://www.elibrary.ru/item.asp?id=54668231 (in Russian).
  66. A.V. Yakovlev, E.V. Tarov, K.E. Izrailov, A.A. Chechulin. Method for detecting source code duplicates based on the random walk algorithm // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2023. No. 2. P. 134-146. // https://www.elibrary.ru/item.asp?id=54153824 (in Russian).
  67. A.V. Meleshko, V.A. Desnitsky. Echnique of attack detection in self-organizing decentralized wireless sensor networks // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2023. No. 3. pp. 63-74. DOI: 10.61260/2218-130X-2023-3-63-74 // https://elibrary.ru/item.asp?id=54765334 (in Russian).
  68. M.M. Kovtsur, A.A. Branitsky, N.I. Kazakov. Development of a concept of centrlalized networking of distributed devices // Economics and quality of communication systems. 2023. No. 2 (28). pp. 99-104. // https://elibrary.ru/item.asp?id=53954105 (in Russian).
  69. I.N. Fabiyanovsky, V.V. Nikolaev, I.B. Saenko. Application of blockchain technology in critical distributed information systems: conceptual foundations // High-tech technologies in space research of the Earth. 2021. Vol. 13. No. 4. pp. 56-64. DOI: 10.36724/2409-5419-2021-13-4-56-64 // https://elibrary.ru/item.asp?id=47206979 (in Russian).
  70. I.V. Kotenko, E.V. Fedorchenko, E.S. Novikova, I.B. Saenko, A.S Danilov. Data collection methodology for security analysis of industrial cyber-physical systems // Cybersecurity issues. 2023. No. 5 (57). pp. 69-79. DOI: 10.21681/2311-3456-2023-5-69-79 // https://elibrary.ru/item.asp?id=54709889 (in Russian).
  71. E.V. Fedorchenko, E.S. Novikova, I.B. Saenko. Attack model for the industrial water treatment systems // International Scientific Conference on Management Problems in Technical Systems. 2023. Vol. 1. pp. 253-257 // https://elibrary.ru/item.asp?id=54678801 (in Russian).
  72. I.B. Saenko, O.S. Lauta, N.A. Vasiliev, V.E. Sadovnikov. An approach to the effective processing of information from smart home sensors using machine learning methods // International Scientific Conference on Management Problems in Technical Systems. 2023. Vol. 1. pp. 229-233. // https://elibrary.ru/item.asp?id=54678795 (in Russian).
  73. E.V. Fedorchenko, I.V. Kotenko, A.V. Fedorchenko, E.S. Novikova, I.B. Saenko. Assessment of information system security based on the exploit's graph model // Questions of cybersecurity. 2023. No. 3 (55). pp. 23-36. DOI: 10.21681/2311-3456-2023-3-23-36 // https://www.elibrary.ru/item.asp?id=54303091 (in Russian).
  74. I.V. Kotenko, I.B. Saenko, R.I. Zakharchenko, A.S. Kapustin, M.H. Al-Barry. Management of access to electronic information and educational environment of universities of federal executive authorities // Issues of cybersecurity. 2023. No. 2 (54). pp. 73-84. DOI: 10.21681/2311-3456-2023-2-73-84 // https://www.elibrary.ru/item.asp?id=54282355 (in Russian).
  75. I.B. Saenko, D.V. Volkov, S.E. Totsky, E.M. Volkova, S.V. Bychkov, A.V. Ermakov. Mproving the noise immunity of multiphase cdma sequences by reducing the number of phases and dynamic range // Telecommunication. 2023. No. 6. pp. 42-47. DOI: 10.34832/ELSV.2023.43.6.005 // https://www.elibrary.ru/item.asp?id=54266219 (in Russian).
  76. M.H. Al-Barry, I.B. Saenko. Proposals for the construction and operation of a system for detecting abnormal behavior of data center users by machine learning methods // Methods and technical means of ensuring information security. 2023. No. 32. pp. 20-21. // https://www.elibrary.ru/item.asp?id=54244631 (in Russian).
  77. I.V. Kotenko, I.B. Paraschuk. Specific features of operational assessment of security of critical resources based on adaptive neural network filtering // Bulletin of the Astrakhan State Technical University. Series: Management, Computer Engineering and Computer Science. 2023. No. 3. pp. 55-64. DOI: 10.24143/2072-9502-2023-3-55-64 // https://www.elibrary.ru/item.asp?id=54320879 (in Russian).
  78. I.B. Paraschuk, A.V. Mikhailichenko, V.A. Markin. Analysis of the effectiveness of information protection in electronic document management systems // Methods and technical means of ensuring information security. 2023. No. 32. pp. 56-57. // https://www.elibrary.ru/item.asp?id=54244653 (in Russian).
  79. E.S. Novikova, I.V. Kotenko, A.V. Meleshko, k.E. Izrailov. federated learning based intrusion detection: system architecture and experiments // Issues of cybersecurity. 2023. No. 6 (58). pp. 50-66. DOI: 10.21681/2311-3456-2023-6-50-66 // https://elibrary.ru/item.asp?id=54966746 (in Russian).
  80. K.N. Gorpinchenko, N.H. Voronkova, E.S. Sakhatskaya, A.A. Chechulin. Factor analysis of the unemployment rate in the Russian Federation // Russian Economic Bulletin. 2023. Vol. 6. No. 5. pp. 11-16.// https://www.elibrary.ru/item.asp?id=54261326 (in Russian).
  81. A.V. Mikhaylichenko, A.E. Derkach, I.B. Paraschuk. Elements of linear Kalman extrapolation and granular computing in application to the tasks of proactive reliability control of mobile data centers // Caspian Journal: Management and High Technologies. 2023. No. 2 (62). pp. 26-33 DOI: 10.54398/20741707_2023_2_26 // https://www.elibrary.ru/item.asp?id=54760145 (in Russian).
  82. V.V. Yelizarov, I.B. Paraschuk, D.V. Salyuk. Analysis of the stages and criteria for the selection of modern artificial intelligence technologies in the interests of building and improving communication equipment and control automation of special purpose // Communication equipment. 2023. No. 1 (161). pp. 60-68. DOI: 10.24412/2782-2141-2023-1-60-68 // https://www.elibrary.ru/item.asp?id=53739946 (in Russian).
  83. I.B. Paraschuk, A.V. Mikhailichenko, A.A. Smirnov. Qualimetric control of critical reliability of hardware and software of data processing centers using methodological and mathematical tools of disaster theory // REDS: Telecommunication devices and Systems. 2023. Vol. 13. No. 3. pp. 27-32. // https://www.elibrary.ru/item.asp?id=52694153 (in Russian).
  84. I.B. Paraschuk, A.V. Mikhailichenko. Stages of the technique for assessing the reliability of mobile data centers in the conditions of noisy source data // Information and Space. 2023. No. 1. pp. 36-44. // https://www.elibrary.ru/item.asp?id=50485728 (in Russian).
  85. A.V. Mikhaylichenko, A.E. Derkach, I.B. Paraschuk. Tasks of proactive reliability control of mobile data centers using linear kalman extrapolation and granular computing // Mathematical methods in technologies and engineering. 2023. No. 1. pp. 54-57. DOI: 10.52348/2712-8873_MT_2023_1_54 // https://elibrary.ru/item.asp?id=50386135 (in Russian).
  86. I.B. Saenko, M.A. Biryukov, I.E. Ostanin, A.V. Ermakov. Algorithm for quick detection of the desired object features in the image // Telecommunication. 2023. No. 10. pp. 57-63. DOI: 10.34832/ELSV.2023.47.10.008 // https://elibrary.ru/item.asp?id=55929722 (in Russian).
  87. T.K. Zhukebaeva, V.A. Desnitsky, E.M. Mardenov. Analytical modeling of attacks in wirelesssensor networks for attack detection // Informatization and Communications. 2023. No. 3. pp. 98-105. DOI: 10.34219/2078-8320-2023-14-3-98-105 // https://elibrary.ru/item.asp?id=54668232 (in Russian).
  88. K.E. Izrailov, M.V. Buinevich. Different genesis attacks to complex objects detecting method based on condition information. Part 1. Prerequisites and schema // Cybersecurity issues. 2023. 3(55). pp. 90-100. DOI: 10.21681/2311-3456-2023-3-90-100 // https://www.elibrary.ru/item.asp?id=54303096 (in Russian).
  89. K.E. Izrailov. Methodology for machine code reverse engineering. Part 1. Preparation of the research object. // Proceedings of educational institutions of communications. 2023. Vol. 9. No. 5. pp. 79-90. DOI: 10.31854/1813-324X-2023-9-5-79-90 // https://www.elibrary.ru/item.asp?id=54890076 (in Russian).
  90. K.E. Izrailov. Methodology for machine code reverse engineering. Part 2. Static investigation //Proceedings of educational institutions of communication. 2023. Vol. 9. No. 6. pp. 68-82. DOI: 10.31854/1813-324X-2023-9-6-68-82 // https://www.elibrary.ru/item.asp?id=56946396 (in Russian).
  91. K.E. Izrailov. Modeling a program with vulnerabilities in the terms of its representations evolution. Part 2. Analytical model and experiment // Proceedings of educational institutions of communications. 2023. Vol. 9. No. 2. pp. 95-111. DOI: 10.31854/1813-324X-2023-9-2-95-111 // https://www.elibrary.ru/item.asp?id=53927921 (in Russian).
  92. A.V. Meleshko. Analysis of the possibility of applying the theory of preparation and decision making to ensure the security of wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2023. ¹ 4. pp. 71-78. DOI: 10.46418/2079-8199_2023_4_14 // https://elibrary.ru/item.asp?id=65666132 (in Russian).
  93. A.V. Meleshko, V.A. Desnitsky. Modeling a self-organizing decentralized wireless sensor network with role-functioning for attack detection // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2023. 3. pp. 63-69. DOI: 10.46418/2079-8199_2023_3_10 // https://www.elibrary.ru/item.asp?id=56006756 (in Russian).
  94. K.N. Zhernova, A.A. Chechulin. Searching for anomalies in security data visualization using artificial neural networks 2023. 3. pp. 39-47. DOI: 10.46418/2079-8199_2023_3_6 // https://www.elibrary.ru/item.asp?id=56006752 (in Russian).
  95. A.V. Yakovlev, K.E. Izrailov. Survey of existing methods for detecting source code duplicates //National security and strategic planning. 2023. No. 1 (41). pp. 86-92. DOI: 10.37468/2307-1400-2023-1-86-92 // https://www.elibrary.ru/item.asp?id=54391110 (in Russian).
  96. V.A. Desnitskiy. Attack detection in critical infrastructures \\on the base of analysis of states // Computer tools in education. 2023. Issue 3. pp. 8-17. DOI: 10.32603/2071-2340-2023-3-8-17 // http://ipo.spb.ru/journal/index.php?article/2346/. // https://www.elibrary.ru/item.asp?id=71274193 (in Russian).
  97. I.B. Saenko, O.S. Lauta, N.A. Vasiliev, V.E. Sadovnikov. An approach to the effective processing of information from smart home sensors using machine learning methods // International Scientific Conference on Management Problems in Technical Systems. (PUTS-2023). 2023. Vol.1. pp. 229-233 // https://elibrary.ru/mzbhij (in Russian).
  98. T.K. Zhukabayeva, V.A. Desnitsky, E.M. Mardenov. Approach to simulation modeling of wireless sensor networks for attack detection // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2023. No. 4. pp. 28-33. DOI: 10.46418/2079-8199_2023_4_6 // https://elibrary.ru/item.asp?id=65666124 (in Russian).
  99. I.V. Kotenko, B.A. Kobrinsky, T.V. Afanasyeva, V.V. Borisov, V.V. Gribova, A.P. Yeremeev, M.A. Mikheenkova, G.F. Rybina, A.A. Kharlamov. Twentieth National Conference on Artificial Intelligence //Artificial intelligence and decision-making. 2023. No. 2. pp. 108-116. DOI: 10.14357/20718594230209 // https://elibrary.ru/item.asp?id=54105813 (in Russian).
  100. I.B. Saenko, I.V. Kotenko, O.S. Lauta, S.Yu. Skorobogatov. Sustainability assessment methodology software-configurable networks in the conditions of computer attacks // I-methods. 2023. Vol. 15. Serial number: 1 // https://elibrary.ru/download/elibrary_66317697_55818154.pdf // https://elibrary.ru/item.asp?id=66317697 (in Russian).
  101. P.A. Kurta, K.E. Izrailov. Survey of methods for building dynamic adaptive interfaces and their intelligentalization // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2023. No. 4. pp. 119-132. DOI: 10.61260/2218-130X-2024-2023-4-119-132 // https://www.elibrary.ru/item.asp?id=60051397 (in Russian).
  102. K.E. Izrailov, M.V. Buinevich. Different genesis attacks to complex objects detecting method based on condition information. Part 2. Algorithm, model and experiment // Issues of cybersecurity. 2023. No. 4 (56). pp. 80-93. DOI: 10.21681/2311-3456-2023-4-80-93 // https://www.elibrary.ru/item.asp?id=54707376 (in Russian).
  103. E.S. Novikova, S.A. Golubev. Federated learning based approach to intrusion detection // International Scientific Conference on Management Problems in Technical Systems. 2023. Vol. 1. pp. 200-203.// https://www.elibrary.ru/item.asp?id=54678788 (in Russian).
  104. I.V. Kotenko, I.A. Popkov. Analysis of current research trends in the topic of THREAT HUNTING // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 683-687. // https://elibrary.ru/item.asp?id=54033669 (in Russian).
  105. I.V. Kotenko, I.A. Popkov. Methodology of automated forensic data collection in THREAT HUNTING processe // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 679-683 // https://elibrary.ru/item.asp?id=54033668 (in Russian).
  106. I.V. Kotenko, I.B. Paraschuk, I.B. Saenko. The content and features of the key stages of the development of methods and models for processing data on cybersecurity incidents in departmental infocommunication networks // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 674-678. // https://www.elibrary.ru/item.asp?id=54033667 (in Russian).
  107. I.V. Kotenko, D.A.Levshun. Algorithm for cause-and-effect correlation of security events in cyber-physical systems on the basis of intelligent graph-oriented approach // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 669-674. // https://elibrary.ru/item.asp?id=54033666 (in Russian).
  108. E.A. Ichetovkin, I.V. Kotenko. Analysis of attacks on machine learning components of intrusion detection systems // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 600-604 // https://elibrary.ru/item.asp?id=54033651 (in Russian).
  109. E.A. Ichetovkin, I.V. Kotenko. Analysis of protection methods intrusion detection systems from attacks on machine learning components // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 595-600 // https://elibrary.ru/item.asp?id=54033650 (in Russian).
  110. I.YU. Zelichenok, I.V. Kotenko. Architecture and implementation of the prototype of the module for detecting multi-step attacks using short-term and long-term analysis (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 537-541 // https://elibrary.ru/item.asp?id=54033638 (in Russian).
  111. E.A. Donskov, I.V. Kotenko I.V. Algorithms for detecting and preventing attacks on intelligent transport systems using blockchain distributed register technology // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 418-423 // https://elibrary.ru/item.asp?id=54033612&pff=1 (in Russian).
  112. H. Dong, I.V. Kotenko. Intrusion detection based on multi-task learning with optimization of uncertainty losses // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 412-417 // https://elibrary.ru/item.asp?id=54033611&pff=1 (in Russian).
  113. D.R. Valeev, I.V. Kotenko. Analysis of approaches to automatic processing of fuzz testing results // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 219-224 // https://elibrary.ru/item.asp?id=54033569&pff=1 (in Russian).
  114. I.V. Paraschuk, A.A. Chechulin. Neuro-fuzzy vulnerability detection method for monitoring the security of processes and means of human-intelligent system interaction within the framework of the "SMART TRANSPORT" concept // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 837-841. // https://www.elibrary.ru/item.asp?id=54033717 (in Russian).
  115. D.V. Klishin, A.A. Chechulin. Ontology of information security models // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 637-642 // https://elibrary.ru/item.asp?id=54033659&pff=1 (in Russian).
  116. K.N. Zhernova, A.A. Chechulin. Methods for searching for vulnerabilities in the unmanned transport environment of the "smart city" // Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 500-504. // https://elibrary.ru/item.asp?id=54033630 (in Russian).
  117. M.D. Cities, A.A. Chechulin. Review and systematization of software tools used to investigate cyber-attacks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 355-359 // https://elibrary.ru/item.asp?id=54033599&pff=1 (in Russian).
  118. V.A. Desnitsky. Analysis of attacking effects on autonomous devices of information and telecommunication systems and networks // In the collection: Mathematical and computer modeling. Collection of materials of the X International Scientific Conference. Omsk, 2023. pp. 248-249 // https://elibrary.ru/item.asp?id=50349461 (in Russian).
  119. E.V. Fedorchenko, A.A. Khachatryan. Analysis of honeypot and deception technology: description of the implementations applied // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles of the XII International Scientific-technical and scientific-methodical Conference. In 4 volumes. Edited by S.I. Makarenko, comp. V.S. Elagin, E.A. Anikevich. St. Petersburg, 2023. pp. 888-891 // https://www.elibrary.ru/item.asp?id=54295098 (in Russian).
  120. V.I. Borisov, E.V. Fedorchenko. Research on interconnection between separate cyber-attack stages and their role in generating attack sequencies for the purpose of proactive response on cyberthreats // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles of the XII International Scientific-technical and scientific-methodical Conference. In 4 volumes. Edited by S.I. Makarenko, comp. V.S. Elagin, E.A. Anikevich. Saint Petersburg, 2023. pp. 350-353. // https://www.elibrary.ru/item.asp?id=54294975 (in Russian).
  121. D.S. Levshun. Approach to simulation modelling of critical infrastructure facilities for cyber-physical attacks analysis // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. St. Petersburg, 2023. pp. 767-770. // https://elibrary.ru/item.asp?id=54033702 (in Russian).
  122. V.O. Popova, A.A, Chechulin. Distinctive features of systems of critical infrastructure objects in the context of the problem of countering cyber attacks // In the collection: Current problems of information and telecommunications in science and education (APINO 2023). Collection of scientific articles. XII International scientific-technical and scientific-methodological conference. In 4 volumes. St. Petersburg, 2023. P. 870-872. // https://www.elibrary.ru/item.asp?id=54033724 (in Russian).
  123. K.N. Zhernova. Designing a globally optimal human-computer interface // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 t .. Saint Petersburg, 2023. pp. 497-500 // https://elibrary.ru/item.asp?id=54033629 (in Russian).
  124. M.M. Kovtsur, A. A.Branitsky, N.I. Kazakov. Organization of protected interaction of distributed network devices // In the book: Mobile business: prospects for the development and implementation of radio communication systems in Russia and abroad. Collection of materials (abstracts) of the 51st International Conference. Moscow, 2023. pp. 37-39. // https://elibrary.ru/item.asp?id=53629183 (in Russian).
  125. I.B. Saenko, A.V. Udaltsov. On the issue of choosing the synchronization parameters of information elements // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023).Vol.3. Collection of scientific articles of the XII International Scientific-technical and scientific-methodical Conference: in 4 vols.. Saint Petersburg, 2023. pp. 827-831. // https://www.elibrary.ru/item.asp?id=54609658 (in Russian).
  126. M.A. Biryukov, V.V. Nikolaev, D.A. Renskov, I.B. Saenko. Conceptual model of a common information space for special purposes // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles of the XII International Scientific-technical and scientific-methodical Conference: in 4 vols.. Saint Petersburg, 2023. pp. 719-723. // https://www.elibrary.ru/item.asp?id=54609634 (in Russian).
  127. A.V. Udaltsov, S.A. Ryumina, I.B. Saenko. Applying the data analysis and machine learning system to conduct classes on artificial intelligence // In the collection: Modern trends in engineering education. Collection of materials of the Scientific and practical conference. Saint Petersburg, 2023. pp. 336-340.// https://www.elibrary.ru/item.asp?id=54396349 (in Russian).
  128. A.V. Udaltsov, I.B. Saenko. Database replication and security when using it // In the collection: Current problems of protection and security. Proceedings of the XXVI All-Russian Scientific and Practical Conference. St. Petersburg, 2023. pp. 462-467 // https://www.elibrary.ru/item.asp?id=54361856 (in Russian).
  129. D.S. Ivantsov, I.B. Saenko. Security information and event management systems: analysis and development trends, application in critical infrastructures // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles of the XII International Scientific-technical and scientific-methodical Conference. In 4 volumes. Edited by S.I. Makarenko, comp. V.S. Elagin, E.A. Anikevich. Saint Petersburg, 2023. pp. 700-704. // https://www.elibrary.ru/item.asp?id=54295056 (in Russian).
  130. A.V. Udaltsov, I.B. Saenko, D.A. Renskov. Maintaining the relevance of information resources in databases when using decision support systems in automated management systems // In the collection: Technologies. Innovation. Connection. materials of the scientific and practical conference. Saint Petersburg, 2023. pp. 374-378. // https://www.elibrary.ru/item.asp?id=54121193 (in Russian).
  131. I.B. Saenko, A.V. Udaltsov, M.A. Biryukov. Balancing requests to information resources in high-performance systems by using data replication // In the collection: State and prospects of development of modern science in the direction of "IT technologies". Proceedings of the II All-Russian Scientific and Technical Conference. Anapa, 2023. pp. 319-325. // https://www.elibrary.ru/item.asp?id=53847513 (in Russian).
  132. I.B. Saenko, V.V. Nikolaev. On the model of the unified information space of departmental structures built on the basis of high-performance computing systems // In the collection: The state and prospects of development of modern science in the direction of "IT technologies". Proceedings of the II All-Russian Scientific and Technical Conference. Anapa, 2023. pp. 310-318. // https://www.elibrary.ru/item.asp?id=53847512 (in Russian).
  133. M.A. Biryukov, I.B. Saenko, A.V. Udaltsov. Intelligent systems in managing the process of database synchronization // In the collection: Technologies of the information society. Proceedings of the XVII International Industrial Scientific and Technical Conference. 2023. pp. 315-317. // https://www.elibrary.ru/item.asp?id=53808204 (in Russian).
  134. V.V. Nikolaev, I.B. Saenko. An approach to building a model of a unified information space for solving the problem of optimizing the distribution of information resources // In the collection: Technologies of the information society. Proceedings of the XVII International Industrial Scientific and Technical Conference. 2023. pp. 96-98. // https://www.elibrary.ru/item.asp?id=53802685 (in Russian).
  135. V.V. Nikolaev, I.B. Saenko. The approach to modelling of special purpose single information space // In the collection: The current state and prospects for the development of infocommunication networks for special purposes. Collection of materials of the scientific and practical conference. Saint Petersburg, 2023. pp. 88-93. // https://www.elibrary.ru/item.asp?id=50469996 (in Russian).
  136. A.V. Udaltsov, D.D. Koryakin, I.B. Saenko. Synchronization of databases in military control systems // In the collection: The current state and prospects for the development of infocommunication networks for special purposes. Collection of materials of the scientific and practical conference. Saint Petersburg, 2023. pp. 81-87. // https://www.elibrary.ru/item.asp?id=50469995 (in Russian).
  137. A.V. Mikhaylichenko, I.B. Paraschuk, A.V. Seleznev. Analysis of the quality of the cybersecurity process and the effectiveness of the data center information protection system in conditions of uncertainty // In the collection: Technologies. Innovation. Connection. materials of the scientific and practical conference. St. Petersburg, 2023. pp. 186-191. // https://www.elibrary.ru/item.asp?id=54121138 (in Russian).
  138. S.A. Shinkarev, I.B. Paraschuk, V.A. Mikhaylichenko. Proactive expert control of the structural reliability of data transmission networks and mobile data centers for the collection and storage of electronic resources in the interests of engineering education // In the collection: Improving the training of engineering specialists in the context of innovative development of Russia. Problems and solutions. Materials of the International correspondence scientific-practical and scientific-methodical conference. St. Petersburg, Peterhof, 2023. pp. 502-509. // https://elibrary.ru/item.asp?id=54152103 (in Russian).
  139. E.S. Kryukova, I.B. Paraschuk. A system of content quality indicators within the framework of information support for the tasks of controlling military robotic complexes // In the collection: The state and prospects of development of modern science in the field of Robotics. Collection of articles of the V All-Russian Scientific and Technical Conference. Anapa, 2023. pp. 107-117. // https://www.elibrary.ru/item.asp?id=54730269 (in Russian).
  140. A.V. Seleznev, E.S. Kryukova, I.B. Paraschuk. Quality indicators of modern electronic educational resources within the information environment for the training of engineering personnel // In the collection: Modern trends in engineering education. Collection of materials of the Scientific and practical conference. St. Petersburg, 2023. pp. 320-324. // https://www.elibrary.ru/item.asp?id=54396346 (in Russian).
  141. A.V. Mikhaylichenko, N.V. Mikhaylichenko, I.B. Paraschuk. Problems of analyzing the effectiveness of the functioning of informatization tools and data centers in a modern engineering university // In the collection: Modern trends in engineering education. Collection of materials of the Scientific and practical conference. St. Petersburg, 2023. pp. 249-253. // https://www.elibrary.ru/item.asp?id=54396332 (in Russian).
  142. I.B. Paraschuk, V.A. Baboshin, A.V. Mikhailichenko. Innovative attractiveness of data centers for storing and processing digital educational resources in a single information space for training engineering specialists // In the collection: Improving the training of engineering specialists in the context of innovative development of Russia. Problems and solutions, materials of the International correspondence scientific-practical and scientific-methodical conference. St. Petersburg, Peterhof, 2023. pp. 471-477. // https://www.elibrary.ru/item.asp?id=54152099 (in Russian).
  143. I.B. Paraschuk, V.A. Baboshin, I.S. Kovalev. Basic functionality and experience of using digital libraries in the information space for training engineering specialists // In the collection: Improving the training of engineering specialists in the context of innovative development of Russia. Problems and solutions. materials of the international correspondence scientific-practical and scientific-methodical conference. St. Petersburg, Peterhof, 2023. pp. 405-410. // https://www.elibrary.ru/item.asp?id=54152075 (in Russian).
  144. I.B. Paraschuk, A.V. Mikhailichenko. Predicting the accident rate of mobile data centers for special purposes using algorithms for proactive assessment of technical reliability indicators // In the collection: Technologies. Innovation. Connection. materials of the scientific and practical conference. St. Petersburg, 2023. pp. 356-361. // https://www.elibrary.ru/item.asp?id=54121190 (in Russian).
  145. I.B. Paraschuk, V.A. Sundukov. Stages of development of models and methods of multi-factor authentication of users as elements of the policy of differentiation of access rights to the resources of infocommunication networks // In the collection: Current problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 vols .. St. Petersburg, 2023. pp. 833-837. // https://www.elibrary.ru/item.asp?id=54033716 (in Russian).
  146. I.B. Paraschuk, V.A. Sayarkin,A.V. Seleznev. Analysis and general classification of cybersecurity risks for document management automation systems based on modern infocommunication networks // In the collection: Current problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 vols .. St. Petersburg, 2023. pp. 828-832.// https://www.elibrary.ru/item.asp?id=54033715 (in Russian).
  147. A.V. Mikhaylichenko, I.B. Paraschuk. Procedures for granular selection of analyzed parameters of technical reliability of modern disk storage systems // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 vols .. St. Petersburg, 2023. pp. 799-803. // https://www.elibrary.ru/item.asp?id=54033709 (in Russian).
  148. A.V. Mikhaylichenko, I.B. Paraschuk, O.I. Pantyukhin. A variant of the formulation of probabilistic partial and complex indicators of the technical reliability of mobile data centers // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 vols .. St. Petersburg, 2023. pp. 795-799. // https://www.elibrary.ru/item.asp?id=54033708 (in Russian).
  149. E.S. Kryukova, A.A. Smirnov, I.B. Paraschuk. Software tools for infocommunication networks and data storage systems: fuzzy identification of vulnerabilities // In the collection: Current problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 vols .. St. Petersburg, 2023. pp.719-723. // https://www.elibrary.ru/item.asp?id=54033687 (in Russian).
  150. I.S. Kovalev, I.B. Paraschuk, A.A. Smirnov. Analysis of the main characteristics of the quality of software for managing modern infocommunication networks // In the collection: Current problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 vols .. St. Petersburg, 2023. pp. 645-649. // https://www.elibrary.ru/item.asp?id=54033661 (in Russian).
  151. A.E. Derkach, A.V. Mikhailichenko, I.B. Paraschuk. The current state of methods for analyzing the effectiveness of storage and backup systems for data centers // In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 vols .. St. Petersburg, 2023. pp. 394-398. // https://www.elibrary.ru/item.asp?id=54033607 (in Russian).
  152. I.B. Paraschuk, A.V. Mikhailichenko, Ya.A. Dombrovsky. The use of granular computing in the tasks of assessing information security and reliability of mobile military data centers // In the collection: The state and prospects of development of modern science in the field of "IT technologies". Proceedings of the II All-Russian Scientific and Technical Conference. Anapa, 2023. pp. 184-194. // https://www.elibrary.ru/item.asp?id=53753290 (in Russian).
  153. A.E. Derkach, I.B. Paraschuk, M.I. Rafalskaya, A.N. Zyuzin. Issues and reasons of developing a methodology for assessing the quality of communication networks and switching systems in the interests of data exchange for backup between data centers // In the collection: The current state and prospects for the development of information and communication networks for special purposes. Collection of materials of the scientific and practical conference. St. Petersburg, 2023. pp. 49-55. // https://www.elibrary.ru/item.asp?id=50469991 (in Russian).
  154. E.S. Kryukova, I.B. Paraschuk, P.G. Romanenko, E.V. Sarafannikov. Qualimetry and basic concepts of monitoring communication networks and switching systems used when subscribers access electronic educational resources // In the collection: The current state and prospects for the development of information and communication networks for special purposes. Collection of materials of the scientific and practical conference. St. Petersburg, 2023. pp. 42-48.// https://www.elibrary.ru/item.asp?id=50469990 (in Russian).
  155. N.V. Mikhaylichenko, A.V. Mikhaylichenko, I.B. Paraschuk. On the issue of the range of services provided to subscribers by stationary and mobile data centers using communication networks and public switching systems // In the collection: The current state and prospects for the development of information and communication networks for special purposes. Collection of materials of the scientific and practical conference. St. Petersburg, 2023. pp. 28-34. // https://elibrary.ru/item.asp?id=50469988 (in Russian).
  156. Udaltsov A.V., Saenko I.B., Renskov D.A. On the issue of updating the value of stored data in information systems // In the collection: Information management, telecommunication systems, means of destruction and their technical support. Collection of scientific articles based on the materials of the V All-Russian interdepartmental Scientific and Technical Conference. Penza, 2023. pp. 172-180.// https://elibrary.ru/item.asp?id=55996665 (in Russian).
  157. I.V. Kotenko, I.B. Saenko, O.S. Lauta, N.A. Vasiliev, V.E. Sadovnikov. An approach to detecting attacks on machine learning systems using a generative-adversarial network // In the collection: The Twenty-first National Conference on Artificial Intelligence with International Participation (CII-2023). Proceedings of the conference. In 2 volumes. Smolensk, 2023. pp. 366-376.// https://elibrary.ru/item.asp?id=56574854 (in Russian).
  158. H. Dong, I. Kotenko. Enhancing IoT security through convolutional variational autoencoders and resampling techniques with GAN // XXI National Conference on Artificial Intelligence with International Participation (KII-2023). Proceedings of the conference. 2023. 1. pp. 316-328 // https://www.elibrary.ru/item.asp?id=56574849 (in Russian).
  159. V.A. Baboshin, I.B. Paraschuk, I.S. Kovalev. On the issue of quality analysis of distributed railway automation, telemechanics and communication systems under conditions of uncertainty of initial data // Complex technologies in mechanics and transport construction: materials of the II All-Russian scientific and practical conference "Complex technologies in mechanics and transport construction", dedicated to the memory of Professor G.N.. Gavrilova (December 14, 2023). 2023. pp. 101-110 (in Russian).
  160. V.A. Baboshin, I.B. Paraschuk, E.S. Kryukova. Multi-criteria analysis of the effectiveness of the system of maintenance and repair of facilities and complexes of railway automation, telemechanics and communications // Complex technologies in mechanics and transport construction: materials of the II All-Russian scientific and practical conference "Complex technologies in mechanics and transport construction", dedicated to the memory of Professor G.N. Gavrilova (December 14, 2023). 2023. pp. 111-118 (in Russian).
  161. V.A. Baboshin, A.V. Mikhailichenko, I.B. Paraschuk. Models for current and predictive control of reliability, durability and maintainability of railway automation, telemechanics and communication systems// Complex technologies in mechanics and transport construction: materials of the II All-Russian scientific and practical conference "Complex technologies in mechanics and transport construction", dedicated to the memory of Professor G.N. Gavrilov (December 14, 2023). 2023. pp. 266-273 (in Russian).
  162. L.A. Vitkova. The model of information attacks in the media space //In the collection: Actual problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 vols .. St. Petersburg, 2023. pp. 265-268. // https://www.elibrary.ru/item.asp?id=54033579 (in Russian).
  163. K.E. Izrailov, N.A. Ponomarev, E.V. Tarkhov. Analysis of time series forecasting models for predicting trends in the development of information security threats // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbSUT. 2023. 1. pp. 572-577 // https://www.elibrary.ru/item.asp?id=54033645 (in Russian).
  164. K.E. Izrailov, I.V. Umaraliev. A hypothetical method of recovery of machine code architecture modules to identify high-level vulnerabilities // Actual problems of infotelecommunications in science and education (APINO-2023). XII International Scientific, technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 577-581 // https://elibrary.ru/item.asp?id=54033646&pff=1 (in Russian).
  165. L.A. Vitkova, A.M. Leshukova. Detection of objects in images // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 272-275 // https://elibrary.ru/item.asp?id=54033828&pff=1 (in Russian).
  166. K.E. Izrailov, A.Yu. Yaroshenko. Investigation of the machine learning opportunities for automatic ranking of vulnerabilities according to their text description // Actual problems of infotelecommunications in science and education (APINO-2023). XII International Scientific, technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 586-590 // https://elibrary.ru/item.asp?id=54033648&pff=1 (in Russian).
  167. K.N. Zhernova, A.A. Chechulin. Methods for searching for vulnerabilities in the unmanned transport environment of the "smart city" // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 500-504 // https://elibrary.ru/item.asp?id=54033630&pff=1 (in Russian).
  168. I.B. Paraschuk, A.A. Chechulin. Neuro-fuzzy vulnerability detection method for monitoring the security of processes and means of human-intelligent system interaction within the framework of the "Smart Transport" concept // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 837-841 // https://elibrary.ru/item.asp?id=54033717&pff=1 (in Russian).
  169. K.E. Izrailov, E.I. Chasovskikh. Comparative analysis of security solutions from unauthorized software distribution // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbGUT. 2023. 1. pp. 581-586 // https://elibrary.ru/item.asp?id=54033647&pff=1 (in Russian).
  170. L.R. Elizarova, K.E. Izrailov. Classification of information security areas using categorical division // Actual problems of infotelecommunications in science and education (APINO-2023). XII International scientific-technical and scientific-methodological conference; collection of scientific articles in 4 volumes / Edited by S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbSUT. 2023. 1. pp. 475-479 // https://elibrary.ru/item.asp?id=54033624&pff=1 (in Russian).
  171. S.S. Khmyrov, I.V. Kotenko. The use of attack indicators for attribution of methods of compromise in the implementation of targeted attacks on critical infrastructure objects // Actual problems of infotelecommunications in science and education (APINO-2023). vol.3, XII International Scientific, technical and scientific-methodological Conference; collection of scientific articles in 4 volumes / Under. ed. S.I. Makarenko; comp. V.S. Elagin, E.A. Anikevich. – St. Petersburg: SPbSUT. 2023. 3. pp. 805-809 // https://elibrary.ru/item.asp?id=54609192&selid=54609653 (in Russian).
  172. L.A. Vitkova, A.L. Zrelova. Modern problems of personal data protection in the Russian Federation // In the collection: Current problems of infotelecommunications in science and education (APINO 2023). Collection of scientific articles. XII International Scientific-technical and scientific-methodical Conference. In 4 vols .. St. Petersburg, 2023. pp. 268-272.// https://elibrary.ru/item.asp?id=54033580&pff=1 (in Russian).
  173. V.A. Sayarkin, I.B. Paraschuk. Risks of information security of electronic document management through the channels of modern regional telecommunication networks // Regional informatics and information security. Collection of works. I'M SORRY. – St. Petersburg: 2023. issue 12. pp. 148-151 // https://elibrary.ru/item.asp?id=60025289 (in Russian).
  174. E.S. Kryukova, I.B. Paraschuk. The essence, goals and principles of optimal adaptive monitoring of the security and quality of the content of electronic educational resources available to users through telecommunication networks // Regional informatics and information security. Collection of works. I'M SORRY. – St. Petersburg: 2023. Issue 12. pp. 105-109 // https://elibrary.ru/item.asp?id=60025278&pff=1 (in Russian).
  175. A.V. Mikhaylichenko, I.B. Paraschuk, A.A. Seleznev. Formation of indicators for the current and proactive analysis of information security and technical reliability of mobile data centers // Regional Informatics and information security. Collection of works. I'M SORRY. – St. Petersburg: 2023. Issue 12. pp. 129-132 // https://elibrary.ru/item.asp?id=60025284&pff=1 (in Russian).
  176. E.S. Novikova, M.D. Kuznetsov. A method for detecting anomalous activity and violations of security criteria and policies in real time // In the book: Information Security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 100-102.// https://elibrary.ru/item.asp?id=60024751 (in Russian).
  177. I.Yu. Zelichenok, I.V. Kotenko. Analysis of big data processing methods used to detect multi-step cyber attacks // In the book: Information Security of Russian regions (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 82-84.// https://elibrary.ru/item.asp?id=60024738 (in Russian).
  178. S.A. Golubev, E.S. Novikova. Design of a distributed intrusion detection system based on federated learning // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 71-72. // https://elibrary.ru/item.asp?id=60024729 (in Russian).
  179. V.A. Sayarkin, I.B. Paraschuk. Aspects of ensuring information security of document management automation systems, taking into account the risk analysis of their security // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 157-159.// https://elibrary.ru/item.asp?id=60024783 (in Russian).
  180. R.V. Yarovoy, I.B. Paraschuk. The interconnection of machine vision and information security // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 178-180.// https://elibrary.ru/item.asp?id=60024795 (in Russian).
  181. S.A. Shinkarev, I.B. Paraschuk. Tasks of synthesis of the topological structure of the data transmission network taking into account the parameters of information security // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 175-177.// https://elibrary.ru/item.asp?id=60024793 (in Russian).
  182. A.V. Mikhailichenko, I.B. Paraschuk, A.V. Seleznev. Information security and technical reliability of mobile data centers: an approach to the formation of indicators for current and proactive control // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 146-148.// https://elibrary.ru/item.asp?id=60024775 (in Russian).
  183. A.V. Meleshko. Construction of attack features for a self-organizing decentralized wireless sensor network// Information security of the regions of Russia // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. C. 93-95 // https://elibrary.ru/item.asp?id=60024746&pff=1 (in Russian).
  184. E.A. Ichetovkin, I.V. Kotenko. Models of attacks on machine learning components of intrusion detection systems for critical infrastructures // In the book: Information Security of Russian regions (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 87-88. // https://elibrary.ru/item.asp?id=60024741 (in Russian).
  185. K.N. Zhernova. Artificial neural network model for visual analysis of information security data //In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 79-80.// https://elibrary.ru/item.asp?id=60024736 (in Russian).
  186. D.S. Ivantsov, I.B. Saenko. On the development of a mathematical model of the process of operation of the information and security event management system // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 85-87.// https://elibrary.ru/item.asp?id=60024740 (in Russian).
  187. A.V. Meleshko. Approach to the role-based management of wireless sensor networks // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 95-97. // https://elibrary.ru/item.asp?id=60024748 (in Russian).
  188. E.S. Kryukova, I.B. Paraschuk. Content quality and safety indicftors electronic educational resources for the interest of training engineering specialists // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 135-136. // https://elibrary.ru/item.asp?id=60024768 (in Russian).
  189. P.V. Bortniker, I.B. Saenko. Application of methods of computer mathematics and multiscale analysis to detect intrusions into information systems // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 291-292. // https://elibrary.ru/item.asp?id=60024865 (in Russian).
  190. K.N. Zhernova. Problems of visual analysis of data in the field of information security using artificial neural networks // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 81-82. // https://elibrary.ru/item.asp?id=60024737 (in Russian).
  191. E.V. Fedorchenko, E.S. Novikova, A.S. Danilov. Designing cyber physical testbed to analyse cyber security // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 108-109.// https://elibrary.ru/item.asp?id=60024757 (in Russian).
  192. S.A. Verevkin, E.V. Fedorchenko. Development of the testbed for dynamic analysis of exploits // In the book: Information security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 70-71. // https://elibrary.ru/item.asp?id=60024728 (in Russian).
  193. E.V. Fedorchenko, A.A. Chechulin, I.B. Paraschuk. Investigation of computer incidents as a basis for operational analysis of cybersecurity and a source of source data for architectural components of information security risk management // In the book: Information Security of the regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 110-111.// https://elibrary.ru/item.asp?id=60024758 (in Russian).
  194. I.A. Popkov, I.V. Kotenko. Digital forensics data gathering for threat hunting purpose // In the book: Information Security of the regions of Russia (IBRD-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 103-104.// https://elibrary.ru/item.asp?id=60024753 (in Russian).
  195. I.V. Kotenko, I.B. Saenko, I.B. Paraschuk. Levels of architecture of components of operational assessment of security of information and telecommunication resources of critical infrastructure // In the book: Information security of regions of Russia (IBRR-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 88-90.// https://elibrary.ru/item.asp?id=60024742 (in Russian).
  196. V.A. Desnitsky. Analysis of modeling conditions of attacks in industrial water purification systems // Information security of the regions of Russia (IBRD-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 75-76 // https://elibrary.ru/item.asp?id=60024732&pff=1 (in Russian).
  197. M.D. Gorda, A.A. Chechulin. Review and systematization of relevant phishing attacks techniques // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 72-74 // https://elibrary.ru/item.asp?id=60024730&pff=1 (in Russian).
  198. V.A. Desnitsky. Detection of attacks on graph-based modeling of system states // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 76-77 // https://elibrary.ru/item.asp?id=60024733&pff=1 (in Russian).
  199. E.A. Donskov, I.V. Kotenko. Reputation and trust models for intelligent transport systems based on blockchain // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 77-78 //https://elibrary.ru/item.asp?id=60024734&pff=1 (in Russian).
  200. D.R. Valeev, I.V. Kotenko. Limitations and outlook for software runtime patching tools // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 69-70 // https://elibrary.ru/item.asp?id=60024727&pff=1 (in Russian).
  201. S.S. Khmyrov, I.V. Kotenko. Approach to forming the featuresof a target cyber attack for atribution of the cyber interrupter // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 112-114 // https://elibrary.ru/item.asp?id=60025211&pff=1 (in Russian).
  202. M.V. Melnik, I.V. Kotenko. Detection of abnormal behavior of users and entities in container systems based on machine learning methods // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 97-98 // https://elibrary.ru/item.asp?id=60024749&pff=1 (in Russian).
  203. L.A. Vitkova, A.L. Zrelova. Investigation of HYPER-V hypervisor security mechanisms // In the collection: Information security and protection of personal data. Problems and ways to solve them. Collection of materials and reports of the XV interregional scientific and practical conference. Under the general editorship of O.M. Golembiovskaya. Bryansk, 2023. pp. 49-53.// https://elibrary.ru/item.asp?id=54133019 (in Russian).
  204. I.V. Kotenko, I.B. Paraschuk, I.B. Saenko. Control of information security of cyberphysical systems based on hybrid neural network filtering // in the collection: Promising directions for the development of domestic information technologies. Materials of the I All-Russian scientific and practical conference. Sevastopol, 2023. pp. 195-199 // https://elibrary.ru/download/elibrary_73085083_25266549.pdf // https://elibrary.ru/item.asp?id=73085083 (in Russian).
  205. A.V. Udaltsov, I.B. Saenko. An approach to assessing the reliability of synchronization of information resources in an automated communication management system // In the collection: Problems of technical support of troops in modern conditions. Materials of the VIII interuniversity scientific and practical conference. St. Petersburg, 2023. pp. 139-143 // https://elibrary.ru/item.asp?id=67916987 (in Russian).
  206. A.V. Udaltsov, I.B. Saenko. Application of generative adversarial networks for database synchronization in special-purpose information systems // In the book: Information security of the regions of Russia (IBRD-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 170-171.// https://elibrary.ru/item.asp?id=60024789 (in Russian).
  207. S.A. Ryumina, I.B. Saenko. Machine learning-based anomalie detection method in sql queries // In the book: Information security of the regions of Russia (IBRD-2023). XIII St. Petersburg Interregional Conference. Conference materials. St. Petersburg, 2023. pp. 154-155.// https://elibrary.ru/item.asp?id=60024780 (in Russian).
  208. V.A. Sayarkin, I.B. Paraschuk, S.B. Nogin. Cybersecurity of automated document management systems: an approach to typologizing potential risks // In the collection: Promising directions for the development of domestic information technologies. Materials of the IX All-Russian scientific and practical conference. Sevastopol, 2023. pp. 219-223.// https://elibrary.ru/item.asp?id=73085095 (in Russian).
  209. A.V. Seleznev, I.S. Kovalev, I.B. Paraschuk. On the issue of software quality for automated control of telecommunication networks // In the collection: Promising directions for the development of domestic information technologies. Materials of the IX All-Russian scientific and practical conference. Sevastopol, 2023. pp. 162-167.// https://elibrary.ru/item.asp?id=73085072 (in Russian).
  210. I.B. Paraschuk, L.A. Sankin, O.I. Pantyukhin. Methods of analyzing the effectiveness of information retrieval systems for data processing centers // In the collection: Promising directions for the development of domestic information technologies. Materials of the IX All-Russian scientific and practical conference. Sevastopol, 2023. pp. 157-161.// https://elibrary.ru/item.asp?id=73085068 (in Russian).
  211. I.B. Paraschuk, A.V. Mikhailichenko. Technological aspects and levels of proactive reliability control of mobile data processing centers // In the collection: Promising directions for the development of domestic information technologies. Materials of the IX All-Russian scientific and practical conference. Sevastopol, 2023. pp. 148-151.// https://elibrary.ru/item.asp?id=73085064 (in Russian).
  212. R.V. Yarovoy, I.B. Paraschuk, E.S. Kryukova. Machine vision and security control of the content of information educational resources // In the collection: Promising directions for the development of domestic information technologies. Materials of the IX All-Russian scientific and practical conference. Sevastopol, 2023. pp. 132-138.// https://elibrary.ru/item.asp?id=73085059 (in Russian).
  213. Vasily Desnitsky. Simulation Modeling of a Flotation Water Treatment System for Attack Evaluation // 2023 International Ural Conference on Electrical Power Engineering (UralCon). 2023. DOI: 10.1109/UralCon59258.2023.10291158

2022

  1. Elena Doynikova, Evgenia Novikova, Ivan Murenin, Maxim Kolomeec, Diana Gaifulina, Olga Tushkanova, Dmitry Levshun, Alexey Meleshko, Igor Kotenko. Security Measuring System for IoT Devices // Lecture Notes in Computer Science. 2022. Ò. 13106 LNCS. Ñ. 256-275. DOI: 10.1007/978-3-030-95484-0_16 // https://elibrary.ru/item.asp?id=48184836
  2. Igor Kotenko, Igor Saenko, Oleg Lauta, Michael Karpov, Ksenia Kribel. An approach to modeling of the security system of intelligent transport systems based on the use of flat graphs // Lecture Notes in Networks and Systems (LNNS). - 2022. - Vol. 330 LNNS. - pp. 440-451. DOI: 10.1007/978-3-030-87178-9_44 // https://elibrary.ru/item.asp?id=47026624
  3. Lidia Vitkova, Andrey Chechulin, Igor Kotenko. Feature selection for intelligent detection of targeted influence on public opinion in social networks // Proceedings of the Fifth International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’21). pp 421–430 // Lecture Notes in Networks and Systems. 2022. Ò. 330 LNNS. Ñ. 421-430. DOI: 10.1007/978-3-030-87178-9_42 // https://elibrary.ru/item.asp?id=47100014
  4. Ksenia Zhernova, Andrey Chechulin. Overview of vulnerabilities of decision support interfaces based on virtual and augmented reality technologies // Lecture Notes in Networks and Systems. 2022. Ò. 330 LNNS. Ñ. 400-409. DOI: 10.1007/978-3-030-87178-9_40 // https://books.google.ru/books?id=NkVDEAAAQBAJ&printsec=frontcover&hl=ru#v=onepage&q&f=false // https://elibrary.ru/item.asp?id=47105497
  5. Sergei Sokolov, Oleg Lauta, Igor Saenko, Michael Mitrofanov, Oleg Lepeshkin. Analytical modeling of computer attacks on intelligent transport systems based on the transformation of stochastic networks // Lecture Notes in Networks and Systems. 2022. Ò. 330 LNNS. Ñ. 489-498. DOI: 10.1007/978-3-030-87178-9_49 // https://elibrary.ru/item.asp?id=47056456
  6. Evgenia Novikova, Diana Gaifulina, Elena Doynikova, Igor Kotenko. Construction and Analysis of Integral User-Oriented Trustworthiness Metrics // Electronics 2022, 11(2), 234, Ïîðÿäêîâûé íîìåð: 234. DOI: 10.3390/electronics11020234 // https://elibrary.ru/item.asp?id=48142369
  7. Alisa Vorobeva, Guldar Khisaeva, Danil Zakoldaev, Igor Kotenko. Detection of Business Email Compromise Attacks with Writing Style Analysis // Communications in Computer and Information Science. 2022. Ò. 1544. Ñ. 248-262. DOI: 10.1007/978-981-16-9576-6_18 // https://elibrary.ru/item.asp?id=48149726
  8. Dmitry Levshun, Andrey Chechulin and Igor Kotenko. A Technique for the Design of Abstract Models of Microcontroller-Based Physical Security Systems // Studies in Computational Intelligence. Springer, Cham. Vol. 1026. P. 397-406. DOI: 10.1007/978-3-030-96627-0_36. // https://elibrary.ru/item.asp?id=48587927
  9. Igor Kotenko, Konstantin Izrailov, Michael Buinevich. Static analysis of information systems for iot cyber security: a survey of machine learning approaches // Sensors. 2022. Vol. 22. ¹ 4, Ïîðÿäêîâûé íîìåð: 1335. DOI: 10.3390/s22041335 // https://elibrary.ru/item.asp?id=48149031
  10. Igor Kotenko, Konstantin Izrailov, Michael Buinevich. Analytical modeling for identification of the machine code architecture of cyberphysical devices in smart homes // Sensors. 2022. Ò. 22. ¹ 3. Serial number: 1017, DOI: 10.3390/s22031017 // https://elibrary.ru/item.asp?id=48145501
  11. Igor Kotenko,Igor Saenko, Oleg Lauta, A. Kribel. Ensuring the survivability of embedded computer networks based on early detection of cyber attacks by integrating fractal analysis and statistical methods // Microprocessors and Microsystems. 2022. Ò. 90. Ñ. 104459. DOI: 10.1016/j.micpro.2022.104459 // https://elibrary.ru/item.asp?id=48145751
  12. M. Kuznetsov, Evgenia Novikova, Igor Kotenko, Elena Doynikova. Privacy policies of iot devices: collection and analysis // Sensors. 2022. Ò. 22. ¹ 5, Ïîðÿäêîâûé íîìåð: 1838. DOI: 10.3390/s22051838 // https://elibrary.ru/item.asp?id=48183588
  13. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Multi-aspect based approach to attack detection in iot clouds // Sensors. 2022. Ò. 22. ¹ 5, Ïîðÿäêîâûé íîìåð: 1831. DOI: 10.3390/s22051831 https://www.elibrary.ru/item.asp?id=48184560
  14. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Security and privacy analysis of smartphone-based driver monitoring systems from the developer’s point of view // Sensors. 2022. Ò. 22. ¹ 13, P. 5063. DOI: 10.3390/s22135063 // https://elibrary.ru/item.asp?id=49158277
  15. Igor Kotenko, Igor Saenko, Igor Parashchuk, Elena Doynikova. An approach for selecting countermeasures against harmful information based on uncertainty management // Computer Science and Information Systems. 2022. Ò. 19. ¹ 1. Ñ. 415-433. DOI: 10.2298/CSIS210211057K // https://www.elibrary.ru/item.asp?id=48188266
  16. Igor Kotenko, Vladimir Avramenko, Albert Malikov, Igor Saenko. An approach to the synthesis of a neural network system for diagnosing computer incidents // Studies in Computational Intelligence. 2022. Ò. 1026. Ñ. 407-416. DOI: 10.1007/978-3-030-96627-0_37 // https://www.elibrary.ru/item.asp?id=48584416
  17. Roman Kryukov, Elena Doynikova, Igor Kotenko. Security analysis of information systems based on attack sequences generation and testing // Studies in Computational Intelligence. 2022. Ò. 1026. Ñ. 427-437. DOI:10.1007/978-3-030-96627-0_39 // https://elibrary.ru/item.asp?id=48590774
  18. Konstantin Izrailov, Dmitry Levshun, Igor Kotenko, Andrey Chechulin. Classification and analysis of vulnerabilities in mobile device infrastructure interfaces // Communications in Computer and Information Science. 2022. Ò. 1544. Ñ. 301-319. DOI: 10.1007/978-981-16-9576-6_21 // https://elibrary.ru/item.asp?id=48149713
  19. Igor Kotenko, Diana Gaifulina, I. Zelichenok. Systematic literature review of security event correlation methods // IEEE Access. 2022. Ò. 10. Ñ. 43387-43420. DOI: 10.1109/ACCESS.2022.3168976 // https://elibrary.ru/item.asp?id=48581809
  20. Igor Kotenko, Igor Parashchuk. Construction of membership functions for fuzzy management of security information and events // Studies in Systems, Decision and Control. 2022. Ò. 417. Ñ. 99-110. DOI: 10.1007/978-3-030-95116-0_8 // https://www.elibrary.ru/item.asp?id=48426113
  21. Alexey Kashevnik, Ardalyon Ponomarev, Nikolay Shilov, Andrey Chechulin. Threats detection during human-computer interaction in driver monitoring systems // Sensors. 2022. Ò. 22. ¹ 6. Ïîðÿäêîâûé íîìåð: 2380 DOI: 10.3390/s22062380 // https://elibrary.ru/item.asp?id=48193047
  22. Desnitsky V. Decentralized role-based secure management in wireless sensor networks // Lecture Notes in Networks and Systems. 2022. Ò. 424. Ñ. 51-58. DOI: 10.1007/978-3-030-97020-8_6. https://www.elibrary.ru/item.asp?id=48584383
  23. E. Novikova, E. Doynikova, S. Golubev. Federated learning for intrusion detection in the critical infrastructures: vertically partitioned data use case // Algorithms. 2022. Ò. 15. ¹ 4. Ïîðÿäêîâûé íîìåð: 104. DOI: 10.3390/a15040104 // https://elibrary.ru/item.asp?id=48426412
  24. E. Novikova, D Fomichov, I. Kholod, E. Filippov. Analysis of privacy-enhancing technologies in open-source federated learning frameworks for driver activity recognition // Sensors. 2022. Ò. 22. ¹ 8. Ïîðÿäêîâûé íîìåð: 2983. DOI: 10.3390/s22082983 // https://www.elibrary.ru/item.asp?id=48428290
  25. A. Shulepov, Evgenia Novikova, I. Murenin. Approach to anomaly detection in cyber-physical object behavior // Studies in Computational Intelligence. 2022. Ò. 1026. Ñ. 417-426. DOI: 10.1007/978-3-030-96627-0_38 // https://www.elibrary.ru/item.asp?id=48584759
  26. Ksenia Namyatova, Lidia Vitkova, Andrey Chechulin. An approach to automated assessment of the image of a territorial entity in the media discourse of a foreign states // Studies in Computational Intelligence. 2022. Ò. 1026. Ñ. 215-224. DOI: 10.1007/978-3-030-96627-0_20 // https://elibrary.ru/item.asp?id=48585256
  27. Alexey Meleshko, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova. Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems // Water. 2022. Ò. 14. ¹ 15. P. 2342. DOI: 10.3390/w14152342 // https://elibrary.ru/item.asp?id=56235923
  28. Igor Kotenko, Igor Saenko, Oleg Lauta, Alexander Kribel. A Proactive Protection of Smart Power Grids against Cyberattacks on Service Data Transfer Protocols by Computational Intelligence Methods // Sensors. 2022. Ò. 22. ¹ 19. Ñ. 7506. DOI: 10.3390/s22197506 // https://www.elibrary.ru/item.asp?id=56872885
  29. Igor Kotenko, Elena Doynikova, Andrey Fedorchenko, Vasily Desnitsky. Automation of Asset Inventory for Cyber Security: Investigation of Event Correlation-Based Technique // Electronics. 2022. Ò. 11. ¹ 15. Ñ. 2368. DOI: 10.3390/electronics11152368 // https://elibrary.ru/item.asp?id=56069940
  30. Roman Kryukov, Vladimir Zima, Elena Doynikova, Evgenia Novikova. Mapping the Security Events to the MITRE ATT &CK Attack Patterns to Forecast Attack Propagation (Extended Abstract) // In book: Attacks and Defenses for the Internet-of-Things. 5th International Workshop, Idiot 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers. Lecture Notes in Computer Science, Vol.13745. 2022. Springer, Cham., Vol.13745. P.165-176. DOI:10.1007/978-3-031-21311-3_10
  31. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Simulation-based and Graph oriented Approach to Detection of Network Attacks // Conference: 2022 11th Mediterranean Conference on Embedded Computing (MECO), P.436-439. DOI:10.1109/MECO55406.2022.9797159
  32. Elena Doynikova, Evgenia Novikova, Anton Shulepov. Comparative review of the intrusion detection systems based on federated learning: advantages and open challenges // Algorithms. 2022. Ò. 15. ¹ 7. Ñ. 247. DOI: 10.3390/a15070247 // https://www.elibrary.ru/item.asp?id=57016209
  33. S.A. Golubev, EE.S. Novikova, E.V. Fedorchenko. Image-Based Approach to Intrusion Detection in Cyber-Physical Objects // Information (Switzerland). 2022. Ò. 13. ¹ 12. Ñ. 553. DOI: 10.3390/info13120553 // https://www.elibrary.ru/item.asp?id=59438213
  34. I. You, T.V. Youn, I. Kotenko, H. Kim, Palmieri F. Preface // Communications in Computer and Information Science. 2022. Ò. 1544. P. v-vi.// https://elibrary.ru/item.asp?id=48150381
  35. Dmitry Levshun, Olga Tushkanova, Andrey Chechulin. Active learning approach for inappropriate information classification in social networks // Proceedings of the 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP 2022). P. 283-289. DOI: 10.1109/PDP55904.2022.00050. // https://elibrary.ru/item.asp?id=48582978
  36. Vasily Desnitsky, Igor Kotenko, Igor Parashuk. Vector-based dynamic assessment of cyber-security of critical infrastructures // Â ñáîðíèêå: Proceedings of the 2022 Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2022. 2022. Ñ. 277-282. DOI: 10.1109/ElConRus54750.2022.9755836 // https://www.elibrary.ru/item.asp?id=48582045
  37. Igor Kotenko, Igor Saenko. Towards resilient and efficient big data storage: evaluating a siem repository based on hdfs // Â ñáîðíèêå: Proceedings - 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2022. 30. 2022. Ñ. 290-297. DOI: 10.1109/PDP55904.2022.00051 // https://elibrary.ru/item.asp?id=48582684
  38. M. Kuznetsov, Evgenia Novikova, Igor Kotenko. An approach to formal desription of the user notification scenarios in privacy policies // Â ñáîðíèêå: Proceedings - 30th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2022. 30. 2022. Ñ. 275-282. DOI: 10.1109/PDP55904.2022.00049 // https://elibrary.ru/item.asp?id=48583376
  39. Ksenia Namyatova, Lidia Vitkova, Andrey Chechulin. An approach to automated assessment of the image of a territorial entity in the media discourse of a foreign states // Proceedings of 14th International Symposium on Intelligent Distributed Computing - IDC'2021. Sep 16-18, 2022, Online Conference, Italy (WoS, Scopus, Ïåðå÷åíü ÂÀÊ, ÐÈÍÖ)
  40. Igor Kotenko, Igor Parashchuk. Description of Information Security Events of Production and Technological Systems Using Fuzzy Graphs // Conference: 2022 International Russian Automation Conference (RusAutoCon). P. 45-50. DOI:10.1109/RusAutoCon54946.2022.9896271
  41. Igor Kotenko, Igor Saenko, Oleg Lauta, Nikita Vasiliev. Attacks Against Artificial Intelligence Systems: Classification, The Threat Model and the Approach to Protection // In book: Proceedings of the Sixth International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’22) (pp.293-302). DOI:10.1007/978-3-031-19620-1_28
  42. Lidia Vitkova, Maxim Kolomeets, Andrey Chechulin. Taxonomy and Bot Threats in Social Networks // Conference: 2022 International Russian Automation Conference (RusAutoCon)At: Sochi, Russia. September 2022. PP. 814-819 // DOI:10.1109/RusAutoCon54946.2022.9896268 // file:///C:/Users/Admin/Downloads/094_v2_word_2019-2.pdf //http://dx.doi.org/10.1109/rusautocon54946.2022.9896268
  43. Igor Kotenko, Igor Saenko, Andrey Chechulin, Lidia Vitkova, Maxim Kolomeec, Igor Zelichenok, Maxim Melnik, Denis Makrushin, Nikita Petrevich. Detection of Anomalies and Attacks in Container Systems: An Integrated Approach Based on Black and White Lists. Lecture Notes in Networks and Systems, 2022, 566 LNNS, P. 107–117. DOI:10.1007/978-3-031-19620-1_11 // http://dx.doi.org/10.1007/978-3-031-19620-1_11
  44. Yu. Sineshchuk, A. Vostrykh, I. Saenko. Designing a human-machine interface based on the cognitive model of information systems users // International Russian Automation Conference. Proceedings 2022 International Russian Automation Conference (RusAutoCon). Danvers, MA, 2022. Ñ. 377-382. DOI: 10.1109/RusAutoCon54946.2022.9896356 // https://elibrary.ru/item.asp?id=54076713
  45. I.B. Parashchuk, V.A. Sayarkin, A.V. Mikhailichenko. Analysis of the basic principles and requirements for information security subsystems in electronic document management systems of data centers // World science: problems and innovations. LXVII Ìåæäóíàðîäíîé íàó÷íî-ïðàêòè÷åñêîé êîíôåðåíöèè. Ïåíçà, 2022. P. 30-32. // https://www.elibrary.ru/item.asp?id=49353664
  46. I. Pestov, L. Vitkova. Methodology for Detecting Anomaly and Attack on Cloud Infrastructure Instances // Proceedings of the Sixth International Scientific Conference "Intelligent Information Technologies for Industry" (IITI'22). - Cham: Springer International Publishing, 2022. - P. 131-141 // Lecture Notes in Networks and Systems, vol 566. Springer, Cham. https://doi.org/10.1007/978-3-031-19620-1_13
  47. Sergei Adadurov, Alexandr Glukhov, Igor Kotenko, Igor Saenko. Intelligent information security services // Automation, communications, computer science. 2022. No. 3. pp. 27-30. DOI: 10.34649/AT.2022.3.3.004 // https://elibrary.ru/item.asp?id=48174328 (in Russian).
  48. Ilya Bystrov, Igor Kotenko. Analysis of insider threat detection methods tested on CERT dataset // Informatization and Communication. 2022. No. 1. pp. 7-12. DOI: 10.34219/2078-8320-2022-13-1-7-12 // https://elibrary.ru/item.asp?id=48316434 (in Russian).
  49. Igor Kotenko, Igor Saenko I.B., Andrey Chechulin, Dmitry Levshun, Sergei Bosyakov, Victor Kochin. The problem of using mobile robotic devices for perimeter monitoring: research analysis and solution approach // Informatization and Communication. 2022. No. 3. pp. 7-14. DOI: 10.34219/2078-8320-2022-13-3-7-14 // https://elibrary.ru/item.asp?id=49389505 (in Russian).
  50. Anton Chudakov, Konstantin Izrailov, Igor Kotenko I.V. Discussion paper: forecasting the possibilitiesof non-euclidan geometry in information security // Informatization and Communications. 2022. No. 3. pp. 15-21. DOI: 10.34219/2078-8320-2022-13-3-15-21 // https://elibrary.ru/item.asp?id=49389506 (in Russian).
  51. Alexandr Branitsky, Yash Sharma, Igor Kotenko, Elena Fedorchenko, Andrey Krasov, Igor Ushakov. Determination of the mental state of users of the social network reddit based on machine learning methods // Information and control systems. 2022. No. 1 (116). pp. 8-18. DOI: 10.31799/1684-8853-2022-1-8-18 // https://elibrary.ru/item.asp?id=48100847 (in Russian).
  52. Igor Kotenko, Igor Paraschuk. Information and telecommunication resources of critical infrastructures: features of interval security analysis // Bulletin of the Astrakhan State Technical University. Series: Management, Computer Engineering and Computer Science. 2022. No. 2. pp. 33-40. DOI: 10.24143/2073-5529-2022-2-33-40 // https://www.elibrary.ru/item.asp?id=48336486 (in Russian).
  53. Igor Kotenko, Igor Saenko, Mazen Hamed Al-Barry. Application of artificial neural networks to reveal abnormal behavior of data center users // Questions of cybersecurity. 2022. No. 2 (48). pp. 87-97. DOI: 10.21681/2311-3456-2022-2-87-97 // https://elibrary.ru/item.asp?id=48417757 (in Russian).
  54. Igor Kotenko, Semyon Khmyrov. Analysis of models and techniques used for attribution of cyber security violators in the implementation of targeted attacks // Questions of cybersecurity. 2022. No. 4 (50). pp. 52-79. DOI: 10.21681/2311-3456-2022-4-52-79 // https://elibrary.ru/item.asp?id=49326500 (in Russian).
  55. Igor Kotenko, Igor Paraschuk. Interval analysis of the security of telecommunications resources of critical infrastructures // Mathematical methods in technologies and engineering. 2022. No. 1. pp. 64-67. DOI: 10.52348/2712-8873_MMTT_2022_1_64 // https://www.elibrary.ru/item.asp?id=48212144 (in Russian).
  56. Andrey Chechulin. The elements of the methodology for information security and information protection in computer networks // Informatization and communication. 2022. No. 3. pp. 27-30. DOI: 10.34219/2078-8320-2022-13-3-27-30 // https://elibrary.ru/item.asp?id=49389508 (in Russian).
  57. Vasily Desnitsky. Machine learning-based detection of denial-of-sleep attacks in wireless sensor networks // Izvestiya SPbSETU LETI. 2022. No. 5/6. pp. 32-40. DOI: 10.32603/2071-8985-2022-15-5/6-32-40 // https://elibrary.ru/item.asp?id=48763628 (in Russian).
  58. Igor Saenko, Oleg Lauta, Nikita Vasiliev, Ksenia Krebel. Threat model of decision support systems based on artificial intelligence elements // Telecommunication. 2022. No. 5. pp. 33-38. DOI: 10.34832/ELSV.2022.30.5.005 // https://elibrary.ru/item.asp?id=48848296 (in Russian).
  59. Igor Saenko, Yuriy Kondrashov, Igor Strelkov. Algorithm for estimating the suitability of frequencies taking into account information on the set of signal and interference parameters // Information and Cosmos. 2022. No. 1. pp. 6-12. // https://www.elibrary.ru/item.asp?id=48205353 (in Russian).
  60. Igor Saenko, Vladimir Nikolaev. An approach to the construction of an optimal scheme for the information resources distribution in a common information space // Proceedings of TSNIIS. St. Petersburg Branch. 2022. Vol. 1. No. 13. pp. 65-68. // https://elibrary.ru/item.asp?id=49204513 (in Russian).
  61. Igor Saenko, Mazen Hamed Al-Barry. Detection of sql attacks on data centers based on the application of binary classifiers // Proceedings of the Central Research Institute. St. Petersburg Branch. 2022. Vol. 1. No. 13. pp. 69-73. // https://elibrary.ru/item.asp?id=49204514 (in Russian).
  62. Mazen Hamed Al-Barry, Igor Saenko. Formation and use of a feature space for detecting abnormal sql queries by machine learning methods // Methods and technical means of ensuring information security. 2022. No. 31. pp. 159-160. // https://www.elibrary.ru/item.asp?id=48803029 (in Russian).
  63. Anton Mikhaylichenko, Igor Paraschuk. Synthesis of a system of reliability indicators for mobile data centers using granular computing methods // Information and Cosmos. 2022. No. 1. pp. 45-52. // https://www.elibrary.ru/item.asp?id=48205358 (in Russian).
  64. Anton Mikhaylichenko, Igor Paraschuk. Elements of fuzzy-granular computing in application to the tasks of analyzing the technical reliability of distributed data processing systems // Caspian Journal: Management and High technologies. 2022. No. 1 (57). pp. 77-84. DOI: 10.54398/2074-1707_2022_1_77 // https://elibrary.ru/item.asp?id=48172504 (in Russian).
  65. Igor Paraschuk., Anton Mikhailichenko, Sergei Nogin. Formation of a set of estimated parameters of technical reliability of mobile data centers // Synchronization systems, signal generation and processing. 2022. Vol. 13. No. 4. pp. 34-39. // https://elibrary.ru/item.asp?id=48401109 (in Russian).
  66. Igor Paraschuk, A. Khodunov, Anton Mikhailichenko. Decision support system for data center reliability analysis tasks // Proceedings of the Central Research Institute. St. Petersburg Branch. 2022. Vol. 1. No. 13. pp. 12-19 // https://elibrary.ru/item.asp?id=49204507 (in Russian).
  67. V. Sundukov, Igor Paraschuk, V. Sayarkin, A. Khodunov A.A. Requirements for procedures and components for eliminating uncertainty in the assessment and categorization of access subjects for multi-factor authentication of users of distributed data processing and storage system // Proceedings of the Central Research Institute. St. Petersburg Branch. 2022. Vol. 1. No. 13. pp. 20-29 // https://elibrary.ru/item.asp?id=49204508 (in Russian).
  68. Anton Mikhaylichenko, Igor Paraschuk. The task of analyzing the technical reliability of distributed information processing systems using fuzzy-granular methods // Mathematical methods in technologies and engineering. 2022. No. 1. pp. 60-63. DOI: 10.52348/2712-8873_MMTT_2022_1_60 // https://elibrary.ru/item.asp?id=48212142 (in Russian).
  69. Igor Parashchuk., Dmitry Salyuk. Analysis of the features and role of modern "end-to-end" digital technologies in the construction and improvement of communication equipment and control automation of special purpose // Communication equipment. 2022. No. 2 (158). pp. 13-21. // https://elibrary.ru/item.asp?id=49487895 (in Russian).
  70. M. Kuznetsov, Eugenia Novikova. The crawler forming the dataset of user agreements for the use of personal data // Izvestiya SPbGETU LETI. 2022. No. 4. pp. 35-43. DOI: 10.32603/2071-8985-2022-15-4-35-43 // https://www.elibrary.ru/item.asp?id=48469048 (in Russian).
  71. A. Shulepov, Evgenia Novikova. Detection of anomalies in data flows from sensor networks by visual analysis methods // Methods and technical means of ensuring information security. 2022. No. 31. pp. 80-81 // https://elibrary.ru/item.asp?id=48802985 (in Russian).
  72. K.E. Izrailov, M.V. Buinevich, I.V. Kotenko, V.A. Desnitsky. Assessment and prediction of the complex objects state: application for information security // Issues of cybersecurity. 2022. No. 6 (52). pp. 2-21. DOI: 10.21681/23113456-6-2022-2-21 // https://elibrary.ru/item.asp?id=59158946 // https://elibrary.ru/item.asp?id=50329071 (in Russian).
  73. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov, N.E. Romanov. A method of variable classification of vulnerabilities in software code. Part 2. Automation based on machine learning // Automation in industry. 2022. No. 4. pp. 49-55. DOI: 10.25728/avtprom.2022.04.10 // https://elibrary.ru/item.asp?id=48272977 (in Russian).
  74. K.N. Zhernova, A.A. Chechulin. Algorithms for assessing the securityof the human-computer interface //Informatization and Communication. 2022. No. 4. pp. 56-66. DOI: 10.34219/2078-8320-2022-13-4-56-66 // https://elibrary.ru/item.asp?id=49811423 (in Russian).
  75. E.V. Fedorchenko (Doynikova), E.S. Novikova, I.V. Kotenko, D.A. Gayfulina, O.N. Tushkanova, D.S. Levshun, A.V. Meleshko , I.N. Murenin, M.V. Kolomeets. The security and privacy measuring system for the internet of things devices // Cybersecurity issues. 2022. No. 5 (51). pp. 28-46. DOI: 10.21681/2311-3456-2022-5-28-46 // https://elibrary.ru/item.asp?id=50310106 (in Russian).
  76. S. E. Adadurov, I.V. Kotenko, I.B. Saenko. An àpproach to big data storage stability and efficiency // Automation, communications, Informatics. 2022. No. 12. pp. 19-21. DOI: 10.34649/AT.2022.12.12.004 // https://www.elibrary.ru/item.asp?id=50139459 (in Russian).
  77. A.V. Meleshko. Models and methods for proactive monitoring of the state of wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2022. No. 1. pp. 52-58. DOI: 10.46418/2079-8199_2022_1_8 // https://elibrary.ru/item.asp?id=49266278 (in Russian).
  78. V.A. Desnitskiy. Modeling and visual analysis of denial-of-sleep attacks in wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2022. No. 3. pp. 14-21. DOI: 10.46418/2079-8199_2022_3_2 // https://elibrary.ru/item.asp?id=49835297 (in Russian).
  79. D.S. Levshun. Approach for road surface quality monitoring based on intellectual analysis of smartphone’s sensors data // Informatization and Communication. 2022. No. 5. pp. 67-72. DOI: 10.34219/2078-8320-2022-13-5-67-72 // https://elibrary.ru/item.asp?id=49831802 (in Russian).
  80. D.A. Levshun. Model of combined application of intelligent methods of correlation of information security events // News of higher educational institutions. Instrumentation. 2022. Vol. 65. No. 11. pp. 833-841. DOI: 10.17586/0021-3454-2022-65-11-833-841 // https://elibrary.ru/item.asp?id=49958781 (in Russian).
  81. K.N. Zhernova. Models of human-computer interface in the field of information security //Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2022. No. 4. pp. 24-31. DOI: 10.46418/2079-8199_2022_4_4 // https://elibrary.ru/item.asp?id=50432296 (in Russian).
  82. A.A. Branitsky. Comparative analysis of mathematical models of military operations // Scientific problems of material and technical support of the Armed Forces of the Russian Federation. 2022. No. 1 (23). pp. 8-14. // https://elibrary.ru/item.asp?id=48273232 (in Russian).
  83. I.V. Kotenko, I.B. Saenko, O.S. Lauta, A.M. Krivel. Anomaly and cyber attack detection technique based on the integration of fractal analysis and machine learning methods // Informatics and Automation. 2022. Vol. 21. No. 6. pp. 1328-1358. DOI: 10.15622/ia.21.6.9 // https://elibrary.ru/item.asp?id=49803813 (in Russian).
  84. I.B. Sayenko, A.V. Udaltsov, A.V. Ermakov. Analysis of the problem of local database synchronization in a distributed information system // Proceedings of the Scientific Research Institute of Radio. 2022. No. 4. pp. 37-41. DOI: 10.34832/NIIR.2022.11.4.004 // https://elibrary.ru/item.asp?id=50000560 (in Russian).
  85. I.B. Saenko, S.E. Totsky, D.V. Volkov, A.V. Ermakov. Methods to improve the noise immunity of multiphase group sequences resulting from nonlinear code multiplexing //Telecommunication. 2022. No. 10. pp. 57-62. DOI: 10.34832/ELSV2022.35.10.009 // https://elibrary.ru/item.asp?id=49952829 (in Russian).
  86. I.V. Kotenko, I.B. Saenko, V.P. Kochin. Supercomputing-based cybersecurity event analytical processing system: construction conception // Informatization and Communication. 2022. No. 4. pp. 24-28. DOI: 10.34219/2078-8320-2022-13-4-24-28 // https://elibrary.ru/item.asp?id=49811418 (in Russian).
  87. I.B. Sayenko, A.A. Makukha, A.V. Ermakov. Choice of the method of information interaction in the corporate information space // Telecommunication. 2022. No. 11. pp. 57-59. DOI: 10.34832/ELSV2022.36.11.008 // https://www.elibrary.ru/item.asp?id=50006226 (in Russian).
  88. I.B. Sayenko, A.V. Vostrykh, Yu.I. Sineshchuk, A.V. Ermakov. Cognitive user model as the basis of man-machine interface for information systems of law enforcement agencies // Proceedings of the Scientific Research Institute of Radio. 2022. No. 4. pp. 46-54. DOI: 10.34832/NIIR.2022.11.4.006 // https://www.elibrary.ru/item.asp?id=50000562 (in Russian).
  89. I.B. Sayenko, D.S. Ivantsov, A.V. Ermakov. Big data storage sustainability model in a distributed file system // Proceedings of the Scientific Research Institute of Radio. 2022. No. 4. pp. 42-45. DOI: 10.34832/NIIR.2022.11.4.005 // https://www.elibrary.ru/item.asp?id=50000561 (in Russian).
  90. A.A. Chechulin. The fiasco of the state and ways to prevent it // Trends in the development of science and education. 2022. No. 86-5. pp. 70-73. DOI: 10.18411/tranio-06-2022-208 // https://www.elibrary.ru/item.asp?id=49232591 (in Russian).
  91. M.V. Kolomiets, L.A. Vitkova, O.N. Tushkanova, A.A. Chechulin. Experimental evaluation: can humans recognize social media bots? // Networks in the Global World 2022, - (2022).
  92. I.B. Paraschuk, A.N. Grigorchuk, A.V. Seleznev, A.V. Ermakov, A.V. Fedorov. Linear filtering in the implementation of procedures for interval assessment of the quality of functioning of electronic libraries // Proceedings of TSNIIS. St. Petersburg branch. 2022. vol. 2. No. 14. pp. 79-84. // https://elibrary.ru/item.asp?id=50137123 (in Russian).
  93. Paraschuk I.B., Romanenko P.G., Grigorchuk A.N., Seleznev A.V., Khodunov A.A. Model of the process of functioning of electronic libraries // Proceedings of the Central Research Institute. St. Petersburg branch. 2022. Vol. 2. No. 14. pp. 10-15. // https://elibrary.ru/item.asp?id=50137111 (in Russian).
  94. A.V. Mikhailichenko, I.B. Paraschuk. Reliability of data storage and processing components for control systems of ground-based robotic complexes for military purposes // Extreme robotics. 2022. Vol. 1. No. 1. pp. 109-114.// https://elibrary.ru/item.asp?id=49986984 (in Russian).
  95. Mikhailichenko A.V., Paraschuk I.B. Architecture of the system of proactive control of technical reliability of mobile data centers // I-methods. 2022. Vol. 14. No. 2.// https://elibrary.ru/item.asp?id=49867676 (in Russian).
  96. L.A. Vitkova, A.L. Matrelova, M.A. Spitsyn. Review and systematization of licenses, restrictions on distribution and copying // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and technical sciences. 2022. 4. pp. 46-51. DOI: 10.46418/2079-8199_2022_4_7 // https://www.elibrary.ru/item.asp?id=50432299 (in Russian).
  97. K. Izrailov, M. Buinevich, I. Kotenko, V. Desnitsky. Assessment and prediction of the complex objects state: applicatioin for information security // Voprosy Kiberbezopasnosti. 2022. ¹ 6(52). Ñ. 2-21. DOI: 10.21681/2311-3456-2022-6-2-21 // https://elibrary.ru/item.asp?id=59158946 (in Russian).
  98. I. Bystrov, Igor Kotenko. User behaviour model for insider threat detection in information systems of organizations // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 225-229 // https://elibrary.ru/item.asp?id=49522688 (in Russian).
  99. Diana Gajfulina, Igor Kotenko. Security event processing models in intelligent systems for monitoring and assessing the security of critical infrastructures // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 319-324. // https://elibrary.ru/item.asp?id=49522708 (in Russian).
  100. Diana Gaifulina, Igor Kotenko, Elena Fedorchenko. Sentiment analysis of social network posts for destructive impacts detection // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 324-328. // https://www.elibrary.ru/item.asp?id=49522709 (in Russian).
  101. Evgeniy Donskov, Igor Kotenko. Security analysis of SD-IOV-BLOCKCHAIN objects // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 423-428. // https://elibrary.ru/item.asp?id=49522729 (in Russian).
  102. I. Zelichenok, Igor Kotenko. Development of the bench architecture for testing the effectiveness of the multi-step attack detection module // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 483-492 // https://elibrary.ru/item.asp?id=49522744 (in Russian).
  103. Igor Kotenko, Vladimir Puchkov. Graph algorithms and platforms graph database management to ensure cybersecurity // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 609-613 // https://elibrary.ru/item.asp?id=49522774&pff=1 (in Russian).
  104. Igor Kotenko, S. Khmyrov. The model of compromising critical information infrastructure objects // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 614-619 // https://elibrary.ru/item.asp?id=49522776&pff=1 (in Russian).
  105. D. Vesnin, Andrey Chechulin. Detection of similar trademarks by analysis of the used color palette // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 255-259 // https://elibrary.ru/item.asp?id=49522694&pff=1 (in Russian).
  106. Ksenia Zhernova, Konstantin Izrailov, Maxim Kolomeets, Dmitry Levshun, Andrey Chechulin. Conceptual model of the "system-operator" interaction interface based on visualization technologies that take into account the human cognitive apparatus // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 460-463. // https://elibrary.ru/item.asp?id=49522737 (in Russian).
  107. Ksenia Zhernova,Andrey Chechulin. Methods for assessing the quality of human-computer interfaces for information security applications based on touch screens // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 466-469. // https://elibrary.ru/item.asp?id=49522740 (in Russian).
  108. Maxim Kolomiets, Andrey Chechulin. Visual model of the computer network attack graph // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 589-591 // https://elibrary.ru/item.asp?id=49522769 (in Russian).
  109. Igor Paraschuk, Andrey Chechulin. Fuzzy identification of vulnerabilities in the interfaces of the unmanned transport environment of the «smart city» // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 727-732. // https://www.elibrary.ru/item.asp?id=49522800 (in Russian).
  110. Alexey Meleshko, Vasily Desnitsky. Detecting attacks in self-organizing decentralized wireless sensor networks // In the collection: Mathematical and information modeling. materials of the All-Russian Conference of Young Scientists. Ministry of Science and Higher Education of the Russian Federation, Tyumen State University, Institute of Mathematics and Computer Science. Tyumen, 2022. pp. 276-281.// https://www.elibrary.ru/item.asp?id=49518839 (in Russian).
  111. Sergei Verevkin, Elena Fedorchenko. Analysis of security data sources for modeling and evaluating cyber attacks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 249-251. // https://elibrary.ru/item.asp?id=49522692 (in Russian).
  112. Alexandr Branitsky, À. Manukyan. Exploring the evolution of information protection mechanisms of the windows 11 operating system // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 183-187 // https://elibrary.ru/item.asp?id=49522679&pff=1 (in Russian).
  113. Georgy Abramenko, Lidia Vitkova, M. Melnik. Overview of tools for monitoring local information security events// In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 46-49 // https://elibrary.ru/item.asp?id=49522647&pff=1 (in Russian).
  114. Lidia Vitkova. An approach to detecting anomalies and attacks in container systems based on logs // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 259-263 // https://elibrary.ru/item.asp?id=49522695&pff=1 (in Russian).
  115. Lidia Vitkova. Algorithm for analysis of registration dates of commentators in the social network VK // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 263-266 // https://elibrary.ru/item.asp?id=49522696&pff=1 (in Russian).
  116. Lidia Vitkova, E. Edemskaya. Researching vulnerabilities of smart home system and methods of their detection // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 267-270 // https://elibrary.ru/item.asp?id=49522697&pff=1 (in Russian).
  117. Lidia Vitkova, A. Zrelova. Analysis of IPTV to detect pirated TV-channel content // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 270-274 // https://elibrary.ru/item.asp?id=49522698&pff=1 (in Russian).
  118. Lidia Vitkova, N. Krestiashin. Classification of SQL-injection threat sources // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 274-278 // https://elibrary.ru/item.asp?id=49522699&pff=1 (in Russian).
  119. Lidia Vitkova, Igor Paraschuk, Igor Saenko. Problems and features of analytical processing procedures for large arrays of heterogeneous data on cybersecurity events in infocommunication networks and systems // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 279-283. // https://elibrary.ru/item.asp?id=49522700 (in Russian).
  120. Ksenia Zhernova. Methods for assessing the security of human-computer interfaces for information security applications // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 456-459. // https://elibrary.ru/item.asp?id=49522736 (in Russian).
  121. Ksenia Zhernova, Maxim Kolomeets. Vulnerabilities of visual interfaces "system - operator" in an unmanned transport environment // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 463-466 // https://elibrary.ru/item.asp?id=49522739 (in Russian).
  122. Maxim Kolomeets. Informativity analysis of malicious bots features in social networks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 586-588 // https://www.elibrary.ru/item.asp?id=49522768 (in Russian).
  123. Dmitry Levshun. A tool for the expert evaluation of the text publications tonality // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 657-661. https://elibrary.ru/item.asp?id=49522784 (in Russian).
  124. Michael Biryukov, Anton Mikhailichenko, Vladimir Nikolaev, Igor Saenko. A genetic approach to optimizing the distribution of information resources in a single information space // In the collection: "Information Society technologies". Proceedings of the XVI International Industrial Scientific and Technical Conference. 2022. pp. 135-137.// https://elibrary.ru/item.asp?id=48465185 (in Russian).
  125. Igor Saenko, Mazen Hamed Al-Barry. Approach to detecting abnormal sql queries based on binary classification methods // In the collection: "Information Society technologies". Proceedings of the XVI International Industrial Scientific and Technical Conference. 2022. pp. 129-131. // https://www.elibrary.ru/item.asp?id=48465186 (in Russian).
  126. Mazen Hamed Al-Barry, Igor Saenko, S. Bushuev. An approach to monitoring abnormal actions of data center users using machine learning // In the collection: Actual problems of protection and security. Proceedings of the XXV All-Russian Scientific and Practical Conference. St. Petersburg, 2022. pp. 340-343. // https://www.elibrary.ru/item.asp?id=49249720 (in Russian).
  127. Vladimir Nikolaev, Igor Saenko, Michael Biryukov. Approach to the assessment of the security of the unified information space // In the collection: Current problems of protection and security. Proceedings of the XXV All-Russian Scientific and Practical Conference. St. Petersburg, 2022. pp. 343-345.// https://www.elibrary.ru/item.asp?id=49249721 (in Russian).
  128. Michael Biryukov, A. Makukha, Igor Saenko I.B. Comparative evaluation of options for organizing information interaction in a distributed control system // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 150-154. // https://www.elibrary.ru/item.asp?id=49522671 (in Russian).
  129. Michael Biryukov, Anton Mikhailichenko, Vladimir Nikolaev, Igor Saenko. About the problem of information resources allocation in a single information space // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 154-159.// https://elibrary.ru/item.asp?id=49522672 (in Russian).
  130. Igor Saenko, Alexandr Udaltsov. Analysis of sinchronization of database in the absence of deterministic queries // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 767-771. // https://www.elibrary.ru/item.asp?id=49522808 (in Russian).
  131. Igor Saenko, Vladimir Nikolaev, Anton Mikhaylichenko. Distribution of information resources in a single information space built with the use of mobile data processing centers // In the collection: The state and prospects of development of modern science in the direction of "IT technologies". Collection of articles of the I Scientific and Technical Conference. Anapa, 2022. pp. 5-11. // https://www.elibrary.ru/item.asp?id=49760522 (in Russian).
  132. Igor Saenko, Mazen Hamed Al-Barry. Application of machine learning methods to detect malicious actions of users of data processing centers // In the collection: State and prospects of development of modern science in the direction of "IT technologies". Collection of articles of the I Scientific and Technical Conference. Anapa, 2022. pp. 62-66. // https://www.elibrary.ru/item.asp?id=49760530 (in Russian).
  133. Igor Paraschuk, E. Kryukova, Oleg Pantyukhin. Digital library as a key element of the unified information space of modern military education // In the collection: The development of military pedagogy in the XXI century. Materials of the IX Interuniversity scientific and Practical Conference. Edited by S.V. Kostarev, I.I. Sokolova, N.V. Ershov. St. Petersburg, 2022. pp. 109-115 // https://elibrary.ru/item.asp?id=48501373 (in Russian).
  134. Vladimir Baboshin, Igor Paraschuk, V. Sundukov. Analysis of general requirements for means of multi-factor authentication of users of railway automation, telemechanics and communication systems // In the collection: Innovative railway. the latest and promising systems for ensuring the movement of trains. problems and solutions. Collection of articles of the V-th International Scientific and Practical Conference. St. Petersburg, Peterhof, 2022. pp. 91-100.// https://elibrary.ru/item.asp?id=49191561 (in Russian).
  135. Vladimir Baboshin, Igor Paraschuk, Anton Mikhailichenko. Modeling of railway automation, telemechanics and communication systems in the interests of assessing and predicting their reliability // In the collection: Innovative railway. the latest and promising systems for ensuring the movement of trains. problems and solutions. Collection of articles of the V-th International Scientific and Practical Conference. St. Petersburg, Peterhof, 2022. pp. 111-120. // https://elibrary.ru/item.asp?id=49221070 (in Russian).
  136. Andrey Seleznev, Igor Paraschuk, V. Sayarkin. Modern electronic document management in automated train dispatching control systems: information security issues // In the collection: Innovative Railway. the latest and promising systems for ensuring the movement of trains. problems and solutions. Collection of articles of the V-th International Scientific and Practical Conference. St. Petersburg, Peterhof, 2022. pp. 416-424. // https://www.elibrary.ru/item.asp?id=49221101 (in Russian).
  137. Vladimi Baboshin, Igor Paraschuk, Anna Konovalova. Use of informational educational resources for training military specialists engineering profile // In the collection: Innovative railway. the latest and promising systems for ensuring the movement of trains. problems and solutions. Collection of articles of the V-th International Scientific and Practical Conference. St. Petersburg, Peterhof, 2022. pp. 451-461. // https://elibrary.ru/item.asp?id=49221108 (in Russian).
  138. Igor Parashchuk, Vitaly Sayarkin, Anton Mikhailichenko. Analysis of the basic principles and requirements for information security subsystems in electronic document management systems of data centers // In the collection: World science: problems and innovations. Collection of articles of the LXVII International Scientific and Practical Conference. Penza, 2022. pp. 30-32. https://elibrary.ru/download/elibrary_49353664_99376199.pdf // https://elibrary.ru/item.asp?id=49353664 (in Russian).
  139. Anton Mikhaylichenko, Igor Paraschuk. Intelligent systems for analyzing the technical reliability of mobile data centers // In the collection: World science: problems and innovations. Collection of articles of the LXVII International Scientific and Practical Conference. Penza, 2022. pp. 35-40 // https://elibrary.ru/item.asp?id=49522646 (in Russian).
  140. Ivan Morozov, Igor Paraschuk I.B., V. Sayarkin. Analysis of the basic principles and requirements for the construction of information security subsystems in modern electronic document management systems // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical conference. Saint Petersburg, 2022. pp. 689-693. // https://elibrary.ru/item.asp?id=49522790&pff=1 (in Russian).
  141. Igor Paraschuk, Vitaly Sayarkin, Anton Mikhailichenko. Topological and temporal availability of mobile data center resources as an element of assessing the level of ensuring their information security // In the collection: The state and prospects of development of modern science in the direction of "IT technologies". Collection of articles of the I Scientific and Technical Conference. Anapa, 2022. pp. 31-38. // https://elibrary.ru/item.asp?id=49760527 (in Russian).
  142. K.E. Izrailov, N.E. Romanov. Application of a genetic algorithm for reverse engineering of machine code // In the collection: Actual problems of infotelecommunications in science and education (APINO 2022). Collection of scientific articles of the XI International scientific-technical and scientific-methodical conference. St. Petersburg, 2022. pp. 239-243. // https://elibrary.ru/item.asp?id=49588777 (in Russian).
  143. K.E. Izrailov, P.A. Kurta. Vulnerability modeling in smart city transport infrastructure interfaces // In the book: Materials of the conference "Information Technologies in Management" (ITU-2022). 15th Multi-conference on Management Issues. Abstracts of the report at the conference, St. Petersburg, 2022. pp. 237-240. // https://elibrary.ru/item.asp?id=50211049 (in Russian).
  144. V.O. Popova, A.A. Chechulin. Review and analysis of sources in the context of the problem of cyber security and improvement of the security policy of critical infrastructure objects // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 177-178.// https://elibrary.ru/item.asp?id=49977215 (in Russian).
  145. I.V. Paraschuk, A.A. Chechulin. Ensuring the security of unmanned vehicles of the «smart city» using proactive vulnerability search in human-machine interaction interfaces based on the methods of the theory of catastrophes // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 116-118. // https://www.elibrary.ru/item.asp?id=49977162 (in Russian).
  146. I.V. Kotenko, D.A. Levshun. Application of intelligent methods of system event correlation in predictive analytics of security states of critically important infrastructure objects // In the collection: The Twentieth National Conference on Artificial Intelligence with International Participation, CII-2022. Proceedings of the conference. In 2 volumes. Moscow, 2022. pp. 152-167. // https://elibrary.ru/item.asp?id=50296597 (in Russian).
  147. I.V. Kotenko. Artificial intelligence for cybersecurity: confrontation of attack and defense technologies // In the collection: The Twentieth National Conference on Artificial Intelligence with international participation. proceedings of the conference. Moscow, 2022. KII-2022, Moscow, 2022. vol. 1, p. 36. // https://elibrary.ru/item.asp?id=50230020 (in Russian).
  148. I.B. Sayenko, I.V. Kotenko, M.H. Al-Barry. Investigation of the possibilities of detecting abnormal behavior of data center users based on machine learning models // The Twentieth National Conference on Artificial Intelligence with International Participation, CII-2022. Proceedings of the conference. In 2 volumes. Moscow, 2022. pp. 232-241. // https://elibrary.ru/item.asp?id=50178696 (in Russian).
  149. I.V. Kotenko, I.B. Paraschuk, I.B. Saenko. Building a subsystem for operational assessment of the level of cybersecurity of information and telecommunication resources of critical infrastructure based on analytical processing of large arrays of heterogeneous data // Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 96-97.// https://www.elibrary.ru/item.asp?id=49977142 (in Russian).
  150. A.V. Meleshko. Data collection from sensors of a self-organizing decentralized wireless sensor network for security analysis // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 174-176. // https://elibrary.ru/item.asp?id=49977213 (in Russian).
  151. A.V. Meleshko. Proactive security monitoring of a self-organizing decentralized wireless sensor network // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 173-174. // https://elibrary.ru/item.asp?id=49977212 (in Russian).
  152. L.A. Vitkova. Information attacks in social networks // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 145-147. // https://elibrary.ru/item.asp?id=49977649 (in Russian).
  153. V.A. Desnitskiy. Combined approach to attack detection in water supply management systems // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 152-153.// https://elibrary.ru/item.asp?id=49977187 (in Russian).
  154. E.V. Fedorchenko, A.N. Polubarieva. Analysis of the problems, their possible solutions and existing prospects of information security issues of wireless medical devices // In the collection: Regional informatics and information security. Proceedings of the Jubilee XVIII St. Petersburg International Conference. Saint Petersburg, 2022. pp. 137-139. // https://www.elibrary.ru/item.asp?id=50477970 (in Russian).
  155. E.V. Fedorchenko. Security assessment of information systems and security decision support using an ontology // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 187-188. // https://www.elibrary.ru/item.asp?id=49977225 (in Russian).
  156. D.S. Levshun, D.A. Gayfulina. Investigation of the role of assessing the tonality of text publications in solving the problem of identifying destructive information influences // In the collection: Pedagogy and psychology in medicine: problems, innovations, achievements. proceedings of the II All-Russian Scientific Congress with international participation. Moscow, 2022. pp. 114-118. // https://elibrary.ru/item.asp?id=49903579 (in Russian).
  157. D.A. Levshun, I.V. Kotenko. Architecture of the security event correlation system based on data mining // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 171-172. // https://elibrary.ru/item.asp?id=49977211 (in Russian).
  158. M.V. Kolomeets. Technique for labeling of social media bot metrics // In the book: Materials of the conference "Information Technologies in Management" (ITU-2022). 15th multi-conference on management issues. St. Petersburg, 2022. pp. 230-232 // https://elibrary.ru/item.asp?id=50211047 (in Russian).
  159. K.N. Zhernova. Conceptual model of human-computer interfaces based on virtual reality technologies and touch screens // Materials of the conference "Information technologies in management" (ITU-2022). 15th multi-conference on management issues. Saint Petersburg, 2022. pp. 226-229. // https://elibrary.ru/item.asp?id=50211046 (in Russian).
  160. K.N. Zhernova. Architecture of the human-computer interface security assessment system //Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 155-157. // https://elibrary.ru/item.asp?id=49977189 (in Russian).
  161. I.V. Kotenko, I.B. Saenko. The concept of analytical processing of large arrays of heterogeneous data on cyber security events in critical infrastructure // In the book: Materials of the conference "Information Technologies in Management" (ITU-2022). 15th MULTI-CONFERENCE ON MANAGEMENT ISSUES. Saint Petersburg, 2022. pp. 218-221. // https://elibrary.ru/item.asp?id=50211044 (in Russian).
  162. V.V. Nikolaev, I.B. Saenko. An approach to building a model of a unified information space in order to optimize the distribution of its resources // In the collection: Promising directions for the development of domestic information technologies. materials of the VIII interregional scientific and practical conference.. Sevastopol State University. Sevastopol, 2022. pp. 184-185. // https://www.elibrary.ru/item.asp?id=54451964 (in Russian).
  163. M.H. Al-Barry, I.B. Saenko. On the construction of feature space for detecting abnormal sql-queries by machine learning methods // In the collection: Promising directions of development of domestic information technologies. materials of the VIII interregional scientific and practical conference.. Sevastopol State University. Sevastopol, 2022. pp. 119-121. // https://www.elibrary.ru/item.asp?id=54451728 (in Russian).
  164. I.B. Paraschuk, I.V. Kotenko, I.B. Saenko. Development of source data for algorithms for fuzzy management of information and security events in cyber-physical systems // In the collection: Promising directions of development of domestic information technologies. materials of the VIII interregional scientific and practical conference.. Sevastopol State University. Sevastopol, 2022. pp. 47-50. // https://www.elibrary.ru/item.asp?id=54451559 (in Russian).
  165. I.B. Saenko, V.V. Nikolaev. On a simulation model of a special-purpose common information space // In the collection: Simulation modeling of military systems, actions of troops and their support processes (IMSVN-2022). Proceedings of the Second All-Russian Scientific and Practical Conference on Simulation Modeling and its application in the military sphere. Saint Petersburg, 2022. pp. 146-151. //https://www.elibrary.ru/item.asp?id=54105182 (in Russian).
  166. V.V. Nikolaev, I.B. Saenko. An approach to optimizing information resources distribution plan of a common information space using a modified genetic algorithm // In the collection: Regional Informatics and information security. Proceedings of the Jubilee XVIII St. Petersburg International Conference. Saint Petersburg, 2022. pp. 85-88. // https://www.elibrary.ru/item.asp?id=50477843 (in Russian).
  167. V.V. Nikolaev, I.B. Saenko. Approach to the evaluation of reliability single information space // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VII Interuniversity Scientific and Practical conference. Saint Petersburg, 2022. pp. 171-174. // https://www.elibrary.ru/item.asp?id=50470051 (in Russian).
  168. M.A. Biryukov, M/H. Al-Barry, I.B. Saenko. Machine learning approach to data center security // In the collection: Modern trends in engineering education. Collection of materials of the Scientific and practical conference. Saint Petersburg, 2022. pp. 41-44. // https://www.elibrary.ru/item.asp?id=50109004 (in Russian).
  169. A.Yu. Khalenev, I.B. Saenko. Methodology of the organization of protected virtual local area networks in automated systems for special purposes // In the collection: The use of modern information technologies in service and combat activities. Collection of articles of the interuniversity scientific and practical conference. Under the general editorship of D.V. Mirimanov. Perm, 2022. pp. 175-180. // https://www.elibrary.ru/item.asp?id=50033422 (in Russian).
  170. A.Yu. Khalenev, I.B. Saenko. A conceptual approach to solving the problem of optimizing the information resources distribution of a special purposes common information space // In the collection: The use of modern information technologies in service and combat activities. Collection of articles of the interuniversity scientific and practical conference. Under the general editorship of D.V. Mirimanov. Perm, 2022. pp. 175-180. // https://www.elibrary.ru/item.asp?id=50033422 (in Russian).
  171. M.H. Al-Barry, I.B. Saenko. A methodology for detecting abnormal actions of data center users based on machine learning methods // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 136-137. // https://www.elibrary.ru/item.asp?id=49977174 (in Russian).
  172. V.V. Nikolaev, I.B. Saenko. The use of a modified genetic algorithm in order to optimize the distribution of information resources of the common information space // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 106-108. // https://www.elibrary.ru/item.asp?id=49977154 (in Russian).
  173. I.B. Paraschuk, I.V. Kotenko. Operational assessment of the security of information and telecommunications resources based on two-stage processing of uncertain source data // In the book: Materials of the conference "Information Technologies in Management" (ITU-2022). The 15th Multi-Conference on Management Issues. St. Petersburg, 2022. pp. 233-236. // https://www.elibrary.ru/item.asp?id=50211048// https://www.elibrary.ru/item.asp?id=50211048 (in Russian).
  174. S.A. Shinkarev, I.B. Paraschuk, E.S. Kryukova. The influence of structural parameters on the assessment of the quality of data transmission networks and electronic libraries // In the collection: Promising directions for the development of domestic information technologies. materials of the VIII interregional scientific and practical conference.. Sevastopol State University. Sevastopol, 2022. pp. 83-86. // https://www.elibrary.ru/item.asp?id=54451650 (in Russian).
  175. A.V. Mikhaylichenko, I.B. Paraschuk. Reliability analysis of mobile data centers: problems and prospects // In the collection: Promising directions for the development of domestic information technologies. materials of the VIII interregional scientific and practical conference. Sevastopol State University. Sevastopol, 2022. pp. 66-68.// https://www.elibrary.ru/item.asp?id=54451580 (in Russian).
  176. I.V. Morozov, V.A. Sundukov, I.B. Paraschuk. Requirements for multi-factor authentication of users in the interests of information protection in critical infrastructures // In the collection: Promising directions for the development of domestic information technologies. materials of the VIII interregional scientific and practical conference.. Sevastopol State University. Sevastopol, 2022. pp. 21-24. // https://www.elibrary.ru/item.asp?id=54451506 (in Russian).
  177. A.V. Seleznev, V.A. Sayarkin, I.B. Paraschuk. Analysis of requirements for software and hardware implementation and review of the principles of building information security tools for modern electronic document management systems // In the collection: Promising directions for the development of domestic information technologies. materials of the VIII interregional scientific and practical conference.. Sevastopol State University. Sevastopol, 2022. pp. 17-20. // https://www.elibrary.ru/item.asp?id=54451494 (in Russian).
  178. I.B. Paraschuk, A.V. Mikhailichenko. Simulation model of a queuing system in the interests of an analytical description of the process of changing the states of reliability indicators of mobile data centers for military purposes // In the collection: Simulation modeling of military systems, actions of troops and their support processes (IMSVN-2022). Proceedings of the Second All-Russian Scientific and Practical Conference on simulation modeling and its application in the military sphere. St. Petersburg, 2022. pp. 132-140. // https://www.elibrary.ru/item.asp?id=54105180 (in Russian).
  179. V.A. Sundukov, I.B. Paraschuk. Criteria for evaluating modern systems, complexes and means of multi-factor authentication of subscribers when accessing information resources of regional telecommunication networks // In the collection: Regional informatics and information security. Proceedings of the XVIII Anniversary St. Petersburg International Conference. St. Petersburg, 2022. pp. 107-111. // https://www.elibrary.ru/item.asp?id=50477969 (in Russian).
  180. I.B. Paraschuk, I.V. Morozov, V.A. Sayarkin. Principles of construction and basic requirements for information security subsystems for the protection of electronic document flow through the channels of modern regional telecommunications networks // In the collection: Regional informatics and information security. Proceedings of the XVIII Anniversary St. Petersburg International Conference. St. Petersburg, 2022. pp. 103-107. // https://www.elibrary.ru/item.asp?id=50477848 (in Russian).
  181. A.V. Mikhaylichenko, I.B. Paraschuk, A.V. Seleznev. Modeling of the processes of changing the states of the parameters of recoverability and persistence in the interests of current and predictive analysis of the technical reliability of mobile data centers // In the collection: Regional Informatics and information security. Proceedings of the XVIII Anniversary St. Petersburg International Conference. St. Petersburg, 2022. pp. 92-96. // https://www.elibrary.ru/item.asp?id=50477845 (in Russian).
  182. E.S. Kryukova, I.B. Paraschuk, A.V. Seleznev. The problems of developing a methodology for analyzing the quality of distributed information systems and telecommunication networks in the conditions of uncertainty of the initial data // In the collection: Regional Informatics and information security. Proceedings of the XVIII Anniversary St. Petersburg International Conference. St. Petersburg, 2022. pp. 67-71. // https://www.elibrary.ru/item.asp?id=50477839 (in Russian).
  183. V.A. Sayarkin, A.V. Mikhailichenko, I.B. Paraschuk. The problems of formulation of complex reliability and security indices of electronic document management system based on distributed network of mobile data-centers // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VII interuniversity scientific and practical conference. St. Petersburg, 2022. pp. 210-214. // https://www.elibrary.ru/item.asp?id=50470058 (in Russian).
  184. I.B. Paraschuk, A.V. Mikhailichenko. Technical reliability of disk storage systems: the granular choice procedures for the analyzed parameters // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VII interuniversity scientific and practical conference. St. Petersburg, 2022. pp. 190-195. // https://www.elibrary.ru/item.asp?id=50470055 (in Russian).
  185. E.S. Kryukova, I.B. Paraschuk, A.V. Seleznev. Estimation of efficiency of functioning of the subsystem of technical maintenance and repair of automated control systems special purpose // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VII interuniversity scientific and practical conference. St. Petersburg, 2022. pp. 140-144. // https://www.elibrary.ru/item.asp?id=50470045 (in Russian).
  186. S.A. Bashkirtsev, V.A. Sundukov, I.B. Paraschuk. Means of multifactor authentication of users of automated control systems of communication: decision making support as a part of their fault-tolerance control // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VII interuniversity scientific and practical conference. St. Petersburg, 2022. pp. 40-44. // https://www.elibrary.ru/item.asp?id=50470026 (in Russian).
  187. A.V. Mikhaylichenko, I.B. Paraschuk, A.V. Seleznev. On the application of information granulation and granular computing methods in the tasks of calculating the reliability of mobile data centers // In the collection: New information technologies and systems (NITiS-2022). Collection of scientific articles based on the materials of the XIX International Scientific and Technical Conference dedicated to the 75th anniversary of the Department of Computer Engineering at PSU. Penza, 2022. pp. 19-22. // https://elibrary.ru/item.asp?id=50454484 (in Russian).
  188. V.A. Sundukov, V.A. Sayarkin, I.B. Paraschuk. On the issue of generating a sequence of a given data set for modeling the process of multi-factor authentication of users in electronic document management systems // In the collection: Innovative activity in the Armed forces of the Russian Federation. Proceedings of the All-Army Scientific and Practical Conference. St. Petersburg, 2022. pp. 390-394. // https://elibrary.ru/item.asp?id=50410548 (in Russian).
  189. A.V. Seleznev, A.V. Mikhailichenko, I.B. Paraschuk. Parametric estimation of the distribution law of message flows in the network of mobile data centers using mathematical methods of theory of catastrophes // In the collection: Innovative activity in the armed forces of the Russian Federation. Proceedings of the All-Army Scientific and Practical Conference. St. Petersburg, 2022. pp. 370-375. // https://elibrary.ru/item.asp?id=50410543 (in Russian).
  190. I.B. Paraschuk, E.S. Kryukova, A.V. Mikhailichenko. An approach to modeling and forecasting random events in the interests of analyzing the reliability and quality of functioning of distributed data processing systems // In the collection: Innovative activity in the Armed forces of the Russian Federation. Proceedings of the All-Army Scientific and Practical Conference. St. Petersburg, 2022. pp. 366-370. // https://elibrary.ru/item.asp?id=50410541 (in Russian).
  191. V.A. Sayarkin, V.A. Sundukov, I.B. Paraschuk. Issues of formulation of conditions for the effective use of multi-factor authentication of users in the interests of security of electronic document management systems // In the collection: Modern trends in engineering education. Collection of materials of the Scientific and practical conference. St. Petersburg, 2022. pp. 265-270. // https://elibrary.ru/item.asp?id=50109043 (in Russian).
  192. A.V. Mikhaylichenko, I.B. Paraschuk, A.V. Seleznev. Intelligent analytical processing of large arrays of heterogeneous data in the interests of monitoring the reliability and maintainability of mobile data centers // In the collection: Modern trends in engineering education. Collection of materials of the Scientific and practical conference. St. Petersburg, 2022. pp. 188-192. // https://elibrary.ru/item.asp?id=50109028 (in Russian).
  193. E.C. Kryukova, I.B. Paraschuk, A.V. Seleznev. Information environment of engineering education: the role and place of modern electronic libraries // In the collection: Modern trends in engineering education. Collection of materials of the Scientific and practical conference. St. Petersburg, 2022. pp. 155-159. // https://elibrary.ru/item.asp?id=50109022 (in Russian).
  194. V.A. Sundukov, I.B. Paraschuk. Access to information resources of regional telecommunication networks: criteria for evaluating systems, complexes and means of multi-factor authentication of subscribers // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 127-129. // https://elibrary.ru/item.asp?id=49977170 (in Russian).
  195. I.B. Paraschuk, I.V. Morozov, V.A. Boyarkin. Subsystems for ensuring the security of electronic document flow through the channels of regional telecommunication networks: requirements and principles of construction // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 114-116.// https://elibrary.ru/item.asp?id=49977161 (in Russian).
  196. A.V. Mikhaylichenko, I.B. Paraschuk, A.V. Seleznev. Urrent and predictive analysis of the technical reliability of mobile data processing centers: modeling the processes of changing the states of the parameters of recoverability and persistence // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 104-106.// https://elibrary.ru/item.asp?id=49977151 (in Russian).
  197. E.S. Kryukova, I.B Paraschuk, A.V. Seleznev. Stages of research within the framework of creating a method and algorithms for assessing the quality of distributed information systems and telecommunication networks, taking into account uncertainty // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 99-101.// https://elibrary.ru/item.asp?id=49977146 (in Russian).
  198. V.A. Malofeev, I.B. Paraschuk, V.A. Sundukov. Departmental infocommunication networks: basic requirements for network attack detection systems and means of multi-factor authentication of users // In the collection: Current problems of infotelecommunications in science and education (APINO 2022). Collection of scientific papers of the XI International Scientific, technical and scientific-methodical Conference. In 4 volumes. Edited by A.V. Shestakov, comp. V.S. Elagin, E.A. Anikevich. St. Petersburg, 2022. pp. 530-534.// https://elibrary.ru/item.asp?id=49800739 (in Russian).
  199. G.S. Bogolepov, A.V. Mikhaylichenko, I.B. Paraschuk, A.V. Seleznev. Assessment and forecasting of reliability of mobile data centers: mathematical models of state change of absence of equipment failures, durability and maintainability parameters // In the collection: Current problems of infotelecommunications in science and education (APINO 2022). Collection of scientific papers of the XI International Scientific, technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2022. pp. 431-436.// https://elibrary.ru/item.asp?id=49800717&pff=1 (in Russian).
  200. A.S. Bashkirtsev, E.S. Kryukova, N.V. Mikhaylichenko, I.B. Paraschuk. Tasks and specifics of the stages of creating a methodology for analyzing the quality of data centers and electronic libraries in conditions of uncertainty // In the collection: Current problems of infotelecommunications in science and education (APINO 2022). Collection of scientific papers of the XI International Scientific, technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2022. pp. 419-423. // https://elibrary.ru/item.asp?id=49800714&pff=1 (in Russian).
  201. I.Yu. Zelichenok, I.V. Kotenko. Detection of multi-step attacks using recurrent neural networks with LSTM layers // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 157-158. //https://elibrary.ru/item.asp?id=49977190 (in Russian).
  202. I.Yu. Zelichenok, I.V. Kotenko. Methods for detecting multi-step attacks on computer networks by using machine learning // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. Saint Petersburg, 2022. pp. 159-160.//https://elibrary.ru/item.asp?id=49977191 (in Russian).
  203. I.S. Bystrov, I.V. Kotenko. Metrics for assessing the results of machine learning in the problem of detecting cyber insiders // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 140-141.// https://elibrary.ru/item.asp?id=49977177&pff=1 (in Russian).
  204. I.S. Bystrov, I.V. Kotenko. Metrics for assessing the results of machine learning in the problem of detecting cyber insiders // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 140-141.// https://elibrary.ru/item.asp?id=49977177 (in Russian).
  205. E.A. Donskov, I.V. Kotenko, A.V. Pomogalova. Analysis of fault tolerance of a blockchain network node when modeling daily load on a transportation node // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 153-155. // https://elibrary.ru/item.asp?id=49977188 (in Russian).
  206. V.V. Puchkov, I.V. Kotenko. Graph databases for building and analyzing attack graphs // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 178-179.// https://elibrary.ru/item.asp?id=49977216 (in Russian).
  207. S.S. Khmyrov, I.V. Kotenko. Approach to profiling a cyber-intruder at attributing targeted attack against critical information infrastructure objects // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 189-190.// https://elibrary.ru/item.asp?id=49977226 (in Russian).
  208. E.S. Novikova. Modeling of the personal data processing activities in information systems // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 176-177.// https://www.elibrary.ru/item.asp?id=49977214 (in Russian).
  209. E.S. Novikova. Analysis of approaches to design of the intrusion detection systems based on federated learning principles // In the collection: Current problems of infotelecommunications in science and education (APINO 2022). XI International Scientific-technical and scientific-methodical Conference. St. Petersburg, 2022. pp. 716-719.// https://www.elibrary.ru/item.asp?id=49522796 (in Russian).

2021

  1. Alexander Branitskiy, Igor Kotenko, Igor Saenko. Applying Machine Learning and Parallel Data Processing for Attack Detection in IoT // IEEE Transactions on Emerging Topics in Computing. 2021. Ò. 9. ¹ 4. Ñ. 1642-1653. https://doi.org/10.1109/TETC.2020.3006351 // https://elibrary.ru/item.asp?id=47507570
  2. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design of secure microcontroller-based systems: application to mobile robots for perimeter monitoring // Sensors 2021. Vol. 21, ¹ 24. Ïîðÿäêîâûé íîìåð: 8451. DOI: 10.3390/s21248451. https://www.mdpi.com/1424-8220/21/24/8451 // https://elibrary.ru/item.asp?id=47541785 (Scopus, WoS, SJR=0.636, Q1)
  3. Maxim Kolomeec, Ksenia Zhernova, Andrey Chechulin. Unmanned Transport Environment Threats // Proceedings of 15th International Conference on Electromechanics and Robotics "Zavalishin's Readings". April 15-18, 2020, Ufa, Russia // Smart Innovation, Systems and Technologies. Springer 2021, Vol. 187. – P. 395-408. 2021. DOI:10.1007/978-981-15-5580-0_32 // https://elibrary.ru/item.asp?id=45282366 (ÐÈÍÖ, Scopus)
  4. Doynikova Elena, Novikova Evgenia, Gaifulina Diana, Kotenko Igor. Towards Attacker Attribution for Risk Analysis // Lecture Notes in Computer Science. 2021. Ò. 12528 LNCS. Ñ. 347-353. // DOI:10.1007/978-3-030-68887-5_22 // https://elibrary.ru/item.asp?id=46756437
  5. Igor Saenko, Fadey Scorik, Igor Kotenko. Combined neural network for assessing the state of computer network elements // Studies in Computational Intelligence. 2021. Ò. 925 SCI. Ñ. 256-261. DOI: 10.1007/978-3-030-60577-3_30 // https://elibrary.ru/item.asp?id=45247405 (WoS and Scopus)
  6. Vasily Desnitsky, Igor Kotenko. Simulation and Assessment of Battery Depletion Attacks on Unmanned Aerial Vehicles for Crisis Management Infrastructures // Simulation Modelling Practice and Theory. 2021. Ò. 107. Ñ. 102244. DOI: 10.1016/j.simpat.2020.102244 // https://elibrary.ru/item.asp?id=45028824
  7. Tsarenko Olga, Bekeneva Yana, Novikova Evgenia. Analysis of the Messages from Social Network for Emergency Cases Detection //In book: Congress on Intelligent Systems pp.35-47 (Scopus) DOI:10.1007/978-981-33-6984-9_4
  8. Igor Kotenko, Igor Parashchuk. A variant of the analytical specification of security information and event management system // Studies in Systems, Decision and Control. 2021. Ò. 350. Ñ. 321-331. DOI: 10.1007/978-3-030-67892-0_26 // https://elibrary.ru/item.asp?id=46835262
  9. Igor Kotenko, Igor Parashchuk. A Fuzzy Model of the Security Event and Incident Management for Technological Processes and Objects // Lecture Notes in Electrical Engineering. 2021. Ò. 729 LNEE. Ñ. 550-559. DOI: 10.1007/978-3-030-71119-1_54 // https://www.elibrary.ru/item.asp?id=46023495
  10. Igor V. Kotenko, Igor B. Parashchuk. Specification of Quality Indicators for Security Event and Incident Management in the Supply Chain // International Journal of Computing 2021, Vol. 20, Issue 1 Ð. 22-30 https://doi.org/10.47839/ijc.20.1.2088 // https://www.elibrary.ru/item.asp?id=46020149 (Scopus)
  11. Yannick Chevalier, Fenzl, Maxim Kolomeets, Roland Rieke, Andrey Chechulin. Christoph Kraus. Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis // Informatics and Automation, Vol.20, ¹ 4, pp. 845-868. DOI: 10.15622/ia.20.4.4 . URL: http://dx.doi.org/10.15622/ia.20.4.4. // https://elibrary.ru/item.asp?id=46506073
  12. Maxim Kolomeets, Andrey Chechulin. Analysis of the Malicious Bots Market // Conference of Open Innovations Association, FRUCT. 2021. ¹ 29. Ñ. 199-205. DOI: 10.23919/FRUCT52173.2021.9435421 // https://elibrary.ru/item.asp?id=46115513
  13. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Bot detection by friends graph in social networks // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). Vol.12, ¹ 2 2021. pp. 141-159. DOI: 10.22667/JOWUA.2021.06.30.141. URL: http://isyou.info/jowua/papers/jowua-v12n2-6.pdf. (Scopus, Q2) // https://elibrary.ru/item.asp?id=47517731
  14. Michael Buinevich, Konstantin Izrailov, Igor Kotenko, Pavel Kurta. Method and algorithms of visual audit of program interaction // Journal of Internet Services and Information Security. 2021. Ò. 11. ¹ 1. Ñ. 16-43. DOI: 10.22667/JISIS.2021.02.28.016 // https://elibrary.ru/item.asp?id=46766923
  15. Igor Kotenko, Konstantin Izrailov, Andrey Krasov, Igor Ushakov. An Approach for Stego-Insider Detection Based on a Hybrid NoSQL Database // Journal of Sensor and Actuator Networks. 2021. Ò. 10. ¹ 2. Serial number: 25 DOI: 10.3390/jsan10020025 // https://elibrary.ru/item.asp?id=46862821
  16. Igor Kotenko, Igor Saenko, Oleg Lauta, M. Karpov. Methodology for management of the protection system of smart power supply networks in the context of cyberattacks // Energies. 2021. Ò. 14. ¹ 18. Serial number: 5963 DOI: 10.3390/en14185963 // https://elibrary.ru/item.asp?id=47097187
  17. Igor Saenko, Igor Kotenko, F. Skorik, M. Al-Barri. Detecting anomalous behavior of users of data centers based on the application of artificial neural networks // Lecture Notes in Computer Science. 2021. Ò. 12948 LNAI. Ñ. 331-342. DOI: 10.1007/978-3-030-86855-0_23 // https://www.elibrary.ru/item.asp?id=47513360
  18. H.D. Karatza, Igor Kotenko. Guest editors’ introduction “Modeling and simulation for intelligent distributed computing” // Simulation Modelling Practice and Theory. 2021. Ò. 109. Ñ. 102297. DOI: 10.1016/j.simpat.2021.102297 // https://elibrary.ru/qqooml
  19. Andrey Privalov, D. Titov, Igor Kotenko, Igor Saenko, Natalya Evglevskaya. Evaluating the functioning quality of data transmission networks in the context of cyberattacks // Energies. 2021. Ò. 14. ¹ 16. Serial number: 4755 DOI: 10.3390/en14164755 // https://elibrary.ru/item.asp?id=46939445
  20. Igor Kotenko, Igor Saenko, Oleg Lauta, K. Kribel. LSTM neural networks for detecting anomalies caused by web application cyber attacks // Frontiers in Artificial Intelligence and Applications. 2021. Ò. 337. Ñ. 127-140. DOI: 10.3233/FAIA210014 // https://elibrary.ru/item.asp?id=47510004
  21. Lidia Vitkova, Igor Kotenko, Andrey Chechulin. An approach to ranking the sources of information dissemination in social networks // Information (Switzerland). 2021. Ò. 12. ¹ 10.Serial number: 416 DOI: 10.3390/info12100416 // https://elibrary.ru/item.asp?id=47516212
  22. Igor Kotenko, Igor Parashchuk. A variant of the analytical specification of security information and event management systems // Studies in Systems, Decision and Control. 2021. Ò. 350. Ñ. 321-331. DOI: 10.1007/978-3-030-67892-0_26 // https://www.elibrary.ru/item.asp?id=46835262
  23. Igor Kotenko, Igor Saenko, Alexander Branitskiy, Igor Paraschuk, Diana Gayfullina. Intelligent system of analytical processing of digital network content for protection against inappropriate information // Informatics and automation. 2021. Vol. 20. No. 4. pp. 755-792. DOI: 10.15622/ia.20.4.1 // https://elibrary.ru/item.asp?id=46506070 (in Russian).
  24. Konstantin Izrailov, Polina Zhukovskaya, Pavel Kurta, Andrey Chechulin. Investigation of the method of determination of password resistance to brute force based on an artificial neural network // Â ñáîðíèêå: Journal of Physics: Conference Series. 13. Ñåð. "13th Multiconference on Control Problems, MCCP 2020" 2021. Ñ. 012123. DOI: 10.1088/1742-6596/1864/1/012123 // https://elibrary.ru/item.asp?id=46835342
  25. L. Vitkova, K. Valieva, D. Kozlov. An approach to detecting the spread of false information on the internet using data science algorithms // Lecture Notes in Electrical Engineering, Ò. 729 LNEE. Ñ. 438-448. DOI: 10.1007/978-3-030-71119-1_43 // https://elibrary.ru/item.asp?id=46023527
  26. Lidia Vitkova, Daria Goluzina, Ksenia Naumenko. Methodology for identifying artificial mobilization of protest activity in social networks // Lecture Notes in Electrical Engineering 2021. Ò. 729 LNEE. Ñ. 468-478. DOI: 10.1007/978-3-030-71119-1_46 // https://elibrary.ru/item.asp?id=46052247
  27. I. Kholod, E. Yanaki, D. Fomichev, E. Shalugin, Eugenia Novikova, E. Filippov, M. Nordlund. Open-source federated learning frameworks for IOT: a comparative review and analysis // Sensors. 2021. Ò. 21. ¹ 1. Ñ. 1-22. DOI: 10.3390/s21010167 // https://elibrary.ru/item.asp?id=45041108
  28. Yannick Chevalier, Florian Fenzl, Maxim Kolomeets, Roland Rieke, Andrey Chechulin, Christoph Kraus. Cyberattack detection in vehicles using characteristic functions, artificial neural networks, and visual analysis // Informatics and Automation 2021. Vol. 20. ¹ 4. Ñ. 845-868. DOI: 10.15622/ia.20.4.4 // https://elibrary.ru/item.asp?id=46506073 (Scopus Q3, RSCI, Ïåðå÷åíü ÂÀÊ, ÐÈÍÖ)
  29. Elena Doynikova, Alexander Branitskiy, Igor Kotenko. Detection and Monitoring of the Destructive Impacts in the Social Networks using Machine Learning Methods // Communications in Computer and Information Science. 2021. Ò. 1538. Ñ. 60-65. DOI: 10.1007/978-3-030-94209-0_6 // https://elibrary.ru/item.asp?id=48152443
  30. Igor Parashchuk, Igor Kotenko. Target functions of the conceptual model for adaptive monitoring of integrated security in material processing systems // Â ñáîðíèêå: Materials Today: Proceedings. Ñåð. "International Conference on Modern Trends in Manufacturing Technologies and Equipment 2020, ICMTMTE 2020" 2021. Ñ. 1454-1458. DOI: 10.1016/j.matpr.2020.08.125 // https://www.elibrary.ru/item.asp?id=46761315 (Scopus)
  31. Lidia Vitkova, Aleksei Pronichev, Elena Doynikova, Igor Saenko. Selection of Countermeasures against Propagation of Harmful Information via Internet // IOP Conference Series: Materials Science and Engineering. Ñåð. "International Scientific Conference of Communications, Information, Electronic and Energy Systems, CIEES 2020", 26th-29th November 2020, Borovets, Bulgaria 1032:012017// 2021. P. 012017. DOI:10.1088/1757-899X/1032/1/012017 // https://elibrary.ru/item.asp?id=46802931 (WoS, Scopus)
  32. E. Doynikova, A. Fedorchenko. Semantic model of an exploit’s source code for data protection in automation systems // Â ñáîðíèêå: IOP Conference Series: Materials Science and Engineering. Krasnoyarsk Science and Technology City Hall., Krasnoyarsk, Russian Federation, 2021. Ñ. 12074. DOI: 10.1088/1757-899X/1047/1/012074 https://www.elibrary.ru/download/elibrary_44745392_43994119.pdf // https://www.elibrary.ru/item.asp?id=44745392
  33. Maxim Kolomeets, Olga Tushkanova, Dmitry Levshun, Andrey Chechulin. Camouflaged bot detection using the friend list // Proceedings - 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2021. 29. 2021. Ñ. 253-259. DOI: 10.1109/PDP52278.2021.00048 // https://elibrary.ru/item.asp?id=46047553 (Scopus).
  34. Oleg Lauta, Igor Saenko, Igor Kotenko. Increasing the reliability of computer network protection system by analyzing its controllability models // Â ñáîðíèêå: Proceedings - 2021 International Russian Automation Conference, RusAutoCon 2021. 2021. Ñ. 537-542. DOI: 10.1109/RusAutoCon52004.2021.9537393 // https://elibrary.ru/item.asp?id=47101158
  35. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Fuzzy sets in problems of identification of attacks on wireless sensor networks // Â ñáîðíèêå: Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021. 2021. Ñ. 290-293. DOI: 10.1109/ElConRus51938.2021.9396712 // https://www.elibrary.ru/item.asp?id=46024531
  36. Igor Kotenko, Igor Saenko,Alexander Kribel, Oleg Lauta. A technique for early detection of cyberattacks using the traffic self-similarity property and a statistical approach // Â ñáîðíèêå: Proceedings - 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2021. 29. 2021. Ñ. 281-284. DOI: 10.1109/PDP52278.2021.00052 // https://elibrary.ru/item.asp?id=46048340
  37. Diana Gaifulina, Igor Kotenko. Selection of deep neural network models for iot anomaly detection experiments // Â ñáîðíèêå: Proceedings - 29th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2021. 29. 2021. Ñ. 260-265. DOI: 10.1109/PDP52278.2021.00049 // https://elibrary.ru/item.asp?id=46082400
  38. Alexander Branitskiy, Elena Doynikova, Igor Kotenko. Technique for classifying the social network profiles according to the psychological scales based on machine learning methods //Journal of Physics: Conference Series. 13. Ñåð. "13th Multiconference on Control Problems, MCCP 2020" 2021. Ñ. 012121. DOI: 10.1088/1742-6596/1864/1/012121 // https://elibrary.ru/item.asp?id=46868874
  39. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko, Eugenia Novikova, A. Shulepov. Combined approach to anomaly detection in wireless sensor networks on example of water management system // Â ñáîðíèêå: 2021 10th Mediterranean Conference on Embedded Computing, MECO 2021. 10. 2021. Ñ. 9460237. DOI: 10.1109/MECO52532.2021.9460237 https://www.elibrary.ru/item.asp?id=47060214
  40. Igor Kotenko, Igor Parashchuk. Evaluation of information security of industrial automation systems using fuzzy algorithms and predicates // Â ñáîðíèêå: Proceedings - 2021 International Russian Automation Conference, RusAutoCon 2021. 2021. Ñ. 261-266. DOI: 10.1109/RusAutoCon52004.2021.9537332 // https://www.elibrary.ru/item.asp?id=47066462
  41. Konstantin Izrailov, Michael Buinevich, Igor Kotenko, À. Yaroshenko. Identifying characteristics of software vulnerabilities by their textual description using machine learning // Â ñáîðíèêå: World Automation Congress Proceedings. Ñåð. "2021 World Automation Congress, WAC 2021" 2021. Ñ. 186-192. DOI: 10.23919/WAC50355.2021.9559470 // https://elibrary.ru/item.asp?id=47513415
  42. Y. Sineshchuk, S. Terekhin, Igor Saenko, Igor Kotenko. Evaluation of graphical user interfaces by the search time for information objects // Â ñáîðíèêå: Journal of Physics: Conference Series. Ñåð. "International Conference on Automatics and Energy, ICAE 2021" 2021. Ñ. 012076. DOI: 10.1088/1742-6596/2096/1/012076 // https://elibrary.ru/item.asp?id=47547124
  43. Vasily Desnitsky. Iotaas based approach to design of a WSN for secure smart city monitoring // Proceedings - 2021 International Russian Automation Conference, RusAutoCon 2021. 2021. Ñ. 443-447. DOI: 10.1109/RusAutoCon52004.2021.9537476 // https://elibrary.ru/item.asp?id=47096519
  44. A. Shulepov, Eugenia Novikova, M. Bestuzhev. Approach to compare point distribution patterns produced by dimension reduction techniques // Â ñáîðíèêå: Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021. 2021. Ñ. 678-681. DOI: 10.1109/ElConRus51938.2021.9396692 // https://www.elibrary.ru/item.asp?id=46048290
  45. M. Kuznetzov, E. Novikova. Towards application of text mining techniques to the analysis of the privacy policies // Â ñáîðíèêå: 2021 10th Mediterranean Conference on Embedded Computing, MECO 2021. 10. 2021. Ñ. 9460130. DOI: 10.1109/MECO52532.2021.9460130 // https://elibrary.ru/item.asp?id=47038887
  46. Igor Kotenko, Igor Parashchuk, and Didier El Baz. Selection and justification of information security indicators for materials processing systems // MATEC Web of Conferences. 2021. 346 pp. 01019 (pp. 1-13). DOI: 10.1051/matecconf/202134601019 // https://elibrary.ru/item.asp?id=69675279
  47. Dmitrii Gavra, Ksenia Namyatova, Lidia Vitkova. Detection of Induced Activity in Social Networks: Model and Methodology // Future Internet. 2021. Vol. 13, ¹ 11, Serial number: 297. DOI: 10.3390/fi13110297 (WoS, Scopus Q2, Ïåðå÷åíü ÂÀÊ, ÐÈÍÖ) file:///C:/Users/79291/Downloads/futureinternet-13-00297.pdf // https://elibrary.ru/item.asp?id=48128180
  48. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Approach to Anomaly Detection in Self-Organized Decentralized Wireless Sensor Network for Air Pollution Monitoring // MATEC Web of Conferences. 2021. Vol.346, pp. 03002 (1-8). DOI: 10.1051/matecconf/202134603002 (WoS, Scopus, ïåðå÷åíü ÂÀÊ, ÐÈÍÖ) // https://elibrary.ru/item.asp?id=70156546
  49. Olga Tushkanova, Vladimir Gorodetsky. Learning an ontology of text data // Â ñáîðíèêå: CEUR Workshop Proceedings. 10. Ñåð. "IMSC 2021 - Russian Advances in Fuzzy Systems and Soft Computing: Selected Contributions to the 10th International Conference on "Integrated Models and Soft Computing in Artificial Intelligence", Kolomna, May 17-20, 2021 P. 37-44. (Scopus) // https://elibrary.ru/item.asp?id=47511846
  50. Igor Kotenko, Yash Sharma, Alexander Branitskiy. Predicting the Mental State of the Social Network Users based on the Latent Dirichlet Allocation and fastText // Proceedings of the 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2021. pp. 191-195 (WoS, Scopus, Ïåðå÷åíü ÂÀÊ, ÐÈÍÖ) DOI:10.1109/IDAACS53288.2021.9661061 // https://elibrary.ru/item.asp?id=48134081
  51. Roman Ushakov, Elena Doynikova, Evgenia Novikova, Igor Kotenko. CPE and CVE based Technique for Software Security Risk Assessment //  ñáîðíèêå: Proceedings of the 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2021. 22-25 September, 2021, Cracow, Poland. pp.353-356 (WoS, Scopus, Ïåðå÷åíü ÂÀÊ, ÐÈÍÖ) DOI:10.1109/IDAACS53288.2021.9660968 // https://elibrary.ru/item.asp?id=48134070
  52. V.K. Fedorov, E.G. Balenko, N.V. Gololobov, K.E. Izrailov. Testing platform invoke as a tool for shellcode injection in windows applications // Â ñáîðíèêå: Journal of Physics: Conference Series. Ñåð. "International Conference on Automatics and Energy, ICAE 2021" 2021. Ñ. 012048. DOI: 10.1088/1742-6596/2096/1/012048 // https://elibrary.ru/item.asp?id=47547489
  53. I.Murenin, E. Doynikova, I.Kotenko. Towards security decision support for large-scale heterogeneous distributed information systems // Proceedings - 2021 14th International Conference on Security of Information and Networks, SIN 2021. 14. 2021. DOI: 10.1109/SIN54109.2021.9699195 // https://www.elibrary.ru/item.asp?id=48945334
  54. I. Kotenko, I. Saenko, O. Lauta, M. Karpov. Situational control of a computer network security system in conditions of cyber attacks // Proceedings - 2021 14th International Conference on Security of Information and Networks, SIN 2021. 14. 2021.DOI: 10.1109/SIN54109.2021.9699368 // https://www.elibrary.ru/item.asp?id=48933030
  55. A. Jha, D. Tokarev, E.S. Novikova, E.V. Fedorchenko. Feature selection for attacker attribution in industrial automation & control systems // Proceedings of 2021 IV International Conference on Control in Technical Systems (CTS). IEEE, 2021. Ñ. 220-223. DOI: 10.1109/CTS53513.2021.9562879 // https://www.elibrary.ru/item.asp?id=48153745
  56. E.V. Doynikova, A.V. Fedorchenko, E.S. Novikova, I.A. Ushakov, A.V. Krasov. Security decision support in the control systems based on graph models // Proceedings of 2021 IV International Conference on Control in Technical Systems (CTS). IEEE, 2021. Ñ. 224-227. DOI: 10.1109/CTS53513.2021.9562793 // https://www.elibrary.ru/item.asp?id=48152287
  57. Konstantin Izrailov, Dmitry Levshun, Andrey Chechulin. Vulnerability classification model for Smart City transport infrastructure interfaces. Systems of Control, Communication and Security, 2021, no. 5, pp. 199-223. DOI: 10.24412/2410-9916-2021-5-199-223 // https://elibrary.ru/item.asp?id=47141867 (in Russian).
  58. Diana Gaifilina, Igor Kotenko. Analysis of deep learning models for network anomaly detection in Internet of Things // Information and control systems. 2021. No. 1 (110). pp. 28-37. DOI:10.31799/1684-8853-2021-1-28-37 // https://elibrary.ru/item.asp?id=44783235 (in Russian).
  59. Igor Kotenko, Maxim Kolomeec, Ksenia Zhernove, Andrey Chechulin. Visual analytics for information security: areas of application, tasks, visualization models // Cybersecurity issues.¹ 4(44). 2021. pp. 2-15. URL: http://dx.doi.org/10.21681/2311-3456-2021-4-2-15 // https://elibrary.ru/item.asp?id=46331128 (in Russian).
  60. Igor Kotenko, Maxim Kolomeec, Ksenia Zhernove, Andrey Chechulin. Visual analytics for information security: efficiency assessment and analysis of visualization methods // Cybersecurity issues. ¹ 6(46). 2021. pp. 36-46. DOI: 10.21681/2311-3456-2021-6-36-45 // https://elibrary.ru/item.asp?id=47327011 (in Russian).
  61. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko, Eugenia Novikova. Security assessment methodology based on the semantic model of metrics and data // Questions of cybersecurity. 2021. No. 1 (41). pp. 29-40. DOI: 10.21681/2311-3456-2021-1-29-40. // https://elibrary.ru/item.asp?id=44833771 (in Russian).
  62. Valeria Popova, Andrey Chechulin. Application of a model for detecting cyberattacks on cyber-physical systems of critical infrastructure nuclear facilities // Informatization and Communications, No.4, 2021. pp. 60-65. DOI: 10.34219/2078-8320-2021-12-4-60-65. // https://elibrary.ru/item.asp?id=46166156 (in Russian).
  63. Igor Kotenko., Igor Saenko, Oleg Lauta, Alexander Krivel. The method of early detection of cyber attacks based on integration of fractal analysis and statistical methods // First Mile. 2021. No. 6 (98). pp. 64-71. DOI: 10.22184/2070-8963.2021.98.6.64.70 // https://elibrary.ru/item.asp?id=46613709 (in Russian).
  64. Sergei Adadurov, Igor Kotenko, Alexander Glukhov, Igor Saenko. Intelligent information security control system // Automation, communications, informatics. 2021. No. 12. pp. 14-18. DOI: 10.34649/AT.2021.12.12.004 // https://elibrary.ru/item.asp?id=47294953 (in Russian).
  65. Igor Kotenko, Igor Saenko, Artem Makukha, Michael Biryukov. Options for creating data storages in a common information space taking into account information security // Informatization and Communications. 2021. No. 7. pp. 48-55. DOI: 10.34219/2078-8320-2021-12-7-48-55 // https://elibrary.ru/item.asp?id=47378758 (in Russian).
  66. Igor Kotenko, Igor Paraschuk. Fuzzy management of information and security events: features of constructing membership functions // Vestnik of the Astrakhan State Technical University. Series: Management, Computer Engineering and Computer Science. 2021. No. 3. pp. 7-15. DOI: 10.24143/2072-9502-2021-3-7-15 // https://www.elibrary.ru/item.asp?id=46351797 (in Russian).
  67. Elena Fedorchenko, Eugenia Novikova, Diana Gayfullina, Igor Kotenko. Attacker profiling based on the network traffic analysis // Control systems, communications and security. 2021. No. 6. pp. 76-89. DOI: 10.24412/2410-9916-2021-6-76-89 // https://elibrary.ru/item.asp?id=47416445 (in Russian).
  68. Andrey Chechulin, Valeria Popova. A model of detecting cyberattacks on cyber-physical systems of critical infrastructure nuclear facilities // Informatization and Communications. 2021. No. 2. pp. 128-133. DOI: 10.34219/2078-8320-2021-12-2-128-133 // https://elibrary.ru/item.asp?id=45571991 (in Russian).
  69. Valeria Popova, Andrey Chechulin. Investigation of the vulnerabilities distribution in the management systems of critical infrastructure // Informatization and Communications. 2021. No. 7. pp. 7-13. DOI: 10.34219/2078-8320-2021-12-7-7-13 // https://elibrary.ru/item.asp?id=47378752 (in Russian).
  70. Vasily Desnitskiy. Approach to real time attack detection on the base of simulation and graph oriented modeling // Informatization and Communication. 2021. No. 7. pp. 30-35. DOI: 10.34219/2078-8320-2021-12-7-30-35 // https://www.elibrary.ru/item.asp?id=47378755 (in Russian).
  71. Alexey Meleshko, Anton Shulepov, Vasily Desnitsky, Eugenia Novikova. Integrated approach to revelation of anomalies in wireless sensor networks for water control cases // Computer tools in education. 2021. No. 1. pp. 58-67. DOI: 10.32603/2071-2340-2021-1-59-68 https://www.elibrary.ru/item.asp?id=47143926 (in Russian).
  72. Vasily Desnitskiy. Classification and analysis of energy depletion attacks in critical cyber-physical systems with unmanned aerial vehicles // Scientific and Analytical Journal Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia. 2021. No. 3. pp. 44-49. https://www.elibrary.ru/item.asp?id=47085002 (in Russian).
  73. Vasily Desnitskiy. An approach to construction of a secure protocolfor decentralized interaction in wireless sensor networks // Scientific and Analytical journal Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia. 2021. No. 4. pp. 51-57. https://www.elibrary.ru/item.asp?id=47520614 (in Russian).
  74. Vasily Desnitsky. Analysis of the model of energy depletion attacks in cyber-physical systems // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 2. pp. 21-27. DOI: 10.46418/2079-8199_2021_2_3 https://www.elibrary.ru/item.asp?id=46618710 (in Russian).
  75. Alexey Meleshko, Vasily Desnitsky. Anomaly revelation approach for decentralized mesh wireless sensor network for air pollution monitoring // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 3. pp. 9-14. DOI: 10.46418/2079-8199_2021_3_2 // https://elibrary.ru/item.asp?id=47695937 (in Russian).
  76. Igor Saenko, Oleg Lauta, Michael Karpov, Alexandr Krivel. Model of threats to information and telecommunication network resources as a key asset of critical infrastructure // Telecommunication. 2021. No. 1. pp. 36-44. DOI: 10.34832/ELSV.2021.14.1.004 // https://elibrary.ru/item.asp?id=44583360 (in Russian).
  77. Sergei Yasinsky, Igor Paraschuk, Elena Kryukova. Solving problems of linear and nonlinear filtering when implementing proce-dures for interval quality estimation of digital libraries // Information and Cosmos. 2021. No. 1. pp. 49-54. // https://elibrary.ru/item.asp?id=46299368 (in Russian).
  78. Elena Kryukova, Igor Paraschuk. Elements of the filtering theory and the theory of interval averages in the application to the problems of analyzing the quality of electronic libraries // Caspian Journal: management and high technologies. 2021. No. 2 (54). pp. 9-15. DOI: 10.21672/2074-1707.2021.54.2.009-015 // https://elibrary.ru/item.asp?id=46453923 (in Russian).
  79. Elena Kryukova, Valery Malafeev, Igor Parashchuk. Questions of cyber hygiene for users and operators of the automated management system of the electronic library // High-tech technologies in space research of the Earth. 2021. Vol. 13. No. 2. pp. 66-73. DOI: 10.36724/2409-5419-2021-13-2-66-73 // https://elibrary.ru/item.asp?id=46345402 (in Russian).
  80. Elena Kryukova, V. Tkachenko, Anton Mikhaylichenko, Igor Paraschuk. Questions of reliability assessment of modern data storage systems for mobile data centers // High-tech technologies in Earth space research. 2021. Vol. 13. No. 5. pp. 86-95. // https://elibrary.ru/item.asp?id=47332662 (in Russian).
  81. Elena Kryukova, Igor Paraschuk, Sergei Yasinsky. Interval assessment of the quality of functioning of modern digital libraries in conditions of heterogeneous source information // Trudy TSNIIS. St. Petersburg Branch. 2021. Vol. 1. No. 11. pp. 25-34. // https://elibrary.ru/item.asp?id=45816421 (in Russian).
  82. Sergei Yasinsky, Elena Kryukova, Igor Paraschuk. Basic concepts and problems of development of expert systems for monitoring the technical condition and quality of services of electronic libraries // Proceedings of TSNIIS. St. Petersburg Branch. 2021. Vol. 1. No. 11. pp. 35-43. // https://elibrary.ru/item.asp?id=45816422 (in Russian).
  83. Lidia Vitkova, Igor Zelichenok. Method for monitoring and diagnosing local incidents with the potential for protest mobiliza // Informatization and communication. 2021. No. 5. pp. 90-96. DOI: 10.34219/2078-8320-2021-12-5-90-96 // https://elibrary.ru/zfzfey // https://elibrary.ru/item.asp?id=46659859 (in Russian).
  84. Michael Kuznetsov, Vladislav Miadzel, Eugenia Novikova. Towards application of text mining techniques to the analysis of the website's online consents // Izvestiya SPbGETU LETI. 2021. No. 4. pp. 42-48. // https://elibrary.ru/item.asp?id=45736640 (in Russian).
  85. Violetta Kiseleva, Eugenia Novikova. Designing a control panel for monitoring the state of a complex object based on a nested design model of data visualization // Izvestiya SPbGETU LETI. 2021. No. 7. pp. 43-49. // https://elibrary.ru/item.asp?id=46566750 (in Russian).
  86. A. Jha, D. Tokarev, Eugenia Novikova, Elena Fedorchenko. Feature selection for attacker attributionin industrial automation & control systems // International Scientific Conference on Management Problems in Technical Systems. 2021. Vol. 1. pp. 273-277. // https://www.elibrary.ru/item.asp?id=46684226 (in Russian).
  87. Ksenia Zhernove. The use of virtual reality interfaces in the field of information security // Informatization and communications. 2021. 2. pp. 118-127. DOI: 10.34219/2078-8320-2021-12-2-118-127 // https://elibrary.ru/item.asp?id=45571989 (in Russian).
  88. Vasily Desnitskiy. Modeling energy exhaustion attacks on uav in telecommunication systems and networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 4. pp. 14-20. DOI: 10.46418/2079-8199_2021_4_2 https://www.elibrary.ru/item.asp?id=47935486 (in Russian).
  89. M.V. Buinevich, V.V. Pokusov, K.E. Izrailov. Threats model of information and technical interaction in the integrated information protection system // Informatization and communication. 2021. No. 4. pp. 66-73. DOI: 10.34219/2078-8320-2021-12-4-66-73 // https://elibrary.ru/item.asp?id=46166157 (in Russian).
  90. K.E. Izrailov. Generalized classification of vulnerabilities of interfaces to the transport infrastructure of the Smart city // Information Technologies. 2021. Vol. 27. No. 6. pp. 330-336. DOI: 10.17587/it.27.330-336 // https://elibrary.ru/item.asp?id=46264778 (in Russian).
  91. N.E. Romanov, K.E. Izrailov, V.V. Pokusov. Intelligent Programming Support System: Machine Learning FEAT. fast development of secure programs // Informatization and Communications. 2021. No. 5. pp. 7-16. DOI: 10.34219/2078-8320-2021-12-5-7-16 // https://elibrary.ru/item.asp?id=46659846 (in Russian).
  92. M.V. Buinevich, K.E. Izrailov, V.V. Matveev, V.V. Pokosov. Method of variable classification of vulnerabilities in software code. Part 1. Stratification and categorical division // Automation in industry. 2021. No. 11. pp. 42-49. DOI: 10.25728/avtprom.2021.11.09 // https://elibrary.ru/item.asp?id=47189511 (in Russian).
  93. L.A. Vitkova. Methodology of countering cyberbullying in social networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 4. pp. 49-54. DOI: 10.46418/2079-8199_2021_4_7 // https://elibrary.ru/item.asp?id=47935491 (in Russian).
  94. L.A. Vitkova, V.V. Puchkov. Architecture of the anomalous detection system in IoT // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 4. pp. 76-81. DOI: 10.46418/2079-8199_2021_4_11 // https://elibrary.ru/rbxxjt (in Russian).
  95. O.N. Tushkanova. Identification of potentially malicious posts on social networks using positive and unlabeled learning on text data // Control systems, communications and security. 2021. No. 6. pp. 30-52. DOI: 10.24412/2410-9916-2021-6-30-52 // https://elibrary.ru/item.asp?id=47416443 (in Russian).
  96. I.V. Kotenko, I.B. Paraschuk. Construction of membership functions in fuzzy security information and event management tasks // Mathematical methods in technology and engineering. 2021. No. 1. pp. 126-129. Proceedings of the International Scientific Conference MMTT-34. DOI: 10.52348/2712-8873_MMTT_2021_1_126 // https://www.elibrary.ru/item.asp?id=45537416 (in Russian).
  97. K.E. Izrailov. Genetic decompilation concept of the telecommunication devices machine code // Proceedings of educational institutions of communications. 2021. Vol. 7. No. 4. pp. 95-109. DOI: 10.31854/1813-324X-2021-7-4-95-109 // https://elibrary.ru/item.asp?id=47488978 (in Russian).
  98. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov V.V. Language of the program code uniform presentation for searching medium- and high-level vulnerabilities: the basic provisions of paradigm // Cybersecurity issues. 2021. No. 6 (46). pp. 78-89. DOI: 10.21681/2311-3456-2021-6-78-89 // https://elibrary.ru/item.asp?id=47327015 (in Russian).
  99. M.A. Skorykh, K.E. Izrailov, A.V. Bashmakov. Task oriented comparison of network traffic analysis tools // In the collection: Theory and practice of information security. Collection of scientific papers based on the materials of the All-Russian scientific and theoretical conference. 2021. pp. 103-107. // https://elibrary.ru/item.asp?id=49246459 (in Russian).
  100. M.V. Buinevich, K.E. Izrailov, A.A. Krivenko. Cybersecurity gaming training systems: review and criteria comparison // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 4. pp. 5-13. DOI: 10.46418/2079-8199_2021_4_1 // https://elibrary.ru/item.asp?id=47935485 (in Russian).
  101. K.E. Izrailov, V.V. Pokusov. Software platform architecture for converting machine code into a high-level representation for expert search of vulnerabilities // Electronic network polythematic journal "Scientific works of KubSTU". 2021. No. 6. pp. 93-111. // https://elibrary.ru/item.asp?id=47970524 (in Russian).
  102. I.B. Saenko, A.Yu. Khalenev. Models for configuring virtual local computing networks in corporate information systems // Proceedings of TSNIIS. St. Petersburg branch. 2021. Vol. 2. No. 12. pp. 80-85. // https://elibrary.ru/item.asp?id=48051459 (in Russian).
  103. I.B. Sayenko, M.H. Al-Barry. Detecting anomalous queries to databases based on machine learning methods // The works of TSNIIS. St. Petersburg branch. 2021. Vol. 2. No. 12. pp. 75-79. // https://elibrary.ru/item.asp?id=48051458 (in Russian).
  104. I.B. Sayenko, I.N. Fabiyanovsky, A.M. Starkov, E.G. Balenko. A model for assessing the timeliness and completeness of the exchange of information resources in corporate systems with a distributed registry // Engineering Bulletin of the Don. 2021. No. 6 (78). pp. 57-70. https://elibrary.ru/item.asp?id=46387062 (in Russian).
  105. F.A. Skorik, I.B. Saenko, S.A. Yasinsky. Combined neural network model for analysis of the state of computer network elements // Information and Cosmos. 2021. No. 3. pp. 56-59. // https://www.elibrary.ru/item.asp?id=47374003 (in Russian).
  106. I.B. Sayenko, I.N. Fabiyanovsky, A.M. Starkov, E.G. Balenko. Methodology for ensuring the timeliness and completeness of the exchange of information resources in corporate networks with a distributed registry // Engineering Bulletin of the Don. 2021. No. 6 (78). pp. 88-99. // https://www.elibrary.ru/item.asp?id=46387065 (in Russian).
  107. M.H. Al-Barry, I.B. Saenko. Investigation of the possibility of detecting abnormal database queries using neural networks // Methods and technical means of ensuring information security. 2021. No. 30. pp. 19-20. // https://www.elibrary.ru/item.asp?id=46183949 (in Russian).
  108. I.B. Saenko, S.A. Yasinsky. Justification of the security risks of 5 g, networks caused by the use of foreign suppliers // Proceedings of TSNIIS. St. Petersburg branch. 2021. Vol. 1. No. 11. pp. 93-100. // https://www.elibrary.ru/item.asp?id=45816427 (in Russian).
  109. D.V. Volkov, I.B. Saenko, R.Sh. Shakurov, A.V. Ulanov. On the issue of constructing an agent model of technical support for a special-purpose communication system // High-tech technologies in space research of the Earth. 2021. Vol. 13. No. 1. pp. 24-35. DOI: 10.36724/2409-5419-2021-13-1-24-35 // https://www.elibrary.ru/item.asp?id=44952892 (in Russian).
  110. E.S. Kryukova, I.B. Paraschuk, S.A. Yasinsky. General organization of components and analysis of the influence of structural parameters of modern electronic libraries to assess their quality // The works of the Central Research Institute. St. Petersburg branch. 2021. Vol. 2. No. 12. pp. 20-26. // https://elibrary.ru/item.asp?id=48051451 (in Russian).
  111. S.A. Yasinsky, A.V. Mikhailichenko, I.B. Paraschuk. Formulation and formal description of the composition of the subsystem of quality indicators of services provided to users by modern mobile data centers // Proceedings of the Central Research Institute. St. Petersburg branch. Scientific and technical collection of articles, 2021. Vol. 2. No.12. pp. 10-19. // https://elibrary.ru/item.asp?id=48051450 (in Russian).
  112. E.S. Kryukova, I.B. Paraschuk. Methodological aspects of the analysis of the quality of electronic libraries based on statistics of interval averages // Mathematical methods in technologies and engineering. 2021. No. 1. pp. 135-138. DOI: 10.52348/2712-8873_MT_2021_1_135 // https://elibrary.ru/item.asp?id=45537420 (in Russian).
  113. I.Yu. Zelichenok. Analysis of information security events based on CICIDS data 17 // Informatization and communications. 2021. No. 7. pp. 68-71. DOI: 10.34219/2078-8320-2021-12-7-68-71 // https://elibrary.ru/item.asp?id=47378761 (in Russian).
  114. I.Yu. Zelichenok. Visualization and processing of information security events based on CICIDS data 17 // Information Technologies and Telecommunications. 2021. Vol. 9. No. 4. pp. 49-55. DOI: 10.31854/2307-1303-2021-9-4-49-55 // https://elibrary.ru/item.asp?id=47570006 (in Russian).
  115. Vladimir Puchkov, Igor Kotenko. Analysis of the security of cyber-physical systems using attack graphs // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). pp. 98-100 // https://elibrary.ru/item.asp?id=49265507 (in Russian).
  116. Vladimir Puchkov. Socio-psychological aspects of the modern information society // XII St. Petersburg Interregional Conference "Information Security of Russian regions" Proceedings of RIIB, issue 10 (IBRR-2021). pp. 149-153 (in Russian).
  117. Vladimir Puchkov. Socio-psychological aspects of the modern information society. XXV International Scientific and Educational-Practical Conference "System Analysis in Design and Management" (SAEC-2021) pp. 417-425 (in Russian).
  118. Ksenia Zhernove, Maxim Kolomeets. Vulnerabilities of "Operator - artificial intelligence" interfaces in an unmanned transport environment // X Anniversary International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO 2021) pp. 387-390 // https://elibrary.ru/item.asp?id=46275432 (in Russian).
  119. Maxim Kolomeets. Analysis of statistical features of social media profiles for bot detection // X Anniversary International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO 2021) pp. 509-512. // https://www.elibrary.ru/item.asp?id=46275456 (in Russian).
  120. Maxim Kolomeets, Ksenia Zhernove, Andrey Chechulin. Conceptual model of system-user interface of unmanned vehicle environment in a smart city // XII St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2021) p. 86. http://spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf. // https://elibrary.ru/item.asp?id=49265527 (in Russian).
  121. Maxim Kolomiets. Social network bots market research // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021) p. 85. URL: http://spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://www.elibrary.ru/item.asp?id=49241014 (in Russian).
  122. Dmitry Levshun. Architecture of the youth survey system in vkontakte social network for identifying negative personal trends // X International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2021). February 24-25, 2021. Collection of scientific articles. Vol. 1. SPb., 2021. P. 570-572. URL: https://www.sut.ru/doci/nauka/1AEA/APINO/10-APINO-2021.%20T.1.pdf (in Russian) // https://elibrary.ru/item.asp?id=46275469 (in Russian).
  123. Dmitry Levshun. Algorithm for the formation of the component composition of a secure microcontroller-based system // XII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2021)". The proceedings of the conference, 2021. P. 88-90. http://spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf (in Russian). // https://elibrary.ru/item.asp?id=49265525 (in Russian).
  124. Dmitry Levshun. Tool for automated passing of psychological tests on a social network // Proceedings of the I International Scientific Congress "Pedagogy and Psychology in Medicine: Problems, Innovations, Achievements". St. Petersburg, Russia, June 3-4, 2021. P. 159-164. https://www.elibrary.ru/download/elibrary_47190334_67120339.pdf (in Russian) // https://elibrary.ru/item.asp?id=47190334 (in Russian).
  125. Alexander Branitskiy, Igor Kotenko, Elena Fedorchenko. Methods of classifying communities in social networks using neural networks // Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 100-103. // https://elibrary.ru/item.asp?id=46275372 (in Russian).
  126. Nina Voncharova, Andrey Bogatyrev, Natalya Krasilnikova, Artem Tishkov, Igor Kotenko. Pedagogical component in the formation of a doctor's personality in medical professional education // In the collection: Social and professional formation of personality in the era of great challenges: Interdisciplinary discourse. collection of articles of the All-Russian conference with international participation. Yaroslavl, 2021. pp. 269-274. // https://elibrary.ru/item.asp?id=45830948 (in Russian).
  127. I.S Bystrov, Igor Kotenko. Analysis of user behavior models for malicious insiders detection // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 139-143. // https://elibrary.ru/item.asp?id=46275380 (in Russian).
  128. Diana Gaifulina, Igor Kotenko. Analysis of criteria for the classification of approaches to security events correlation // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 206-210. // https://elibrary.ru/item.asp?id=46275393 (in Russian).
  129. E.A. Donskov, Igor Kotenko. Analysis of adversarial attacks on machine learning components of intrusion detection systems // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. pp. 315-319. // https://elibrary.ru/item.asp?id=46275417 (in Russian).
  130. Igor Zelichenok, Igor Kotenko. Analysis of methods for multi-step attack detection // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. pp. 400-405. // https://elibrary.ru/item.asp?id=46275435 (in Russian).
  131. Igor Kotenko, Vladimir Puchkov. Analysis of methods for assessing the security of cyber-physical systems // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. Vol.1 pp. 531-536. // https://elibrary.ru/item.asp?id=46275461 (in Russian).
  132. Igor Kotenko, S. Khmyrov. Analysis of current methods of attributing cyber security offensers in the implementation of targeted attacks on objects of critical infrastructure // In the collection: Actual problems of infotelecommunications in science and education (APINO 2021). collection of scientific articles: in 4 t .. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. pp. 536-541. // https://elibrary.ru/item.asp?id=46275462 (in Russian).
  133. Alexander Branitsky, Elena Doynikova, Igor Kotenko. Application of neural networks to detect potentially destructive information content in social networks // In the collection: Pedagogy and psychology in medicine: problems, innovations, achievements. proceedings of the I International Scientific Congress. Moscow, 2021. pp. 35-40. // https://www.elibrary.ru/item.asp?id=47190313 (in Russian).
  134. Valeria Popova, Andrey Chechulin. Initial events analysis for the safety of nuclear fuel transfer operations // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. Saint Petersburg, 2021. pp. 395-399. // https://elibrary.ru/item.asp?id=46545700 (in Russian).
  135. Alexander Branitsky, Rinat Mardanov. Detection voice spoofing based on convolutional and recurrent neural networks // Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg, 2021. pp. 87-91.// https://elibrary.ru/item.asp?id=46545632 (in Russian).
  136. Vasily Desnitskiy, Igor Paraschuk. Formal description of the features of the intruder model and criticality of attacking actions on wireless sensor networks // Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 297-301. https://www.elibrary.ru/item.asp?id=46275413 (in Russian).
  137. I. Bystrov, Andrey Fedorchenko, Elena Fedorchenko. An architecture of security assessment and countermeasure selection system based on the semantic model of data and metrics // Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. pp. 143-146. // https://elibrary.ru/item.asp?id=46275381 (in Russian).
  138. Elena Doynikova (Fedorchenko), Andrey Fedorchenko, Igor Ushakov, Andrey Krasov, Eugenia Novikova. Decision support for responding to violations in control systems using graph models // International Scientific Conference on Management Problems in Technical Systems. 2021. Vol. 1. pp. 278-282. // https://elibrary.ru/item.asp?id=46684227 (in Russian).
  139. D. Mikhailov, Igor Saenko, E. Ugarova. Algorithm for the formation of access control schemes in virtual local area networks of automated control systems for special purposes // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VI Interuniversity Scientific and Practical Conference. Saint Petersburg, 2021. pp. 100-103. // https://www.elibrary.ru/item.asp?id=46480253 (in Russian).
  140. Igor Saenko. Artificial intelligence: history and current state of research // In the collection: The use of artificial intelligence in information and telecommunication systems. collection of materials of the scientific and practical conference. Military Academy of Communications. Saint Petersburg, 2021. pp. 5-10. // https://www.elibrary.ru/item.asp?id=46341730 (in Russian).
  141. M. Al-Barry, Igor Saenko. Identification of anomalies in the registration logs of database servers as an element of maintenance of data processing centers // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VI Interuniversity Scientific and Practical Conference. St. Petersburg, 2021. pp. 90-94. // https://www.elibrary.ru/item.asp?id=46480251 (in Russian).
  142. Fadey Skorik, Igor Saenko, E. Ugarova. Application of combined neural networks for monitoring the state of a computer network // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VI Interuniversity Scientific and Practical Conference. Saint Petersburg, 2021. pp. 95-99. // https://www.elibrary.ru/item.asp?id=46480252 (in Russian).
  143. Igor Saenko, Alexandra Khinenzon. Analysis of social media metadata to detect abnormal behavior // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 642-647. // https://elibrary.ru/item.asp?id=46275485 (in Russian).
  144. Igor Saenko, Andrey Kiy, Andrey Renskov, Oleg Lapshin. Organizational and technological methodology of modernization of special software for the domestic hardware and software platform // In the collection: The state and prospects of development of modern science in the direction of "Automated control systems, information and telecommunication systems" . Collection of articles of the III All-Russian Scientific and Technical Conference. Anapa, 2021. pp. 82-88. // https://www.elibrary.ru/item.asp?id=46365163 (in Russian).
  145. Jaroslav Dombrovsky, V. Malofeev, Igor Paraschuk. Analysis of modern software tools for protecting infocommunications from network attacks // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. pp. 310-314. // https://elibrary.ru/item.asp?id=46275416 (in Russian).
  146. Igor Paraschuk, Elena Fedorchenko. Analysis of the effectiveness of the information security management system of the industrial Internet of Things using methods of the theory of fuzzy sets // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 617-621. // https://www.elibrary.ru/item.asp?id=46275479 (in Russian).
  147. Igor Paraschuk, Nikolay Mikhaylichenko, Anton Mikhaylichenko. Neuro-fuzzy networks and algorithms of granular computing in intelligent data processing tasks for assessing the reliability of mobile data centers // In the collection: Application of artificial intelligence in information and telecommunication systems. collection of materials of the scientific and practical conference. Military Academy of Communications. Saint Petersburg, 2021. pp. 110-115. // https://elibrary.ru/item.asp?id=46341744 (in Russian).
  148. Igor Paraschuk, Elena Kryukova, Andrey Bashkirtsev, Andrey Seleznev. Intelligent electronic library management systems: goals, directions and phases of development // In the collection: The use of artificial intelligence in information and telecommunication systems. collection of materials of the scientific and practical conference. Military Academy of Communications. Saint Petersburg, 2021. pp. 115-120. // https://elibrary.ru/item.asp?id=46341745 (in Russian).
  149. Elena Kryukova, S. Belyaev, Igor Paraschuk. Expert assessment of the technical condition and planning of maintenance of automated control systems and electronic libraries for special purposes // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VI Interuniversity Scientific and Practical Conference. St. Petersburg, 2021. pp. 121-124.// https://elibrary.ru/item.asp?id=46480258 (in Russian).
  150. Anton Mikhaylichenko, Igor Paraschuk, Elena Kryukova. Building systems of indicators of technical reliability of electronic libraries and data processing centers // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VI Interuniversity Scientific and Practical Conference. Saint Petersburg, 2021. pp. 130-135. // https://elibrary.ru/item.asp?id=46480260 (in Russian).
  151. S. Bashkirtsev, V. Malofeev, I. Paraschuk. Analysis of the role and place of technical condition monitoring tasks in the communication system management cycle and in the process of formulating requirements for automated communication management systems // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VI Interuniversity Scientific and Practical Conference. Saint Petersburg, 2021. pp. 136-140. // https://elibrary.ru/item.asp?id=46480261 (in Russian).
  152. Igor Paraschuk, Elena Kryukova, Anton Mikhailichenko. Reliability analysis of data processing centers and electronic libraries // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the VI Interuniversity Scientific and Practical Conference. St. Petersburg, 2021. pp. 146-150. // https://www.elibrary.ru/item.asp?id=46480263 (in Russian).
  153. Andrey Bashkirtsev, Igor Paraschuk. Determination of the informative significance of requirements for quality indicators of the technical basis of the communication management system // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg, 2021. Vol. 2, pp. 65-69.// https://elibrary.ru/item.asp?id=46545627 (in Russian).
  154. Kryukova E.S., Paraschuk I.B. Substantiation of the stages of the method of interval estimation of the quality of electronic libraries // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg, 2021. pp. 285-289.// https://elibrary.ru/item.asp?id=46545676 (in Russian).
  155. Anton Mikhaylichenko, Nikolay Mikhaylichenko, Igor Paraschuk. Formulation of stages and features of the development of a methodology for assessing the reliability of modern mobile data centers // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg, 2021. pp. 345-349. // https://elibrary.ru/item.asp?id=46545689 (in Russian).
  156. Elizaveta Berezina, Lidia Vitkova. Development of a database for selecting countermeasures for malicious information detection systems of // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. Vol.1, pp. 90-95. // https://elibrary.ru/item.asp?id=46275370 (in Russian).
  157. Lyubov Bogdanova, Lidia Vitkova. The development of a traffic sequence diagram in IOT networks // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. Vol. 1, pp. 95-99.// https://elibrary.ru/item.asp?id=46275371&pff=1 (in Russian).
  158. Lidia Vitkova. Analysis of data models of popular social networks // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. Vol.1, pp. 160-163. // https://elibrary.ru/item.asp?id=46275385 (in Russian).
  159. Lidia Vitkova, Daria Goluzina D.R. K-block cross validation in machine learning problems // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. Vol.1, pp. 163-167. // https://elibrary.ru/item.asp?id=46275386&pff=1 (in Russian).
  160. Lidia Vitkova, Valentina Koptelova. Classification of e-commerce bots and their behavior // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. Vol.1 pp. 168-173. // https://elibrary.ru/item.asp?id=46275387&pff=1 (in Russian).
  161. Ksenia Zhernova. Methodology for designing human-computer interfaces for information security applications // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. St. Petersburg, 2021. Vol.1, pp. 384-387. // https://elibrary.ru/item.asp?id=46275431 (in Russian).
  162. N.V. Gololobov, K.E. Izrailov. Investigating a way to call an insecure kernel API on Windows OS // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. Vol.1, pp. 248-252. // https://elibrary.ru/item.asp?id=46275402 (in Russian).
  163. K.E. Izrailov, V.V. Pokusov. Creation of a software object-oriented platform for the development of UEFI modules // Actual problems of infotelecommunications in science and education (APINO-2021). X Anniversary International scientific-technical and scientific-methodical conference; collection of scientific articles in 4 vol. 2021. Volume 2. pp. 246-250 https://www.sut.ru/doci/nauka/1AEA/APINO/10-APINO-2021.Ò.2.pdf // https://elibrary.ru/item.asp?id=46545667 (in Russian).
  164. I.S. Bystrov, I.V. Kotenko. Classification of approaches for user behavior modeling for insider threats detection // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. T 1. pp. 70-72 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49240932 (in Russian).
  165. D.A. Gaifullina. Basic systematization criteria for approaches to security events correlation // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. T 1. pp. 73-75 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49241019 (in Russian).
  166. S.A. Golubev, I.N. Murenin, E.S. Novikova. Analysis of approaches to attribute selection for malware analysis based on images // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. T 1. pp. 75-76 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://www.elibrary.ru/item.asp?id=49240934 (in Russian).
  167. V.A. Desnitskiy. Analysis of applicability and theoretical evaluation of means for analysis of protection of the components in wireless sensor networks // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. Vol. 1. P. 77 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49241018 (in Russian).
  168. A.V. Meleshko. Attack model for a decentralized self-organizing wireless sensor network // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. pp. 90-92 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265524&pff=1 (in Russian).
  169. A.V. Pomogalova, E.A. Donskov, I.V. Kotenko. Decentralized finance services: general attack algorithm // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. T 1. pp. 95-97 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265247 (in Russian).
  170. V.O. Popova, A.A. Chechulin. Investigation of the vulnerabilities distribution in the management systems of critical infrastructure // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. 1. pp. 97-98 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265522 (in Russian).
  171. S.S. Khmyrov, I.V. Kotenko. Analysis of the extended «Cyber kill chain» model for attributing cyber security offenders under implementation of targeted attacks against critical infrastructure objects // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. pp. 103-105 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265504 (in Russian).
  172. A.A. Branitsky, Ya. Sharma, E.V. Fedorchenko. Applying machine learning methods for sentiment analysis of users of the social network Reddit // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. 1. pp. 69-70 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://www.elibrary.ru/item.asp?id=49241020 (in Russian).
  173. K.N. Zhernova, A.A. Chechulin. Overview of security threats for modern interfaces // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. T 1. pp. 82-83 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49241015 (in Russian).
  174. V.A. Desnitskiy. An approach to monitoring Denial-of-Sleep attacks in wireless sensor networks using intelligent data analysis // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. T 1. pp. 78-79 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf https://www.elibrary.ru/item.asp?id=49241017 (in Russian).
  175. A.V. Meleshko. Approach to designing a safe self-organizing decentralized wireless sensor network // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. T 1. pp. 92-94 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265523 (in Russian).
  176. E.V. Fedorchenko, I.B. Paraschuk. Approaches to eliminating the uncertainty of security input information in the tasks of analyzing the security of industrial Internet of Things systems // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. 1. pp. 100-102 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265506 (in Russian).
  177. E.V. Fedorchenko, A.V. Fedorchenko, E.S. Novikova, A.A. Branitsky, A.V. Meleshko, V.V. Puchkov. System for security assessment and counermeasure selection using semantic model of data and metrics // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. 1. pp. 102-103 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://www.elibrary.ru/item.asp?id=49265505 (in Russian).
  178. V.A. Desnitskiy. Architecture and hardware and software prototypes of security analysis tools for wireless sensor networks components // In the collection: Mathematical and computer modeling. Collection of materials of the IX International Scientific Conference dedicated to the 85th anniversary of Professor V.I. Potapov. Omsk, 2021. pp. 251-253. http://fkn.univer.omsk.su/nauka/Conf/2021/IX_MCM_Conf_2021.pdf https://www.elibrary.ru/item.asp?id=48737114 (in Russian).
  179. V.A. Desnitskiy. Analysis of requirements for real-time detection of attacks in critical infrastructures // In the collection: Mathematical and computer modeling. Collection of materials of the IX International Scientific Conference dedicated to the 85th anniversary of Professor V.I. Potapov. Omsk, 2021. pp. 254-256. http://fkn.univer.omsk.su/nauka/Conf/2021/IX_MCM_Conf_2021.pdf. https://www.elibrary.ru/item.asp?id=48737115 (in Russian).
  180. A.V. Meleshko. Analysis of attacking effects on the prototype of a wireless sensor network // Collection of materials of the IX International Scientific Conference dedicated to the 85th anniversary of Professor V.I. Potapov. 2021. pp. 260-262 http://fkn.univer.omsk.su/nauka/Conf/2021/IX_MCM_Conf_2021.pdf // https://elibrary.ru/item.asp?id=48737117 (in Russian).
  181. A.V. Meleshko. Building a prototype of a wireless sensor network for monitoring ambient air // In the collection: Mathematical and computer modeling. Collection of materials of the IX International Scientific Conference dedicated to the 85th anniversary of Professor V.I. Potapov. 2021. pp. 257-259 http://fkn.univer.omsk.su/nauka/Conf/2021/IX_MCM_Conf_2021.pdf // https://elibrary.ru/item.asp?id=48737116 (in Russian).
  182. V.A. Desnitskiy. Application of simulation principles to solve problems of detecting attacks in critical infrastructures // In the collection: Digital region: experience, competencies, projects. Proceedings of the IV International Scientific and Practical Conference dedicated to the Year of Science and Technology in Russia. Bryansk, 2021. pp. 195-198. http://bgitu.ru/upload/iblock/f78/Sbornik_Tsifrovoy_region_opyt_kompetentsii_proekty_2021.pdf https://www.elibrary.ru/item.asp?id=48374815 (in Russian).
  183. E.V. Fedorchenko, E.S. Novikova, D.A. Gayfulina, I.V. Kotenko. Attacker profiling for security analysis and response to cyber incidents // In the collection: Actual problems of protection and security: Proceedings of the XXIV All-Russian Scientific and Practical Conference RARAN (March 31 - April 3, 2021). 2021. Volume 1. pp. 144-148 // https://www.elibrary.ru/item.asp?id=48010763 (in Russian).
  184. I.B. Paraschuk, I.V. Kotenko, I.B. Saenko. Management of information and security events based on fuzzy algorithms // Promising directions of development of domestic information technologies: materials of the VII interregional scientific and practical conference. Sevastopol. 2021. pp. 67-68 // https://elibrary.ru/item.asp?id=48803654 (in Russian).
  185. E.V. Fedorchenko, I.B. Paraschuk. Assessment of cyberattack protection in industrial Internet of Things systems // Promising directions of development of domestic information technologies: materials of the VII interregional scientific and practical conference. Sevastopol. 2021. pp. 65-66 //https://www.elibrary.ru/item.asp?id=48803653 (in Russian).
  186. V.I. Gorodetsky, O.N.Tushkanova. Generation of text data ontology // In the collection: Integrated Models and Soft computing in Artificial Intelligence (IMB-2021). Collection of scientific papers of the Xth International Scientific and Technical Conference. In 2 volumes. Smolensk, 2021. pp. 284-295 // https://elibrary.ru/item.asp?id=46337304 (in Russian).
  187. K.N. Zhernova. Secure interface to control device type «Smart mirror» // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021), pp. 81-82 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49241016 (in Russian).
  188. Igor Kotenko, Igor Saenko, Igor Paraschuk. Analysis of the security of critical infrastructure resources in terms of their availability: indicators and criteria // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021)1, pp. 87-88 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://www.elibrary.ru/item.asp?id=49265526 (in Russian).
  189. Andrey Bashkirtsev, Igor Paraschuk, Sergey Belyaev, Grigory Bogolepov. Classification and ranking by informative significance of requirements for security indicators of automated telecommunications network management systems // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021) P. 126-128. http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265502 (in Russian).
  190. Nikolay Mikhaylichenko, Igor Paraschuk, Anton Mikhaylichenko. Information security of mobile data centers: stages of development of the methodology of analysis in conditions of uncertainty // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021) P. 175-177. http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://www.elibrary.ru/item.asp?id=49233528 (in Russian).
  191. Igor Paraschuk, Elena Kryukova. Information security of modern electronic libraries: features and stages of interval analysis // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021) P. 183-185. http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49241026 (in Russian).
  192. Igor Paraschuk, Valery Malofeev, Ivan Morozov. Software tools for protecting telecommunications from network attacks, analysis of their capabilities and application specifics // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021) P. 185-187. http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265498 (in Russian).
  193. Vyacheslav Sundukov, Igor Paraschuk, Andrey Seleznev. Analysis of modern means of multi-factor authentication of users of automated telecommunications network management systems // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021) P. 193-195. http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49265497 (in Russian).
  194. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov, A.Yu. Yaroshenko. On the architecture of complex and integrated security systems: protocol-oriented approach // In the collection: Current problems of protection and security. Proceedings of the XXIV All-Russian Scientific and Practical Conference RARAN. Moscow, 2021. pp. 377-383. // https://elibrary.ru/item.asp?id=47472530 (in Russian).
  195. K.E. Izrailov. Improving the interfaces of specialized mobile applications of the Ministry of Emergency Situations of Russia // In the collection: Transport of Russia: problems and prospects - 2021. Materials of the International Scientific and Practical Conference. Saint Petersburg, 2021. pp. 82-88. // https://elibrary.ru/item.asp?id=48702890 (in Russian).
  196. V.O. Popova, A.A. Chechulin. Investigation of the vulnerabilities distribution in the management systems of critical infrastructure // Â ñáîðíèêå: Information security of the regions of Russia (IBRR-2021). Materials of the XII St. Petersburg Interregional Conference. Saint Petersburg, 2021. pp. 97-98. // https://elibrary.ru/item.asp?id=49265522 (in Russian).
  197. I.V. Kotenko, I.B. Saenko, I.B. Paraschuk. Criteria for assessing the availability of information, telecommunications and other critical resources for the analysis of their security // Regional informatics and information security. Proceedings of the XII St. Petersburg Interregional Conference. Saint Petersburg, 2021. pp. 97-101. // https://elibrary.ru/item.asp?id=48126257 (in Russian).
  198. M. H. Al-Barry, I.B. Saenko. An approach to detect harmful actions by users of data centers // In the collection: Information security of the regions of Russia (IBRR-2021). Materials of the XII St. Petersburg Interregional Conference. Saint Petersburg, 2021. pp. 117-118. // https://elibrary.ru/item.asp?id=49265256 (in Russian).
  199. E.V. Fedorchenko, I.B. Paraschuk. Analysis of the security protection of industrial internet of things systems in the conditions of uncertainty of security input information // Regional informatics and information security. Proceedings of the XII St. Petersburg Interregional Conference. Saint Petersburg, 2021. pp. 113-117. // https://elibrary.ru/item.asp?id=48126261 (in Russian).
  200. V.V. Nikolaev, I.B. Saenko, S.N. Bushuev. An approach to formation of the optimal plan for distribution of information resources in a common information space // In the collection: Promising directions for the development of domestic information technologies. Materials of the VII interregional scientific and practical conference. Scientific editor B.V. Sokolov. Sevastopol, 2021. pp. 69-70. // https://elibrary.ru/item.asp?id=48803655 (in Russian).
  201. M.H. Al-Barry, I.B. Saenko I.B. An approach to detecting anomalous database query based on using machine learning methods // In the collection: Promising directions of development of domestic information technologies. Materials of the VII interregional scientific and practical conference. Scientific editor B.V. Sokolov. Sevastopol, 2021. pp. 71-72. // https://www.elibrary.ru/item.asp?id=48803658 (in Russian).
  202. I.B. Saenko, A.M. Starkov, I.N. Fabiyanovsky. An approach to improving the efficiency and completeness of information exchange in a corporate information system based on Blockchain technology // In the collection: Innovative activity in the Armed Forces of the Russian Federation. proceedings of the All-Army scientific and practical conference. Saint Petersburg, 2021. pp. 116-119. // https://www.elibrary.ru/item.asp?id=47962912 (in Russian).
  203. N.V. Mikhaylichenko, I.B. Paraschuk, A.V. Mikhaylichenko. General tasks and content of the stages of developing a methodology for analyzing information security of mobile data centers // In the collection: Regional informatics and information security. Proceedings of the XII St. Petersburg Interregional Conference. St. Petersburg, 2021. pp. 43-47. // https://www.elibrary.ru/item.asp?id=48126245 (in Russian).
  204. I.B. Paraschuk, A.V. Mikhailichenko, E.S. Kryukova. Analysis of noisy and heterogeneous data on the values of data center reliability parameters // In the collection: Modern technologies: current issues of theory and practice. Collection of articles of the International Scientific and Practical Conference. Penza, 2021. pp. 74-76. // https://elibrary.ru/item.asp?id=47108447 (in Russian).
  205. I.B. Paraschuk, E.S. Kryukova. An approach to solving the problem of increasing the reliability of control and analysis of multiparametric systems // In the collection: Innovative activity in the armed forces of the Russian Federation. Proceedings of the All-Army scientific and practical conference. St. Petersburg, 2021. pp. 102-105.// https://elibrary.ru/item.asp?id=47962909 (in Russian).
  206. N.V. Mikhaylichenko, A.V. Mikhaylichenko, I.B. Paraschuk. Granular probabilistic automaton for modeling the process of changing the states of data processing centers // In the collection: Innovative activity in the Armed forces of the Russian Federation. Proceedings of the All-Army scientific and practical conference. St. Petersburg, 2021. pp. 105-108.// https://elibrary.ru/item.asp?id=47962910 (in Russian).
  207. S.V. Belyaev, I.V. Morozov, I.B. Paraschuk. On the issue of structural and statistical analysis of information traffic // In the collection: Innovative activity in the armed forces of the Russian Federation. Proceedings of the All-Army scientific and practical conference. St. Petersburg, 2021. pp. 108-111.// https://elibrary.ru/item.asp?id=47962911 (in Russian).
  208. Kryukova E.S., Paraschuk I.B. Analysis of the quality of electronic libraries: methodological approaches // In the collection: Promising directions for the development of domestic information technologies. Materials of the VII interregional scientific and practical conference. Scientific editor B.V. Sokolov. Sevastopol, 2021. pp. 42-43. // https://elibrary.ru/item.asp?id=48803644 (in Russian).
  209. A.V. Seleznev,V.A. Sundukov, I.B. Paraschuk. Multi-factor authentication of information system users: features and problems // In the collection: Promising directions for the development of domestic information technologies. Materials of the VII interregional scientific and practical conference. Scientific editor B.V. Sokolov. Sevastopol, 2021. pp. 51-52.// https://elibrary.ru/item.asp?id=48803647 (in Russian).
  210. A.S. Bashkirtsev, I.B. Paraschuk, S.V. Belyaev, G.S.Bogolepov. Requirements for security indicators of automated telecommunications network management systems and their formulation their informative significance // In the collection: Regional informatics and information security. Proceedings of the XII St. Petersburg Interregional Conference. St. Petersburg, 2021. pp. 23-27. //https://elibrary.ru/item.asp?id=48126241 (in Russian).
  211. I.B. Paraschuk, E.S. Kryukova. Interval analysis of information security of electronic libraries // In the collection: Regional informatics and information security. Proceedings of the XII St. Petersburg Interregional Conference. St. Petersburg, 2021. pp. 53-57. // https://elibrary.ru/item.asp?id=48126247 (in Russian).
  212. I.B. Paraschuk, V.A. Malafeev, I.V. Morozov. Assessment of the potential and review of the features of software for protecting telecommunications from network attacks // In the collection: Regional informatics and information security. Proceedings of the XII St. Petersburg Interregional Conference. St. Petersburg, 2021. pp. 58-61.// https://elibrary.ru/item.asp?id=48126248 (in Russian).
  213. V.V. Puchkov. Socio-psychological aspects of the modern information society // In the collection: Regional informatics and information security. Proceedings of the XII St. Petersburg Interregional Conference. St. Petersburg, 2021. pp. 149-153. // https://www.elibrary.ru/item.asp?id=48126271 (in Russian).
  214. A.A. Shulepov, E.S. Novikova. An approach to comparing patterns of system functioning based on analysis ofdistribution of multi-dimensional data in space // in the collection: Information security of the regions of Russia (IBRD-2021). Materials of the XII St. Petersburg Interregional Conference. St. Petersburg, 2021. pp. 346-348.// https://www.elibrary.ru/item.asp?id=49265367 (in Russian).

2020

  1. Bilal Fakih, Didier El Baz, Igor Kotenko. GRIDHPC: A decentralized environment for high performance computing // Concurrency Computation Practice and Experience. 2020. Ò. 32. ¹ 10. Ñ. e5320. DOI: 10.1002/cpe.5320, Internal Article ID: 16450736 // https://elibrary.ru/item.asp?id=43203879 (ÐÈÍÖ, WoS, Scopus, SJR=0.31, Q2)
  2. Dmitry Levshun, Yannick Chevalier, Igor Kotenko, Andrey Chechulin. Design and verification of a mobile robot based on the integrated model of cyber-physical systems // Simulation Modelling Practice and Theory, 2020, Vol. 105, P. 102151. DOI: 10.1016/j.simpat.2020.102151 // https://elibrary.ru/item.asp?id=45422773
  3. Alexey Kashevnik, Andrew Ponomarev, Nikolay Shilov, Andrey Chechulin. In-Vehicle Situation Monitoring for Potential Threats Detection Based on Smartphone Sensors // Sensors 2020, Vol. 20, ¹ 18, P.1-15, DOI: 10.3390/s20185049 // https://elibrary.ru/item.asp?id=45319177 (ÐÈÍÖ, Scopus)
  4. Yannick Chevalier, Roland Rieke, Florian Fenzl, Andrey Chechulin, Igor Kotenko. ECU-Secure: Characteristic Functions for In-Vehicle Intrusion Detection // Studies in Computational Intelligence, Vol.868, 2020. P.495-504. DOI: 10.1007/978-3-030-32258-8_58. // https://elibrary.ru/item.asp?id=43205154
  5. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. The Integrated Model of Secure Cyber-Physical Systems for their Design and Verification // Studies in Computational Intelligence. 2020. Ò. 868. Ñ. 333-343. DOI: 10.1007/978-3-030-32258-8_39 // https://elibrary.ru/item.asp?id=43207770
  6. Vasily Desnitsky, Nikolay Rudavin, Igor Kotenko. Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems // Studies in Computational Intelligence Vol. 868 Ð. 323-332 DOI:10.1007/978-3-030-32258-8_38 // https://elibrary.ru/item.asp?id=43212577
  7. Anastasia Balueva, Vasily Desnitsky, Igor Ushakov. Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning // Studies in Computational Intelligence. 2020. Ò. 868. Ñ. 350-355. DOI: 10.1007/978-3-030-32258-8_41 eLIBRARY ID: 41346187
  8. I. Kotenko, I. Parashchuk. Determining the parameters of the mathematical model of the process of searching for harmful information // Studies in Systems, Decision and Control. Vol. 260, pp. 225-236. DOI: 10.1007/978-3-030-32648-7_18 // https:// https://elibrary.ru/item.asp?id=41817686 (WoS, Scopus)
  9. A. Branitskiy, E. Doynikova, I. Kotenko, N. Krasilnikova, D. Levshun, A. Tishkov, N. Vanchakova. The Common Approach to Determination of the Destructive Information Impacts and Negative Personal Tendencies of Young Generation Using the Neural Network Methods for the Internet Content Processing // Studies in Computational Intelligence. 2020. Vol. 868 P. 302-310. DOI: 10.1007/978-3-030-32258-8_36. // https://elibrary.ru/item.asp?id=43208120
  10. Kotenko I., Saenko I., Levshun D. A model checking based approach for verification of attribute-based access control policies in cloud infrastructures // Advances in Intelligent Systems and Computing. 2020. Ò. 1156. Ñ. 165-175. DOI: 10.1007/978-3-030-50097-9_17 // https://elibrary.ru/item.asp?id=45438125 (Scopus)
  11. Lidia Vitkova, Igor Saenko, Olga Tushkanova. An Approach to Creating an Intelligent System for Detecting and Countering Inappropriate Information on the Internet // Studies in Computational Intelligence 2020. Vol. 868 pp. 244-254. https://doi.org/10.1007/978-3-030-32258-8_29. ISSN 1860-949X. // https://elibrary.ru/item.asp?id=43219363
  12. Lidia Vitkova, Maxim Kolomeets. Approach to Identification and Analysis of Information Sources in Social Networks // Studies in Computational Intelligence. 2020. Ò. 868. Ñ. 285-293. DOI: 10.1007/978-3-030-32258-8_34 (Scopus, WoS) // https://elibrary.ru/item.asp?id=43212299
  13. Igor Parashchuk, Elena Donikova. The Architecture of Subsystem for Eliminating an Uncertainty in Assessment of Information Objects’ Semantic Content Based on the Methods of Incomplete, Inconsistent and Fuzzy Knowledge Processing // Studies in Computational Intelligence 2020 Vol. 868 pp. 294-301. DOI: 10.1007/978-3-030-32258-8_35 // https://elibrary.ru/item.asp?id=43208800
  14. A. Soboleva, O. Tushkanova. The Methodology of Extraction and Analysis of Event Log Social Graph // Conference of Open Innovations Association, FRUCT. 2020. ¹ 26. P. 415-422 // https://elibrary.ru/item.asp?id=42830762
  15. Dmitry Levshun, Diana Gaifulina, Andrey Chechulin and Igor Kotenko. Problematic Issues of Information Security of Cyber-Physical Systems // Informatics and Automation. Vol. 19. No. 5. 2020. P. 1050-1088. ISSN 2078-9181 (2078-9599). DOI: 10.15622/ia.2020.19.5.6. // https://elibrary.ru/item.asp?id=44269284 (in Russian).
  16. Ksenia Zhernova, Maxim Kolomeets, Igor Kotenko, Andrey Chechulin. Adaptive Touch Interface: Application for Mobile Internet Security // Communications in Computer and Information Science (ñì. â êíèãàõ). Springer, Singapore, 2020. Vol. 1121. P. 53–72. DOI: 10.1007/978-981-15-9609-4_5 // https://elibrary.ru/item.asp?id=45172903
  17. Dmitry Levshun, Yurii Bakhtin, Andrey Chechulin, Igor Kotenko. Analysis of Attack Actions on the Railway Infrastructure based on the Integrated Model // Communications in Computer and Information Science. Springer, Singapore, 2020. Vol. 1121. P. 145-162. DOI: 10.1007/978-981-15-9609-4_11 // https://elibrary.ru/item.asp?id=45173086
  18. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. The application of the methodology for secure cyber–physical systems design to improve the semi-natural model of the railway infrastructure // Microprocessors and Microsystems. 2020. Ñ. 103482. DOI: 10.1016/j.micpro.2020.103482 // https://elibrary.ru/item.asp?id=45110890 (ÐÈÍÖ, Scopus)
  19. Gustavo Gonzalez-Granadillo, Elena Doynikova, Joaquin Garcia-Alfaro, Igor Kotenko, Andrey Fedorchenko. Stateful RORI-based countermeasure selection using hypergraphs // Journal of Information Security and Applications. 2020. vol. 54. Ð. 102562. DOI: 10.1016/j.jisa.2020.102562 // https://elibrary.ru/item.asp?id=43306456
  20. Florian Fenzl, Roland Rieke, Yannick Chevalier, Andreas Dominik, Igor Kotenko. Continuous Fields: Enhanced In-Vehicle Anomaly Detection using Machine Learning Models // Simulation Modelling Practice and Theory. 2020. vol. 105. Ð. 102143. DOI: 10.1016/j.simpat.2020.102143 // https://www.elibrary.ru/item.asp?id=45492807
  21. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova. Data Analytics for Security Management of Complex Heterogeneous Systems: Event Correlation and Security Assessment Tasks // EAI/Springer Innovations in Communication and Computing. 2020. Ò. 3. Ñ. 79-116. DOI: 10.1007/978-3-030-19353-9_5 // https://elibrary.ru/item.asp?id=45370984
  22. Igor Kotenko, Igor Saenko, Alexander Branitskiy. Machine Learning and Big Data Processing for Cybersecurity Data Analysis // Intelligent systems reference library 2020. Vol. 177. pp. 61-85. DOI: 10.1007/978-3-030-38788-4_4 // https://elibrary.ru/item.asp?id=43247607 (WoS, Scopus)
  23. Igor Kotenko, Igor Saenko, Oleg Lauta, Aleksander Kribel. An Approach to Detecting Cyber Attacks against Smart Power Grids Based on the Analysis of Network Traffic Self-Similarity // 2020 Energies Vol. 13, ¹ 19, P. 5031 DOI: 10.3390/en13195031 // https://elibrary.ru/item.asp?id=45234731 (WoS, Scopus)
  24. Igor Kotenko, Lidiya Vitkova, Igor Saenko, Olga Tushkanova, Alexander Branitskiy. The intelligent system for detection and counteraction of malicious and inappropriate information on the Internet // AI Communications. 2020. Vol. 33 ¹. 1. pp. 13-25. DOI: 10.3233/AIC-200647 // https://elibrary.ru/item.asp?id=45174880 (WoS, Scopus)
  25. Evgenia Novikova, Igor Kotenko, Ivan Murenin. The visual analytics approach for analyzing trajectories of critical infrastructure employers // Energies. 2020. vol. 13. ¹ 15. pp. 3936. DOI: 10.3390/en13153936 (WoS, Scopus) https://www.mdpi.com/1996-1073/13/15/3936 // https://elibrary.ru/item.asp?id=45330905
  26. Andrey Privalov, Vera Lukicheva, Igor Kotenko, Igor Saenko. Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering // Energies. 2020. vol. 13 ¹ 11. pp. 2774. file:///C:/Users/Admin/Downloads/energies-13-02774.pdf. DOI: 10.3390/en13112774 // https://elibrary.ru/item.asp?id=43291532 (WoS, Scopus)
  27. Elena Doynikova, Evgenia Novikova, Igor Kotenko. Attacker Behaviour Forecasting Using Methods of Intelligent Data Analysis: A Comparative Review and Prospects // Information (Switzerland). 2020. Ò. 11. ¹ 3. Ñ. 168. DOI: 10.3390/INFO11030168 // https://elibrary.ru/item.asp?id=43306145
  28. Igor Kotenko. Guest Editorial: Intelligent Distributed Computing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2020. vol. 11. issue 2. pp. 1-2. DOI: 10.22667/JOWUA.2020.06.30.001 // https://www.elibrary.ru/item.asp?id=45443699
  29. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. A Semantic Model for Security Evaluation of Information Systems // Journal of Cyber Security and Mobility. 2020. vol. 9, ¹. 2. pp. 301–330. DOI: 10.13052/JCSM2245-1439.925 // https://elibrary.ru/item.asp?id=43302003
  30. Vladimir Gorodetsky, Olga Tushkanova. Semantic Technologies for Semantic Applications. Part 2. Models of Comparative Text Semantics // Scientific and Technical Information Processing. 2020. Ò. 47. ¹ 6. Ñ. 365-373 DOI: 10.3103/S0147688220060027 (WoS, Scopus) // https://elibrary.ru/item.asp?id=46755444
  31. Sergey Mescheryakov, Dmitry Shchemelinin, Konstantin Izrailov, Victor Pokussov. Digital Cloud Environment: Present Challenges and Future Forecast // Future Internet. 2020. vol. 12.I ssue 5 pp. 82. DOI: 10.3390/fi12050082 // https://elibrary.ru/item.asp?id=45512264
  32. Evgenia Novikova, Mikhail Bestuzhev, Igor Kotenko. Anomaly Detection in the HVAC System Operation by a RadViz Based Visualization-Driven Approach // Lecture Notes in Computer Science. 2020. Vol 11980 LNCS, pp. 402-418. DOI: 10.1007/978-3-030-42048-2_26 // https://elibrary.ru/item.asp?id=43253565
  33. Evgenia Novikova, Elena Doynikova, Igor Kotenko. P2Onto: Making Privacy Policies Transparent // Lecture Notes in Computer Science. 2020. Ò. 12501 LNCS. Ñ. 235-252. DOI: 10.1007/978-3-030-64330-0_15 // https://elibrary.ru/item.asp?id=45049659
  34. Aleksei Malov, Ivan Kholod, Sergei Rodionov, Evgenia Novikova. Data Mining Algorithms Parallelization in the Framework of Agent-Oriented Programming // International Conference on Next Generation Wired/Wireless Networking Conference on Internet of Things and Smart Spaces // Lecture Notes in Computer Science (cì. â êíèãàõ), volume 12525 LNCS pp.135-147 DOI:10.1007/978-3-030-65726-0_13
  35. Murenin Ivan, Novikova Evgenia, Ushakov Roman, Kholod Ivan. Explaining Android Application Authorship Attribution Based on Source Code Analysis // International Conference on Next Generation Wired/Wireless Networking Conference on Internet of Things and Smart Spaces NEW2AN 2020, ruSMART 2020: Internet of Things, Smart Spaces, and Next Generation Networks and Systems pp 43-56 // Lecture Notes in Computer Science Vol.12525 LNCS DOI:10.1007/978-3-030-65726-0_5 (Scopus, ÐÈÍÖ)
  36. I. Merelli, P. Lio, I. Kotenko, D. D'Agostino. Latest advances in parallel, distributed, and network-based processing // Concurrency Computation Practice and Experience, 2020.Vol. 32. ¹ 10. P. e5683-e5687. DOI: 10.1002/cpe.5683. https://www.onlinelibrary.wiley.com/doi/pdfdirect/10.1002/cpe.5683 // https://elibrary.ru/item.asp?id=43248749
  37. Valery Andreev, Valery Ostrovskii, Timur Karimov, Aleksandra Tutueva, Elena Doynikova, Denis Butusov. Synthesis and Analysis of the Fixed-Point Hodgkin–Huxley Neuron Model // Electronics. 2020. Ò. 9. ¹ 3. Ñ. 434. DOI: 10.3390/electronics9030434 // https://elibrary.ru/item.asp?id=43270554
  38. Dmitry Kaplun, Sergey Aryashev, Alexander Veligosha, Elena Doynikova, Pavel Lyakhov, Denis Butusov. Improving Calculation Accuracy of Digital Filters Based on Finite Field Algebra // Applied Sciences (Switzerland) 2020. vol. 10, ¹ 1, pp. 45-58. DOI: 10.3390/app10010045 // https://elibrary.ru/item.asp?id=43252534
  39. Vyacheslav Efimov, Igor Kotenko, Igor Saenko. Network application-layer protocol classification based on fuzzy data and neural network processing // International Journal of Computing 2020, Vol. 19, Issue 3 Ð. 335 – 346 https://doi.org/10.47839/ijc.19.3.1877 (Scopus) https://www.computingonline.net/computing/article/view/1877/924 // https://elibrary.ru/item.asp?id=46763664
  40. Lidia Vitkova, Igor Kotenko, Maxim Kolomeets, Olga Tushkanova, Andrey Chechulin. Hybrid Approach for Bots Detection in Social Networks Based on Topological, Textual and Statistical Features // Conference: 4th International Scientific Conference “Intelligent Information Technologies for Industry”At: Ostrava-Prague, Czech Republic. May 2020 // Advances in Intelligent Systems and Computing, Springer. 2020. vol.1156 AISC . P.412-421. DOI:10.1007/978-3-030-50097-9_42 // https://elibrary.ru/item.asp?id=45439091
  41. Diana Gaifulina, Andrey Chechulin. Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet // Studies in Computational Intelligence, Vol.868, 2020. P.278-284. DOI:10.1007/978-3-030-32258-8_33 // https://elibrary.ru/item.asp?id=43219502
  42. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Towards Intelligent Data Processing for Automated Determination of Information System Assets // In book: Handbook of Research on Intelligent Data Processing and Information Security Systems. 2020. pp. 147-160. DOI: 10.4018/978-1-7998-1290-6.ch007
  43. E. Novikova, M. Bestuzhev, A. Shorov. The visualization-driven approach to the analysis of the hvac data // Studies in Computational Intelligence. 2020. Ò. 868. Ñ. 547-552. DOI: 10.1007/978-3-030-32258-8_64 // https://www.elibrary.ru/item.asp?id=43213882
  44. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Machine learning based approach to detection of anomalous data from sensors in cyber-physical water supply systems // Â ñáîðíèêå: IOP Conference Series: Materials Science and Engineering. International Conference on Modern Trends in Manufacturing Technologies and Equipment 2019, ICMTME 2019. 2020. Ñ. 033034. DOI: 10.1088/1757-899X/709/3/033034 // https://elibrary.ru/item.asp?id=43236220
  45. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Neural Network Based Classification of Attacks on Wireless Sensor Networks // Proceeding of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus 2020) St. Petersburg and Moscow, Russia, 27–30 ÿíâàðÿ 2020 ã. P. 284-287 DOI: 10.1109/EIConRus49466.2020.9039275. // https://www.elibrary.ru/item.asp?id=43259386
  46. Maxim Kolomeets, Andrey Chechulin, Ksenia Zhernova, Igor Kotenko, Diana Gaifulina. Augmented reality for visualizing security data for cybernetic and cyberphysical systems // Proceedings-2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), March 11-13, 2020, Vasteras, Sweden. P. 421-428. DOI: 10.1109/PDP50117.2020.00071 // https://elibrary.ru/item.asp?id=43284316
  47. Vasily Desnitsky. Approach to Machine Learning based Attack Detection in Wireless Sensor Networks // Proceedings - 2020 International Russian Automation Conference (RusAutoCon) Sochi, 06–12 ñåíòÿáðÿ 2020 ãîäà C. 767-771. DOI: 10.1109/RusAutoCon49822.2020.9208085. https://www.elibrary.ru/item.asp?id=45202232
  48. Vasily Desnitsky, Igor Kotenko. Enhancing technology of producing secure IoT devices on the base of remote attestation // MATEC Web of Conferences, ICMTMTE 2020, Vol. 329, Article Number 03023. P. 1-8. 2020. DOI: 10.1051/matecconf/202032903023 (WoS) https://www.matec-conferences.org/articles/matecconf/pdf/2020/25/matecconf_icmtmte2020_03023.pdf
  49. Aleksander Kribel; Igor Saenko; Igor Kotenko. Detection of Anomalies in the Traffic of Information and Telecommunication Networks Based on the Assessment of its Self-Similarity // Proceedings - 2020 International Russian Automation Conference (RusAutoCon-2020). Sochi, Russian Federation, September 6-12, 2020. pp. 713-718. DOI: 10.1109/RusAutoCon49822.2020.9208147. // https://www.elibrary.ru/item.asp?id=45197978
  50. E.V. Doynikova, A.V. Fedorchenko, R.O. Kryukov. Determination of features of cyber-attack goals based on analysis of data in open security data sources // IOP Conference Series: Materials Science and Engineering. 2020. Ò. 734. Ñ. 012160. DOI: 10.1088/1757-899X/734/1/012160 // https://www.elibrary.ru/item.asp?id=42766659
  51. Kotenko Igor, Branitskiy Alexander, Tishkov Artem, Doynikova Elena. Analysis of Formats of Young People’s Communicative Behavior in Social Network //2020 24th International Conference on System Theory, Control and Computing, ICSTCC 2020 - Proceedings. 24. 2020. Ñ. 439-444. DOI:10.1109/ICSTCC50638.2020.9259747 // https://elibrary.ru/item.asp?id=45065233
  52. Igor Kotenko, Yury Sineshchuk, Igor Saenko. Optimizing Secure Information Interaction in Distributed Computing Systems by the Sequential Concessions Method // Proceedings - 2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP) Vasteras, 11-13 March 2020. pp. 429-432. DOI: 10.1109/PDP50117.2020.00072 // https://elibrary.ru/item.asp?id=43305074 (Scopus (íà àíãëèéñêîì)
  53. Vladimir Avramenko, Igor Kotenko, A. Malikov, Igor Saenko. Combined neural network model for diagnosing computer incidents // CEUR Workshop Proceedings. Ñåð. "RAAI 2020 - Selected Contributions of the "Russian Advances in Artificial Intelligence" Track at RCAI 2020, co-located with 18th Russian Conference on Artificial Intelligence, RCAI 2020" 2020. Ñ. 280-294. http://ceur-ws.org/Vol-2648/paper24.pdf // https://elibrary.ru/item.asp?id=45269276 (Scopus)
  54. Evgenia Novikova, Mikhail Bestuzhev. Exploration of the Anomalies in HVAC Data Using Image Similarity Assessment // 2020 9th Mediterranean Conference on Embedded Computing (MECO), Budva, Montenegro. P. 9134218. DOI: 10.1109/MECO49872.2020.9134218 // https://elibrary.ru/item.asp?id=45424269
  55. Igor Parashchuk, Elena Doynikova, Igor Saenko, Igor Kotenko. Selection of Countermeasures against Harmful Information based on the Assessment of Semantic Content of Information Objects in the Conditions of Uncertainty // INISTA 2020 - 2020 International Conference on INnovations in Intelligent SysTems and Applications, Proceedings. 2020. Ñ. 9194680. DOI: 10.1109/INISTA49547.2020.9194680 // https://elibrary.ru/item.asp?id=45285751
  56. Andrei Privalov, Ekaterina Skudneva, Igor Kotenko, Igor Saenko. Graph-based evaluation of probability of disclosing the network structure by targeted attacks // Proceedings of IEEE/IFIP Network Operations and Management Symposium 2020, NOMS 2020 Budapest, 2020 April 20-24 P. 9110299 DOI: 10.1109/NOMS47738.2020.9110299 // https://elibrary.ru/item.asp?id=43306131 (Scopus)
  57. Kolomeets Maxim, Levshun Dmitry, Soloviev Sergei, Chechulin Andrey, Kotenko Igor. Social networks bot detection using Benford’s law // Â ñáîðíèêå: 13th International conference on Security of Information and Networks, SIN 2020. Proceedings of the 13th International Conference on Security of Information and Networks. Virtual, Online, 2020. Ñ. 3433589. DOI: 10.1145/3433174.3433589 // https://elibrary.ru/item.asp?id=46743261
  58. Kotenko Igor, Saenko Igor, Skorik Fadey. Intelligent support for network administrator decisions based on combined neural networks // Â ñáîðíèêå: 13th International Conference on Security of Information and Networks, SIN 2020. Proceedings of the 13th International Conference on Security of Information and Networks. Virtual, Online, 2020. Ñ. 3433602. DOI:10.1145/3433174.3433602 // https://elibrary.ru/item.asp?id=46750503 (WoS and Scopus).
  59. Kotenko Igor, Krasov Andrey, Ushakov Igor and Izrailov Konstantin. Detection of Stego-Insiders in Corporate Networks Based on a Hybrid NoSQL Database Model // ACM International Conference Proceeding Series. 4. Ñåð. "Proceedings of the 4th International Conference on Future Networks and Distributed Systems, ICFNDS 2020" 2020. Ñ. 3442612. DOI: 10.1145/3440749.3442612 // https://elibrary.ru/item.asp?id=46072420
  60. Mikhail Buinevich, Konstantin Izrailov, Igor Kotenko, Igor Ushakov, Dmitry Vlasov. Approach to combining different methods for detecting insiders // ACM International Conference Proceeding Series - The 4th International Conference on Future Networks and Distributed Systems (ICFNDS 2020). St.-Petersburg, Russia. November 26 - 27, 2020 . www.icfnds.org. P. 3442619. DOI: 10.1145/3440749.3442619 // https://elibrary.ru/item.asp?id=46092483
  61. Evgenia Novikova, Polina Belimova, Alena Dzhumagulova, Mikhail Bestuzhe, Yulia Bezbakh, Aleksandr Volosiuk, Andrey Balkanskii, Alexei Lavrov. Usability Assessment of the Visualization-Driven Approaches to the HVAC Data Exploration // 30th International Conference on Computer Graphics and Machine Vision (Gaphicon 2020),Saint Petersburg, September 22-25, 2020. // Ceur Workshop Proceedings. Vol. 2744. pp. 1-12. http://ceur-ws.org/Vol-2744/paper17.pdf // DOI:10.51130/graphicon-2020-2-3-17 // https://elibrary.ru/item.asp?id=45055234
  62. L. A. Vitkova, I. B. Saenko, A. A. Chechulin, I. B. Paraschuk. The technology of Intelligent analytical processing of digital network objects for detection and counteraction of unappropriate information // The 1st International Conference on Computer Technology Innovations dedicated to the 100th anniversary of the Gorky House of Scientists of Russian Academy of Science (ICCTI — 2020). Saint Petersburg, Russia. April 13-14. 2020. P. 13-19. https://iccti.kp.center/wp-content/uploads/2020/12/ICCTI2020-OCP-press.pdf
  63. Doynikova E., Kotenko I., Parashchuk I. An alternative of classification for network traffic monitoring procedures in order to detect harmful information and computer attacks // The 1st International Conference on Computer Technology Innovations dedicated to the 100th anniversary of the Gorky House of Scientists of Russian Academy of Science (ICCTI — 2020). Saint Petersburg, Russia. April 13-14. SPb.: Petropolis. 144 p. P.8-12. ISBN: 978-5-9676-1216-9. (Scopus) https://iccti.kp.center/wp-content/uploads/2020/12/ICCTI2020-OCP-press.pdf
  64. Daniel Zelle, Roland Rieke, Christian Plappert, Christoph Kraub, Dmitry Levshun, Andrey Chechulin. SEPAD - security evaluation platform for autonomous driving. Proceedings - 2020 28th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP-2020) Vesteos, Sweden, March 11-13, 2020. P.413-420. DOI: 10.1109/PDP50117.2020.00070. // https://elibrary.ru/item.asp?id=43293732
  65. Kotenko Igor, Parashchuk Igor. Assessment of components to ensure the security of control and diagnostic information about technological processes // International Conference on Modern Trends in Manufacturing Technologies and Equipment: Mechanical Engineering and Materials Science (ICMTMTE 2020) Sevastopol, Russia. 7-11 September, 2020. MATEC Web of Conferences. vol. 329. no. 03005. pp. 1-10. DOI: 10.1051/matecconf/202032903005. (WoS).
  66. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Determination of features of cyber attack goals based on analysis of data in open security data sources // IOP Conference Series: Materials Science and Engineering. Krasnoyarsk Science and Technology City Hall of the Russian Union of Scientific and Engineering Associations. 2020. Ñ. 12160. DOI: 10.1088/1757-899X/734/1/012160 // https://www.elibrary.ru/item.asp?id=42766659
  67. Igor Kotenko, Igor Parashchuk. Identification of the traffic model parameters for network and cloud platform security management // 3RD International Scientific and Technical Conference "Modern Network Technologies 2020" (MoNeTeC 2020) Moscow, 27–29 October 2020 ã. Ð. 9258159 DOI:10.1109/MoNeTeC49726.2020.9258159 //https://www.elibrary.ru/item.asp?id=45071307 (ÐÈÍÖ)
  68. Zelle D., Rieke R., Plappert C., Kraus C., Levshun D., Chechulin A. Sepad - security evaluation platform for autonomous driving // Â ñáîðíèêå: Proceedings - 2020 28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2020. 28. 2020. P. 413-420. 10.1109/PDP50117.2020.00070 // https://elibrary.ru/item.asp?id=43293732
  69. K. Izrailov, A. Chechulin, L. Vitkova. Threats classification method for the transport infrastructure of a smart city // Â ñáîðíèêå: 14th IEEE International Conference on Application of Information and Communication Technologies, AICT 2020 - Proceedings. 14. 2020. Ñ. 9368828. DOI: 10.1109/AICT50176.2020.9368828 // https://www.elibrary.ru/item.asp?id=46760875
  70. M. Buinevich, K. Izrailov, G. Ganov. Intellectual method of program interactions visualisation in unix-like systems for information security purposes // Â ñáîðíèêå: CEUR Workshop Proceedings. 12. Ñåð. "MICSECS 2020 - Proceedings of the 12th Majorov International Conference on Software Engineering and Computer Systems" 2020. Ñ. 59-71.// https://www.elibrary.ru/item.asp?id=46875073
  71. A.V. Meleshko, V.A. Desnitsky, I.V. Kotenko. Modelling attacks in self-organizing wireless sensor networks of smart cities // IOP Conference Series: Materials Science and Engineering. Ñåð. "International Conference on Modern Trends in Manufacturing Technologies and Equipment, ICMTMTE 2020 - Materials Science" 2020. Ñ. 032077. DOI: 10.1088/1757-899X/971/3/032077 https://www.elibrary.ru/item.asp?id=45070170
  72. M.P. Bestuzhev, E.S. Novikova, Y. A. Bekeneva. Analysis of the visual analytics techniques for monitoring heterogeneous data streams // Â ñáîðíèêå: Proceedings of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, EIConRus 2020. 2020. Ñ. 237-240. DOI: 10.1109/EIConRus49466.2020.9039020 // https://www.elibrary.ru/item.asp?id=43262690
  73. Diana Gaifulina, Igor Kotenko. Application of deep learning methods in cybersecurity tasks. Part 1 // Cybersecurity issues. 2020. No. 3 (37). P 76-86. DOI: 10.21681/2311-3456-2020-03-76-86 // https://elibrary.ru/item.asp?id=43976797 (in Russian).
  74. Ksenia Zhernova, Maxim Kolomeets, Igor Kotenko, Andrey Chechulin. Use of adaptive touch interface in information security applications // Cybersecurity issues. 2020. No. 1 (35). P. 18-28. DOI: 10.21681/2311-3456-2020-01-18-28 // https://elibrary.ru/item.asp?id=42739002 (in Russian).
  75. Ksenia Zhernova. Trends and challenges of the human-machine interfaces naturality development // Informatization and communication. 2020. ¹ 2. P. 84-95. DOI: 10.34219/2078-8320-2020-11-2-84-95 // https://elibrary.ru/item.asp?id=42976418 (in Russian).
  76. Tuan An Pham, Alexey Kashevnik, Andrey Chechulin. Evaluation of facial analysis methods for personalization in driver monitoring systems // Modern science: topical problems of theory and practice. Series: Natural and Technical Sciences. 2020. ¹07. P.154-160. DOI: 10.37882/2223-2966.2020.07.35 // https://www.elibrary.ru/item.asp?id=43971746 (in Russian).
  77. Vasily Desnitsky. Modeling and analysis of information security threats in wireless sensor networks // Journal Information Technology and Telecommunications. Vol. 8, No. 3. 2020. P. 102-111. DOI: 10.31854/2307-1303-2020-8-3-102-111. // https://www.elibrary.ru/item.asp?id=43960182 (in Russian).
  78. Vasily Desnitsky, Nikolay Rudavin. Modeling of Denial-of-Sleep attacks in wireless sensor networks // Vestnik Sankt-Peterburgskogo Universiteta GPS MChS Rossii. Issue 3. P. 76-82. 2020. https://www.elibrary.ru/item.asp?id=44108907 (in Russian).
  79. Lidia Vitkova, Andrey Chechulin, Dmitry Saharov. Choosing measures to counter malicious information in social networks // Bulletin of the Voronezh institute of the FPS of Russia. ¹ 3, 2020. P. 20-29. // https://www.elibrary.ru/item.asp?id=44210327 (in Russian).
  80. Vasily Desnitsky, Alexey Meleshko. Approach to modeling attacks in digital city’s self-organizing wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1 Natural and technical sciences. No. 3. P. 20-25. 2020. DOI: 10.46418/2079-8199_2020_3_3 // https://www.elibrary.ru/item.asp?id=44180589 (in Russian).
  81. Meleshko A.V., Vasily Desnitsky. A game based technique for application of countermeasure selection process // Scientific and Analytical journal Bulletin of the Saint Petersburg University of the State Fire Service of the EMERCOM of Russia. 2020, No. 4. Ð. 70-77. https://vestnik.igps.ru/wp-content/uploads/V20204/10.pdf https://www.elibrary.ru/item.asp?id=44539817 (in Russian).
  82. Branitskiy Alexander, Doynikova Elena, Kotenko Igor. Use of neural networks for forecasting of the exposure of social network users to destructive impacts // Information and Control Systems 2020. ¹1(104) pp. 24-33. DOI: 10.31799/1684-8853-2020-1-24-33 // https://elibrary.ru/item.asp?id=42714729 (in Russian).
  83. I. V. Kotenko, I. B. Parashchuk. Model of security information and event management system // Bulletin of the Astrakhan State Technical University. Series: Management, Computer Engineering and Computer Science. 2020. No. 2. pp. 84-94. DOI: 10.24143/2072-9502-2020-2-84-94 // https://www.elibrary.ru/item.asp?id=42708547 (in Russian).
  84. I. B. Saenko, I. V. Kotenko I. V. Using a role-based approach and genetic optimization for VLAN design in large critical infrastructures // Automation of control processes. 2020. No. 2 (60). pp. 81-88. DOI: 10.35752/1991-2927-2020-2-60-81-88 // https://elibrary.ru/item.asp?id=43154233 (in Russian).
  85. Diana Gaifulina, Igor Kotenko Application of deep learning methods in cybersecurity tasks. Part 2 // Questions of Cybersecurity. 2020. No. 4 (38). pp. 11-21. DOI: 10.21681/2311-3456-2020-04-11-21 // https://elibrary.ru/item.asp?id=44149486 (in Russian).
  86. I. Kotenko, B. Tynymbaev UEBA system for a cloud service provider // Information Protection. Insider. 2020. No. 4(94). Ð. 15-19 // https://www.elibrary.ru/item.asp?id=43941322 (in Russian).
  87. I. V. Kotenko, N. A. Komashinsky, I. B. Saenko, A.V. Bashmakov. Methods and tools of parallel event processing for creating new generation of security monitoring systems // Informatization and Communication. 2020. No. 5. pp. 107-118. DOI: 10.34219/2078-8320-2020-11-5-107-118 // https://elibrary.ru/item.asp?id=44544630 (in Russian).
  88. I. V. Kotenko, I. V. Saenko, I. V. Lauta, A. M. Kribel. Analysis of the process of selfsimilarity of network traffic as an approach to detecting cyber attacks on computer networks // Telecommunications. 2020. No. 12. pp. 54-59. DOI: 10.34832/ELSV.2020.13.12.008 // https://elibrary.ru/item.asp?id=44368136 (in Russian).
  89. M. V. Kolomeets. Effectiveness of data visualization in virtual reality // Izvestiya vuzov. Instrumentation. 2020. Vol. 63 No. 11 pp. 1046-1052. DOI: 0.17586/0021-3454-2020-63-11-1046-1052 https://cyberleninka.ru/article/n/effektivnost-vizualizatsii-dannyh-v-virtualnoy-realnosti/viewer // https://elibrary.ru/item.asp?id=44451453 (in Russian).
  90. A. P. Pronichev, A. A. Chechulin, L. A. Vitkova. Approach to management of heterogeneous swarms of devices // Informatization and Communication. 2020. No. 5. pp. 119-124 DOI: 10.34219/2078-8320-2020-11-5-119-124 // https://elibrary.ru/item.asp?id=44544631 (in Russian).
  91. A. P. Pronichev. Architecture of a distributed system for processing heterogeneous data from social networks // Informatization and Communication. 2020. No. 4. pp. 97-100. DOI: 10.34219/2078-8320-2020-11-4-97-100 // https://elibrary.ru/item.asp?id=44312286 (in Russian).
  92. M. V. Buinevich, K. E. Izrailov, V. V. Pokusov, V. A. Taylakov, I. N. Fedulina An intelligent method of machine code algorithmization for vulnerabilities search // Information Security. Insider. 2020. No. 5 (95). pp. 57-63 // https://www.elibrary.ru/item.asp?id=44133751 (in Russian).
  93. M.V. Buynevich, K. E. Izrailov. Analytical modeling of the vulnerable program code execution // Cybersecurity. 2020. No. 3(37). pp. 2-12. DOI: 10.21681/2311-3456-2020-03-02-12 // https://www.elibrary.ru/item.asp?id=43976791 (in Russian).
  94. M.V. Buinevich, K.E. Izrailov. Identification of processor’s architecture of executable code based on machine learning. Part 1. Frequency byte model // Proceedings of educational institutions of communication. 2020. Vol.6 No. 1. pp. 77-85. DOI: 10.31854/1813-324X-2020-6-1-77-85 // https://www.elibrary.ru/item.asp?id=42752699 (in Russian).
  95. M.V. Buinevich, K.E. Izrailov. Identification of processor’s architectureof executable code based on machine learning.Part 2. Identification method // Proceedings of educational institutions of communication. 2020. Vol. 6 No. 2. pp. 104-112. DOI: 10.31854/1813-324X-2020-6-2-104-112 // https://www.elibrary.ru/item.asp?id=43084686 (in Russian).
  96. M.V. Buinevich, K.E. Izrailov. Identification of processor’s architecture of executable code based on machine learning. Part 3. Assessment quality and applicability border // Proceedings of educational institutions of communication. 2020. Vol. 6 ¹ 3. pp. 48-57. DOI: 10.31854/1813-324X-2020-6-3-48-57 // https://www.elibrary.ru/item.asp?id=44012810 (in Russian).
  97. M.V. Buynevich, K.E. Izrailov. Generalized model of static analysis of program code based on machine learning in relation to the problem of vulnerability search // Informatization and Communication. 2020. No. 2. pp. 143-152. DOI: 10.34219/2078-8320-2020-11-2-143-152 // https://www.elibrary.ru/item.asp?id=42976426 (in Russian).
  98. M.V. Buinevich, K.E. Izrailov. Method for classification of files on the basis of machine training technology // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2020. No. 1. Ð. 34-41 DOI: 10.46418/2079-8199_2020_1_6 // https://www.elibrary.ru/item.asp?id=43121338 (in Russian).
  99. L. A. Vitkova, I. B. Saenko Architecture of the system for detecting and countering unwanted information in social networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2020. No. 3. Ð. 33-39. DOI: 10.46418/2079-8199_2020_3_5 // https://www.elibrary.ru/item.asp?id=44180591 (in Russian).
  100. L.A. Vitkova, D.V. Sakharov, D.R. Goluzina. A model of malicious information and its social media distributor // Information Protection. Insider. 2020. No. 3 (93). pp. 66-72 // https://www.elibrary.ru/item.asp?id=42976235 (in Russian).
  101. Yu.N. Bolshakov, M.J. Bolshakov, K.E. Izrailov, A.V. Romanenko. Visualization of information exchange in the context of Industry 4.0 vision // Automation in industry. 2020. No. 8. pp. 23-29. DOI: 10.25728/avtprom. 2020. 08. 06 // https://www.elibrary.ru/item.asp?id=43836926 (in Russian).
  102. T.O. Gamidov, L.A. Vitkova, M.M. Kovtsur. Development of models and algorithms for data analysis for research progress social network incidents and crises // Bulletin of the St. Petersburg State University of Technology and Design. 2020. No. 2. Ð. 3-10. DOI:10.46418/2079-8199_2020_2_1 // https://www.elibrary.ru/item.asp?id=44022492 (in Russian).
  103. V. A. Desnitsky. Analysis of information security violations in wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and technical sciences. 2020. No. 4. P. 48-55. DOI: 10.46418/2079-8199_2020_4_7 https://www.elibrary.ru/item.asp?id=44830242 (in Russian).
  104. E.O. Berezina, L.A. Vitkova, K.A. Akhrameeva. A research on security threats in IoT networks // Vestnik SPGUTD. 2020. No. 2. Ð. 11-18. DOI: DOI 10.46418/2079-8199_2020_2_2 // https://www.elibrary.ru/item.asp?id=44022493 (in Russian).
  105. K.E. Izrailov. Visualization of many featured software vulnerabilities using the principal component analysis // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2020. ¹ 1. Ð. 3-8. DOI: 10.46418/2079-8199_2020_1_1 // https://www.elibrary.ru/item.asp?id=43121333 (in Russian).
  106. K.E. Izrailov. Applying of genetic algorithms to decompile machine code // Information Protection. Insider. 2020. No. 3(39). pp. 24-30 // https://www.elibrary.ru/item.asp?id=42976228 (in Russian).
  107. I. B. Paraschuk, E. S. Kryukova. Mathematical model for estimating the quality of electronic library: synthesis of the number of gradations of space states // Prikaspiyskiy zhurnal: Upravlenie i vysokie tekhnologii. 2020. No. 1 (49). pp. 121-131 DOI: 10.21672/2074-1707.2020.49.4.121-131 // https://elibrary.ru/item.asp?id=42883201 (in Russian).
  108. E.S. Kryukova, I B. Paraschuk. Software tool for modeling the state transition of a quality indicator of an electronic library: a method for determining the key elements of a model // Software Engineering. 2020.Vol. 11 No. 3. Ð. 177-182. DOI: 10.17587/prin.11.177-182 // https://elibrary.ru/item.asp?id=43044389 (in Russian).
  109. E.O. Berezina, L.A. Vitkova. Security threat analysis for software-defined networks // Bulletin of Young Scientists of the St. Petersburg State University of Technology and Design. 2020. No. 1. pp. 24-32 // https://www.elibrary.ru/item.asp?id=44097191 (in Russian).
  110. E.O. Berezina, L.A. Vitkova. Overveiw of algorithms for detecting abnormal signaling in IoT // Bulletin of Young Scientists of the St. Petersburg State University of Technology and Design. 2020. No. 1. P. 47-51 // https://www.elibrary.ru/item.asp?id=44097196 (in Russian).
  111. K.E. Izrailov, AI. Obrezkov. An approach to identifying the sequence of single-target network attacks with visualization of their progress to an expert // Methods and technical means of ensuring the security of information. 2020. No. 29. P. 68-69 // https://www.elibrary.ru/item.asp?id=44017276 (in Russian).
  112. I.B. Paraschuk, E.S. Kryukova and S.A. Yasinsky. Temporary and topological accessibility of users to the information resource of electronic libraries: indicators and evaluation criteria in the framework of system studies // Trudy TSNIIS. St. Petersburg branch. Scientific and technical collection of articles. Vol. 1. No. 9. 2020. pp. 8-16. // elibrary.ru/item.asp?id=43167370 (in Russian).
  113. A. A. Chechulin, Yu. E. Bakhtin, A. P. Pronichev. Complex approach to railway infrastructure modeling for security analysis // Methods and technical means of ensuring the security of information. 2020. No. 29. P. 18-19 // https://elibrary.ru/item.asp?id=44017243 (in Russian).
  114. I.B. Paraschuk, I.V. Kotenko. Variant of analytical description of the security information and event management system // Mathematical methods in engineering and Technology (MMTT-33): proceedings of the International Scientific Conference. 2020. Vol. 1. Ð. 40-44 // https://www.elibrary.ru/item.asp?id=42417073 (in Russian).
  115. I.B. Paraschuk, E.S. Kryukova. Algorithm for synthesis of the number of gradations of state spaces in the interests of assessing the quality of the electronic library // Mathematical methods in engineering and Technology (MMTT-33): proceedings of the International Scientific Conference. 2020. Vol. 1. P. 107-110 // https://elibrary.ru/item.asp?id=42417085 (in Russian).
  116. E.V. Doynikova, A.V. Fedorchenko. An approach to building an ontology of metrics for dynamic security analysis // Methods and technical means of ensuring information security. 2020. No. 29. pp. 42-43. // https://www.elibrary.ru/item.asp?id=44017261 (in Russian).
  117. E. V. Doynikova, A. V. Meleshko, A. V. Fedorchenko, YM. Êopchak System for selecting protection measures against ddos attacks // Methods and technical means of ensuring information security. 2020. No. 29. pp. 66-68. // https://www.elibrary.ru/item.asp?id=44017275 (in Russian).
  118. E.S. Novikova, Ya. Bekeneva, M. Bestuzhev. Visual analytics methods for monitoring heterogeneous data flows // News of LETI. 2020. N. 8-9. pp. 52-60. // https://www.elibrary.ru/item.asp?id=44644450 (in Russian).
  119. L.A. Vitkova, L.N. Bogdanova, V.V. Puchkov. Overview of methods and algorithms for detecting anomalies in VANET networks // Vestnik SPGUTD 2020. ¹ 4. P. 36-42 DOI: 10.46418/2079-8199_2020_4_5 // https://www.elibrary.ru/item.asp?id=44830240 (in Russian).
  120. E.S. Novikova. Application of methods for projecting multidimensional data for the study of data from smart building management systems // Trends in the development of science and education. 2020.¹ 68-1 Ð.66-70 DOI: 10.18411/lj-12-2020-18 // https://www.elibrary.ru/item.asp?id=44503536 (in Russian).
  121. Dmitry Levshun. Formation of requirements for the design process of secure cyberphysical systems // Izvestiya vysshikh uchebnykh zavedeniy. Instrumentation. 2020. Vol. 63, No. 11. pp. 1040-1045. DOI: 10.17586/0021-3454-2020-63-11-1040-1045. // https://elibrary.ru/item.asp?id=44451452 (in Russian).
  122. M.V. Buinevich, G.A. Khanov, K.E. Izrailov. Intellectual method of programs interactions visualization for information security audit of the operating system // Informatization and Communications. 2020. No. 4. pp. 67-74. DOI: 10.34219/2078-8320-2020-11-4-67-74 // https://www.elibrary.ru/item.asp?id=44312282 (in Russian).
  123. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov, A.Yu. Yaroshenko. Main principles of designing the modern protection systems architecture // National security and strategic planning. 2020. No. 3 (31). pp. 51-58. DOI: 10.37468/2307-1400-2020-3-51-58 // https://www.elibrary.ru/item.asp?id=44342138 (in Russian).
  124. K.E. Izrailov, P.E. Zhukovskaya, P.A. Kurta, A.A.Chechulin. Research of the method for determining the password resistance to brute force on the basis of an artificial neural network // In the collection: Information technologies in management. conference materials. Saint Petersburg, 2020. pp. 273-276. // https://www.elibrary.ru/item.asp?id=44686239 (in Russian).
  125. I.A. Ushakov, I.V. Kotenko, A. Yu. Avramenko, A.I. Preobrazhensky, D/V. Pelevin. Combined approach to insider detection on computer networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2020. No. 4. pp. 66-71. DOI: 10.46418/2079-8199_2020_4_10 // https://www.elibrary.ru/item.asp?id=44830245 (in Russian).
  126. P.A. Kurta, M.V. Kolomiets. Generalized classification of interfaces for the transport infrastructure of the Smart city // Bulletin of Cybernetics. 2020. No. 4 (40). pp. 6-13 DOI: 10.34822/1999-7604-2020-4-6-13 // https://elibrary.ru/item.asp?id=44629578 (in Russian).
  127. I.B. Saenko, I.N. Fabiyanovsky, V.V. Nikolaev, S.A. Yasinsky. Building a model for functioning a distributed information system based on blockchain technology // Information and Space. 2020. No. 4. pp. 73-78. // https://elibrary.ru/item.asp?id=44446413 (in Russian).
  128. I.B. Saenko, D.V. Volkov, S.A. Yasinsky. Simulation of corporate telecommunication networks based on agent approach // Information and Cosmos. 2020. No. 1. pp. 52-59. // https://elibrary.ru/item.asp?id=42491196 (in Russian).
  129. I.B. Saenko, I.N. Fabiyanovsky, V.V. Nikolaev. Conceptual model of a distributed information system // Trudy TSNIIS. St. Petersburg branch. 2020. Vol. 2. No. 10. pp. 104-107.// https://www.elibrary.ru/item.asp?id=44547908 (in Russian).
  130. I.B. Saenko, A.M. Starkov, A.E. Krizhik. technique of increasing the reliability of functioning of corporative computer networks on the basis of VLAN technology // Information and Space. 2020. No. 2. pp. 81-93. // https://www.elibrary.ru/item.asp?id=43834943 (in Russian).
  131. E.S. Kryukova, S.A. Yasinsky, I.B. Paraschuk. Sensitivity and stability algorithms for evaluating the quality of functioning modern electronic libraries // Trudy ZNIIS. St. Petersburg branch. 2020. Vol. 2. No. 10. pp. 10-18.// https://elibrary.ru/item.asp?id=44547900 (in Russian).
  132. S.A. Yasinsky, E.S. Kryukova, I.B. Paraschuk. On the issue of formulation of the problem, goals and objectives of adaptive monitoring of electronic libraries // Proceedings of the Central Research Institute. St. Petersburg branch. 2020. Vol. 2. No. 10. pp. 19-30. // https://elibrary.ru/item.asp?id=44547901 (in Russian).
  133. I.B. Saenko, F.A. Skorik. Assessment of the state of computer network elements based on the use of a combined neural network // Proceedings of the Central Research Institute. St. Petersburg branch. 2020. Vol. 1. No. 9. pp. 31-37.// https://www.elibrary.ru/item.asp?id=43167373 (in Russian).
  134. I. Yu. Zelichenok, R.Ya. Pirmagomedov. Tutorial on using machine learning for activity recognition via a smartphone // Information technologies and Telecommunications. 2020. Vol. 8. No. 2. pp. 92-108. DOI: 10.31854/2307-1303-2020-8-2-92-108 // https://elibrary.ru/item.asp?id=43882117 (in Russian).
  135. Alexander Branitskiy, Polina Gladysheva, Vasily Desnitsky, Igor Kotenko. Implementation and evaluation of adaptation and retraining methods for the analysis of information objects in web-content // IX International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 154-158. // https://elibrary.ru/item.asp?id=44603985 (in Russian).
  136. Diana Gaifulina. Analysis of structurally undefined network traffic payload of industrial cyber-physical systems // IX International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 302-307. // https://elibrary.ru/item.asp?id=44604017 (in Russian).
  137. Diana Gaifulina, Igor Kotenko. Analysis of deep learning methods for intrusion detection tasks // IX International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 308-313. // https://elibrary.ru/item.asp?id=44604018 (in Russian).
  138. Ksenia Zhernova, Maxim Kolomeets. Review of methods for evaluating the efficiency of visual analytics systems // Actual problems of infotelecommunications in science and education (APINO 2020). IX International Scientific, Technical and Scientific Methodological Conference. February 26-27, 2020. St. Petersburg. Vol.1, P. 463-466 // https://elibrary.ru/item.asp?id=44604048 (in Russian).
  139. Maxim Kolomeets, Ksenia Zhernova. Virtual reality in visual analysis of graphs // Actual problems of infotelecommunications in science and education (APINO 2020). IX International Scientific, Technical and Scientific Methodological Conference. February 26-27, 2020. St. Petersburg. Vol.1 P. 460-462 // https://elibrary.ru/item.asp?id=44604047 (in Russian).
  140. Vasily Desnitsky, Alexey Meleshko. Modeling attacks on self-organizing wireless sensor networks // IX International scientific-technical and scientific-methodical conference "Actual problems of infotelecommunications in science and education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 389-394.//https://www.elibrary.ru/item.asp?id=44604034 (in Russian).
  141. Vasily Desnitsky, Igor Parashchuk. A generalized algorithm for analyzing the security of wireless sensor networks from attacking influences // IX International Scientific and Technical and Scientific and Methodological Conference "Actual problems of infotelecommunications in science and education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 394-398. // https://www.elibrary.ru/item.asp?id=44604035 (in Russian).
  142. Dmitry Levshun. An attacker model for a modern cyber-physical system // IX International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Vol. 1. SPb., 2020. P. 679-682. // https://elibrary.ru/item.asp?id=44604096 (in Russian).
  143. Dmitry Levshun, Sergey Ageev, Igor Saenko. Architecture of the verification system for information access control policies in cloud infrastructures // IX International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Vol. 1. SPb., 2020. P. 38-43. // https://elibrary.ru/item.asp?id=44603959 (in Russian).
  144. Dmitry Levshun. An approach to the formation of requirements in the design process of secure cyber-physical systems // IV Interregional Scientific-Practical Conference "Advanced National Information Systems and Technologies". September 22-26, 2020. Materials of the conference. P. 237-238. // https://elibrary.ru/item.asp?id=45844829 (in Russian).
  145. Dmitry Levshun. An approach to the formation of specifications of secure cyberphysical systems // IV Interregional Scientific-Practical Conference "Advanced National Information Systems and Technologies". September 22-26, 2020. Materials of the conference. P. 239-240. // https://elibrary.ru/item.asp?id=45844830 (in Russian).
  146. Dmitry Levshun, Anton Tishkov, Elena Doynikova. Annotation of social network posts and profiles in order to detect destructive impacts // IV Interregional Scientific-Practical Conference "Advanced National Information Systems and Technologies". September 22-26, 2020. Materials of the conference. P. 205-206. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844814 (in Russian).
  147. Igor Saenko, Dmitry Levshun, Alexander Ivanov. Proposals for creating a system for verifying information access control policies in cloud infrastructures // IV Interregional Scientific-Practical Conference "Advanced National Information Systems and Technologies". September 22-26, 2020. Materials of the conference. P. 245-246. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844832 (in Russian).
  148. Vasily Desnitsky, Alexey Meleshko. Approach to detection of anomalous data in cyber-physical systems // Proceedings of the scientific seminar "Fundamental problems of management of production processes in the transition to Industry 4.0". P. 257-258. 2020. https://www.elibrary.ru/item.asp?id=44131878 (in Russian).
  149. Vasily Desnitsky. An approach to analysis of information security violations in mobile applications // XVII St. Petersburg International Conference "Regional Informatics (RI-2020)". October 28-30, 2020. Conference materials / SPOISU. - SPb, Ð. 134-136. 2020. https://www.elibrary.ru/item.asp?id=49390761 (in Russian).
  150. Vasily Desnitsky. Hardware and software stand for modeling attacks in ZigBee networks // In the collection: Priority directions of innovation activity in industry. Collection of scientific articles on the results of the eleventh International Scientific Conference. 2020. pp. 81-84. https://www.elibrary.ru/item.asp?id=44569809 (in Russian).
  151. A. A. Branitsky, E. V. Doynikova, I. V. Kotenko. Technique of classification of social network users by the psychological scales of the Ammon test based on artificial neural networks // Materials of the conference "Information Technologies in Management". 2020. P. 266-268 // https://elibrary.ru/item.asp?id=44686237 (in Russian).
  152. L.A. Vitkova, K.A. Valieva, D.S. Kozlov. An approach to detecting the spread of false information on the Internet using data science algorithms // Abstracts of the scientific seminar "Fundamental problems of production process management in the conditions of transition to Industry 4.0". 2020. pp. 128-133 // https://www.elibrary.ru/item.asp?id=44120958 (in Russian).
  153. L.A. Vitkova, K.A. Naumenko. Methodology for identifying artificial mobilization of protest activity in social networks // Abstracts of the scientific seminar "Fundamental problems of production process management in the conditions of transition to Industry 4.0". 2020. pp. 212-215 // https://www.elibrary.ru/item.asp?id=44131549 (in Russian).
  154. I.B. Paraschuk, A.S. Bashkirtsev, V.A. Malofeev. Formulation of modern requirements for technical and other types of support for automated special-purpose systems // V Interuniversity scientific and practical conference "Problems of technical support of troops in modern conditions". Proceedings of the conference. 2020. Ð. 73-76 // https://elibrary.ru/item.asp?id=43766050 (in Russian).
  155. A.A. Bogatyrev, N.P. Vanchakova, N.V. Krasilnikova, A.V. Tishkov, E.A. Vatskel, I.V. Kotenko. Ecology of the Internet-communication in contemporary world and in Russia // Regional Informatics and Information Security. Collection of works. 2020. Release 8. Ð.95-98. http://www.spoisu.ru/files/riib/riib_8_2020.pdf // https://www.elibrary.ru/item.asp?id=48027060 (in Russian).
  156. I.B. Paraschuk, E S. Kryukova, L.A. Sayarkin, V.A. Malofeev. Review and analysis of quality indicators of modern means of trusted loading of automated workplaces, connected to electronic libraries //Science And Education: Problems And Innovations: Collection of articles of the IV International Scientific and Practical Conference, Penza 07 May 2020 Ð. 76-78 // https://www.elibrary.ru/item.asp?id=42789034 (in Russian).
  157. I.B. Paraschuk, E.S. Kryukova. Analysis of the structure features of modern electronic libraries in the interests of assessing their quality // New information technologies and systems. Collection of scientific articles based on the materials of the XVII International Scientific and Technical Conference. Penza, November 18-19, 2020, pp. 227-230. // https://elibrary.ru/item.asp?id=44479593 (in Russian).
  158. I.B. Paraschyuk, E.S. Kryukova. Main directions of quality assessment of search information and reference systems and analysis of prospects of their application for management and technical support of electronic libraries // V Interuniversity scientific and practical conference "Problems of technical support of troops in modern conditions". Proceedings of the conference. 2020. P. 179-183 // https://elibrary.ru/item.asp?id=43766072 (in Russian).
  159. I.B. Paraschuk, E.S. Kryukova. Indicators of confidentiality and data integrity in the interests of modeling and analyzing the quality of the information protection process in electronic libraries // Materials of the International Scientific and Practical conference " Actual problems of mathematical modeling and information technologies (AZMMiIT 2020). 2020. pp. 195-197 // https://elibrary.ru/item.asp?id=44764854 (in Russian).
  160. I.B. Paraschuk, E.S. Kryukova. Application of methods of the theory of interval averages in problems of evaluating the quality and efficiency of functioning of electronic libraries // In the collection: New information technologies and systems. Collection of scientific articles based on the materials of the XVII International Scientific and Technical Conference. 2020. pp. 223-227. // https://elibrary.ru/item.asp?id=44479592 (in Russian).
  161. I. B. Paraschuk, E. S. Kryukova Synopsis of requirements for automated control systems for electronic libraries // International scientific and practical conference " Technologies and Control Systems in Industry (Technopro-2020)". Saratov: Gagarin State Technical University named after Yu. A. 2020. pp. 135-137 (in Russian).
  162. A.A. Branitsky, E.V. Doynikova, I.V. Kotenko. Technique for determination of social network users exposure to destructiveness // IX international scientific-technical and scientific-methodical conference "Actual problems of infotelecommunication in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. Ð. 159-162. // https://www.elibrary.ru/item.asp?id=44603986 (in Russian).
  163. Yu. E. Bakhtin, S. N. Bushuev, D. A. Gaifulina, K. N. Zhernova, A. Yu. Ivanov, V. I. Komashinsky, I. V. Kotenko Methods of experimental evaluation of the effectiveness of human-computer interaction in visual analytics // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. Ð. 120-123 // https://elibrary.ru/item.asp?id=44603978 (in Russian).
  164. K. N. Zhernova, N. A. Komashinsky, I. V. Kotenko. Models of visual human-computer interaction with the network of devices in the Internet of things // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 466-470.// https://elibrary.ru/item.asp?id=44604049 (in Russian).
  165. D.A. Kleverov, I.V. Kotenko. Adaptation of bio-inspired algorithms for computer security analysis to big data technologies // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 583-588 // https://www.elibrary.ru/item.asp?id=44604076 (in Russian).
  166. M.A. Kleverov, I.B. Kotenko. Big data feature selection using biclustering algorithms for the problem of cyber-attack detection // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Volume 1. pp. 588-592.// https://www.elibrary.ru/item.asp?id=44604077 (in Russian).
  167. M. V. Kolomeets, I. V. Kotenko, A. A. Chechulin. Architecture and implementation of visual interfaces for identification and opposition of unwanted, doubtful and harmful information // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 606-609 // https://elibrary.ru/item.asp?id=44604081 (in Russian).
  168. N.A. Komashinsky, I.V. Kotenko. Methods for detecting computer attacks in high-load networks // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 609-614 // https://www.elibrary.ru/item.asp?id=44604082 (in Russian).
  169. A. P. Pronichev, I. V. Kotenko. Modeling query processing processes in distributed big data storage systems // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 620-624 // https://elibrary.ru/item.asp?id=44604084 (in Russian).
  170. I. V. Kotenko, B. A. Tynymbaev. Model and architecture of UEBA system for cloud service provider // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 624-629 // https://www.elibrary.ru/item.asp?id=44604085 (in Russian).
  171. I.V. Kotenko, IA. Ushakov. Big data representation model about insider attacks in NOSQL format // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 634-639. // https://www.elibrary.ru/item.asp?id=44604087 (in Russian).
  172. I.V. Kotenko, IA. Ushakov. Detection of insiders in computer networks based on expert rules and machine learning methods // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 639-643.// https://www.elibrary.ru/item.asp?id=44604088&pff=1 (in Russian).
  173. I.V. Kotenko, A.V. Khinenzon. Analysis of algorithms for detecting suspicious behavior in social networks // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 644-648. // https://www.elibrary.ru/item.asp?id=44604089&pff=1 (in Russian).
  174. A.V. Krasov, A.V. Krylov, I. A. Ushakov. Designing a network segment of the apk "Safe City" and researching methods to ensure protection from outsider threats // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 649-653. // https://www.elibrary.ru/item.asp?id=44604090&pff=1 (in Russian).
  175. S. N. Bushuev, O. I. Pantyukhin, I. B. Paraschuk, I. B. Saenko. The tasks of analysis and synthesis of data access control systems in cloud infrastructures of critical information objects // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 185-190. // https://www.elibrary.ru/item.asp?id=44603992 (in Russian).
  176. I. B. Paraschuk, A. A. Chechulin. The essence and content of the task of searching for interface vulnerabilities in the interests of the safe control of unmanned vehicles of the "smart city" // IX International scientific-technical and scientific-methodological conference" Actual problems of infotelecommunications in science and education"(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 759-763. // https://www.elibrary.ru/item.asp?id=44604113 (in Russian).
  177. E. V. Doynikova, O. S. Dudkina, I. B. Saenko. Decisions support to increase protection against information security incidents using MITRE ATT&CK database // IX International scientific-technical and scientific-methodological conference "Actual problems of infotelecommunications in science and education" (APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 409-414. // https://elibrary.ru/item.asp?id=44604037 (in Russian).
  178. E. V. Doynikova, E. S. Novikova. Forecasting attacker behavior using intelligent data analysis // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 415-418. // https://www.elibrary.ru/item.asp?id=44604038 (in Russian).
  179. E. V. Doynikova, A. N. Polubaryeva Analysis of the problems, their possible solutions and existing prospects of information security issues of wireless medical devices // IX International Scientific-technical and scientific-methodological Conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Volume 1. pp. 419-424. // https://www.elibrary.ru/item.asp?id=44604039 (in Russian).
  180. P.M. Zalesova, I.B. Saenko. Neural networks for monitoring and countering unwanted information on the Internet / / IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Volume 1. pp. 474-478. // https://elibrary.ru/item.asp?id=44604051 (in Russian).
  181. V.A. Gavrilyuk, A.A. Chechulin. Multi-step attack analysis algorithm for assessing computer network security // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 299-302. // https://www.elibrary.ru/item.asp?id=44604016&pff=1 (in Russian).
  182. A. A. Branitsky, A. A. Le Investigation of the vulnerability detection method in applications using the JBIG2 codec // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. Ð. 162-166. // https://elibrary.ru/item.asp?id=44603987 (in Russian).
  183. E.O. Berezina, L.A. Vitkova. IoT threats model in software-defined networks // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. Ð. 130-134.// https://www.elibrary.ru/item.asp?id=44603980&pff=1 (in Russian).
  184. K.A. Valieva, L.A. Vitkova, E.V. Smirnov. Methods for detecting malicious information in the information space of social networks // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 206-211. // https://www.elibrary.ru/item.asp?id=44603996&pff=1 (in Russian).
  185. L.A. Vitkova. Model and algorithms for protecting against malicious information in social networks // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 235-240. // https://www.elibrary.ru/item.asp?id=44604002&pff=1 (in Russian).
  186. L.A. Vitkova, T.O. Gamidov, M.M. Kovtsur. Development of mechanisms for analyzing unwanted information in social networks // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 240-245. // https://www.elibrary.ru/item.asp?id=44604003&pff=1 (in Russian).
  187. L.A. Vitkova, V.N. Diorditsa, M.M. Kovtsur, A.I. Targonskaya. Investigation of the integration mechanisms of the AGAT CU 72XX telecommunication platform // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. Ð. 246-249. // https://www.elibrary.ru/item.asp?id=44604004&pff=1 (in Russian).
  188. L.A. Vitkova, E.A. Donskov. Analysis of keystroke recognition algorithms and their performance indicators // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 249-253. // https://www.elibrary.ru/item.asp?id=44604005&pff=1 (in Russian).
  189. L.A. Vitkova, K E. Izrailov, A A. Chechulin. Classification of vulnerability of interfaces transport infrastructure of a smart city // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 253-258. // https://www.elibrary.ru/item.asp?id=44604006&pff=1 (in Russian).
  190. L.A. Vitkova, M.A. Spravtseva. Countering the spread of unwanted information in the information space of social networks // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 258-261. // https://www.elibrary.ru/item.asp?id=44604007&pff=1 (in Russian).
  191. L.A. Vitkova, V.I. Temchenko, A.A. Chechulin. Heuristic traffic analysis methods // IX International scientific-technical and scientific-methodological conference " Actual problems of infotelecommunications in science and education "(APINO-2020)". February 26-27, 2020. Collection of scientific articles. 2020. Vol. 1. P. 261-266. // https://www.elibrary.ru/item.asp?id=44604008&pff=1 (in Russian).
  192. S. N. Bushuev, I. B. Saenko. An approach to information access control in the emergency monitoring system // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1.Ð. 122-124. http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390749 (in Russian).
  193. L.A. Vitkova. Survey of approaches to the classification of security threats smart city // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 124-126 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390748 (in Russian).
  194. L.A. Vitkova, E.V. Doynikova, A.P. Pronichev. About modeling the processes of detecting and countering terrorist and extremist activity on the internet and social networks // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 126-127 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390589 (in Russian).
  195. D.A. Gaifulina. Selection of classification criteria for cyber-physical systems to identify attack vectors // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 127-129 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390747 (in Russian).
  196. D. A. Gaifulina, I. V. Kotenko Place and role of correlation of security events in cloud systems based on deep learning methods // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 129-131 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390763 (in Russian).
  197. E. V. Doynikova, A.V. Fedorchenko, D. A. Gaifulina Technique for selection of countermeasures against cyber attacks based on the ontology of security metrics // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 137-138 eLIBRARY ID: 46542004 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390760 (in Russian).
  198. K. N. Zhernova, D. A. Gaifulina, A. Yu. Ivanov, V. I. Komashinsky. Mobile network visualization data Management using touch screens // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 138-139 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390759 (in Russian).
  199. A.V. Kartel, E. S. Novikova, I. N. Murenin, E. V. Doynikova. Defining attributes for malware authorship attributing based on control flow graph analysis // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 139-141 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390758 (in Russian).
  200. M. V. Kolomeets, K. N. Zhernova. Visual analysis of social network bots in augmented reality // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 141-142 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390757 (in Russian).
  201. M. V. Kolomeets, A. A. Chechulin Analysis of social networks to identify group malicious and undesirable information activity / / XVII St. Petersburg International Conference " Regional Informatics (RI-2020)", St. Petersburg, Russia, October 28-30, 2020. (in Russian).
  202. N.A. Komashinsky, I.V. Kotenko. A technique of distributed detection of computer anomalies based on big data analysis // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 142-144 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390756 (in Russian).
  203. N. A. Komashinsky, I. V. Kotenko. Theoretical-multiple model of distributed detection of computer attacks using signature analysis // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 144-146 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390771 (in Russian).
  204. I. V. Kotenko, Yu. E. Bakhtin, S. N. Bushuev, N. A. Komashinsky. Methodology for designing a network security visualization and data management complex by means of touch screens // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 148-149 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390770 (in Russian).
  205. D. S. Levshun. Requirements to the methodology for design and verification of secure cyber-physical systems // XVII St. Petersburg International Conference "Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, Part 1., pp.153-154 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390769 (in Russian).
  206. A.V. Meleshko. Analysis of security of computer networks from attacks of failure to service // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 155-157 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390768&pff=1 (in Russian).
  207. A.V. Meleshko. Software model for generating water supply management system security incidents // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 157-159 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390767 (in Russian).
  208. I.N. Murenin, E.S. Novikova. Analysis of self-similarity assessment techniques for network traffic of superhigh volumes // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 163-165 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390600&pff=1 (in Russian).
  209. I. B. Paraschuk, V. A. Desnitsky Features of security assessment software and hardware components of wireless sensor networks // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 166-168 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf https://www.elibrary.ru/item.asp?id=49390766 (in Russian).
  210. I. B. Paraschuk, V. A. Desnitsky, O. N. Tushkanova. Model of the digital content parental control system on the Internet // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 168-170 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390765 (in Russian).
  211. A. P. Pronichev. A data model of the system for moving objects simulation // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 171-172 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390764 (in Russian).
  212. A. P. Pronichev, I. V. Kotenko. Overview of approaches to design and evaluation of distributed big data processing systems // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 172-173 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://elibrary.ru/item.asp?id=49390779 (in Russian).
  213. I. B. Saenko, A. Yu. Ivanov Features of implementation of the abac access control model in the territorial distributed telecommunication system // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., p. 173-175 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390778 (in Russian).
  214. I. B. Saenko, V. I. Komashinsky A perspective information access control system for th eLIBRARY ID: 46545257e urban public transport system // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 175-177 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390777 (in Russian).
  215. I. B. Paraschuk, I. B. Saenko, S. N. Bushuev. Functional relationships and content of the levels of the generalized architecture of a promising system for delimiting access to information in cloud infrastructures of critical information systems // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)" St. Petersburg, October 28-30, 2020, part 1., p. 177-179 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390776 (in Russian).
  216. B.A. Tynymbaev, I.V. Kotenko. A model of user behavior analytics system // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1, p. 179-180 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390775&pff=1 (in Russian).
  217. I. B. Paraschuk, A. A. Chechulin. Stages of research and building of a safe human-machine interface for a modern intellectual transport environment // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 180-182 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390774 (in Russian).
  218. I.V. Kotenko, I.B. Paraschuk, I.B. Saenko. Detection and opposition of network attacks based on traffic analysis: basic research directions // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 187-188. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844802 (in Russian).
  219. K. N. Zhernova, I. V. Kotenko, A. A. Chechulin. Evaluation methodology of gestural interfaces for computer security management // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, ðð. 219-220. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844820 (in Russian).
  220. I.B. Paraschuk, A.A. Chechulin. Security of the human-machine interface for an intelligent transport environment // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, ðð. 65-66. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844751 (in Russian).
  221. A.A. Chechulin. Scatter plot model for detecting network scan in virtual reality // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, ðð. 67-68. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844752 (in Russian).
  222. A.V. Tishkov, A. A. Strakh, A. A. Branitsky, E. V. Doynikova, A. A. Chechulin. Analysis of correlations between Ammon’s test scales for determination of features for test results forecasting // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, ðð. 122-123. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844771 (in Russian).
  223. V. A. Desnitsky, A. A. Chechulin, E. V. Doynikova. A technique for verification of representation models of wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, ðð. 197-198. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf https://www.elibrary.ru/item.asp?id=45844808 (in Russian).
  224. E. V. Doynikova, E. V. Chechulin, A.V. Meleshko Extended ontology of metrics for security assessment of industrial Internet of Things systems // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, ðð. 201-202. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844811 (in Russian).
  225. A. A. Chechulin, E. V. Doynikov, V. A. Desnitsky. Model of a stacked pie chart for visual analytics in virtual reality // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 233-234. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844827 (in Russian).
  226. I.B. Paraschuk, E.S. Kryukova. Quality control of modern electronic libraries // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 23-24. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844738 (in Russian).
  227. I.B. Parashchuk, I.B. Saenko. Information access differentiation system in cloud infrastructures: components of generalized architecture // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 162-163. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844790 (in Russian).
  228. V.A. Desnitsky, I.B. Paraschuk. A technique for revelation of anomalous data in wireless sensor networks on the base of artificial intelligence methods // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, p. 199. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf https://www.elibrary.ru/item.asp?id=45844809 (in Russian).
  229. V.A. Desnitsky, I.B. Parashchuk. Wireless sensor networks and analysis of security against attacks of their hardware and software components // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 207-208. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844815 (in Russian).
  230. L.A. Vitkova, I.B. Saenko, E.V. Doynikova, A.P. Pronichev. Model for detecting and countering extremist activity on the Internet // Perspektivnye napravleniya razvitiya otechestvennykh informatsionnykh tekhnologii: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 71-72 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844754 (in Russian).
  231. I.B. Saenko, A.Yu. Ivanov. Perspective system for access control for information in the cloud environment: features of application in critical infrastructures // Perspektivnye napravleniya razvitiya otechestvennykh informatsionnykh tekhnologii: materials of the VI interregional scientific-practical conference, Sevastopol, 22-26 Sep. 2020, pp. 189-190. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844804 (in Russian).
  232. I.B. Saenko, D.S. Shapovalov. Data processing model in databases of enterprise information systems on the basis of ASP-technology // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 241-242. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844883 (in Russian).
  233. I.B. Saenko, D.A. Kleverov, M.A. Kleverov. Approach to data storage in a perspective access control system for information in cloud infrastructure // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 243-244. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844831 (in Russian).
  234. I.B. Saenko, O.I. Pantyukhin. The architecture of a perspective access control system for information in cloud infrastructures // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 247-248. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844833 (in Russian).
  235. V. A. Desnitsky, A. A. Branitsky, A.V. Fedorchenko. A technique for distributed collection, processing and analysis of data in a wireless sensor network // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020. pp. 195-196. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf https://www.elibrary.ru/item.asp?id=45844807 (in Russian).
  236. V. A. Desnitsky. An approach to evaluation of energy resources depletion attacks in wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020. p. 200. https://www.elibrary.ru/item.asp?id=45844810 (in Russian).
  237. V. A. Desnitsky. An approach to the construction of security components for Internet of Things systems on the base of fog computing // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 249-250. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf https://www.elibrary.ru/item.asp?id=45844834 (in Russian).
  238. D. N. Shevchenko, E. V. Doynikova Technique for analysis of internal information security incidents within the corporate data transfer framework // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 57-58 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844748 (in Russian).
  239. E. V. Doynikova, E. S. Novikova Response against cyberattacks considering attacker profile // Perspektivnye napravleniya razvitiya otechestvennykh informatsionnykh tekhnologii: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 203-204. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844812 (in Russian).
  240. E. V. Doynikova, N. A. Krivykh. Tool of monitoring and integration of vulnerabilities from open databases// Perspektivnye napravleniya razvitiya otechestvennykh informatsionnykh tekhnologii: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 231-232. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844826 (in Russian).
  241. E.S. Novikova, M.P. Bestuzhev. Definition of the requirements to methods of visual analysis of data streams in real time // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 209-210. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844816 (in Russian).
  242. E.S. Novikova, I.N. Murenin. A technique for interpretability of machine learning models in the problem of attributing the software code // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 211-212. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844817 (in Russian).
  243. L.A. Vitkova, A.A. Izmailova. Detecting false information in social networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 69-70. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844753 (in Russian).
  244. L.A. Vitkova. Detection of artificial mobilization of protest activity in social networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 73-74. // https://www.elibrary.ru/item.asp?id=45844755 (in Russian).
  245. L.N. Bogdanova, L.A. Vitkova. Analysis of abnormal traffic in VANET networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 144-145. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=49390771&pff=1 (in Russian).
  246. D. A. Gayfulina. Analysis of protection methods for cyberp-hysical systems // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 223-224. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844822 (in Russian).
  247. D.A. Gayfulina. Analysis of vulnerabilities of cyber-physical systems // Perspective directions of development of domestic information technologies: materials of the VI Interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 225-226. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844823 (in Russian).
  248. A. V. Meleshko. Analysis of approaches to choose and evaluation countermeasures against attacks on computer networks // Perspective directions of development of domestic information technologies: materials of the VI Interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 191-192. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844805 (in Russian).
  249. A.V. Meleshko. Analysis of modeling tools of wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the VI Interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 193-194. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844806 (in Russian).
  250. A. P. Pronichev. Architecture of the control unit of the system of modeling of moving objects // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 229-230. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844825 (in Russian).
  251. K. E. Izrailov, K. N. Zhernova. Intellectual methods of classification of a smart city transport infrastructure // Perspective directions of development of domestic information technologies: materials of the VI Interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 160-161 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844789 (in Russian).
  252. K. N. Zhernova Evaluation method of visualization models for computer security systems // Perspective directions of development of domestic information technologies: materials of the VI Interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 221-222. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://elibrary.ru/item.asp?id=45844821 (in Russian).
  253. I. B. Saenko, O. S. Lauta, A.M. Kribel, I. V. Kotenko, I. V. Podguzov Research of the possibility of applying a fractal approach to detecting traffic anomalies and cyberattacks in computer networks // Materials of the 29th Scientific and Technical Conference "Methods and technical means of ensuring information security". September 28-30, 2020, Saint Petersburg. Polytechnical University publishing house. 2020. ¹ 29,P. 54-55. // https://www.elibrary.ru/item.asp?id=44017268 (in Russian).
  254. I.B. Paraschuk, I.B. Saenko, I.V. Kotenko. Theoretical and experimental analysis of the component of removing uncertainty evaluating and categorizing the semantic content of information objects // Materials of the conference " Information Technologies in Management "(ITU-2020). St. Petersburg: JSC "Concern "Central Research Institute"Electropribor". 2020. P. 243-246. // https://www.elibrary.ru/item.asp?id=44686231 (in Russian).
  255. I. B. Paraschuk, I. B. Saenko. Assessment of the quality of the process of reconfiguring access control policies in cloud infrastructures of critical information systems // In the collection: Information technologies in management. conference materials. St. Petersburg, 2020. pp. 247-249. // https://elibrary.ru/item.asp?id=44686232 (in Russian).
  256. A.V. Tishkov, L.V. Strakh, E.V. Doynikova. Characteristic of relationship of I-functions in the personality structure of junior-course students of Medical University // Information technologies in management. conference materials. Saint Petersburg, 2020. pp. 259-261. // https://www.elibrary.ru/item.asp?id=44686235 (in Russian).
  257. V. A. Desnitsky. Architecture and algorithms of the system of distributed data collection, processing and analysis in a wireless sensor network // In the book: Mathematical and computer modeling. collection of materials of the VIII International Scientific Conference dedicated to the memory of A.L. Josefer. Omsk, 2020. pp. 252-254. http://fkn.univer.omsk.su/nauka/Conf/2020/VIII_MCM_Conf_2020.pdf https://www.elibrary.ru/item.asp?id=45809228 (in Russian).
  258. V. A. Desnitsky. Analysis of wireless sensor networks for solving information security problems // In the book: Mathematical and computer modeling. collection of materials of the VIII International Scientific Conference dedicated to the memory of A.L. Josefer. Omsk, 2020. pp. 255-257. 2020. P. 255-257. http://fkn.univer.omsk.su/nauka/Conf/2020/VIII_MCM_Conf_2020.pdf https://www.elibrary.ru/item.asp?id=45809230 (in Russian).
  259. V. A. Desnitsky. Identification of anomalous data from sensors of wireless sensor networks // In the collection: Challenges of the digital economy: the development of a comfortable urban environment. Proceedings of the III All-Russian Scientific and Practical Conference with international participation. 2020. pp. 233-235. https://www.elibrary.ru/item.asp?id=44171535 (in Russian).
  260. A. A. Bogatyrev, A. A. Branitsky, N. P. Vanchakova, E. V. Doynikova, I. V. Kotenko, N. V. Krasilnikova, D. S. Levshun, A.V. Tishkov Methods of identifying and preventing destructive formats of communicative behavior of young people in social networks // Proceedings of the conference "Neuroinformatics-2020". P. 388-397 // https://elibrary.ru/item.asp?id=46415288 (in Russian).
  261. V. A. Desnitsky. Algorithms for detection of anomalous data from sensors in self-organizing wireless sensor networks // In the collection: DIGITAL REGION: EXPERIENCE, COMPETENCIES, PROJECTS. collection of articles of the III International Scientific and Practical Conference dedicated to the 90th anniversary of the Bryansk State University of Engineering and Technology. Bryansk, 2020. pp. 252-256. https://www.elibrary.ru/item.asp?id=45793877 (in Russian).
  262. V. A. Desnitsky. Approach to construction and analysis of a secure system for distributed collection and prosessing of data from nodes of a wireless sensor network // In the collection: DIGITAL REGION: EXPERIENCE, COMPETENCIES, PROJECTS. collection of articles of the III International Scientific and Practical Conference dedicated to the 90th anniversary of the Bryansk State University of Engineering and Technology. Bryansk, 2020. pp. 256-258. https://www.elibrary.ru/item.asp?id=45793878 (in Russian).
  263. A. A. Branitsky Architecture of a network attack detection system based on the usage of machine learning methods and big Data processing technologies // Proceedings of the International Conference "Innovations in Information Technologies, Mechanical Engineering and Motor Transport" (IITMA-2020). Russia, Kemerovo. December 4, 2020.Ð. 160-162 // https://elibrary.ru/item.asp?id=44730124 (in Russian).
  264. E.V. Fedorchenko Analysis of the exploits source code to improve efficiency of the security information and event management systems // Proceedings of the International Conference "Innovations in Information Technologies, Mechanical Engineering and Motor Transport" (IITMA-2020). Russia, Kemerovo. December 4, 2020. Ð. 201-203 // https://elibrary.ru/item.asp?id=44730138 (in Russian).
  265. Vasily Desnitsky. A technique for application of the process of countermeasure choice on the base of game theory approach // XVII St. Petersburg International Conference "Regional Informatics (RI-2020)". October 28-30, 2020. Conference materials / SPOISU. - SPb, Ð. 133-134. http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf https://www.elibrary.ru/item.asp?id=49390762 (in Russian).
  266. Bashkirtsev A. S., Mitrofanov E. A., Paraschuk I. B. Analysis of requirements for automated telecommunication network management systems // Regional informatics and information security. Collection of works. Issue 8. St. Petersburg: SPOISU, 2020. pp. 91-96. http://www.spoisu.ru/files/riib/riib_8_2020.pdf (in Russian).
  267. Andrey Bashkirtsev, Yevgeny Mitrofanov, Igor Parashchuk. Automated telecommunication network management systems: review and analysis of modern requirements // Regional Informatics (RI-2020). XVII St. Petersburg International Conference "Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020: Conference proceedings. Part 1. SPOISU. - St. Petersburg: 2020. - 393 p., pp. 63-65. // https://elibrary.ru/item.asp?id=49390716 (in Russian).
  268. Nikolay Mikhaylichenko, Igor Paraschuk, L. Sayarkin, V. Tkachenko. Analysis of user characteristics of modern data centers in the interest of the formulation of the system of indicators of the quality of the user experience // In the collection: Actual problems of infotelecommunications in science and education. (APINO-2020) collection of scientific articles: in 4 volumes. Edited by S.V. Bachevsky. 2017. pp. 338-343. // https://elibrary.ru/item.asp?id=32650705 (in Russian).
  269. K.E. Izrailov, S.A. Kuznetsov. The use of artificial intelligence and machnie learning methods to search for vulnerabilities in source code // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific-technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 361-366. // https://www.elibrary.ru/item.asp?id=44610403 (in Russian).
  270. K.E. Izrailov, I.M. Tatarnikova, A.V. Fedorova, V.Yu. Shiryaev. Comparative analysis of plagiarism checkers // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific-technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 366-371.// https://www.elibrary.ru/item.asp?id=44610404 (in Russian).
  271. E.V. Doynikova, E.S. Novikova, D.A. Gayfullina, I.V. Kotenko. Defining a set of attributes for forming an attacker's profile when analyzing information security risks // In the book: Regional Informatics (RI-2020). XVII St. Petersburg International Conference. Conference materials. St. Petersburg, 2020. pp. 136-137. // https://www.elibrary.ru/item.asp?id=49390591 (in Russian).
  272. A.A. Bogatyrev, N.P. Vanchakova, E.A. Vatskel, I.V. Kotenko, N.V. Krasilnikova, A.V. Tishkov. Pedagogical technology "web quest" as a tool for preventing destructive behavior of young people in social Internet networks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). IX International Scientific-technical and scientific-methodical Conference: collection of scientific articles. Saint Petersburg, 2020.Vol.4, pp. 263-268. // https://www.elibrary.ru/item.asp?id=44627781 (in Russian).
  273. I.V. Kotenko, B.A. Tynymbaev. Comparative analysis of solutions for building UBA and UEBA prospective systems // Actual problems of infotelecommunications in science and education (APINO 2020). IX International Scientific-technical and scientific-methodical Conference: collection of scientific articles. St. Petersburg, 2020. Vol.1, pp. 629-634. // https://www.elibrary.ru/item.asp?id=44604086 (in Russian).
  274. A.V. Meleshko. Detecting attacks in the water supply management system using machine learning // In the book: Mathematical and computer modeling. collection of materials of the VIII International Scientific Conference dedicated to the memory of A.L. Josefer. Omsk, 2020. pp. 249-251. // https://www.elibrary.ru/item.asp?id=45809227 (in Russian).
  275. A.V. Meleshko. An approach to generating data sets for modeling attacks in a water supply management system // In the book: Mathematical and computer modeling. collection of materials of the VIII International Scientific Conference dedicated to the memory of A.L. Josefer. Omsk, 2020. pp. 246-248. // https://www.elibrary.ru/item.asp?id=45809225 (in Russian).
  276. A.V. Meleshko. Practical implementation of an approach to detecting anomalies in cyber-physical systems // In the collection: DIGITAL REGION: EXPERIENCE, COMPETENCIES, PROJECTS. collection of articles of the III International Scientific and Practical Conference dedicated to the 90th anniversary of the Bryansk State University of Engineering and Technology. Bryansk, 2020. pp. 621-625. // https://www.elibrary.ru/item.asp?id=45793966 (in Russian).
  277. A.V. Meleshko. Analysis of approaches to revelation of violations in data of cyber-physical systems // In the collection: DIGITAL REGION: EXPERIENCE, COMPETENCIES, PROJECTS. collection of articles of the III International Scientific and Practical Conference dedicated to the 90th anniversary of the Bryansk State University of Engineering and Technology. Bryansk, 2020. pp. 617-620. // https://www.elibrary.ru/item.asp?id=45793965 (in Russian).
  278. E.V. Doynikova, A.V. Fedorchenko, A.A. Branitsky. Analysis of the source code of exploits to identify signs of vulnerabilities used by them // In the collection: Challenges of the digital economy: the development of a comfortable urban environment. Proceedings of the III All-Russian Scientific and Practical Conference with international participation. 2020. pp. 249-250. // https://www.elibrary.ru/item.asp?id=44171539 (in Russian).
  279. A.V. Meleshko. Analysis of security of computer networks from attacks of failure to service // In the book: Regional Informatics (RI-2020). XVII St. Petersburg International Conference. Conference materials. St. Petersburg, 2020. pp. 155-157 // https://elibrary.ru/item.asp?id=49390768 (in Russian).
  280. A.Yu. Ivanov, D.A. Kleverov, M.A. Kleverov, I.B. Saenko. Organization of data storage in a promising system of access control to information of cloud infrastructure // In the collection: Current problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific, technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 356-360. // https://www.elibrary.ru/item.asp?id=44610402 (in Russian).
  281. M.V. Dulkov, I.N. Fabiyanovsky, I.B. Saenko. Improving the speed of processing unstructured data in distributed information systems based on blockchain technology // In the collection: Current problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific, technical and scientific-methodical Conference. In 4 t.. St. Petersburg, 2020. pp. 286-291.// https://www.elibrary.ru/item.asp?id=44610387 (in Russian).
  282. R.V. Galiev, I.B. Saenko. Application of modern systems of electronic document circulation in order to increase the effectiveness of management of scientific and educational activities of universities of the russian federation // In the collection: Current problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific, technical and scientific-methodical Conference. In 4 t.. St. Petersburg, 2020. pp. 208-210. // https://www.elibrary.ru/item.asp?id=44610370 (in Russian).
  283. S.N. Bushuev, V.I. Komashinsky, O.I. Pantyukhin, I.B. Parashchuk, I.B. Saenko. Building a promising system for differentiating access to information in cloud infrastructures of critical information objects // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific, technical and scientific-methodical Conference. In 4 t.. St. Petersburg, 2020. pp. 122-127. // https://www.elibrary.ru/item.asp?id=44610325 (in Russian).
  284. I.B. Sayenko, S.N. Bushuev. A promising system of information access differentiation in cloud infrastructures // In the collection: Science Today: Global challenges and mechanisms of development. Materials of the international scientific and practical conference. 2020. pp. 57-59.// https://www.elibrary.ru/item.asp?id=43047812 (in Russian).
  285. L.A. Vitkova, I.B. Paraschuk. Analysis of modern innovative solutions for identification of deviations in heurisms of traffic of extra volumes for detection of network attacks and protection against them // In the collection: Regional informatics and information security. Proceedings of the conference: St. Petersburg International Conference and St. Petersburg Interregional Conference. St. Petersburg, 2020. pp. 99-102. // https://www.elibrary.ru/item.asp?id=48027063 (in Russian).
  286. I.B. Paraschuk, V.A. Malafeev, A.A. Pronin, A.S. Bashkirtsev. Overview of basic requirements for cybersecurity in automated management systems for critical information infrastructures // In the collection: Promising directions for the development of domestic information technologies. Materials of the round tables of the VI interregional scientific and practical conference. Sevastopol, 2020. pp. 56-57. // https://www.elibrary.ru/item.asp?id=46146786 (in Russian).
  287. I.B. Paraschuk, L.A. Vitkova, V.A. Malafeev. Software systems for detecting network attacks: issues of technical and economic evaluation of competitive analogues, potential of development and application // In the book: Regional Informatics (RI-2020). XVII St. Petersburg International Conference. Conference materials. St. Petersburg, 2020. pp. 100-102.// https://www.elibrary.ru/item.asp?id=49390579 (in Russian).
  288. L.A. Vitkova, I.B. Paraschuk. Detection of network attacks and protection against them on the basis of identification of deviations in heurisms of traffic of extra volume: analysis of modern innovative solutions // In the book: Regional Informatics (RI-2020). XVII St. Petersburg International Conference. Conference materials. St. Petersburg, 2020. pp. 68-69. // https://www.elibrary.ru/item.asp?id=49390564 (in Russian).
  289. I.B. Paraschuk, L.A. Vitkova, V.A. Malafeev. To the question of technical and economic evaluation of the potential of existing and perspective network attack detection systems // In the collection: Regional informatics and information security. Proceedings of the conference: St. Petersburg International Conference and St. Petersburg Interregional Conference. St. Petersburg, 2020. pp. 118-122. // https://www.elibrary.ru/item.asp?id=48027076 (in Russian).
  290. L.N. Bogdanova, D.A. Kleverov, M.A. Kleverov. The overview of models and algorithms for detecting abnormal signalization in IOT // In the collection: Current problems of infotelecommunications in science and education (APINO 2020). IX International Scientific-technical and scientific-methodological Conference : collection of scientific articles. St. Petersburg, 2020. pp. 141-145. // https://www.elibrary.ru/item.asp?id=44603982 (in Russian).
  291. I.B. Paraschuk, N.V. Mikhailichenko, E.S. Kryukova. Multiparametric data storage systems, data centers and digital libraries: method of control the technical condition parameters and quality analysis // Regional Informatics (RI-2020) p.102-103 // https://www.elibrary.ru/item.asp?edn=gvzkuq (in Russian).
  292. E.S. Kryukova, I.B. Paraschuk, A.V. Chernyavsky. Analysis of tasks, functions and signs of modern electronic libraries // In the collection: Actual problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific, technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 440-445. // https://elibrary.ru/item.asp?id=44610421 (in Russian).
  293. V.A. Malafeev, I.B. Paraschuk, A.A. Pronin, L.A. Sankin. Expert systems for analysis of the cyber security of telecommunication networks and technologies, their tasks and features // In the book: Regional Informatics (RI-2020). XVII St. Petersburg International Conference. Conference materials. St. Petersburg, 2020. pp. 87-88.// https://elibrary.ru/item.asp?id=49390574 (in Russian).
  294. E.S. Kryukova, N.V. Mikhailichenko, I.B. Paraschuk. Monitoring of electronic libraries: basic concepts, goals, principles and directions of development // In the book: Regional Informatics (RI-2020). XVII St. Petersburg International Conference. Conference materials. St. Petersburg, 2020. pp. 83-84. // https://elibrary.ru/item.asp?id=49390573 (in Russian).
  295. I.B. Paraschuk, E.S. Kryukova, Yu.G. Kuzmin, N.V. Mikhailichenko. Features and principles of optimal adaptive monitoring of data centers and electronic libraries // In the collection: Promising directions for the development of domestic information technologies. Materials of the round tables of the VI interregional scientific and practical conference. Sevastopol, 2020. pp. 46-47. // https://elibrary.ru/item.asp?id=46146780 (in Russian).
  296. I.B. Paraschuk, E.S. Kryukova, L.A. Sayarkin, V.A. Malofeev. Review and analysis of quality indicators of modern means of trusted loading of automated workplaces, connected to electronic libraries // In the collection: Science and education: problems and innovations. Collection of articles of the IV International Scientific and Practical Conference. Penza, 2020. pp. 76-78.// https://elibrary.ru/item.asp?id=42789034 (in Russian).
  297. D.M. Vorontsov, N.V. Mikhailichenko, I.B. Paraschuk. Features and quality indicators of identification features input devices as modern software and hardware means of access control to information infrastructure objects // In the collection: Current problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific, technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 194-199. // https://elibrary.ru/item.asp?id=44610349 (in Russian).
  298. V.A. Malafeev, I.B. Paraschuk, E.O. Shestakov. Selection and justification of effective measures for integrated data protection in information systems // In the collection: Current problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific, technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 510-515. // https://elibrary.ru/item.asp?id=44610435 (in Russian).
  299. E.S. Kryukova, I.B. Paraschuk, N.V. Mikhaylichenko. Quality analysis of electronic libraries as elements of a telecommunication media // In the collection: Current problems of infotelecommunications in science and education (APINO 2020). Collection of scientific articles of the IX International Scientific, technical and scientific-methodical Conference. In 4 volumes. St. Petersburg, 2020. pp. 5-9. // https://elibrary.ru/item.asp?id=44610299 (in Russian).
  300. E.S. Kryukova, N.V. Mikhailichenko, I.B. Paraschuk. Concepts and directions of development of monitoring of electronic libraries as typical components of information-telecommunication media // In the collection: Regional informatics and information security. Proceedings of the conference: St. Petersburg International Conference and St. Petersburg Interregional Conference. St. Petersburg, 2020. pp. 69-72. // https://elibrary.ru/item.asp?id=48027033 (in Russian).
  301. V.A. Malafeev, I.B. Paraschuk, A.A. Pronin, L.A. Sankin. Tasks and features of expert systems for analysis of cyber-security of telecommunication networks and technologies // In the collection: Regional informatics and information security. Proceedings of the conference: St. Petersburg International Conference and St. Petersburg Interregional Conference. St. Petersburg, 2020. pp. 76-80.// https://elibrary.ru/item.asp?id=48027048 (in Russian).
  302. I.B. Paraschuk, N.V. Mikhaylichenko, E,S. Kryukova. Method of control and analysis of multiparametric data storage systems, date centers and electronic libraries // In the collection: Regional Informatics and information security. Proceedings of the conference: St. Petersburg International Conference and St. Petersburg Interregional Conference. St. Petersburg, 2020. pp. 80-83.// https://elibrary.ru/item.asp?id=48027050 (in Russian).
  303. I.N. Fabiyanovsky, M.V. Dulkov, I.B. Saenko. Application of a distributed registry system to improve operational accounting and control of the technical condition of elements of a distributed information system // In the collection: Problems of technical support of troops in modern conditions. Proceedings of the V Interuniversity scientific and practical conference. 2020. pp. 245-250.// https://www.elibrary.ru/item.asp?id=43766086 (in Russian).
  304. I.B. Saenko, I.N. Fabiyanovsky. Evaluation of the implementation of possible options for the placement of information resources in a single information space based on selected performance indicators // In the book: Promising directions for the development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 259-261. // https://www.elibrary.ru/item.asp?id=42944601 (in Russian).
  305. A.Yu. Khalenev, I.B. Saenko, A.V. Kiy, M.K. Alekseeva. On the problem of updating information in a distributed data base of automated systems for special purposes // In the book: Promising directions for the development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 264-266.// https://www.elibrary.ru/item.asp?id=42944603 (in Russian).
  306. M.D. Kuznetsov, E.S. Novikova. Application of latent semantic analysis for clustering of texts similar in content 1 // In the book: Mathematical and computer modeling. collection of materials of the VIII International Scientific Conference dedicated to the memory of A.L. Josefer. Omsk, 2020. pp. 125-127.// https://www.elibrary.ru/item.asp?id=45809109 (in Russian).
  307. E.S. Novikova, A.A. Vlasyuk, M.P. Bestuzhev, A.V. Konnova, A.V. Lavrov. The study of data visualization techniques obtained from cyberphysical systems // in the collection: ALMANAC of scientific work of YOUNG SCIENTISTS of ITMO UNIVERSITY XLIX scientific and educational conference of ITMO University St. Petersburg ITMO University, 2020. pp. 173-179. // https://www.elibrary.ru/item.asp?id=44721049 (in Russian).
  308. Kartel A., Novikova E., Volosiuk A. analysis of visualization techniques for malware detection // Proceedings of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, EIConRus 2020. 2020. P. 337-340. DOI: 10.1109/EIConRus49466.2020.9038910 // https://www.elibrary.ru/item.asp?id=43259701

2019

  1. Vasily Desnitsky, Igor Kotenko, Danil Zakoldaev. Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices // Electronics. 2019. Ò. 8. ¹ 5. Ñ. 500, https://doi.org/10.3390/electronics8050500 // https://elibrary.ru/item.asp?id=41630344
  2. Kotenko I., Parashchuk I. Analysis of the Sensitivity of Algorithms for Assessing the Harmful Information Indicators in the Interests of Cyber-Physical Security // Electronics (switzeland) 2019. vol. 8, no. 3. P. 284-291 https://doi.org/10.3390/electronics8030284 DOI: 10.3390/electronics8030284 // https://www.elibrary.ru/item.asp?id=38746576 (WoS, Scopus, SJR=0.46, Q1).
  3. Igor Kotenko, Igor Saenko, Sergey Ageev. Hierarchical fuzzy situational networks for online decision-making: Application to telecommunication systems // Knowledge Based Systems (KBSs). 2019. vol 185. Ð. 104935. DOI: 10.1016/j.knosys.2019.104935 // https://doi.org/10.1016/j.knosys.2019.104935 // https://elibrary.ru/item.asp?id=41646866 (WoS, Scopus, SJR=1.46, Q1)
  4. Andrey Privalov, Vera Lukicheva, Igor Kotenko, Igor Saenko. Method of early detection of cyber-attacks on telecommunication networks based on traffic analysis by extreme filtering // Energies, 2019, ¹ 12(24), Ð. 4768-4777;DOI: 10.3390/en12244768 // https://doi.org/10.3390/en12244768. 13 Dec 2019. 14 p. https://www.mdpi.com/1996-1073/12/24/4768 // https://elibrary.ru/item.asp?id=43229731(Q1, WoS, Scopus, SJR=0.61, Q1)
  5. Maxim Kolomeets, Andrey Chechulin, and Igor Kotenko. Social networks analysis by graph algorithms on the example of the VKontakte social network // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2019, Vol. 10, No. 2, P. 55-75. https://doi.org/10.22667/JOWUA.2019.06.30.055 (Q2, Scopus). // https://elibrary.ru/item.asp?id=41699611
  6. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Determination of System Weaknesses based on the Analysis of Vulnerability Indexes and the Source Code of Exploits // Journal of Universal Computer Science. 2019, Vol. 25, No. 9. pp. 1043-1065. http://www.jucs.org/jucs_25_9/ determination_of_system_ weaknesses. (WoS, Scopus, SJR=0.33, Q2). DOI: 10.3217/jucs-025-09-1043 // https://elibrary.ru/item.asp?id=45166166
  7. Igor Kotenko, Sergey Ageev, Igor Saenko. Applying fuzzy computing methods for on-line monitoring of new generation network elements // Advances in Intelligent Systems and Computing. 2019. Ò. 874. Ñ. 331-340. DOI: 10.1007/978-3-030-01818-4_33 // https://elibrary.ru/item.asp?id=38636559
  8. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Martin Strecker. Voronoi maps for planar sensor networks visualization // Communications in Computer and Information Science. 2019. Ò. 971. Ñ. 96-109. DOI: 10.1007/978-981-13-3732-1_7 // https://elibrary.ru/item.asp?id=38663581
  9. Anton Pronoza, Lidia Vitkova, Andrey Chechulin, Igor Kotenko. Visual analysis of information dissemination channels in social network for protection against inappropriate content // In book: Proceedings of the Third International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’18). pp.95-105. // Advances in Intelligent Systems and Computing. Vol. 875, 2019. P. 95-105. DOI: 10.1007/978-3-030-01821-4_11 (ñonference materials) // https://elibrary.ru/item.asp?id=38635986
  10. Alexander Branitskiy, Dmitry Levshun, Natalia Krasilnikova, Elena Doynikova, Igor Kotenko, Artem Tishkov, Nina Vanchakova, and Andrey Chechulin. Determination of Young Generation’s Sensitivity to the Destructive Stimuli based on the Information in Social Networks // Journal of Internet Services and Information Security (JISIS), Vol. 9, No. 3, August 2019. P. 1-20. DOI: 10.22667/JISIS.2019.08.31.001 // URL: http://isyou.info/jisis/vol9/no3/jisis-2019-vol9-no3-01.pdf. (Scopus, WoS, SJR=0.18, Q4) // https://elibrary.ru/item.asp?id=41700137
  11. Iuliia Kim, Ilya Viksnin, Igor Kotenko. Automated centroid tuning based on particle swarm optimization in the image clustering process // International Journal of Computer Science & Applications (IJCSA). 2019. vol. 16. no. 1. pp. 17-37. (WoS, Scopus, SJR=0.13, Q4).
  12. Igor Kotenko, Pavel Budko, Alexey Vinogradenko, Igor Saenko. An Approach for Intelligent Evaluation of the State of Complex Autonomous Objects Based on the Wavelet Analysis // Frontiers in Artificial Intelligence and Applications. 2019. Ò. 318. Ñ. 25-38. DOI: 10.3233/FAIA190036 // https://elibrary.ru/item.asp?id=43252618
  13. A. Branitskiy, I. Kotenko. Attack Detection in Mobile Internet and Networks using the Graph-based Schemes for Combining the Support Vector Machines // Communications in Computer and Information Science. 2019. Ò. 971. Ñ. 1-16. DOI: 10.1007/978-981-13-3732-1_1 // https://elibrary.ru/item.asp?id=38663533
  14. V. Gorodetsky, O. Tushkanova. Semantic Technologies for Semantic Applications. Part 1. Basic Components of Semantic Technologies // Scientific and Technical Information Processing, Vol..46 ¹ 5, Ð.306-313 DOI: 10.3103/S0147688219050022 // https://elibrary.ru/item.asp?id=43267255
  15. Igor Kotenko, Igor Saenko, Oleg Lauta. Modeling the Impact of Cyber Attacks // In book: Cyber Resilience of Systems and Networks (pp.135-169), January 2019. DOI:10.1007/978-3-319-77492-3_7, https://doi.org/10.1007/978-3-319-77492-3_7.
  16. Vladislav Alexandrov, Vasily Desnitsky, Dmitry Chaly. Design and Security Analysis of a Fragment of Internet of Things Telecommunication System // Journal Automatic Control and Computer Sciences. Voume 53. Issue 7. P. 851-856. 2019. DOI: 10.3103/S0146411619070241 (WoS) // https://elibrary.ru/item.asp?id=43243969
  17. Maxim Kolomeets, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker, and Igor Kotenko. Reference architecture for social networks graph analysis // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2019, Vol. 10, No. 4, P. 109-125. http://isyou.info/jowua/papers/jowua-v10n4-7.pdf (Q2, Scopus), DOI: 10.22667/JOWUA.2019.12.31.109 //https://elibrary.ru/item.asp?id=43235758
  18. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions // Automatic Control and Computer Sciences. 2019. Ò. 53. ¹ 8. Ñ. 1029-1037. DOI: 10.3103/S014641161908008X // https://elibrary.ru/item.asp?id=43268189
  19. Alexander Branitskiy, Igor Kotenko. Applying artificial intelligence methods to network attack detection // Intelligent Systems Reference Library. 2019. Ò. 151. Ñ. 115-149. DOI: 10.1007/978-3-319-98842-9_5 // https://elibrary.ru/item.asp?id=35751400 (ÐÈÍÖ, Scopus)
  20. Evgenia Novikova, Igor Kotenko. Visualization-Driven Approach to Fraud Detection in the Mobile Money Transfer Services // In book: Algorithms, Methods, and Applications in Mobile Computing and Communications P .205-236 DOI:10.4018/978-1-5225-5693-0.ch009
  21. Ivo Berger, Roland Rieke, Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Comparative study of machine learning methods for in-vehicle intrusion detection // Lecture Notes in Computer Science. 2019. Ò. 11387 LNCS. Ñ. 85-101. DOI: 10.1007/978-3-030-12786-2_6 // https://elibrary.ru/item.asp?id=38656424
  22. M. Kolomeets, A. Chechulin, I. Kotenko. Social networks analysis by graph algorithms on the example of the v kontakte social network // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2019. Ò. 10. ¹ 2. Ñ. 55-75. DOI: 10.22667/JOWUA.2019.06.30.055 // https://elibrary.ru/item.asp?id=41699611
  23. Ilsun You, Vishal Sharma, Hsing-Chung Chen, Igor Kotenko. Mobile Internet Security (Second International Symposium, MobiSec 2017, Jeju Island, Republic of Korea, October 19–22, 2017, Revised Selected Papers) // Publisher: Springer SingaporeISBN: 978-981-13-3731-4, January 2019. DOI:10.1007/978-981-13-3732-1
  24. D.A Bashmakov, A.V. Sivachev, D. El Baz, D. S. Levshun, A.G. Korobeynikov. Method for predicting pixel values in background areas in the problem of weighted steganalysis in the spatial domain of natural images under small payloads // Communications in Computer and Information Science. 2019. Ò. 971. Ñ. 65-82. DOI: 10.1007/978-981-13-3732-1_5 // https://elibrary.ru/item.asp?id=38666486
  25. Igor Kotenko, Igor Saenko, Sergey Ageev. Applying Intelligent Agents for Anomaly Detection of Network Traffic in Internet of Things Networks // 2018 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS 2018). Bali, Indonesia. 1-3 November, 2018. 2019. Ð. 123-129. DOI: 10.1109/IOTAIS.2018.8600867 // https://elibrary.ru/item.asp?id=38639777 (WoS and Scopus)
  26. Andrey Chechulin, Igor Kotenko. Application of image classification methods for protection against inappropriate information in the Internet // The 2018 International Conference on Internet of Things and Intelligence Systems (IoTaIS 2018). Bali, Indonesia. 1-3 November, 2018. IEEE Xplore, 2019. P.167-173 DOI: 10.1109/IOTAIS.2018.8600896 // https://elibrary.ru/item.asp?id=38639482
  27. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Igor Saenko. Access Control Visualization Using Triangular Matrices // Â ñáîðíèêå: 2019 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP). 2019. Ñ. 348-355. DOI: 10.1109/EMPDP.2019.8671578 // https://elibrary.ru/item.asp?id=38327114
  28. Dmitry Levshun, Andrey Chechulin, Igor Kotenko, Yannick Chevalier. Design and verification methodology for secure and distributed cyber-physical systems // 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Canary Islands, Spain, 2019. P. 8763814 DOI: 10.1109/NTMS.2019.8763814 // https://elibrary.ru/item.asp?id=41651124
  29. Ilya Afanasyev, Alexander Kolotov, Ruslan Rezin, Konstantin Danilov, Manuel Mazzara, Subham Chakraborty, Alexey Kashevnik, Andrey Chechulin, Aleksandr Kapitonov, Vladimir Jotsov, Andon V. Topalov, Nikola Georgiev Shakev, Sevil Ahmed. Towards Blockchain-based Multi-Agent Robotic Systems: Analysis, Classification and Applications. CoRR abs/1907.07433 (2019). https://arxiv.org/pdf/1907.07433.pdf https://arxiv.org/pdf/1907.07433.pdf https://ieeexplore.ieee.org/document/9073162
  30. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. Protection Mechanisms against Energy Depletion Attacks in Cyber-Physical Systems // Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2019, Saint Petersburg - Moscow,J anuary 28-30, 2019, pp. 214-219, 2019. DOI: 10.1109/EIConRus.2019.8656795 // https://elibrary.ru/item.asp?id=38701751
  31. Desnitsky V.A., Kotenko I.V., Parashchuk I.B. Methods of assessing the effectiveness of network content processing systems for detecting malicious information9 taking into account the elimination of uncertainty in the semantic content of information objects // Proceedings of 2019 22nd International Conference on Soft Computing and Measurements, SCM 2019. 22. 2019. Ñ. 41-44. DOI: 10.1109/SCM.2019.8903670 // https://www.elibrary.ru/item.asp?id=43213385 (WoS, Scopus).
  32. Igor Kotenko, Igor Saenko I., Alexander Branitskiy. Improving the Performance of Manufacturing Technologies for Advanced Material Processing Using a Big Data and Machine Learning Framework // Â ñáîðíèêå: Materials Today: Proceedings. 2019. Ñ. 380-385. DOI: 10.1016/j.matpr.2018.12.162 // https://elibrary.ru/item.asp?id=39000243
  33. Igor Kotenko, Igor Saenko, Alexei Kushnerevich, Alexander Branitskiy. Attack detection in IoT critical infrastructures: a machine learning and big data processing approach // Proceedings - 27th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2019. 27. 2019. Ñ. 340-347. DOI: 10.1109/EMPDP.2019.8671571 // https://elibrary.ru/item.asp?id=38662631
  34. I. Kotenko, I. Parashchuk. An approach to modeling the decision support process of the security event and incident management based on Markov chains // IFAC-PapersOnLine. 9th IFAC Conference on Manufacturing Modelling, Management and Control, MIM 2019. 2019. Ñ. 934-939. DOI: 10.1016/j.ifacol.2019.11.314 // https://www.elibrary.ru/item.asp?id=43236275
  35. Lidia Vitkova, Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Approach to organizing of a heterogeneous swarm of cyber-physical devices to detect intruders // Â ñáîðíèêå: IFAC-PapersOnLine. 9th IFAC Conference on Manufacturing Modelling, Management and Control, MIM 2019. 2019. Ñ. 945-950. DOI: 10.1016/j.ifacol.2019.11.316 https://www.elibrary.ru/item.asp?id=43243011
  36. Diana Gaifulina, Andrey Fedorchenko, Igor Kotenko. Network Protocols Determination Based on Raw Data Analysis for Security Assesment under Uncertainty // The 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2019). 18-21 September, 2019, Metz, France. pp. 163-167. DOI: 10.1109/IDAACS.2019.8924349 // https://elibrary.ru/item.asp?id=43217877 (WoS, Scopus).
  37. A. Branitskiy, A. Fedorchenko, I. Kotenko, I. Saenko. An Approach to Intelligent Distributed Scanning and Analytical Processing of the Internet Inappropriate Information // The 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2019). 18-21 September, 2019, Metz, France. pp. 146-151. DOI: 10.1109/IDAACS.2019.8924380 // https://elibrary.ru/item.asp?id=43221671 (WoS, Scopus).
  38. Igor Kotenko, Igor Parashchuk. Decomposition and formulation of system of features of harmful information based on fuzzy relationships // Â ñáîðíèêå: Proceedings - 2019 International Russian Automation Conference, RusAutoCon 2019. 2019. Ñ. 8867768. DOI: 10.1109/RUSAUTOCON.2019.8867768, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8867768& isnumber=8867588. // https://www.elibrary.ru/item.asp?id=41711204 (WoS, Scopus).
  39. I. Saenko, I. Kotenko. A Role-Base Approach and a Genetic Algorithm for VLAN Design in Large Critical Infrastructures // Proceedings of ACM Genetic and Evolutionary Computation Conference Companion (GECCO), Prague, Czech Republic, July 2019 (GECCO’19). pp. 1643-1650. DOI: 10.1145/3319619.3326853 // https://elibrary.ru/item.asp?id=41626641 (WoS, Scopus, SJR=0.17).
  40. I. Parashchuk, I. Kotenko. Formulation of a system of indicators of information protection quality in automatic systems of numerical control machines for advanced material processing // Â ñáîðíèêå: Materials Today: Proceedings. International Conference on Modern Trends in Manufacturing Technologies and Equipment, ICMTMTE 2019. 2019. Ñ. 1835-1840. DOI: 10.1016/j.matpr.2019.07.023 // https://www.elibrary.ru/item.asp?id=43266444
  41. Kotenko I., Parashchuk I. Multi-criteria security assessment of control and diagnostic data on the technological processes // International Conference on Modern Trends in Manufacturing Technologies and Equipment: Mechanical Engineering and Materials Science (ICMTMTE 2019) Vol. 298, Ð. 00071, DOI:10.1051/matecconf/201929800071
  42. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Automated Revealing of Organizational Assets based on Event Correlation // Â ñáîðíèêå: 2019 10th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2019 - Proceedings and Workshop. 10. 2019. Ñ. 8763843. DOI: 10.1109/NTMS.2019.8763843 // https://www.elibrary.ru/item.asp?id=41677256
  43. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Ontology of metrics for cyber security assessment // Â ñáîðíèêå: ACM International Conference Proceeding Series. Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019. 2019. Ñ. 3341496. DOI: 10.1145/3339252.3341496 // https://elibrary.ru/item.asp?id=41627655
  44. I. Kotenko, I. Saenko, Y. Sineshchuk, V. Kuvatov, O. Chudakov. Optimization of the cyber Security System Structure Based on Accounting of the Prevented Damage Cost // Â ñáîðíèêå: ACM International Conference Proceeding Series. Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019. 2019. Ñ. 3357620. DOI: 10.1145/3357613.3357620 // https://elibrary.ru/item.asp?id=43230718 (WoS and Scopus).
  45. Igor Kotenko, Nickolay Komashinsky. Combining Spark and Snort Technologies for Detection of Network Attacks and Anomalies: Assessment of Performance for the Big Data Framework // ACM International Conference Proceeding Series. Proceedings of the 12th International Conference on Security of Information and Networks, SIN 2019. 2019. Ñ. 3357630. DOI: 10.1145/3357613.3357630 // https://www.elibrary.ru/item.asp?id=43224063
  46. Olga Tushkanova, Vladimir Samoylov. Knowledge Net: Model and System for Accumulation, Representation, and Use of Knowledge // IFAC-PapersOnLine. 9th IFAC Conference on Manufacturing Modelling, Management and Control, MIM 2019. 2019. Ñ. 1150-1155. // https://elibrary.ru/item.asp?id=43250613
  47. Diana Gaifulina, Andrey Chechulin. Development of the Complex Algorithm for Web Pages Classification to Detection Inappropriate Information on the Internet // 13th International Symposium on Intelligent Distributed Computing (IDC 2019), Saint-Petersburg, Russia, 7-9 October 2019.
  48. Vasily Desnitsky, Igor Kotenko. Monitoring the State of Materials in Cyberphysical Systems: Water Supply Case Study // Materials Today: Proceedings. 2019. P. 410-416. 2019. DOI: 10.1016/j.matpr.2019.01.005 // https://elibrary.ru/item.asp?id=39002730
  49. I. Kotenko, I. Saenko, A. Branitskiy. Detection of Distributed Cyber Attacks Based on Weighted Ensembles of Classifiers and Big Data Processing Architecture // INFOCOM 2019 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2019. 2019. Ñ. 9093774. DOI: 10.1109/INFOCOMWKSHPS47286.2019.9093774 // https://elibrary.ru/item.asp?id=45469616
  50. Krasov A., Vitkova L., Pestov I. Behavioral analysis of resource allocation systems in cloud infrastructure // Proceedings of the International Russian Automation Conference. Sochi, Russia, September 8-14, 2019. Ð. 8867699 DOI: 10.1109/RUSAUTOCON.2019.8867699 // https://www.elibrary.ru/item.asp?id=41809461&pff=1
  51. M. Buinevich, P. Fabrikantov, E. Stolyarova, K. Izrailov, A. Vladyko. Software defined internet of things: cyber antifragility and vulnerability forecast // Â ñáîðíèêå: 11th IEEE International Conference on Application of Information and Communication Technologies, AICT 2017 - Proceedings. 11. 2019. Ñ. 8687021. DOI: 10.1109/ICAICT.2017.8687021 // https://elibrary.ru/item.asp?id=36339665
  52. Vasily Desnitsky, Alexey Meleshko. Security analysis of software and hardware components in wireless sensor networks // Information Technology and Telecommunications. 2019. Vol. 7, No. 1. P. 75-83. https://www.sut.ru/doci/nauka/1AEA/ITT/2019_1/75-83.pdf 10.31854/2307-1303-2019-7-1-75-83 // https://elibrary.ru/item.asp?id=41382752 (in Russian).
  53. Alexey Meleshko, Vasily Desnitsky. Machine learning based approach to detection of anomalous data from sensors in ciber-physical water supply systems // Bulletin of the St. Petersburg State University of Technology and Design. Series 1 Natural and technical sciences. No. 4. P. 69-72. 2019. // https://elibrary.ru/item.asp?id=42485920 (in Russian).
  54. Vasily Desnitsky, Nikolay Rudavin. Modeling and evaluation of energy exhaustion attacks on unmanned aerial vehicles in crisis management systems // Scientific and analytical journal Bulletin of the St. Petersburg University of the State Fire Service EMERCOM of Russia. 2019. Issue 4. P. 69-74. https://www.elibrary.ru/item.asp?id=41833385 (in Russian).
  55. Evgenia Novikova, Igor Kotenko. Open challenges in visual analytics for security information and event management // Information & Control Systems. 2019. no. 2. pp. 57-67. DOI: 10.31799/1684-8853-2019-2-57-67 https://cyberleninka.ru/article/n/otkrytye-zadachi-vizualnogo-analiza-v-sistemah-upravleniya-informatsionnoy-bezopasnostyu/viewer // https://elibrary.ru/item.asp?id=41138301 (in Russian).
  56. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko. Automated detection of assets and calculation of their criticality for the analysis of information system security // SPIIRAS Proceedings. 2019. vol. 18. no 5. pp. 1182-1211. DOI: 10.15622/sp.2019.18.5.1182-1211 (Scopus, SJR: 0.17, Q3). // https://elibrary.ru/item.asp?id=40938369 (in Russian).
  57. Albert Malikov, Vladimir Avramenko, Igor Saenko. Model and method for diagnosing computer incidents in information and communication systems based on deep machine learning // Information and Control Systems. 2019, No. 6(103), pp. 32-42 DOI: 10.31799/1684-8853-2019-6-32-42 // https://elibrary.ru/item.asp?id=41653597 (in Russian).
  58. Igor Parashchuk, Igor Kotenko, Sergey Ostroverkhiy. Assessing the correlation of monitoring concepts in the interests of detecting malicious information and the provisions of the quality management of information and analytical systems // Information and spacn. 2019. ¹ 2. pp. 50-55. (HAC, RSCI, impact-factor – 0,277). // https://www.elibrary.ru/item.asp?id=38245716 (in Russian).
  59. Igor Kotenko, Igor Ushakov, Dmitry Pelevin, Alexander Ovramenko. Hybrid NoSQL database model for analysis of network traffic // Information security. Inside. 2019. no 1(85). pp. 46-54. // https://elibrary.ru/item.asp?id=37055268 (in Russian).
  60. Igor Kotenko, Igor Ushakov, Dmitry Pelevin, Alexander Preobrazhenskiy, Alexander Ovramenko. Identification of insiders in the corporate network: UBA and UEBA based approach // Information security. Inside. 2019. ¹ 5(89). pp. 26-35. // https://elibrary.ru/item.asp?id=41221380 (in Russian).
  61. Igor Kotenko, Igor Saenko, Vladimir Avramenko. Conceptual approach to ensuring information security of a system of distributed situational centers // Informatization and communication. 2019. no. 3. pp. 37-42. DOI:10.34219/2078-8320-2019-10-3-37-43. // https://elibrary.ru/item.asp?id=41472114 (in Russian).
  62. Igor Kotenko, Igor Parashchuk. Verification of unreliable parameters of the malicious information detection model // Herald of the Astrakhan State Technical University. Series Management, Computing and Informatics. 2019. no. 2. pp. 7-18. DOI: 10.24143/2072-9502-2019-2-7-18. // https://www.elibrary.ru/item.asp?id=37261366 (in Russian).
  63. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. A comprehensive model of secure cyber-physical systems for their design and verification // Proceedings of Educational Institutions of Communication. 2019. Vol. 5, No. 4. P. 114-123. DOI: 10.31854/1813-324X-2019-5-4-114-123 // https://elibrary.ru/item.asp?id=41664180 (in Russian).
  64. Diana Gaifulina, Andrey Fedorchenko, Igor Kotenko. Lexical marking of network traffic data for security assessment // Information security. Inside. 2019. ¹. 6(90). pp. 56-60. // https://elibrary.ru/item.asp?id=41494731 (in Russian).
  65. Nina Vanchakova, Andrey Bogatyrev, Natalia Krasilnikova, Diana Gaifulina, Igor Kotenko, Alexander Branitskiy. Media portrait of an individual as a basis for identifying the destructive style of interaction of young people in social network // Modern High Technologies, 2019. ¹ 11-2 Ð. 319-325. DOI: 10.17513/snt.37811 // https://elibrary.ru/item.asp?id=41594376 (in Russian).
  66. Dmitry Levshun, Igor Kotenko, Andrey Chechulin. Technique for design and verification of secure cyber-physical systems // Bulletin of the St. Petersburg State University of Technology and Design. Series 1. Natural and technical sciences. 2019. No. 4. P. 19-22. // https://elibrary.ru/item.asp?id=42485910 (in Russian).
  67. Igor Saenko, M. Birukov, Sergey Yasinskiy. Technique of forming a common scheme of access control to heterogeneous information resources in cloud infrastructures / Information and space. 2019. no. 1. pp. 77-83. https://infokosmo.ru/file/article/16728.pdf // https://elibrary.ru/item.asp?id=37189186 (in Russian).
  68. Igor Parashchuk, Nikolay Makhailichenko. Features of the use of neuro fuzzy-models for decision making procedures in the problems of evaluating the effectiveness of the performance of specialized data centers // Information and space. 2019. no. 1. pp. 84-88. (HAC, RSCI, impact-factor – 0,277). https://infokosmo.ru/file/article/16729.pdf // https://www.elibrary.ru/item.asp?id=37189187 (in Russian).
  69. Vladimir Gorodetsky, Olga Tushkanova. Semantic technologies for semantic applications. Part 2. Models of comparative text semantics // Artificial Intelligence and Decision Making. 2019.No 1. C. 49-61. (VAK, RSCI, impact factor - 0.74). DOI 10.14357 / 20718594190105 // https://elibrary.ru/item.asp?id=37179703 (in Russian).
  70. Dmitry Kudryavtsev, Alena Begler, Tatiana Gavrilova, Irina Leshcheva, Miroslav Kubelsky, Olga Tushkanova. Method for collaborative visual creation of a knowledge graph // Artificial Intelligence and Decision Making. 2019.No 1. P. 27-38. (VAK, RSCI, impact factor - 0.74). DOI 10.14357 / 20718594190103 // https://elibrary.ru/item.asp?id=37179701 (in Russian).
  71. Olga Tushkanova, Vladimir Samoylov. Knowledge Net: model and system for accumulation, representation and use of knowledge and data. Ontology of designing. 2019; Vol. 9. ¹ 1 (31) P. 117-131. (VAK, RSCI). DOI: 10.18287/2223-9537-2019-9-1-117-131 // https://elibrary.ru/item.asp?id=37627844 (in Russian).
  72. gor Saenko, D. Shapovalov, Sergey Yasinskiy. Comparative evaluation of options for implementing the ASP data processing model in corporate web applications // Information and space. 2019. ¹ 2. pp. 72-77. // https://elibrary.ru/item.asp?id=38245719 (in Russian).
  73. Alexander Branitskiy, Igor Saenko. The Technique of Multi-aspect Evaluation and Categorization of Malicious Information Objects on the Internet // Proceedings of Telecommunication Universities. 2019. Vol. 5. ¹ 3. pp. 58-65. DOI:10.31854/1813-324X-2019-5-3-58-65 // https://elibrary.ru/item.asp?id=41122910 (in Russian).
  74. Alexey Pronichev, Lidia Vitkova. Modeling of multiagent system of cyber-physical devices for solving problem management and security control problems // International Scientific Journal. 2019. No 9-1 (87). Part 1. pp.14-19. DOI: 10.23670/IRJ.2019.87.9.003 // https://elibrary.ru/item.asp?id=40803323 (in Russian).
  75. Igor Saenko, Albert Malikov, Vladimir Avramenko, Sergey Yasinskiy. A neural network model for diagnosing computer incidents at critical information infrastructure facilities // Information and space. 2019. ¹ 3. pp. 77-84.// https://elibrary.ru/item.asp?id=39791192 (in Russian).
  76. Elena Doynikova, Diana Gaifulina, Roman Kryukov. Identification of signs of cyberattack targets based on the analysis of security data in open sources // Trends in the development of science and education, 2019. No. 56-2 P. 36-41 DOI: 10.18411/lj-11-2019-33 // https://elibrary.ru/item.asp?id=43073434 (in Russian).
  77. Igor Kotenko, Dmitry Levshun, Igor Saenko. Verification of Access Control Policies based on Attributes in Cloud Infrastructures based on Model Checking // Systems of Control, Communication and Security, 2019. ¹ 4. P. 421-436. DOI: 10.24411/2410-9916-2019-10417 // https://elibrary.ru/item.asp?id=41567826 (in Russian).
  78. Diana Gaifulina, Igor Kotenko, Andrey Fedorchenko. A Technique for Lexical Markup of Structured Binary Data for Problems of Protocols Analysis in Uncertainty Conditions // Systems of Control, Communication and Security, 2019, ¹ 4, pp. 280-299. DOI: 10.24411/2410-9916-2019-10411. // https://elibrary.ru/item.asp?id=41567819 (in Russian).
  79. K.E. Izrailov, N.V. Gololobov, G.A. Raskin. Method of malware analysis based on FUZZY HASH // Informatization and Communication 2019. No. 2. pp. 36-44. DOI: 10.34219/2078-8320-2019-10-2-36-44 // https://elibrary.ru/item.asp?id=37576030 (in Russian).
  80. M.V. Buinevich, K.E. Izrailov. Anthropomorphic approach to description of the vulnerabilities interaction in program code. Part 1. Types of interactions // Information protection. Inside. 2019. No. 5 (89). pp. 78-85. // https://elibrary.ru/item.asp?id=41221386 (in Russian).
  81. M.V. Buinevich, K.E. Izrailov. Anthropomorphic approach to description of the vulnerabilities interaction in program code. Part. 2. Metric of vulnerabilities // Information protection. Inside. 2019. No. 6 (90). pp. 61-65. // https://elibrary.ru/item.asp?id=41494732 (in Russian).
  82. M.V. Buinevich, P.E. Zhukovskaya, K.E. Izrailov, V.V. Pokusov. Application of machine training to search vulnerabilities in the software code // Information technologies and telecommunications. 2019. Vol. 7. No. 4. pp. 59-65.DOI: 10.31854/2307-1303-2019-7-4-50-56 // https://elibrary.ru/item.asp?id=43921815 (in Russian).
  83. I.V. Kotenko. Research and development of an integrated security system based on embedded intelligent microcontrollers // In the collection: Challenges of the digital economy: markets, industries, platforms and technologies. collection of scientific papers. Kirov, 2019. pp. 30-32. // https://elibrary.ru/item.asp?id=38429455 (in Russian).
  84. D. A. Gaifullina. Methodology of data transmission medium traffic analysis in cybernetic systems for detecting network anomalies // In the collection: Almanac of scientific works of young scientists of ITMO University. XLVIII Scientific and educational-methodical conference of ITMO University. 2019. pp. 14-19. // https://elibrary.ru/item.asp?id=42160896 (in Russian).
  85. I.B. Saenko, S.A. Yasinsky, M.A. Biryukov. Methodology for forming a unified scheme for differentiating access to heterogeneous information resources in cloud infrastructures // Information and Space. 2019. No. 1. pp. 77-83. // https://elibrary.ru/item.asp?id=37189186 (in Russian).
  86. I.B. Saenko, A.M. Starkov. The approach to modeling virtual local area networks in the corporate information systems // High-tech technologies in space research of the Earth. 2019. Vol. 11. No. 1. pp. 66-77. DOI: 10.24411/2409-5419-2018-10226 // https://elibrary.ru/item.asp?id=37149814 (in Russian).
  87. I.B. Saenko, A.M. Starkov. Model for assessing the stability of the functioning of local area networks using VLAN technology // The works of TSNIIS. St. Petersburg branch. 2019. Vol. 1. No. 7. pp. 46-52. // https://elibrary.ru/item.asp?id=43167691 (in Russian).
  88. I.B. Saenko, I.N. Fabiyanovskiy. An approach to the operational processing of unstructured data in distributed information systems based on block chain technology // Proceedings of TSNIIS. St. Petersburg branch. 2019. Vol. 2. No. 8. pp. 8-13. // https://elibrary.ru/item.asp?id=43167363 (in Russian).
  89. I.B. Sayenko, D.S. Shapovalov, S.A. Yasinsky. Comparative evaluation of options for implementing the ASP data processing model in corporate web applications // Information and Cosmos. 2019. No. 2. pp. 72-77. https://elibrary.ru/item.asp?id=38245719 (in Russian).
  90. N.V. Mikhaylichenko, I.B. Paraschuk. Security of cyber-physical systems "smart logistics" for automated supply management // High-tech technologies in space research of the Earth. 2019. Vol. 11. No. 5. pp. 32-38. DOI: 10.24411/2409-5419-2018-10285 // https://elibrary.ru/item.asp?id=41670216 (in Russian).
  91. E.S. Kryukova, I.B. Paraschuk. Synthesis of transitional probability matrix elements for electronic library quality indicator model // Mathematical methods in engineering and technology - MMTT. 2019. Vol. 12-3. pp. 38-43.// https://elibrary.ru/item.asp?id=41467450 (in Russian).
  92. I.B. Paraschuk, I.V. Kotenko, S.M. Ostroverhiy. Evaluation of the correlation of monitoring concepts in the interests of detecting malicious information and the provisions of quality management of information and analytical systems // Information and Space. 2019. No. 2. pp. 50-55. // https://www.elibrary.ru/item.asp?id=38245716 (in Russian).
  93. Lidia Vitkova, Andrey Chechulin. Architecture of distributed data collection and processing in monitoring systems social networking // Perspective directions of development of domestic information technologies: materials of the V Interregional scientific and practical conference. Sevastopol, September 24-28, 2019 (collection of conference abstracts) P. 321-323. // https://elibrary.ru/item.asp?id=42944628 (in Russian).
  94. Lidia Vitkova, Andrey Chechulin, Ksenia Naumenko. Monitoring of the agenda in media systems while simultaneously applying task change algorithms // Perspective directions of development of domestic information technologies: materials of the V Interregional scientific and practical conference. Sevastopol, September 24-28, 2019 P. 323-325. // https://elibrary.ru/item.asp?id=42944629 (in Russian).
  95. Ksenia Zhernova, Andrey Chechulin. Data visualization models and algorithms for identification and counteraction of inappropriate information // Perspective directions of development of domestic information technologies: materials of the V Interregional scientific and practical conference. Sevastopol, September 24-28, 2019 P. 325-327. // https://elibrary.ru/item.asp?id=42944630 (in Russian).
  96. Igor Kotenko, Andrey Chechulin, Ksenia Zhernova. Comparison of realizations of gestural interfaces for network security management // Perspective directions of development of domestic information technologies: materials of the V Interregional scientific and practical conference. Sevastopol, September 24-28, 2019 (collection of conference abstracts) P. 329-330. // https://elibrary.ru/item.asp?id=42944632 (in Russian).
  97. Vasily Desnitsky, Igor Parashchuk. Indicators of accessibility, integrity and privacy of data of users of wireless sensor networks in the interests of analysis and ensuring their security // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". Conference materials. Saint-Petersburg, October 23-25, 2019. P. 114-116, 2019 (in Russian).// http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=46470582 (in Russian).
  98. Aleksei Meleshko, Vasily Desnitsky // Data anomalies identification in ciber-physical water supply systems // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". Conference materials. Saint-Petersburg, October 23-25, 2019. P. 136-137 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=46470466 (in Russian).
  99. Igor Parashchuk, Vasily Desnitsky. Architecture of the component of eliminating the uncertainty of analysis of the problem of information facilities on the basis of processing of complete, contradictive and fuzzle knowledge // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". Conference materials. Saint-Petersburg, October 23-25, 2019. P. 244-245 // http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=46470281 (in Russian).
  100. Igor Parashchuk, Vasily Desnitsky. Analysis of the sense filling of information objects on the basis of processing of full, contravenous and fuzzy knowledge: architecture of the component of elimination the uncertainty // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". The proceedings of conference. Issue 7. Saint-Petersburg, October 23-25, 2019. P. 258-262 http://www.spoisu.ru/files/riib/riib_7_2019.pdf // https://www.elibrary.ru/item.asp?id=42562059 (in Russian).
  101. Vasily Desnitsky, Igor Parashchuk. Analysis and security of data protection of users of wireless sensor networks: indicators of accessibility, integrity and confidentiality // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". The proceedings of conference. Issue 7. Saint-Petersburg, October 23-25, 2019. P. 34-38 http://www.spoisu.ru/files/riib/riib_7_2019.pdf // https://www.elibrary.ru/item.asp?id=42561898 (in Russian).
  102. Anastasia Balueva, Vasily Desnitsky. Approach to detection of Denial-of-Sleep attacks in cyber-physical systems on the base of machine-training methods // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1., p. 97-103 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383501&pff=1 (in Russian).
  103. Vasily Desnitsky, Pavel Dumenko. Analysis of Information Security Violations in Mobile Applications // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information and Telecommunications in Science and Education" (APINO 2019), February 27-28, 2019, proceedings, St. Petersburg. : SPbSUT, Ð. 384-390 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf https://www.elibrary.ru/item.asp?id=41383559 (in Russian).
  104. L.A. Vitkova, V.A. Desnitsky, K.N. Zhernova, A.A. Chechulin. Review of human-computer interaction for network security // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) T. 1, p. 218-223 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?id=41383526 (in Russian).
  105. V.A. Desnitsky, I.P. Zuev, P.V. Karelsky, M.M. Kovtsur. Analysis of dissemination channels in the social network Twitter // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles), T. 1., p. 390-395 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383560 (in Russian).
  106. Gamidov T.O., Desnitsky V.A., Dudkina O.S., Sakharov D.V. Methods and techniques for analysis of unwanted information in social networks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles)T. 1., p. 317-320 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?id=41383545 (in Russian).
  107. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Methodology for evaluating the effectiveness of network content processing systems for detecting malicious information, taking into account the elimination of uncertainties in the semantic content of information objects // International Conference on Soft Computing and Measurements. T. 1. P. 62-65. 2019. // https://www.elibrary.ru/item.asp?id=38309100 (in Russian).
  108. Alexandr Branitskiy, Vasily Desnitsky. Approach to adaptation and retraining of system for analyzing the information objects // In the book: Promising directions of development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 62-64. // https://elibrary.ru/item.asp?id=42944524 (in Russian).
  109. Vasily Desnitsky, Andrey Fedorchenko. Modeling processes of protection against attacks of energy exhaustion in cyberphysical systems // Materials of V interregional scientific-practical conference Advanced national information systems and technologies, September 24-28, p. 282-284, 2019. https://www.elibrary.ru/item.asp?id=42944610 (in Russian).
  110. Vasily Desnitsky, Elena Doinikova, Andrey Fedorchenko, Alexander Branitsky. Modeling and analysis of intruder actions in wireless sensor networks // Proceedings of the II International Scientific and Practical Conference "Digital Region: Experience, Competencies, Projects". Ed. Bryansk State Engineering and Technology University. P. 237-240. 2019. https://www.elibrary.ru/item.asp?id=42462480 (in Russian).
  111. Vasily Desnitsky, Nikolay Rudavin, Alexey Meleshko. Analysis of attacking effects of the Denial-of-Sleep type in cyber-physical systems // In the collection: New information technologies and systems. Collection of scientific articles of the XVI International Scientific and Technical Conference. 2019. pp. 216-218. https://www.elibrary.ru/item.asp?id=41508390 (in Russian).
  112. Vasily Desnitsky. Modeling and analysis of cyberphysical attacks of the depletion of energy resources of the devices of the Internet of things systems // Collection of abstracts of the participants of the II International Scientific Conference "Science of the Future - Science of the Young" IV All-Russian Forum "Science of the Future - Science of the Young" May 14-17, 2019, Sochi, Russia. Ed. LLC "Inconsult K", p. 115. 2019. ISBN 978-5-9500875-1-6. (in Russian).
  113. Igor Kotenko, Igor Parashchuk. Determination of the parameters of the mathematical model of the malicious information search process // Collection of reports of the international scientific conference "Mathematical Methods in Engineering and Technology" (MMTT-32), June 3-7, 2019 St. Petersburg. pp. 68-72. // https://www.elibrary.ru/item.asp?id=38577391 (in Russian).
  114. Nikolay Komashinsky, Igor Kotenko. Analysis of models and systems of parallel processing of events for the detection of information security incidents // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 551-556 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?id=41383593 (in Russian).
  115. Nikolay Komashinskiy, Igor Kotenko. An intrusion detection model with the use of signature methods and big data technologies // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. vol. 1. pp. 556-561. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?id=41383594 (in Russian).
  116. Igor Kotenko, Bolat Tynymbaev. Architecture of Advanced UEBA System for Cloud Service Providers // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 581-585. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383599 (in Russian).
  117. Bolat Tynymbaev, Igor Kotenko. Review of UEBA Class Solutions // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. vol. 1. pp. 585-590. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383600 (in Russian).
  118. Yurii Bakhtin, Sergey Bushuev, Maxim Kolomeets, Nikolai Komashinskiy, Igor Kotenko. Computer-human interaction algorithms for touch screens in a computer network visualization system // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. Vol. 1. pp. 123-127. // https://elibrary.ru/item.asp?id=41383506 (in Russian).
  119. Sergey Ageev, Alexander Ivanov, Maxim Kolomeets, Vladimir Komashinskiy, Igor Kotenko. The architecture of the computer network visualization system based on touch screens and augmented reality // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. vol. 1. pp. 33-36. // https://elibrary.ru/item.asp?id=41383488 (in Russian).
  120. Nina Vanchakova, Lidia Vitkova, Igor Kotenko, Natalia Krasilnikova, Luvov Strah, Artem Tishkov, Andrey Chechulin. Signs and criteria of personality destructiveness and destructive impact based on Internet content and the behavior of subjects in social networks // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. V.2, P. 133-138. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.2.pdf //https://elibrary.ru/item.asp?id=42504986 (in Russian).
  121. Alexander Branitskiy, Nina Vanchakova, Elena Doynikova, Igor Kotenko, Natalia Krasilnikova, Igor Saenko, Artem Tishkov. Common approach to the determination of destructive information impacts and negative personal trends of young generation using the techniques based on neural networks for internet content processing // 8th International Conference on Advanced Infotelecommunications (ICAIT 2019). February 27-28, 2019. Conference proceedings. Russia, St. Petersburg. vol. 1. pp. 164-167 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383514 (in Russian).
  122. Lidia Vitkova, Igor Kotenko, Andrey Fedorchenko, Alexandra Khinenzon. Distributed data collection and processing in systems of monitoring of information space social networking // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. Vol. 1. pp. 228-232. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383528 (in Russian).
  123. Igor Kotenko, Olga Tushkanova. A version of the system architecture for analyzing information objects on the Internet using parallel computing // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. vol. 1. pp. 577-580. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383598 (in Russian).
  124. Igor Kotenko, Dmitry Pelevin, Igor Ushakov. General Technique of Computer Network Insider Detection Based on Big Data Technology // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019). 2019. Vol. 1. pp. 572-576. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383597 (in Russian).
  125. Igor Kotenko, Alexander Ovramenko, Igor Ushakov. Architecture and program prototype of insider detection system in computer network based on big data technologies // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO 2019) Vol. 1. pp. 568-572. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383596 (in Russian).
  126. Artem Tishkov, Lyubov Strakh, Nina Vanchakova, Natalya Krasilnikova, Igor Kotenko, Alexander Branitskiy. Statistical analysis of i-functions interrelation of undergraduate students // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 374-376 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45839425 (in Russian).
  127. Alexander Branitskiy, Lidia Vitkova, Igor Saenko, Andrey Chechulin, Elena Doynikova, Igor Kotenko, Artem Tishkov, Nina Vanchakova. Appying neural networks for predicting the results of the Ammon's test using the profile of social networks // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp.100-101. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=45839427 (in Russian).
  128. Igor Saenko, Andrey Fedorchenko. Architecture of system of distributed intelligent scanners of network content for protection against unwanted information // 8th International Conference on Advanced Infotelecommunications (ICAIT 2019). February 27-28, 2019. Conference proceedings. Russia, St. Petersburg. Vol. 1. pp. 720-725. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383628 (in Russian).
  129. Igor Parashchuk, Igor Saenko. The generalized algorithm of elimination of uncertainty of assessment and categorization of semantic filling of information objects for the benefit of detection and counteraction of undesirable information // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles).Vol. 2 P. 486-491 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.2.pdf //https://elibrary.ru/item.asp?id=42505074 (in Russian).
  130. Dmitry Levshun, Oleg Pantjuhin, Igor Saenko. Assessment of the Quality of Access Control Policies in a Cloud Storage Based on the ABAC Access Control Model // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 655–659. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383614 (in Russian).
  131. Igor Parashchuk, Igor Kotenko, Igor Saenko. To the question of the formal description of the problem of adaptive observation, evaluation and prediction of signs of unwanted information to ensure the security of cyber-physical-social systems // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 269-271. // https://elibrary.ru/item.asp?id=42944605 (in Russian).
  132. Igor Saenko, Aleksander Ivanov, Vladimir Komashinskiy. Models and algorithms for optimization of the access control policies in cloud infrastructures // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 314-316. // https://www.elibrary.ru/item.asp?id=42944624 (in Russian).
  133. Igor Saenko, Vladimir Komashinskiy, Dmitry Levshun. Verification algorithms for access control policies based on the ABAC model // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 312-314 // https://elibrary.ru/item.asp?id=42944623 (in Russian).
  134. Igor Saenko, Sergey Bushuev, Dmitry Levshun. Quality assessment models for access control policies in cloud infrastructures // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 316-318. // https://elibrary.ru/item.asp?id=42944625 (in Russian).
  135. Elena Doynikova, Igor Parashchuk. Requirements to processes and components of elimination of uncertainty of the analysis of semantic filling of information objects for the benefit of detection and counteraction of harmful information // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.2, Ñ. 254-259 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.2.pdf // https://www.elibrary.ru/item.asp?id=42505015 (in Russian).
  136. Igor Parashchuk, Lydia Vitkova. Methods of eliminating the uncertaintenance of analysis of the significant filling of information facilities based on the use of the algorithms of processing of complete, contracting and fuzzle knowledge // Regional informatics and information security. Proceedings. no. 7. 2019. pp 262-266. // https://elibrary.ru/item.asp?id=42562060 (in Russian).
  137. Igor Parashchuk, Lydia Vitkova. Application of algorithms of processing of incomplete, contradictive and fuzzy knowledge to eliminate the uncertainty of analysis of substantic filling of information objects // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 242-243 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=45839474 (in Russian).
  138. Kristina Valieva, Lidia Vitkova, Andrey Chechulin. Preparatory Processing of Information Objects in the Monitoring Systems of the Internet // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp. 197-201. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383521 (in Russian).
  139. Lidia Vitkova, Anna Kuraeva, Anton Pronoza, Andrey Chechulin. Analysis of Methods of Identification and Evaluation Pages of Opinion Leaders in Social Networks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp. 233-237. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383529 (in Russian).
  140. Ksenia Zhernova, Andrey Chechulin. Data visualization models and algorithms for identification and counteraction of inappropriate information // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 325-327. // https://elibrary.ru/item.asp?id=42944630 (in Russian).
  141. Ksenia Zhernova, Maxim Kolomeets, Andrey Chechulin. Review of Human-machine Interaction Methods in Systems for Counteracting Doubtful and Undesirable Information. // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 449-454. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383572 (in Russian).
  142. Elena Doynikova. Model for Forecasting Cyberattack Goals Based on the Neuro-Fuzzy Networks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 405-408. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?id=41383563 (in Russian).
  143. Lidia Vitkova, Elena Doynikova, Igor Kotenko. Model of Responses Against Unwanted, Questionable and Malicious Information on the Internet // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp. 223-227. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383527 (in Russian).
  144. Lidia Vitkova, Timur Gamidov, Elena Doynikova, Olga Dudkina, Alexey Kushnerevich. The Analysis of Features of the Industrial Internet of Things for Formation of a System of Security Metrics // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp. 212-217. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?id=41383525 (in Russian).
  145. Elena Doynikova. The technique and algorithms for the cyber attack forecasting based on neuro-fuzzy networks // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 308-310. // https://www.elibrary.ru/item.asp?id=42944621 (in Russian).
  146. Elena Doynikova, Andrey Fedorchenko. Classification of interfaces and types of events used in the industrial internet of things for analysis of their weakness to cyberatacs // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 306-308. // https://elibrary.ru/item.asp?id=42944620 (in Russian).
  147. Natalia Krasilnikova, Elena Doynikova, Nina Vanchakova. The seven level scale of destructive manifestations of behavior in social networks for monitoring destructive effects by neural network methods // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 304-306. // https://elibrary.ru/item.asp?id=42944619 (in Russian).
  148. Lidia Vitkova. The Place and Role of Monitoring and Counteraction Unwanted Information in Social Networks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1.pp. 209-212. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383524 (in Russian).
  149. Daria Starodubova, Alexey Malko, Andrey Chechulin. The Research about the Protection of Computer Networks from Reconnaissance Attacks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 674-677. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383618 (in Russian).
  150. Alexey Malko, Daria Starodubova, Andrey Chechulin. The Research of Methods and Algorithms of Collection Information in a Computer Network // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 677-681. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?edn=lkfkfj (in Russian).
  151. Vasily Desnitsky, Nikolay Rudavin. Analysis of atacking influences on unmanned aerial vehicles // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 318-319. // https://elibrary.ru/item.asp?id=42944626 (in Russian).
  152. Alexander Branitskiy, Elena Doynikova, Veronika Kuzmina, Igor Saenko, Andrey Chechulin. Analysis of CVSS Metrics System in Order to Develop Attack Graph Algorithm // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 167-172. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?id=41383515 (in Russian).
  153. Alexey Pronichev, Lidia Vitkova. Development of architecture of decentralized system analysis of network traffic // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 546-548 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45839491 (in Russian).
  154. Alexey Pronichev, Igor Kotenko. Perspective areas of application of multiagent systems // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 464-466. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45839645 (in Russian).
  155. Alexander Branitskiy, Igor Saenko. Methods and models of multi-aspect evaluation and categorization of the semantic content of information objects // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 310-312. // https://elibrary.ru/item.asp?id=42944622 (in Russian).
  156. Alexander Branitskiy, Igor Saenko. Methods of adaptation and retraining of the system of analysis of information objects in the internet network // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 102-103. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45839662 (in Russian).
  157. Elena Doynikova. Classification and analysis of cyber attacks goals in the industrial internet of things // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 116-117 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45841665 (in Russian).
  158. Olga Dudkina, Elena Doynikova, Igor Saenko. Analysis of information security metrics for the industrial internet of things // Regional informatics and information security. Proceedings. Issue 7. 2019. pp. 38-41. http://www.spoisu.ru/files/riib/riib_7_2019.pdf // https://elibrary.ru/item.asp?id=42561902 (in Russian).
  159. E.V. Doynikova, L.A. Vitkova. Technique and algorithms for selection of measures to counter unwanted, doubtful and harmful information on the Internet // Regional Informatics and Information Security. Collection of works. Issue 7. 2019. pp. 246-248. http://www.spoisu.ru/files/riib/riib_7_2019.pdf // https://elibrary.ru/item.asp?id=42562055 (in Russian).
  160. Dar'ya Baranova, Igor Saenko, and Evgeniy Smirnov. Monitoring of Information Activity in Social Networks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1. pp. 103-107. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383502 (in Russian).
  161. Igor Saenko, Alexander Ivanov, Vladimir Komashinsky, Oleg Pantyukhin. Method of attribute-based access control policy optimization for cloud storage // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 148-150. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=45842707 (in Russian).
  162. Igor Saenko , Dmitry Levshun, Sergey Ageev, Vladimir Komashinsky. Model of ensuring consistency of the access control policies of cloud storage on the basis of the ABAC model // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". The proceedings of conference, 2019. pp. 150-152. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45842706 (in Russian).
  163. Olga Tushkanova, Igor Saenko. The Technique of ensuring timeliness of multiclass classification of inappropriate information on the Internet using parallel computing // XI St. Petersburg Interregional Conference «Information Security of Russian Regions», October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 153-155. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45842703 (in Russian).
  164. Andrey Fedorchenko, Igor Saenko. Algorithms for the collection and pre-processing of network information objects based on the distributed intelligent scanners application // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp. 155-156. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45842877 (in Russian).
  165. Igor Saenko, Igor Parashchuk, Sergey Bushuev. Model and algorithm of detection of need of reconfiguring the access control policies in crucial cloudy infrastructures // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. C. 304-305. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45842696 (in Russian).
  166. Diana Gaifulina, Elvira Khakimova, Andrey Chechulin. Development of a complex algorithm for websites classification to detect inappropriate content on the Internet // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol.1. pp.312-317. https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383544 (in Russian).
  167. Diana Gaifulina. Application of the technique of analysis of binary data of network traffic for the identification of anomalies under uncertain specifications of data transmission protocols // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp.108-110. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45842693 (in Russian).
  168. Diana Gaifulina. Development and research of a compositional algorithm for classifying web pages for detecting inappropriate content on the Internet // XI St. Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2019)», October 23-25, 2019, Russia, St. Petersburg. 2019. pp.110-112. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=45842692 (in Russian).
  169. Dmitry Levshun, Andrey Chechulin. The aspects of the verification of secure cyberphysical systems // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". October 23-25, 2019. Proceedings of the conference. P. 133-134. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=46478813 (in Russian).
  170. Dmitry Levshun. Application of modeling for verification of the cyber-physical systems security // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". October 23-25, 2019. Proceedings of the conference. P. 131-132. http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=46470950 (in Russian).
  171. Saenko I. B., Shapovalov D. S. Data processing model in databases of enterprise information systems on the basis of ASP-technology // Promising directions for the development of domestic information technologies: materials of the VI Interregional Scientific and Practical Conference, Sevastopol, September 24-28, 2019. (PNROIT 2019), pp. 257-259 // https://www.elibrary.ru/item.asp?id=42944600 (in Russian).
  172. Paraschuk I.B., Chernyavsky A.V., Shestakov E.O. Models and methods for evaluating the efficiency of complex information protection in data storage systems and electronic libraries // In the collection: Regional Informatics and information security. Collection of works. Issue 7, 2019. pp. 102-105. // https://elibrary.ru/item.asp?id=42561977 (in Russian).
  173. K.E. Izrailov, I.M. Tatarnikova. An approach to analyzing the security of a software code from the standpoint of its form and content // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-technical and Scientific-methodological Conference: in 4 t.. 2019. pp. 462-467. // https://elibrary.ru/item.asp?id=41383575 (in Russian).
  174. V.A. Gavrilyuk, A.A. Chechulin. Analysis of trends of informational threats and vulnerabilities // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-technical and Scientific-methodological Conference: in 4 t.. 2019. pp. 307-311. // https://elibrary.ru/item.asp?id=41383543&pff=1 (in Russian).
  175. D.A. Gayfulina, E.R. Khavanskaya, A.A. Chechulin. Development of a complex algorithm for websites classification to detect inappropriate content on the internet // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-Technical and Scientific-methodological Conference : in 4 t.. 2019. pp. 312-317. // https://elibrary.ru/item.asp?id=41383544 (in Russian).
  176. M.V. Kolomeets, A.A. Chechulin. Models and algorithms for the implementation of visual interfaces to identify and counter undesirable, questionable and harmful information // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-Technical and Scientific-methodological Conference: in 4 t.. 2019. pp. 547-551 // https://elibrary.ru/item.asp?id=41383592 (in Russian).
  177. I.V. Kotenko, K.N. Zhernova. Visual model of a computer network with support for a gesture control interface // Promising directions of development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 327-328.// https://elibrary.ru/item.asp?id=42944631 (in Russian).
  178. N.A Komyshinsky, I.V. Kotenko. Ensuring information security using big data technology // Promising directions of development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 266-268. // https://www.elibrary.ru/item.asp?id=42944604 (in Russian).
  179. A.V. Meleshko, S.V. Savkov. Threat model and risk assessment methodology for a water supply management system // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-technical and Scientific-methodological conference : in 4 t.. 2019. pp. 458-463. // https://elibrary.ru/item.asp?id=42505066 (in Russian).
  180. E.S. Kryukova, V.A. Malafeev, I.V. Paraschuk. Analysis of modern approaches to assessing the quality of data storage systems and electronic libraries // In the collection: New information technologies and systems. Collection of scientific articles of the XVI International Scientific and Technical Conference. 2019. pp. 177-180. // https://elibrary.ru/item.asp?id=41508379 (in Russian).
  181. V.A. Desnitsky, N.N. Rudavin. Analysis of attacking effects on unmanned aerial vehicles // In the book: Promising directions of development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 318-319. https://www.elibrary.ru/item.asp?id=42944626 (in Russian).
  182. V.A. Desnitsky, Yu.A. Svintsov. Approaches to the analysis of security of hardware-software components of wireless sensor networks // In the book: Promising directions for the development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 320-321. https://www.elibrary.ru/item.asp?id=42944627 (in Russian).
  183. D.A. Gaifullina, E,R. Khovanskaya. Research of machine learning methods in the task of classifying web pages to identify unwanted information on the Internet // In the collection: Almanac of scientific works of young scientists of ITMO University. XLVIII Scientific and educational-methodical conference of ITMO University. 2019. pp. 8-13. // https://elibrary.ru/item.asp?id=42160888 (in Russian).
  184. N.V. Drobotun, A.V. Soshnikov, A.P. Pronichev. Information security - a guarantee of financial security // In the collection: Financial literacy is the key to the well-being of the population. Materials of the All-Russian scientific and practical conference. Edited by M.N. Titova, A.I. Lyubimenko. 2019. pp. 66-69. // https://elibrary.ru/item.asp?id=37574720 (in Russian).
  185. I. B. Sayenko, I.N. Fabiyanovsky. Assessment and the choice of options for locating information resources in a common information space // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International scientific-technical and scientific-methodical conference : in 4 t.. 2019. pp. 529-532. // https://elibrary.ru/item.asp?id=42505084 (in Russian).
  186. I.B. Saenko, A.M. Starkov. Methodology of technological management of virtual local area networks in corporate information systems // In the collection: Technologies of the information society. Materials of the XIII International Industrial Scientific and Technical Conference. 2019. pp. 96-99. // https://elibrary.ru/item.asp?id=39228393 (in Russian).
  187. I.B. Saenko, A.S. Kulikova. Assessment of nosql DBMS capabilities for building a personal database of documentary data // In the book: Promising directions for the development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 262-263. // https://www.elibrary.ru/item.asp?id=42944602 (in Russian).
  188. I.B. Saenko, A.M. Starkov. Technological management system for enterprise-level virtual local area networks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific-technical and Scientific-methodological Conference : in 4 t.. 2019. pp. 715-720. // https://www.elibrary.ru/item.asp?id=41383627 (in Russian).
  189. I.B. Paraschuk, D.M. Vorontsov, N.V. Mikhaylichenko. Topical issues of information protection in data processing centers using trusted download systems and identification feature input devices // Information security of Russian regions (IBRR-2019). conference materials. St. Petersburg, 2019. pp. 219-220 // https://www.elibrary.ru/item.asp?id=47348089 (in Russian).
  190. I.B. Paraschuk, V.V. Pashchenko. Quality and reliability of complexes of information protection means for modern automated systems: indicators and criteria of evaluation // In the collection: Regional informatics and information security. Collection of works. 2019. pp. 97-101.// https://www.elibrary.ru/item.asp?id=42561970 (in Russian).
  191. I.B. Paraschuk, N.V. Mikhailichenko, E.O. Shestakov. Analysis of directions, methods and means of technical support for complex protection of data storage systems // IV Interuniversity scientific and practical conference "Problems of technical support of troops in modern conditions". Proceedings of the conference. Volume 1. - St. Petersburg: VAZ, 2019. pp. 333-337. // https://elibrary.ru/fdkbvh (in Russian).
  192. I.B. Paraschuk, E.S. Kryukova. Features of development of modern digital libraries and analysis of approaches to evaluation their quality // In the collection: Modern technologies: current issues, achievements and innovations. Collection of articles of the XXXI International Scientific and Practical Conference. 2019. pp. 34-36.// https://elibrary.ru/item.asp?id=41199630 (in Russian).
  193. N.S. Aminov, L.A. Vitkova. Algorithms of artificial neural networks for natural language processing and sentiment analysis text systems for monitoring inappropriate content on the internet // Information security of the regions of Russia (IBRR-2019). XI St. Petersburg Interregional Conference, Information Security of the regions of Russia (IBRR-2019). XI St. Petersburg Interregional Conference. St. Petersburg, October 23-25, 2019: Conference proceedings. / TO SPOIS. St. Petersburg, 2019. C. 529-530 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=72016991 (in Russian).
  194. M.V. Kolomiets, A.A. Chechulin, K.V. Zhernova. Usage of graph algorithms for social networks analysis // Information security of the regions of Russia (IBRR-2019). XI St. Petersburg Interregional Conference, Information Security of the regions of Russia (IBRR-2019). XI St. Petersburg Interregional Conference. St. Petersburg, October 23-25, 2019: Conference proceedings. / TO SPOIS. St. Petersburg, 2019. C. 128-129 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=56959336 (in Russian).
  195. N.V. Mikhaylichenko, I.B. Paraschuk. The role and tasks of expert systems for designing neurocomputer elements of modern data processing centers // In the book: Neurocomputers and their application. XVII All-Russian Scientific Conference. Abstracts of the reports. 2019. pp. 169-171.// https://elibrary.ru/item.asp?id=41207944 (in Russian).
  196. I.B. Paraschuk, A.V. Chernyavsky, E.O. Shestakov. The effectiveness of complex information protection in data storage systems and electronic libraries: models and evaluation methods // In the collection: Information security of the regions of Russia (IBRR-2019). conference materials. St. Petersburg, 2019. pp. 248-250.// https://elibrary.ru/item.asp?id=47346013 (in Russian).
  197. I.B. Paraschuk, N.V. Mikhaylichenko, E.O. Shestakov. Indicators of quality of functioning of modern data centers // In the book: Promising directions for the development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 37-38.// https://elibrary.ru/item.asp?id=42944512 (in Russian).
  198. D.M. Vorontsov, V.D. Zhmurov, I.B. Paraschuk. Analysis of vulnerabilities of input device and reading device identification signs // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific, Technical and scientific-methodological Conference: in 4 volumes. 2019. pp. 303-307.// https://elibrary.ru/item.asp?id=41383542 (in Russian).
  199. I.B. Paraschuk, N.V. Mikhaylichenko. The method of multi-criteria evaluation of the effectiveness of data processing centers // In the collection: Information Society technologies. Materials of the XIII International Industrial Scientific and Technical Conference. 2019. pp. 72-74.//https://elibrary.ru/item.asp?id=38513443 (in Russian).
  200. N.V. Mikhaylichenko, I.B. Paraschuk, A.V. Chernyavsky. Option of classification of electronic libraries for the benefit of automation of management of their information resources //In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific, technical and scientific-methodological conference : in 4 t.. 2019. pp. 463-468.// https://elibrary.ru/item.asp?id=42505068 (in Russian).
  201. D.M.Vorontsov, N.V. Mikhaylichenko, I.B. Paraschuk. Systems of trusted downloads and devices for input identification features in the problems of protecting information at data centers // In the collection: Regional Informatics and information security Proceedings. 2019. pp. 30-34. // https://elibrary.ru/item.asp?id=42561894 (in Russian).
  202. A.S. Kulikova, I.B. Saenko. The choice of document oriented dbms for storing personal data // In the collection: Actual problems of infotelecommunications in science and education (APINO 2019). collection of scientific articles of the VIII International Scientific, technical and scientific-methodical conference : in 4 t.. 2019. pp. 646-650. // https://www.elibrary.ru/item.asp?id=41383612 (in Russian).
  203. Lidia Vitkova, Andrey Chechulin, Dmitry Sakharov, Anton Pronoza. On the issue of the information sphere security in the context of information warfare // All-Russian Scientific Conference of Young Scientists "Innovations in Youth Science", 2018, p. 59. (in Russian).
  204. V.O. Vasiliev, L.A. Vitkova. Development of route planning algorithm of an autonomous robot based on point cloud map and improved ant-colony algorithm // Information security of the regions of Russia (IBRR-2019). XI St. Petersburg Interregional Conference, Information Security of the regions of Russia (IBRR-2019). XI St. Petersburg Interregional Conference. St. Petersburg, October 23-25, 2019: Conference proceedings. / TO SPOIS. St. Petersburg, 2019. C. 532-533 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // (in Russian).

2018

  1. Igor Kotenko, Igor Saenko, Sergey Ageev. Hierarchical Fuzzy Situational Networks for Online Decision Support in Distributed Cyber-Physical Systems // Frontiers in Artificial Intelligence and Applications. 2018. Ò. 303. Ñ. 623-636. (Q4, Scopus) DOI: 10.3233/978-1-61499-900-3-623 // https://elibrary.ru/item.asp?id=38686359
  2. Elena Doynikova, Igor Kotenko. An automated graph based approach to risk assessment for computer networks with mobile components // Communications in Computer and Information Science. 2018. Ò. 797. Ñ. 95-106. DOI: 10.1007/978-981-10-7850-7_9 // https://www.elibrary.ru/item.asp?id=35502078
  3. Igor Kotenko, Igor Saenko, Oleg Lauta, Mikhail Kocinyak. Assessment of computer network resilience under impact of cyber attacks on the basis of stochastic networks conversion // Communications in Computer and Information Science. 2018. Ò. 797. Ñ. 107-117. DOI: 10.1007/978-981-10-7850-7_10 // https://elibrary.ru/item.asp?id=35514911
  4. Igor Kotenko, Igor Saenko, Alexander Branitskiy. Framework for Mobile Internet of Things Security Monitoring based on Big Data Processing and Machine Learning // IEEE Access, 2018, Vol.6. P. 72714-72723 DOI: 10.1109/ACCESS.2018.2881998 // https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8539995 // https://elibrary.ru/item.asp?id=38631720 (Q1, WoS and Scopus)
  5. Igor Saenko, Igor Kotenko. Genetic Algorithms for solving Problems of Access Control Design and Reconfiguration in Computer Networks // ACM Transactions on Internet Technology. 2018. Ò. 18. ¹ 3. Ñ. 27. https://doi.org/10.1145/3093898 // https://elibrary.ru/item.asp?id=43288530 (Q2, WoS and Scopus).
  6. Igor Kotenko, Andrey Fedorchenko, Elena Doynikova, Andrey Chechulin. An Ontology-based Hybrid Storage of Security Information // Information Technology and Control. 2018. Ò. 47. ¹ 4. Ñ. 655-667 DOI: 10.5755/j01.itc.47.4.20007 // https://elibrary.ru/item.asp?id=37282133
  7. Igor Kotenko. Guest Editorial: Managing Insider Security Threats // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 9, No. 1, March 2018. P.1-3. DOI: 10.22667/JOWUA.2018.03.31.001 // https://elibrary.ru/item.asp?id=35483397 (Q3, Scopus).
  8. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko, Yannick Chevalier. A visual analytics approach for the cyber forensics based on different views of the network traffic // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2018, Vol. 9, No. 2, P. 57-73. (Q3, Scopus) // https://elibrary.ru/item.asp?id=38663593
  9. Igor Kotenko, Igor Parashchuk. Synthesis of controlled parameters of cyber-physical-social systems for monitoring of security incidents in conditions of uncertainty // Â ñáîðíèêå: Journal of Physics: Conference Series. 3. Ñåð. "3rd Annual International Conference on Information System and Artificial Intelligence, ISAI 2018" 2018. Ñ. 012153. DOI: 10.1088/1742-6596/1069/1/012153 // https://www.elibrary.ru/item.asp?id=35734637
  10. Gustavo Gonzalez-Granadillo, Joaquin Garcia-Alfaro, Igor Kotenko, Elena Doynikova. Hypergraph-driven Mitigation of Cyber-Attacks // Internet Technology Letters. John Wiley & Sons, Ltd., 2018. Volume1, Issue1, May/June 2018. 6 p. https://doi.org/10.1002/itl2.38 (WoS).
  11. Igor Kotenko, Igor Saenko, Sergey Ageev. Fuzzy Adaptive Routing in Multi-Service Computer Networks under Cyber Attack Implementation // Advances in Intelligent Systems and Computing. 2018. Ò. 679. Ñ. 215-225. DOI: 10.1007/978-3-319-68321-8_22 // https://elibrary.ru/item.asp?id=31083207
  12. Gustavo Gonzalez-Granadillo, Elena Doynikova, Igor Kotenko, Joaquin Garcia-Alfaro. Attack Graph-based Countermeasure Selection using a Stateful Return on Investment Metric // Lecture Notes in Computer Science. 2018. Ò. 10723 LNCS. Ñ. 293-302. DOI: 10.1007/978-3-319-75650-9_19 // https://elibrary.ru/item.asp?id=35490864
  13. Igor Kotenko, Igor Saenko. Evolutionary Algorithms for Design of Virtual Private Networks // Studies in Computational Intelligence. 2018. Ò. 798. Ñ. 287-297. DOI: 10.1007/978-3-319-99626-4_25 // https://www.elibrary.ru/item.asp?id=35751038
  14. Igor Kotenko, Igor Saenko, Alexander Branitskiy. Applying Big Data Processing and Machine Learning Methods for Mobile Internet of Things Security Monitoring // Journal of Internet Services and Information Security. 2018. Ò. 8. ¹ 3. Ñ. 54-63. // https://elibrary.ru/item.asp?id=41290334
  15. Igor Kotenko, Elena Doynikova. Selection of countermeasures against network attacks based on dynamical calculation of security metrics // Journal of Defence Modeling and Simulation, 2018. Vol. 15. ¹ 2. P.181-204. DOI: 10.1177/1548512917690278. https://doi.org/10.1177/1548512917690278 // https://elibrary.ru/item.asp?id=35489635
  16. E. Doynikova, I. Kotenko. Approach for determination of cyber-attack goals based on the ontology of security metrics // IOP Conference Series Materials Science and Engineering 450(5):052006, November 2018, DOI:10.1088/1757-899X/450/5/052006, https://doi.org/10.1088/1757-899X/450/5/052006.
  17. M.V. Buinevich, K.E. Izrailov, V.V. Pokusov,S.V. Sharapov, S.N. Terekhin. Generalized interaction model in the information system // International Journal of Pure and Applied Mathematics. 2018. Ò. 119. ¹ 17. Ñ. 1381-1385. // https://elibrary.ru/item.asp?id=35321842
  18. Andrey Chechulin, Maxim Kolomeec, Igor Kotenko. Visual analytics for improving efficiency of network forensics: account theft investigation // Â ñáîðíèêå: Journal of Physics: Conference Series. 3. Ñåð. "3rd Annual International Conference on Information System and Artificial Intelligence, ISAI 2018" 2018. Ñ. 012062. DOI: 10.1088/1742-6596/1069/1/012062. (Q3, WoS and Scopus) // https://www.elibrary.ru/item.asp?id=35737385
  19. Igor Kotenko, Andrey Chechulin, Mikhail Bulgakov. Intelligent Security Analysis of Railway Transport Infrastructure Components on the base of Analytical Modeling // Advances in Intelligent Systems and Computing. 2018. Ò. 680. Ñ. 178-188. DOI: 10.1007/978-3-319-68324-9_20 // https://elibrary.ru/item.asp?id=31113435 (WoS and Scopus).
  20. Elena Doynikova Igor Kotenko. The multi-layer graph based technique for proactive automatic response against cyber attacks // Proceedings of the 26th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2018). Cambridge, UK, March 21-23, 2018. Los Alamitos, California. IEEE Computer Society. 2018. P.470-477. DOI: 10.1109/PDP2018.2018.00081 // https://elibrary.ru/item.asp?id=35728921
  21. Igor Kotenko, Andrey Fedorchenko, Igor Saenko, Alexey Kushnerevich. Parallelization of security event correlation based on accounting of event type links // Proceedings of the 26th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2018). Cambridge, UK, March 21-23, 2018. Los Alamitos, California. IEEE Computer Society. 2018. P.462-469. DOI: 10.1109/PDP2018.2018.00080 // https://elibrary.ru/item.asp?id=35751811 (WoS and Scopus).
  22. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visual analysis of CAN bus traffic injection using radial bar charts // Proceedings - 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018. 1. 2018. Ñ. 841-846. DOI: 10.1109/ICPHYS.2018.8390816, https://ieeexplore.ieee.org/abstract/document/8390816/ (WoS and Scopus) // https://elibrary.ru/item.asp?id=35768985
  23. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. A Technique for Design of Secure Data Transfer Environment: Application for I2C Protocol // Proceedings - 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018. 1. 2018. Ñ. 789-794. DOI: 10.1109/ICPHYS.2018.8390807. https://ieeexplore.ieee.org/document/8390807 // https://elibrary.ru/item.asp?id=35757740
  24. Vasily Desnitsky, Igor Kotenko. Security event analysis in XBee-based wireless mesh networks // Â ñáîðíèêå: Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018. 2018. Ñ. 42-44. DOI: 10.1109/EIConRus.2018.8317025 // https://elibrary.ru/item.asp?id=35749402
  25. Igor Kotenko, Igor Parashchuk. Formation of indicators for assessing technical reliability of information security systems // Â ñáîðíèêå: 2018 International Russian Automation Conference, RusAutoCon 2018. 2018. Ñ. 8501650. https://ieeexplore.ieee.org/document/8501650, DOI: 10.1109/RUSAUTOCON.2018.8501650 // https://www.elibrary.ru/item.asp?id=38615194
  26. Igor Saenko, Igor Kotenko. Genetic Algorithms for Role Mining in Critical Infrastructure Data Spaces // Â ñáîðíèêå: GECCO 2018 Companion - Proceedings of the 2018 Genetic and Evolutionary Computation Conference Companion. 2018. Ñ. 1688-1695. // https://elibrary.ru/item.asp?id=35723654 (WoS and Scopus).
  27. Igor Kotenko, Igor Saenko, Oleg Lauta. Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion (invited paper) // Â ñáîðíèêå: Proceedings of 2018 10th International Workshop on Resilient Networks Design and Modeling, RNDM 2018. 10. 2018. Ñ. 8489830. DOI: 10.1109/RNDM.2018.8489830 // https://elibrary.ru/item.asp?id=38638411
  28. Iuliia Kim, Anastasiia Matveeva, Ilya Viksnin, Igor Kotenko. Image clustering method based on particle swarm optimization // Â ñáîðíèêå: Annals of Computer Science and Information Systems. Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018. 2018. Ñ. 535-544. DOI: 10.15439/2018F206 // https://elibrary.ru/item.asp?id=38611180 (WoS and Scopus)
  29. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Determination of security threat classes on the basis of vulnerability analysis for automated countermeasure selection // ACM International Conference Proceeding Series. 13. Ñåð. "ARES 2018 - 13th International Conference on Availability, Reliability and Security" (ARES 2018). Hamburg, Germany, August 27-30, 2018 Ð. 3233260 DOI: 10.1145/3230833.3233260 // https://elibrary.ru/item.asp?id=38644965
  30. Igor Kotenko, Igor Saenko, Andrey Chechulin, Vasily Desnitsky, Lidia Vitkova, Anton Pronoza. Monitoring and counteraction to malicious influences in the information space of social networks // Â ñáîðíèêå: 10th International Conference on Social Informatics (SocInfo). 2018. Ñ. 159-167. DOI: 10.1007/978-3-030-01159-8_15 // https://elibrary.ru/item.asp?id=35677138
  31. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. Ensuring Availability of Wireless Mesh Networks for Crisis Management // Studies in Computational Intelligence. 2018. Ò. 798. Ñ. 344-353. DOI: 10.1007/978-3-319-99626-4_30 // https://elibrary.ru/item.asp?id=35751016
  32. Igor Kotenko, Sergey Ageev, Igor Saenko. Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems // Â ñáîðíèêå: ACM International Conference Proceeding Series. Proceedings - SIN 2018: 11th International Conference on Security of Information and Networks. 2018. Ñ. a22. DOI: 10.1145/3264437.3264487 // https://elibrary.ru/item.asp?id=38638961 (Scopus, WoS)
  33. Alexander Branitskiy, Igor Kotenko. Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems // ACM International Conference Proceeding Series. Proceedings - SIN 2018: 11th International Conference on Security of Information and Networks (SIN 2018). September 10th-12th, 2018 - Cardiff University, Cardiff P. a12- a20 DOI: 10.1145/3264437.3264488 // https://elibrary.ru/item.asp?id=38638966 (Scopus, WoS)
  34. Igor Kotenko, Igor B. Parashchuk, Turganbek Omar. Neuro-fuzzy models in tasks of intelligent data processing for detection and counteraction of inappropriate, dubious and harmful information // 2nd International Scientific-Practical Conference Fuzzy Technologies in the Industry (FTI 2018), October 23-25, 2018, Ulyanovsk, Russia. P.116-125 // https://elibrary.ru/item.asp?id=37534870
  35. Elena Doynikova, Igor Kotenko. Approach for determination of cyber attack goals based on the ontology of security metrics // Proceedings of the International Workshop “Advanced Technologies in Aerospace, Mechanical and Automation Engineering" (MIST: Aerospace-2018). October 20, 2018, Krasnoyarsk, Russia. IOP Conference Series: Materials Science and Engineering (MSE),IOP Publishing, Vol.450 ¹ 5, Ð. 052006-052013 https://doi.org/10.1088/1757-899X/450/5/052006.
  36. Dmitry Levshun, Yannick Chevalier, Igor Kotenko, Andrey Chechulin. Secure Communication in Cyber-Physical Systems // The 3rd International Symposium on Mobile Internet Security (MobiSec 2018). Cebu, Philippines, August 29-September 1, 2018. 9 p. http://isyou.info/conf/mobisec18/mobisec18-book-ver1.pdf.
  37. Maxim Kalameyets, Andrey Chechulin, Igor Kotenko. The technique of structuring social network graphs for visual analysis of user groups to counter inappropriate, dubious and harmful information // 2nd International Scientific-Practical Conference Fuzzy Technologies in the Industry (FTI 2018), October 23-25, 2018, Ulyanovsk, Russia, P.87-95 http://ceur-ws.org/Vol-2258/paper12.pdf // https://elibrary.ru/item.asp?id=37534866
  38. M. Buinevich, K. Izrailov, A. Vladyko. Metric of vulnerability at the base of the life cycle of software representations // Â ñáîðíèêå: 2018 20th International Conference on Advanced Communication Technology (ICACT). conference proceedings. 2018. Ñ. 1-8. DOI: 10.23919/ICACT.2018.8323940 // https://elibrary.ru/item.asp?id=35762323
  39. M. Buinevich, K. Izrailov, E. Stolyarova, A. Vladyko. Combine method of forecasting vanet cybersecurity for application of high priority way // Â ñáîðíèêå: 2018 20th International Conference on Advanced Communication Technology (ICACT). conference proceedings. 2018. Ñ. 266-271. DOI: 10.23919/ICACT.2018.8323720 // https://elibrary.ru/item.asp?id=35063552
  40. Merelli I., Lio P., Kotenko I. Message from organizing chairs // Proceedings - 26th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2018. 26. 2018. Ñ. xxi. DOI: 10.1109/PDP2018.2018.00006 // https://elibrary.ru/item.asp?id=35741312
  41. D. Kudryavtsev, T. Gavrilova, I. Leshcheva, A. Begler, M. Kubelskiy, O. Tushkanova. Mind mapping and spreadsheets in collaborative design of knowledge graphs // CEUR Workshop Proceedings. 17, Business Resilience - Organizational and Information System Resilience in Congruence. Ñåð. "BIR-WS 2018 - Joint Proceedings of the BIR 2018 Short Papers, Workshops and Doctoral Consortium, co-located with 17th International Conference Perspectives in Business Informatics Research, BIR 2018" 2018. Ñ. 82-93 // https://elibrary.ru/item.asp?id=38646475
  42. D.V. Kudryavtsev, T.A. Gavrilova, I.A. Leshcheva, A. Begler, M. Kubelski, O. Tushkanova. A method for collaborative visual creation of a knowledge graph // GSOM EMERGING MARKETS CONFERENCE 2018. Conference Proceedings. Graduate School of Management, Saint Petersburg University. 2018. Ñ. 98-102. // https://elibrary.ru/item.asp?id=41821719
  43. Elena Doynikova, Igor Kotenko. Improvement of attack graphs for cybersecurity monitoring: handling of inaccuracies, processing of cycles, mapping of incidents and automatic countermeasure selection // SPIIRAS Proceedings. 2018. ¹ 2(57) P. 211 -240. DOI: 10.15622/sp.57.9 // https://elibrary.ru/item.asp?id=32761925 (in Russian).
  44. Georgy Bezruk, Martynova Lubov’, Igor Saenko. Dynamic Method of Searching Anthropogenic Objects in Seabed with Use of Autonomous Underwater Vehicles // SPIIRAS Proceedings, 2018" 3(58) P. 203-226 DOI: 10.15622/sp.58.9 // https://elibrary.ru/item.asp?id=35630309 (in Russian).
  45. Igor Kotenko, Igor Saenko, Alexey Kushnerevich. Architecture of the Parallel Big Data Processing System for Security Monitoring of Internet of Things Networks // SPIIRAS Proceedings. 2018 ¹ 4(59). P.5-30, DOI 10.15622/sp.59.1 // https://elibrary.ru/item.asp?id=35358989 (Scopus) (in Russian).
  46. Anton Pronoza, LidiaVitkova, Andrey Chechulin, Igor Kotenko, Dmitry Saharov. Methodology for disseminating information channels analysis in social networks // Vestnik of Saint-Petersburg University applied mathematics. Computer science. Control processes, 2018. Vol.14, ¹ 4, P.362-377 DOI: 10.21638/11702/spbu10.2018.409 // https://elibrary.ru/item.asp?id=36687364 (in Russian).
  47. Andrey Fedorchenko,Igor Kotenko. Correlation of Information in SIEM Systems based on Event Type Relation Graph // Information and Control Systems.2018. ¹ 1(92). P.58-67. https://doi.org/10.15217/issnl684-8853.2018.1.58 https://cyberleninka.ru/article/n/korrelyatsiya-informatsii-v-siem-sistemah-na-osnove-grafa-svyazey-tipov-sobytiy/viewer // https://elibrary.ru/item.asp?id=32538052 (in Russian).
  48. Vasily Desnitsky, Igor Kotenko. Analysis of Energy Resource Depletion Attacks on Wireless Devices // Journal of Instrument Engineering. 2018. Vol.61.No.4. P.291-297.DOI: 10.17586/0021-3454-2018-61-4-291-297 https://cyberleninka.ru/article/n/analiz-atak-istoscheniya-energoresursov-na-sistemy-besprovodnyh-ustroystv/viewer // https://www.elibrary.ru/item.asp?id=32836535 (in Russian).
  49. Maxim Kolomeec, Andrey Chechulin, Elena Doynikova, Igor Kotenko. A technique of visualization of cybersecurity metrics // Journal of Instrument Engineering. 2018. Vol.61.No.10.P.873-880. DOI: 10.17586/0021-3454-2018-61-10-873-880 https://cyberleninka.ru/article/n/metodika-vizualizatsii-metrik-kiberbezopasnosti // https://elibrary.ru/item.asp?id=36408681 (in Russian).
  50. Sergety Ageev, Igor Saenko, Igor Kotenko. Method and Algorithms of Anomaly Detection in Multiservice Network Traffic based on Fuzzy Logical Inference // Information and Control Systems.2018. No.3(94). P.61-68. https://doi.org/10.15217/issn1684-8853.2018.3.61 // https://elibrary.ru/item.asp?id=35097885 (in Russian).
  51. Igor Kotenko,Dmitry Levshun, Andrey Chechulin, Igor Ushakov, Andrey Krasov. An Integrated Approach to Provide Security of Cyber-Physical Systems Based on Microcontrollers // Cybersecurity issues.2018. No.3 (27) P.29 38. DOI: 10.21681/2311-3456-2018-3-29-38 // https://elibrary.ru/item.asp?id=36609968 (in Russian).
  52. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Visual Analytics for Detecting Attacks in Vehicle`s CAN Bus Traffic // Information Security. Inside. 2018. No.3(81). P.51-57 // https://elibrary.ru/item.asp?id=35097115 (in Russian).
  53. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design of Secure Data Transfer Environment Using the I2C Protocol as an Example // Information Security. Inside. 2018. No.4(82). P.54-62 // https://elibrary.ru/item.asp?id=35510042 (in Russian).
  54. Elena Doynikova, Andrey Fedorchenko, Igor Kotenko. Determination of Information System Weaknesses for Automated selection of security measures // Problems of information security. Computer systems. 2018. No.3. P.89-99. // https://elibrary.ru/item.asp?id=36576822 (in Russian).
  55. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. An approach to ensuring availability in wireless networks for crisis management // Scientific and analytical journal Bulletin of St. Petersburg University of the State Fire Service EMERCOM of Russia. 2018. No.3. P.92-96. // https://elibrary.ru/item.asp?id=36263688 (in Russian).
  56. I.V. Kotenko, I.B. Parashchuk. Automated adaptive monitoring of integrated security of information systems "smart city": target functions of the conceptual model // Bulletin of the Astrakhan State Technical University. Series Management, Computer Engineering and Informatics, 2018 No. 3, Ð. 7-15. DOI: 10.24143/2072-9502-2018-3-7-15 https://www.elibrary.ru/download/elibrary_35216893_29342477.pdf // https://www.elibrary.ru/item.asp?id=35216893 (in Russian).
  57. Andrey Fedorchenko. Analysis of Security Events Properties for Detection of Information Objects and their Types in Uncertain Infrastructures // Journal of Instrument Engineering. 2018. Ò.61. No.11. P.997 1004. DOI: 10.17586/0021-3454-2018-61-11-997-1004 https://pribor.ifmo.ru/ru/article/17666/analiz_atak_istoscheniya_energoresursov_na_sistemy_besprovodnyh_ustroystv.htm // https://elibrary.ru/item.asp?id=36552322 (in Russian).
  58. Nickolay Komashinsky. Combining Hadoop and Snort Technologies for Detection of Network Attacks // Journal of Instrument Engineering. 2018. Ò.61. No.11. P.1005-1011. DOI: 10.17586/0021-3454-2018-61-11-1005-1011 https://pribor.ifmo.ru/en/article/18279/kombinirovanie_tehnologiy_HADOOP_i_SNORT_dlya_obnaruzheniya_setevyh_atak_.htm // https://www.elibrary.ru/item.asp?id=36552323 (in Russian).
  59. Vladimir Gorodetski, Olga Tushkanova. Semantic technologies for semantic application. Part 1. Basic components of semantic technologies // Artificial Intelligence and Decision Making. 2018. No.4. P.61-71 DOI: 10.14357/20718594180406 // https://elibrary.ru/item.asp?id=36643713 (in Russian).
  60. Igor Parashchuk, Vyacheslav Loginov, Vyacheslav Elizarov. Optimizing IT-infrastructure parameter space being assessed by SIEM system under uncertainty // Information and space. 2018. No.1. P.75 80 // https://elibrary.ru/item.asp?id=34859228 (in Russian).
  61. Lidia Vitkova. The method of audience analysis for the information dissemination channel in social networks // Proceedings of higher educational institutions. Light industry technology. 2018. Vol.42. No.4. Ð. 5-10 // https://elibrary.ru/item.asp?id=37750236 (in Russian).
  62. Lidia Vitkova. Overview of the investigations in the area of monitoring and counteraction to threats to information-psychological security in social networks // Information Technology and Telecommunications. 2018. Vol. 6, No. 3. pp. 1-9. https://www.sut.ru/doci/nauka/ITT/1-9.pdf // https://elibrary.ru/item.asp?id=37179955 (in Russian).
  63. Vasily Desnitsky, Nikolay Rudavin. Modeling and analysis of energy exhaustion attacks in digital city systems // Information Technology and Telecommunications. 2018. Vol. 6, No.3. P. 10-18. https://www.sut.ru/doci/nauka/ITT/10-18.pdf // https://elibrary.ru/item.asp?id=37179956 (in Russian).
  64. Anastasia Balueva, Vasily Desnitsky. Secure data transfer protocol for the internet of things on raspberry Pi Example // Information Technology and Telecommunications. 2018. Vol. 6. No.4. P. 10-20 https://www.sut.ru/doci/nauka/1AEA/ITT/2018_4/10-20.pdf // https://www.elibrary.ru/item.asp?id=41162088 (in Russian).
  65. Dmitry Levshun. Unification of connection between cyber-physical systems and sources of data // Information Technology and Telecommunications. 2018. Vol. 6 No. 3. pp. 28-37 https://www.sut.ru/doci/nauka/ITT/28-37.pdf //https://elibrary.ru/item.asp?id=37179958 (in Russian).
  66. Igor Parashchuk, Igor Kotenko. Target Functions of the Conceptual Model of Adaptive Monitoring of Integrated Security in the Interests of Counteracting the Socio-Cyber-Physical Threats to the “Smart City”// Mathematical methods in engineering and technology - MMTT. 2018. Vol. 2. pp. 139-144. // https://www.elibrary.ru/item.asp?id=36295775 (in Russian).
  67. Igor Saenko, Alexey Kushnerevich, Alexander Branitskiy. An approach to detecting attacks on Internet of things devices based on distributed data processing and the use of machine learning algorithms // Methods and technical means of ensuring information security. 2018. No. 27. pp. 29-30. // https://elibrary.ru/item.asp?id=36546903 (in Russian).
  68. Igor Saenko, Andrey Chechulin, Lidia Vitkova. The intelligent systems concept of analytical processing of digital network content in order to detect unwanted information // Methods and technical means of ensuring information security. 2018. No. 27. pp. 6-7. // https://elibrary.ru/item.asp?id=36546890 (in Russian).
  69. Igor Parashchuk, Igor Saenko, Oleg Pantiuhin. Trusted systems for delimiting access to information in cloud infrastructures // High-tech technologies in space exploration of the Earth. 2018. Vol. 10. No. 6. pp. 68-75. DOI: 10.24411/2409-5419-2018-10188 // https://elibrary.ru/item.asp?id=36776105 (in Russian).
  70. Vasily Desnitsky. Feasibility analysis of resource exhaustion attacks on unmanned aerial vehicles // Journals - Herald of Modern Research. 2018. Nr. 12.5 (27). P. 100-102. https://elibrary.ru/download/elibrary_36709001_32704293.pdf // https://www.elibrary.ru/item.asp?id=36709001 (in Russian).
  71. Alexey Meleshko, Sergey Savkov. Risk assessment in cyberphysical systems under conditions of incomplete initial data // Almanac of scientific works of young scientists of ITMO University-2018 // XLVII scientific and educational-methodical conference of ITMO University, subject: Computer technologies and management, St. Petersburg, January 30-February 02, 2018 Vol. 1. P. 19-22. https://elibrary.ru/download/elibrary_41287906_35277840.pdf // https://elibrary.ru/item.asp?id=41287906 (in Russian).
  72. Gaifullina Diana. Analytical review of methods for detecting anomalies of the network level of cyber-physical systems // Almanac of scientific works of young scientists of ITMO University-2018. / / XLVII scientific and educational-methodical conference of ITMO University, subject: Computer technologies and management, St. Petersburg, January 30-February 02, 2018 Vol.1. P. 4-7. // https://elibrary.ru/item.asp?id=41287898 (in Russian).
  73. Aralbaev Tashbulat, Abramova Taisia, Galimov Rinat. Gayfulina Diana, Khakimova Elvira. Selection of basic function for identification of time series based on associative majority approach // Bulletin of ISTU them. M. T. Kalashnikov, 2018. Vol. 21. N. 4. P. 194-199. DOI: 10.22213/2413-1172-2018-4-194-199 // https://www.elibrary.ru/item.asp?id=36785050 (in Russian).
  74. I.V. Kotenko, A.A. Chechulin, D.S. Levshun Modeling of railway transport infrastructure security monitoring systems // Transport security and technologies-2018. No.1 - P. 62-64 https://www.securitymedia.ru/issue_transport_issue_0_58.html (in Russian).
  75. Nikolay Vasilishin, Igor Ushakov, Igor Kotenko. Research of the network traffic analysis algorithms using big data to detect computer attacks // Electronic journal "Alley of Science" 2018. Vol. 3. No. 6 (22). pp. 1012-1021. https://alley-science.ru/arhiv_nomerov/ // https://elibrary.ru/item.asp?id=35326749 (in Russian).
  76. M.V. Buinevich, V.V. Pokusov, K.E. Izrailov. Method of visualizing the modules of the information security system // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2018. No. 3. pp. 81-91. // https://elibrary.ru/item.asp?id=36263686 (in Russian).
  77. M.V. Buinevich, V.V. Pokusov, K.E. Izrailov. Interaction effects of enterprise providing subsystems of information service (as example is used fire safety service) // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2018. No. 4. pp. 48-55. // https://elibrary.ru/item.asp?id=37272518 (in Russian).
  78. V.A.Tailakov, K.E. Izrailov. Methods of automating the search for vulnerabilities in software at the appropriate levels of its development // Scientific aspect. 2018. Vol. 6. No. 4. pp. 719-726.// https://elibrary.ru/item.asp?id=36942713 (in Russian).
  79. D.V. Volkov, I.B. Saenko, A.M. Starkov. Technique of technological management of virtual local area networks of special purposes // Proceedings of Tula State University. Technical sciences. 2018. Issue 12. pp. 423-435. // https://elibrary.ru/item.asp?id=36739167 (in Russian).
  80. D.V. Volkov, I.B. Saenko, A.M. Starkov, A.T. Sultanbekov. Evaluation of the stability of the data network under destructive influence // Proceedings of Tula State University. Technical sciences. 2018. No. 12. pp. 358-363. https://cyberleninka.ru/article/n/otsenka-ustoychivosti-seti-peredachi-dannyh-v-usloviyah-destruktivnyh-vozdeystviy/viewer // https://elibrary.ru/item.asp?id=36739156 (in Russian).
  81. D.V. Volkov, I.B. Saenko, A.M. Starkov. Methodology for assessing the bandwidth of a special-purpose communication network under destructive effects on network elements // Proceedings of Tula State University. Technical sciences. 2018. Issue 12. pp.391-396. // https://elibrary.ru/item.asp?id=36739161 (in Russian).
  82. V.I. Gorodetsky, O.N. Tushkanova. Semantic technologies for semantic applications. Part 1. Basic components of semantic technologies // Artificial intelligence and decision-making. 2018. No. 4. pp. 61-71. DOI: 10.14357/20718594180406 // https://elibrary.ru/item.asp?id=36643713 (in Russian).
  83. I.B. Saenko, M.A. Biryukov, S.A. Yasinsky, A.N. Gryazev. Implementation of security criteria in the construction of a unified system of access differentiation to information resources in cloud infrastructures //Information and Space. 2018. No. 1. pp. 81-85. // https://elibrary.ru/item.asp?id=34859229 (in Russian).
  84. R.I. Zakharchenko, I.D. Korolev, I.B. Saenko. Synergistic approach to the management of sustainable functioning of the special purpose automatic systems // Control, communication and security systems. 2018. No. 4. pp. 207-225. // https://elibrary.ru/item.asp?id=36547745 (in Russian).
  85. I.B. Sayenko, R.I. Zakharchenko, S.A. Yasinsky, A.N. Gryazev. Models of functioning of critical information infrastructure in conditions of cybernetic confrontation // Information and Space. 2018. No. 2. pp. 46-51. // https://elibrary.ru/item.asp?id=35268436 (in Russian).
  86. D.V. Volkov, I.B. Saenko. Approach to justification criterion of efficiency of functioning of data networks // Trudy TSNIIS. St. Petersburg branch. 2018. Vol. 2. No. 6. pp. 68-71. // https://elibrary.ru/item.asp?id=43160140 (in Russian).
  87. I.B. Saenko, A.V. Neizhmak, S.A. Yasinsky, A.N. Zyuzin. Model and algorithm of functioning of the system for increasing the reliability of information in data transmission networks using control packets // Information and Cosmos. 2018. No. 3. pp. 21-25. // https://elibrary.ru/item.asp?id=35785157 (in Russian).
  88. F.A. Skorik, I.B. Saenko. The method of continuous training of an artificial neural network in the task of predicting the state of a distributed military information system // Communication equipment. 2018. No. 1 (141). pp. 242-244. // https://www.elibrary.ru/item.asp?id=48623460 (in Russian).
  89. I.B. Saenko, A.M. Starkov. Model of technological management of virtual local computing networks in corporate information systems // Proceedings of the Central Research Institute. St. Petersburg branch. 2018. Vol. 2. No. 6. pp. 72-84.// https://www.elibrary.ru/item.asp?id=43160141 (in Russian).
  90. D.S. Shapovalov, I.B. Saenko. Data processing model in corporate information system based on "active server pages technology" // Proceedings of the Central Research Institute. St. Petersburg branch. 2018. Vol. 2. No. 6. pp. 85-91.// https://www.elibrary.ru/item.asp?id=43160142 (in Russian).
  91. Igor Parashchuk, Igor Kotenko. Neural network identification of the stochastic matrix elements for modeling of information security processes // International Conference on Soft Computing and Measurements. 2018. Vol. 1. pp. 728-731. // https://www.elibrary.ru/item.asp?id=35619917 (in Russian).
  92. Alexey Kushnerevich, Alexander Branitskiy. Software for distributed machine learning procedures for network security purposes // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P.394-397. // https://elibrary.ru/item.asp?id=37028984 (in Russian).
  93. Igor Parashchuk, Sergey Ageev. Increase of reliability of an estimation of semantic filling of information objects on the basis of processing incomplete, contradictory and fuzzy knowledge // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 378-383. // https://elibrary.ru/item.asp?id=37028981 (in Russian).
  94. Igor Parashchuk, Igor Kotenko. General architecture of intelligent system for analytical processing of digital network content in order to protect against unwanted information // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 384-388. // https://www.elibrary.ru/item.asp?id=37028982 (in Russian).
  95. Igor Parashchuk. Indicators of the quality of the information technology security systems and its effectiveness evaluation // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P.389-393. // https://www.elibrary.ru/item.asp?id=37028983 (in Russian).
  96. Nickolay Komashinsky. Methods of profiling and anomaly detection for detecting malicious activity // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P.446-450. // https://elibrary.ru/item.asp?id=37028995 (in Russian).
  97. Evgenii Merkushev. Cloud data integrity mechanisms based on proof of data possession protocol // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 433-436. // https://elibrary.ru/item.asp?id=37028992 (in Russian).
  98. Igoe Kotenko, Igor Saenko. Common architecture of the intelligent system for analytical processing of digital network content with the purpose of detecting from undesirable information // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 482-487. // https://elibrary.ru/item.asp?id=37029002 (in Russian).
  99. Igor Saenko, Vladimir Komashinskiy. The system of indices and criteria for evaluation of quality of access control policies in cloudy infrastructures of crucial information systems // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 451-456 // https://www.elibrary.ru/item.asp?id=37028996 (in Russian).
  100. Vasily Desnitsky, Alexander Branitskiy. Principles of adaptation and retraining of a system for analyzing information objects for protection against inappropriate and malicious information // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 404–407. // https://elibrary.ru/item.asp?id=37028986 (in Russian).
  101. Maxim Kolomeec, Igor Kotenko, Nikita Kosov, Sergey Ageev, Alexander Ivanov. Analysis of human-machine interaction methods in SIEM-systems visual analytics instruments // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 559-562 // https://www.elibrary.ru/item.asp?id=37029016 (in Russian).
  102. Maxim Kolomeec, Dmitry Levshun. Data visualization for the identification and counteraction of undesirable information // Information technologies in Management (ITU-2018). conference materials. 2018. pp. 437-440. // https://elibrary.ru/item.asp?id=37028993 (in Russian).
  103. D.S. Levshun, Yu.E. Bakhtin. Emergency properties of cyber-physical systems // Materials of the conference "Information Technologies in Management" (ITU-2018). Saint-Petersburg, October 2-4, 2018. Saint-Petersburg: JSC "Concern" Central Research Institute "Electropribor", 2018. p. 441-445 // https://elibrary.ru/item.asp?id=37028994 (in Russian).
  104. Artem Kulakov, Dmitry Levshun. Hot-plugging of external electronic components to Arduino platform devices // Information technologies in Management (ITU-2018). conference materials. 2018. pp. 457-460. // https://elibrary.ru/item.asp?id=37028997 (in Russian).
  105. Lidia Vitkova, Elena Doynikova. Decision support for protection against inappropriate information // Information technologies in Management (ITU-2018). conference materials. 2018. pp. 398-403. // https://elibrary.ru/item.asp?id=37028985 (in Russian).
  106. V.I. Gorodetsky, O.N. Tushkanova. Semantic computing and big data // Materials of the plenary sessions of the 11th Russian Multi-conference on management problems. St. Petersburg: JSC "Concern" Central Research Institute "Electropribor", 2018, p. 55-71 // https://elibrary.ru/item.asp?id=36591593 (in Russian).
  107. Igor Saenko, Artem Starkov. An approach to developing methodological foundations of technological management of virtual computer networks in corporate information systems // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 461-468 // https://elibrary.ru/item.asp?id=37028999 (in Russian).
  108. Sergey Ageev, Igor Saenko. Operational management of routing in multiservice communication networks taking into account support of information and network security in case of incompleteness of controlled information // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018. P 474-481.// https://www.elibrary.ru/item.asp?id=37029001 (in Russian).
  109. Elena Doynikova, Andrey Fedorchenko. Application of ontological repository for analysis of security of information systems // In the collection: Information technologies in Management (ITU-2018). conference materials. 2018. pp. 413-417. // https://www.elibrary.ru/item.asp?id=37028989 (in Russian).
  110. Elena Doynikova. Approach to the cyberattack prediction and response based on the neuro-fuzzy networks in the industrial Internet of things // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 408-412 // https://www.elibrary.ru/item.asp?id=37028987 (in Russian).
  111. Vasily Desnitsky, Nikolay Rudavin. Approach to security analysis of wireless self-organizing network for crisis management // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 488-492. // https://www.elibrary.ru/item.asp?id=37029003 (in Russian).
  112. Igor Kotenko, Maxim Kolomeec, Sergey Bushuev, Artem Gelfand. Data visualization for the identification and counteraction of undesirable information computer-human interaction techniques based on multitouch screens in security operation centers // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 554-558 // https://elibrary.ru/item.asp?id=37029015 (in Russian).
  113. Elvira Hakimova, Andrey Chechulin. Protection technique against inappropriate information in the Internet network for children with disabilities // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 418-427 // https://elibrary.ru/item.asp?id=37028990 (in Russian).
  114. Alexei Kushnerevich, Igor Saenko, Andrey Fedorchenko. Requirements for network informational objects gathering and processing systems based on application of distributed intelligent scanners // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 155-156. // https://elibrary.ru/item.asp?id=41290700 (in Russian).
  115. Parashchuk I. B., Ziyaev P. V., Mikhailichenko N. V. Methods, direct and inverse problems of analyzing the efficiency of data centers // Regional Informatics and Information Security. Collection of works. Issue 5 / SPOISU. - St. Petersburg, 2018. pp. 86-90. http://www.spoisu.ru/files/riib/riib_5_2018.pdf // https://elibrary.ru/item.asp?id=49241582 (in Russian).
  116. Igor Parashchuk, Igor Kotenko, Igor Saenko, Andrey Chechulin. Key architectural decisions on creation of intelligent system of analytical processing of digital network content for the benefit of protection against inappropriate information // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 151-152. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=36349218 (in Russian).
  117. Igor Parashchuk, Elena Doynikova, Igor Kotenko. Approach to the development of requirements for elimination of incomplete and contradiction of estimation and categorization of sense filling of information objects // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 162-164. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=36336097 (in Russian).
  118. Igor Parashchuk, Vladimir Komashinskiy. An approach to development of criteria for evaluation of quality of perspective access control models // Regional Informatics (RI-2018). XVI St. Petersburg International Conference " Regional Informatics (RI-2018)". St. Petersburg, October 24-26, 2018: Materials of the conference. St. Petersburg: SPOISU. 2018. pp. 147-149. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://www.elibrary.ru/item.asp?id=36338111 (in Russian).
  119. Igor Parashchuk, Pavel Ziyaev, Nikolay Mikhailichenko. Data centers: methods and directions of improving the analysis of the effectiveness of their functioning // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 82-84. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=36537731 (in Russian).
  120. Sergey Bushuev, Igor Saenko. About the task statement for supporting the required access control in cloud infrastructure of the crucial information system // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 123-125. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://www.elibrary.ru/item.asp?id=41281731 (in Russian).
  121. Alexander Ivanov, Igor Saenko.The analysis of opportunities of perspective information access control models in cloud infrastructures // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 139-141. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://www.elibrary.ru/item.asp?id=41285580 (in Russian).
  122. Alexander Branitskiy. Substantiation of requirements to means of implementing of multidimensional estimation and categorization of semantic content of information objects // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 118-119. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46479392 (in Russian).
  123. Igor Kotenko, Maxim Kolomeec, Vladimir Komashinskiy, Sergey Bushuev, Artem Gelfand. Computer-human interaction model on the basis of touch screens for monitoring of computer networks security // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 149-150. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=41400292 (in Russian).
  124. Maxim Kolomeec, Dmitry Levshun. Requirements for data visualization for identification and countermeasure selection for undesirable and abnormal information // Regional informatics "RI-2018". conference materials. Saint Petersburg, 2018. pp. 144-146. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=44536648 (in Russian).
  125. N.A. Komashinsky, I.V. Kotenko. Analysis of UEBA-system architectures // Regional Informatics (RI-2018). XVI St. Petersburg International Conference " Regional Informatics (RI-2018)". St. Petersburg, October 24-26, 2018: Materials of the conference. St. Petersburg: SPOISU. 2018. pp. 146-147. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://www.elibrary.ru/item.asp?id=46479579 (in Russian).
  126. Eugene Merkushev, Igor Kotenko. Usage of SAP HANA for big data security analytics // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 156-157. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46479782 (in Russian).
  127. Eugene Merkushev, Igor Kotenko. Computation integrity mechanismcs in cloud environments // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 158-159. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46479834 (in Russian).
  128. D.S. Levshun. Mathematical model of cyber-physical system // Regional Informatics and information security. Collection of works. Issue 5 / SPOISU. - St. Petersburg, 2018. pp. 159-161. http://www.spoisu.ru/files/riib/riib_5_2018.pdf // https://elibrary.ru/item.asp?id=49241564 (in Russian).
  129. Egor Denisov, Yaroslav Andreyanov, Lydia Vitkova, Dmitry Sakharov. Information influence of social networks // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 569-570. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=36800684&pff=1 (in Russian).
  130. Igor Kotenko, Igor Saenko, Andrey Chechulin. Conceptual model of functioning of intelligent system of analytical processing of digital network content for the benefit of detection and counteraction of inappropriate, dubious and harmful information // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 153-154. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=41285896 (in Russian).
  131. Oleg Pantiukhin, Sergey Ageev, Igor Saenko. Conceptual model of information access control in cloud infrastructures of crucial information systems // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 161-162. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://www.elibrary.ru/item.asp?id=36800442 (in Russian).
  132. Elvira Khakimova, Andrey Chechulin. Analysis of sources and types of unwanted information in the internet // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 172-173. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46484156&pff=1 (in Russian).
  133. Andrey Chechulin, Maxim Kolomeets. Sources of security data for hybrid repository construction // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 175-176. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46484186 (in Russian).
  134. Alexander Branitskiy, Vasily Desnitsky. Substantiation of requirements for adaptation and retraining of system of analysis of information objects for protection against unwanted and harmful information // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 120-122. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46484187 (in Russian).
  135. Elena Doynikova, Andrey Fedorchenko. Application of the ontological database in the task of vulnerability classification for automated determination of the security threats // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 135-136. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://www.elibrary.ru/item.asp?id=46484332 (in Russian).
  136. Elena Doynikova. Determination of the security input data for generation of the sample for neuro-fuzzy network training to forecast cyberattacks // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 133-135. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://www.elibrary.ru/item.asp?id=46486377 (in Russian).
  137. Diana Gaifulina, Andrey Fedorchenko. Structural analysis of the internet of things network traffic for determination of the information transmission protocols // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 125-127. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46486374 (in Russian).
  138. D.A. Gaifulina, A.V. Fedorchenko. Method of preliminary processing of network traffic for detecting anomalies in cyber-physical systems // Materials of the conference "Information Technologies in Management" (ITU-2018). Saint-Petersburg, October 2-4, 2018. Saint-Petersburg: JSC "Concern" Central Research Institute "Electropribor", 2018. pp. 428-432. // https://elibrary.ru/item.asp?id=37028991 (in Russian).
  139. Vasily Desnitsky. Analysis of denial-of-sleep attacks on IoT devices // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 129-131. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf https://www.elibrary.ru/item.asp?id=46486372 (in Russian).
  140. Nikolay Rudavin, Vasily Desnitsky. Construction of system components for managing availability of zigbee networks // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 165-167. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf https://www.elibrary.ru/item.asp?id=46488011 (in Russian).
  141. Igor Kotenko. Cybersecurity analytics: analysis of the current state and perspective research directions // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Vol.1, P. 10-19. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://elibrary.ru/item.asp?id=35231512 (in Russian).
  142. Elena Doynikova, Igor Kotenko. Techniques and tools of response to cyberattacks in the industrial Internet of Things // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 23-28. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://www.elibrary.ru/item.asp?id=35231514 (in Russian).
  143. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Computer-human interaction techniques for improving the effectiveness of decision-making processes in information security // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Vol. 1. P. 479-483. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://elibrary.ru/item.asp?id=35231618 (in Russian).
  144. Nickolay Komashinsky, Igor Kotenko. Problems of detecting targeted attacks (apt) against critically important information systems // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Vol. 1. P. 483-488. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://www.elibrary.ru/item.asp?id=35231619 (in Russian).
  145. Evgenii Merkushev, Igor Kotenko. Data and computation integrity mechanisms in cloud environments // Actual problems of informational communication in science and education (APISE 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 493-498. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://elibrary.ru/item.asp?id=35231621&pff=1 (in Russian).
  146. Igor Ushakov, Igor Kotenko. Models of NoSQL databases for cybersecurity monitoring // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 498-501. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://elibrary.ru/item.asp?id=35231622&pff=1 (in Russian).
  147. Igor Kotenko, Igor Ushakov. Methods of searching insiders in computer networks based on big data technologies // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 501-506. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://elibrary.ru/item.asp?id=35231623&pff=1 (in Russian).
  148. Igor Parashchuk, Igor Saenko, Oleg Pantiuhin. Analysis of the state of research on the modeling of access control to information in cloud infrastructures of critical information systems // Actual problems of informational communication in science and education (ÀPINO 2018). VII Internation technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 604-609 https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://elibrary.ru/item.asp?id=35231647 (in Russian).
  149. Alexander Branitskiy. Software ways for enhancing the effectiveness of the network-based signature attack detection systems // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 118–123. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://elibrary.ru/item.asp?id=35231537 (in Russian).
  150. Alexander Branitskiy. Parallel genetic training algorithm for neuro-fuzzy network for solving the task of detection of sequences of scanning packets // XVI St. Petersburg International Conference "Regional Informatics (RI-2018)". Conference proceedings. SPOISU. - 2018. P. 119–120. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46486494 (in Russian).
  151. Lidia Vitkova, Anton Pronoza, Dmitry Saharov, Andrey Chechulin. Security problems of the information sphere in the conditions of information warfare // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 191-195.// https://elibrary.ru/item.asp?id=35231553&pff=1 (in Russian).
  152. Elena Doynikova, Sergey Savkov, Evgenii Chumak. Information security for the bodynets: main trends // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 290-295. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://www.elibrary.ru/item.asp?id=35231577 (in Russian).
  153. Diana Gaifulina, Andrey Fedorchenko. Overview of network traffic presentation formats for cyber-physical security analysis // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 2. P. 223-228. https://www.sut.ru/doci/nauka/7apino/APINO%202018-T2.pdf // (in Russian).
  154. Alexey Meleshko, Vasily Desnitsky. Security Incident Modeling in a Water Supply Management System // In the collection: Actual problems of infotelecommunications in science and education (APINO 2018). VII International Scientific-technical and scientific-methodical conference. Collection of scientific articles. In 4 volumes. Edited by S.V. Bachevsky. 2018. pp. 301-306. https://www.sut.ru/doci/nauka/7apino/APINO%202018-T2.pdf // https://elibrary.ru/item.asp?id=35428316&pff=1 (in Russian).
  155. Pavel Dumenko, Vasily Desnitsky. An approach to development and evaluation of a protocol for remote attestation of Java programs // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 280-285. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://elibrary.ru/item.asp?id=35231575&pff=1 (in Russian).
  156. Igor Parashchuk, Igor Kotenko, Igor Saenko. Parameters of IT-infrastructure of the cyberphysical system in interest of security information and event management: the basic directions of selection // Promising directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018 P. 233-234 // https://www.elibrary.ru/item.asp?id=36570170 (in Russian).
  157. Igor Saenko, Sergei Bushuev, Alexander Ivanov. Possibilities of application of flexible access control models for increasing cloudy information infrastructure security // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018 P. 257-258 https://www.elibrary.ru/download/elibrary_36570212_71058938.pdf // https://www.elibrary.ru/item.asp?id=36570212 (in Russian).
  158. Igor Saenko, Artem Starkov. An approach to creating criteria of technological control for the virtual computer network of corporate type // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018 P. 259-260. https://www.elibrary.ru/download/elibrary_36570217_36099069.pdf // https://elibrary.ru/item.asp?id=36570217 (in Russian).
  159. Sergey Ageev, Igor Saenko, Denis Fedoseev. Intelligent techniques for online decision support in multiservice network management // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018 P. 199-200. https://elibrary.ru/download/elibrary_36570117_65499856.pdf // https://www.elibrary.ru/item.asp?id=36570117 (in Russian).
  160. Yurii Bahtin, Andrey Chechulin. Security analysis of the security and fire alarm system devices interaction protocol // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018. P. 231-232. https://elibrary.ru/download/elibrary_36570166_67404611.pdf // https://elibrary.ru/item.asp?id=36570166 (in Russian).
  161. Vasily Desnitsky. Rule based rerelation of energy resource exhaustion attacks in wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018. P. 247-248. // https://www.elibrary.ru/item.asp?id=36570193 (in Russian).
  162. Vasily Desnitsky. An approach to providing availability in wireless sensor networks for crisis management // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018 P. 63-64. https://elibrary.ru/download/elibrary_36569973_64647042.pdf // https://www.elibrary.ru/item.asp?id=36569973 (in Russian).
  163. Bakhtin Yu. E., Levshun D. S. Development of semi-natural railway model for security incidents analysis // Materials of the conference "Information Technologies in Management" (ITU-2018). Saint-Petersburg, October 2-4, 2018. Saint-Petersburg: JSC "Concern" Central Research Institute "Electropribor", 2018. pp. 469-473 // https://elibrary.ru/item.asp?id=37029000 (in Russian).
  164. Vasily Desnitsky, Igor Kotenko Machine learning based detection of DENIAL-OF-SLEEP attacks in wireless sensor networks for crisis management // Proceedings of XXI International Conference on Soft Computing and Measurements (SCM-2018). Saint-Petersburg, Russia,May 23-25, 2018. Vol.1. P.431-433 // https://elibrary.ru/item.asp?id=35619840 (in Russian).
  165. K.E. Izrailov, V.V. Pokusov, E.S. Stolyarova. Information objects in the system of ensuring information security // In the collection: Theoretical and applied issues of complex security. Materials of the I International Scientific and Practical Conference. Petrovsky Academy of Sciences and Arts. 2018. pp. 166-169. // https://elibrary.ru/item.asp?id=34924831 (in Russian).
  166. À.À. Renskov, I.B. Paraschuk. Features of technical support and stages of the process of creating a unified electronic library within the framework of the "electronic university" system // Problems of technical support of troops in modern conditions, 2018. pp.347-351 // https://elibrary.ru/item.asp?id=34861197 (in Russian).
  167. D.A. Gaifullina. Identification of typical structures of network traffic packets of cyberphysical systems for the study and identification of anomalies // In the collection: Proceedings of the VII Congress of Young Scientists. Saint Petersburg, 2018. pp. 29-33. // https://elibrary.ru/item.asp?id=43995606 (in Russian).
  168. D.V. Kudryavtsev, T.A. Gavrilova, I.A. Leshcheva, A.M. Begler, M.V. Kubelsky, O.N. Tushkanova. Methodology of group work on visual development of the knowledge graph // In the collection: The Sixteenth National Conference on Artificial Intelligence with international participation CII-2018. Proceedings of the conference: in 2 volumes. 2018. pp. 53-60. // https://elibrary.ru/item.asp?id=35568575 (in Russian).
  169. O.I. Pantyukhin, I.B. Paraschuk, I.B. Saenko. Analysis of the state of research on modeling the differentiation of access to information in cloud infrastructures of critical information systems // In the collection: Current problems of infotelecommunications in science and education (APINO 2018). VII International Scientific-technical and scientific-methodical Conference. Collection of scientific articles. In 4 volumes. Edited by S.V. Bachevsky. 2018., volume 2, pp. 524-529. https://www.sut.ru/doci/nauka/7apino/APINO%202018-T2.pdf // https://www.elibrary.ru/item.asp?id=35428586 (in Russian).
  170. I.B. Paraschuk, N.V. Mikhailichenko. Features of building and analyzing the quality of data-centers as the basic elements of the it-infrastructure // Materials of the IV interregional scientific and practical conference. Sevastopol State University; scientific ed. by B.V. Sokolov. 2018, pp. 28-29 // https://elibrary.ru/item.asp?id=36569945&pff=1 (in Russian).
  171. L.A. Vitkova, A.I. Ivanov. Review of topical threats and methods of protection in the field of cloud calculations // In the collection: Current problems of infotelecommunications in science and education (APINO 2018). VII International Scientific-technical and scientific-methodical Conference. Collection of scientific articles. In 4 volumes. Edited by S.V. Bachevsky. 2018. pp. 179-182. // https://www.elibrary.ru/item.asp?id=35231550&pff=1 (in Russian).
  172. L.A. Vitkova, A.S. Isakov, M.M. Kovtsur. The comparison of mechanisms for obtaining the revocation status of an x.509 digital certificate on the certificate authority on ASTRA LINUX to support PKI // In the collection: Actual problems of infotelecommunications in science and education (APINO 2018). VII International Scientific-technical and scientific-methodical Conference. Collection of scientific articles. In 4 volumes. Edited by S.V. Bachevsky. 2018. pp. 182-186 // https://www.elibrary.ru/item.asp?id=35231551&pff=1 (in Russian).
  173. D.S. Shapovalov, I.B. Saenko. Analyzis of the "active server pages" technology use for the development of interactive web applications // In the collection: Regional informatics "RI-2018". conference materials. St. Petersburg, 2018. pp. 110-111. // https://www.elibrary.ru/item.asp?id=41288544 (in Russian).

2017

  1. Vladimir Gorodetsky, Igor Kotenko, Viktor Skormin. Integrated Multi-Agent Approach to Network Security Assurance: Models of Agents' Community // Information Security for Global Information Infrastructures. IFIP Advances in Information and Communication Technology. 2017. Ò. 47. Ñ. 291-300. DOI: 10.1007/978-0-387-35515-3_30 // https://elibrary.ru/item.asp?id=41628485
  2. Igor Saenko, Sergey Ageev and Igor Kotenko. Detection of traffic anomalies in multi-service networks based on a fuzzy logical inference // Studies in Computational Intelligence. 2017. Ò. 678. Ñ. 79-88. DOI: 10.1007/978-3-319-48829-5_8 // https://elibrary.ru/item.asp?id=28239199
  3. Igor Saenko and Igor Kotenko. Reconfiguration of RBAC schemes by genetic algorithms // Studies in Computational Intelligence. 2017. Ò. 678. Ñ. 89-98. DOI: 10.1007/978-3-319-48829-5_9 // https://elibrary.ru/item.asp?id=28220320
  4. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Categorisation of web pages for protection against inappropriate content in the internet. International Journal of Internet Protocol Technology (IJIPT), Vol. 10, No. 1, 2017. P.61-71. DOI: 10.1504/IJIPT.2017.083038 // https://www.elibrary.ru/item.asp?id=29485945
  5. Igor Kotenko, Andrey Chechulin, Alexander Branitskiy. Generation of Source Data for Experiments with Network Attack Detection Software // Journal of Physics: Conference Series. 2017. Ò. 820. ¹ 1. Ñ. 012033. DOI: 10.1088/1742-6596/820/1/012033 // https://elibrary.ru/item.asp?id=29483273
  6. Igor Kotenko, Igor Saenko and Andrey Chechulin. Protection against information in eSociety: using Data Mining methods to counteract unwanted and malicious data // Communications in Computer and Information Science. 2017. Ò. 745. Ñ. 170-184. DOI: 10.1007/978-3-319-69784-0_15 // https://elibrary.ru/item.asp?id=31040301 (WoS and Scopus)
  7. Alexander Branitskiy, Igor Kotenko. Hybridization of computational intelligence methods for attack detection in computer networks // Journal of Computational Science, Elsevier, 2017, Vol.23, P.145–156. DOI: 10.1016/j.jocs.2016.07.010 // https://elibrary.ru/item.asp?id=41771295
  8. Alexander Branitskiy and Igor Kotenko. Network anomaly detection based on an ensemble of adaptive binary classifiers // Computer Network Security. Lecture Notes in Computer Science. 2017. Ò. 10446 LNCS. Ñ. 143-157. DOI: 10.1007/978-3-319-65127-9_12 // https://elibrary.ru/item.asp?id=31110104
  9. Evgenia Novikova, Ivan Murenin. Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure // Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag. The 2017 7th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS-2017). August 28-30, 2017, Warsaw, Poland, Vol. 10446 LNCS P.50–61. DOI: 10.1007/978-3-319-65127-9_5. // https://elibrary.ru/item.asp?id=31080040
  10. Vasily Desnitsky and Igor Kotenko. Modeling and Analysis of IoT Energy Resource Exhaustion Attacks // Studies in Computational Intelligence - 11th International Symposium on Intelligent Distributed Computing (IDC'2017). Belgrade. Serbia, 11-13 october 2017. Vol.737 P. 263-270. DOI: 10.1007/978-3-319-66379-1_23 // https://elibrary.ru/item.asp?id=31113146
  11. Igor Kotenko, Igor Saenko, Alexey Kushnerevich. Parallel big data processing system for security monitoring in Internet of Things networks // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.8, No.4 Ð. 60-74 (December 2017). DOI: 10.22667/JOWUA.2017.12.31.060 // https://elibrary.ru/item.asp?id=35536738
  12. Paolo Palumbo, Luiza Sayfullina, Dmitriy Komashinskiy, Emil Eirola and Juha Karhunen. A Pragmatic Android Malware Detection Procedure. Computers & Security Journal, Elsevier. Vol 70, 2017. P.689-701. DOI:10.1016/j.cose.2017.07.013
  13. Igor Kotenko, Andrey Chechulin, Elena Doynikova, Andrey Fedorchenko. Ontological hybrid storage for security data // Studies in Computational Intelligence. 2017. Ò. 737. Ñ. 159-171. DOI: 10.1007/978-3-319-66379-1_15 // https://elibrary.ru/item.asp?id=31065783
  14. Maxim Kolomeec, Gustavo Gonzalez-Granadillo, Elena Doynikova, Andrey Chechulin, Igor Kotenko, and Herve Debar. Choosing models for security metrics visualization // Lecture Notes in Computer Science. 2017. Ò. 10446 LNCS. Ð. 75-87. DOI: 10.1007/978-3-319-65127-9_7 // https://elibrary.ru/item.asp?id=31066510
  15. Andrey Fedorchenko, Igor Kotenko, Elena Doynikova, Andrey Chechulin. The ontological approach application for construction of the hybrid security repository // XX International Conference on Soft Computing and Measurements (SCM'2017), Saint-Petersburg, May 24-26, 2017 P.525-528. DOI: 10.1109/SCM.2017.7970638 // https://elibrary.ru/item.asp?id=31048917
  16. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design Lifecycle for Secure Cyber-Physical Systems based on Embedded Devices // Proceedings of the 2017 IEEE 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2017. 9. 2017. Ñ. 277-282. DOI: 10.1109/IDAACS.2017.8095090 // https://elibrary.ru/item.asp?id=35530497
  17. Elena Doynikova and Igor Kotenko. CVSS-based Probabilistic Risk Assessment for Cyber Situational Awareness and Countermeasure Selection // Proceedings - 2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2017. 25. 2017. Ñ. 346-353 DOI: 10.1109/PDP.2017.44 // https://elibrary.ru/item.asp?id=31045380
  18. Igor Saenko, Igor Kotenko, and Alexey Kushnerevich. Parallel processing of big heterogeneous data for security monitoring of iot networks // Â ñáîðíèêå: Proceedings - 2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2017. 25. 2017. Ñ. 329-336. DOI: 10.1109/PDP.2017.45 // https://elibrary.ru/item.asp?id=31036173
  19. Elena Doynikova, Andrey Chechulin, and Igor Kotenko. Analytical Attack Modeling and Security Assessment based on the Common Vulnerability Scoring System // Conference of Open Innovation Association, FRUCT. Proceedings of the 20th Conference of Open Innovations Association, FRUCT 2017. 2017. Ñ. 53-61. DOI: 10.23919/FRUCT.2017.8071292 // https://elibrary.ru/item.asp?id=35517447
  20. Igor Saenko, Igor Kotenko. Administrating Role-Based Access Control by Genetic Algorithms // GECCO 2017 - Proceedings of the Genetic and Evolutionary Computation Conference Companion. 2017. Ñ. 1463-1470. DOI: 10.1145/3067695.3082509 // https://elibrary.ru/item.asp?id=31080315
  21. Igor Kotenko, Artem Kuleshov and Igor Ushakov. Aggregation of Elastic Stack Instruments for Collecting, Storing and Processing of Security Information and Events // 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). 2017. ¹ 234 DOI: 10.1109/UIC-ATC.2017.8397627 // https://elibrary.ru/item.asp?id=35285008
  22. Elena Doynikova and Igor Kotenko. Enhancement of Probabilistic Attack Graphs for Accurate Cyber Security Monitoring // 2017 IEEE SmartWorld Ubiquitous Intelligence and Computing, Advanced and Trusted Computed, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017 - Conference Proceedings. 2017. Ñ. 1-6. DOI: 10.1109/UIC-ATC.2017.8397618 // https://elibrary.ru/item.asp?id=35757909
  23. Andrey Fedorchenko, Igor Kotenko, and Didier El Baz. Correlation of security events based on the analysis of structures of event types // Â ñáîðíèêå: Proceedings of the 2017 IEEE 9th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2017. 9. 2017. Ñ. 270-276. DOI: 10.1109/IDAACS.2017.8095089 https://hal.laas.fr/hal-02115860/file/scan145632.pdf // https://elibrary.ru/item.asp?id=35539679
  24. Vasily Desnitsky, Igor Kotenko. Modeling and analysis of security incidents for mobile communication mesh ZigBee-based network // XX International Conference on Soft Computing and Measurements (SCM'2017). Saint-Petersburg, 24–26 may 2017. P.500-502. DOI: 10.1109/SCM.2017.7970629 // https://elibrary.ru/item.asp?id=31032496
  25. Igor Kotenko, Igor Saenko, Sergey Ageev. Monitoring the State of Elements of Multi-service Communication Networks on the Basis of Fuzzy Logical Inference // The Sixth International Conference on Communications, Computation, Networks and Technologies (INNOV 2017). October 8 - 12, 2017. Athens, Greece. IARIA, 2017. P.26-32. ISBN: 978-1-61208-596-8. https://www.researchgate.net/publication/322244745_
  26. M. Buinevich, K. Izrailov, A. Vladyko. Testing of utilities for finding vulnerabilities in the machine code of telecommunication devices // Â ñáîðíèêå: 2017 19th International Conference on Advanced Communication Technology (ICACT). 19, Opening Era of Smart Society. Ñåð. "19th International Conference on Advanced Communications Technology: Opening Era of Smart Society, ICACT 2017 - Proceeding" 2017. Ñ. 408-414. DOI: 10.23919/ICACT.2017.7890122 // https://elibrary.ru/item.asp?id=28900838
  27. R. Yusupov, I. Kotenko. Message from organizing committee chairs // Proceedings - 2017 25th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2017. 25. 2017. Ñ. xv. DOI: 10.1109/PDP.2017.5 // https://elibrary.ru/item.asp?id=31028961
  28. Jacek Rak, John Bay, Igor Kotenko, Leonard Popyack, Victor Skormin, Krzysztof Szczypiorski. Computer Network Security // 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings. DOI: 10.1007/978-3-319-65127-9
  29. Dmitry Levshun, Andrey Chechulin. Development of the information search interface in unified repository of multimedia data from field ethnographic expeditions // Universum: Technical science: digital science journal. 2017. ¹ 4(37). P. 15-21. https://7universum.com/ru/tech/archive/item/4623 // https://elibrary.ru/item.asp?id=29039410 (in Russian).
  30. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Design lifecycle for secure cyber-physical systems based on embedded devices. Information Security. Inside, ¹4(76), 2017. P.53-59. // https://elibrary.ru/item.asp?id=29966169 (in Russian).
  31. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Using virtual and augmented reality for cyber security data visualization. Information Security. Inside, ¹5(77), 2017. P.58-63 // https://elibrary.ru/item.asp?id=30268269 (in Russian).
  32. Igor Kotenko, Andrey Chechulin, Dmitry Levshun. Security analysis of railway transport infrastructure on the base of analytical modeling. Information Security. Inside, ¹6(78), 2017. P.48-57. // https://elibrary.ru/item.asp?id=30585609 (in Russian).
  33. Alexander Branitskiy. Hierarchical hybridization of binary classifiers for detecting anomalous network connections // SPIIRAS Proceedings. No. 3 (52), 2017. P. 204–233. DOI: 10.15622/sp.52.10 // https://elibrary.ru/item.asp?id=29296342 (in Russian).
  34. Igor Kotenko, Artem Kuleshov, Igor Ushakov. A system for collecting, storing and processing security information and events based on elastic stack tools // SPIIRAS Proceedings. No. 5 (54), 2017. P. 5-34. DOI: 10.15622/sp.54.1 // https://elibrary.ru/item.asp?id=30282018 (in Russian).
  35. Evgenia Novikova, Ivan Murenin. The technique of the visual analysis of the organization employees routes for anomaly detection // SPIIRAS Proceedings. No. 5 (54), 2017. P. 57-83. DOI: 10.15622/sp.54.3 // https://elibrary.ru/item.asp?id=30282020 (in Russian).
  36. Igor Kotenko, Igor Saenko, Mikhail Kotsynyak, Oleg Lauta. Assessment of cyber-resilience of computer networks based on simulation of cyber attacks by the stochastic networks conversion method // SPIIRAS Proceedings. No. 6 (55), 2017. P. 160-184. DOI: 10.15622/sp.55.7 // https://elibrary.ru/item.asp?id=30685505 (in Russian).
  37. Vasily Desnitsky, Igor Kotenko. Modeling and analysis of security incidents for mobile communication mesh ZigBee-based network // XX International Conference on Soft Computing and Measurements (SCM'2017),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2017. Vol. 2, P. 39-42. https://elibrary.ru/download/elibrary_29902194_82983224.pdf // https://elibrary.ru/item.asp?id=29902194 (in Russian).
  38. Alexander Branitskiy, Igor Kotenko. Open source software for network attack detection and prevention. Part 1 // Information security. Inside. No. 2(47), 2017. P. 40-47. // https://elibrary.ru/item.asp?id=28846336 (in Russian).
  39. Alexander Branitskiy, Igor Kotenko. Open source software for network attack detection and prevention. Part 2 // Information security. Inside. No. 3(75), 2017. P. 58-66. // https://elibrary.ru/item.asp?id=29207619 (in Russian).
  40. Igor Kotenko, Igor Ushakov. Big data technologies for monitoring of computer security // Information security. Inside. 2017. No. 3(75), P. 23-33. // https://elibrary.ru/item.asp?id=29207615 (in Russian).
  41. Igor Kotenko, Vasily Desnitsky. Ñountering targeted cyber-physical attacks in distributed large-scale critical systems // Information Security. Inside, 2017, ¹4(76), P. 66-69. // https://elibrary.ru/item.asp?id=29966171 (in Russian).
  42. Elena Doynikova and Igor Kotenko. A multi-layer technique for proactive response against cyber attacks based on graph models // Information Security. Inside, 2017, No. 6(78). pp. 58-67 // https://www.elibrary.ru/item.asp?id=30585610 (in Russian).
  43. Elena Doynikova, Andrey Chechulin and Igor Kotenko. Computer network security evaluation based on CVSS metrics // Information and Control Systems, 2017, No. 6(91). pp. 76-87. DOI: 10.15217/issn1684-8853.2017.6.76 // https://elibrary.ru/item.asp?id=30794562 (in Russian).
  44. Igor Kotenko, Andrey Fedorchenko, Igor Saenko, and Alexei Kushnerevich. Big data technologies for security event correlation based on event type accounting // Cybersecurity issues. 2017. No. 5(24), Ð. 2-16 DOI: 10.21681/2311-3456-2017-5-2-16 // https://elibrary.ru/item.asp?id=32360573 (in Russian).
  45. Vasily Desnitsky. An IoTaaS-based approach to design digital city software. Vestnik Sankt-Peterburgskogo Universiteta GPS MChS Rossii. 2017. Issue. 4. P. 94-105. // https://elibrary.ru/item.asp?id=32561545 (in Russian).
  46. Vasily Desnitsky. A modeling and analysis of security incidents in a cyber-physical system for water supply management // Journal Information technologies and telecommunications. 2017. Vol.5, ¹ 3. P. 93-102. // https://elibrary.ru/item.asp?id=30725044 (in Russian).
  47. Dmitry Levshun. Design of unified repository for multimedia data from field ethnographic expeditions // Information Technology and Telecommunications. 2017. Vol. 5. ¹ 3. P. 84–92. // https://elibrary.ru/item.asp?id=30725043 (in Russian).
  48. Igor Kotenko, Igor Saenko. SIEM-systems for monitoring and managing incidents. Transport safety and technology. 2017. ¹ 04(51) P. 96-97 (in Russian).
  49. Igor Kotenko, Igor Parashchuk. Analysis of tasks and potential directions for the development of modern methods and tools for ensuring the complex security of cyber-physical systems such as "Smart transport" // The journal "Scientific Review". 2017. No. 25. pp. 26-30. // https://www.elibrary.ru/item.asp?id=46552549 (in Russian).
  50. K.E. Izrailov. A system of criteria for evaluating methods to search for vulnerabilities and a metric of comprehensibility of program code representation // Informatization and communication. 2017. No. 3. pp. 111-118 // https://elibrary.ru/item.asp?id=29108491 (in Russian).
  51. D.V. Sakharov, M.V. Levin, E.S. Fostach, L.A. Vitkova. Research of Mechanisms for Providing Secure Access to Data Hosted in the Cloud Infrastructure. Naukoemkie Tekhnologii v Kosmicheskikh Issledovaniyakh Zemli. 2017. Vol. 9, ¹ 2. pp. 40-46 // https://elibrary.ru/item.asp?id=29108763 (in Russian).
  52. I.B. Saenko, M.A. Biryukov, V.V. Efimov, S.A. Yasinsky. Model of administration of access control schemes in cloud infrastructures // Information and Space. 2017. No. 1. pp. 121-126. // https://elibrary.ru/item.asp?id=28875030 (in Russian).
  53. A.N. Gryazev, S.A. Yasinsky, I.B. Saenko, A.V. Manaskin. Application of ontological data models in the interests of decision support for communication management // Information and Space. 2017. No. 3. pp. 77-84. // https://elibrary.ru/item.asp?id=30016811 (in Russian).
  54. A.N. Gryazev, A.V. Kiy, I.B. Saenko, S.A. Yasinsky. On user profile referencing for access distinction in automatized special purpose systems // The works of TSNIIS. St. Petersburg Branch. 2017. Vol. 1. No. 4. pp. 12-23. // https://elibrary.ru/item.asp?id=36426069 (in Russian).
  55. A.V. Kiy, I.B. Saenko, I.V. Usachev. Access control tool based on information profiles as a component of the intellectual system of information security // Information Systems and Technologies. 2017. No. 4 (102). pp. 94-103. // https://www.elibrary.ru/item.asp?id=29436846 (in Russian).
  56. Andrey Fedorchenko, Igor Kotenko, Elena Doynikova, Andrey Chechulin. The ontological approach application for the construction of the hybrid security repository. XX International Conference on Soft Computing and Measurements (SCM'2017), Proceedings. Saint-Petersburg, ETU "LETI", 2017. Vol. 2, P.55-58. https://elibrary.ru/download/elibrary_29902198_57102181.pdf // https://elibrary.ru/item.asp?id=29902198 (in Russian).
  57. Igor Kotenko, Igor Parashchuk. To the question of integrated security of the "Smart City" and the problems of counteraction to socio-cyberphysical threats // World science: problems and innovations. Proceedings of XII international science-practical conference. Penza, 2017. P. 33-36. http://comsec.spb.ru/index.php?menu=papers&action=edit&id=1198 // https://www.elibrary.ru/item.asp?id=29885427 (in Russian).
  58. Nikolai Vasilishin, Nikita Dubrovin, Igor Ushakov, Andrey Chechulin. Techniques for network traffic gathering and analysis based on big data technologies // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). 01-02 March 2017. Conference proceedings. St. Petersburg., 2017. Vol. 2. P. 127-131. https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf // https://elibrary.ru/item.asp?id=32578103 (in Russian).
  59. Mikhail Vikhrov, Andrey Fedorchenko, and Andrey Chechulin. Approaches for rules representations for security events correlation in cyber-physical systems // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). March 1-2, 2017. Proceedings. Vol. 2 pp.175-179. https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf // https://elibrary.ru/item.asp?id=32578124&pff=1 (in Russian).
  60. Vasily Desnitsky Desnitsky V.A., Kotenko I.V., Lauta O.S., Sayenko I.B. An approach to the cyber-resilience assessment on the basis of topological conversion of stochastic networks // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). 01-02 March 2017. Conference proceedings. St. Petersburg., 2017. Vol. 2. P.250-255.https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf // https://www.elibrary.ru/item.asp?id=32578164 (in Russian).
  61. Vasily Desnitsky, Nikolai Ostrouschenko.A model of the secure mobile communication network for support and operational management in emergency situations // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). 01-02 March 2017. Conference proceedings. St. Petersburg., 2017. Vol. 2. P. 255-260. https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf // https://elibrary.ru/item.asp?id=32578166&pff=1 (in Russian).
  62. Andrey Fedorchenko, Elena Doynikova, and Andrey Chechulin. Analysis of the security data and their specifications for the security information and event management systems // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). March 1-2, 2017. Proceedings, Vol. 3. Ð. 209-214 https://www.sut.ru/doci/nauka/6apino/apino2017-3.pdf // https://www.elibrary.ru/item.asp?id=32650671 (in Russian).
  63. I.B. Saenko, A.G. Kushnerevich, I.V. Kotenko, A.A. Chechulin. An approach to creation of program system of the distributed parallel processing of data bulks about security events on the computer network // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). March 1-2, 2017. Conference proceedings. Saint-Petersburg, 2017. Vol. 3 pp. 286-291 https://www.sut.ru/doci/nauka/6apino/apino2017-3.pdf // https://elibrary.ru/item.asp?id=32650689 (in Russian).
  64. Vasily Desnitsky. Evaluation of wireless device protection from energy exhaustion attacks // International congress IS&IT – International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2017. Vol. 2. pp. 343-349. (in Russian).
  65. Elena Doynikova and Igor Kotenko. Technique for the automatic assessment of secondary business assets security properties criticality in the service oriented architectures // International congress IS&IT – International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2017. Vol. 2. pp. 349-355. (in Russian).
  66. Andrey Chechulin, Andrey Kotenko. Modeling cyber-physical attacks and producing countermeasures in a mode near to real-time // International congress IS&IT – International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2017. Vol. 2. pp. 271-276. (in Russian).
  67. Vasily Desnitsky. Modeling and security analysis of a communication network for crisis managament on the base of xbee devices // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 221-223 https://www.elibrary.ru/download/elibrary_35276202_89146554.pdf // https://elibrary.ru/item.asp?id=35276202 (in Russian).
  68. Dmitry Levshun. The approach to design of secure systems based on embedded devices // Regional informatics and information security. 2017. pp. 414-416. https://elibrary.ru/download/elibrary_35276265_33102548.pdf // https://elibrary.ru/item.asp?id=35276265 (in Russian).
  69. Igor Parashchuk, Vyacheslav Zhmurov, Leonid Sayarkin. Types of means of trusted downloads facilities and their role in securing the information security of telecommunication networks // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 82-84 https://elibrary.ru/download/elibrary_35276130_82727792.pdf // https://elibrary.ru/item.asp?id=35276130 (in Russian).
  70. Igor Parashchuk, Pavel Ziyaev, Vladimir Tkachenko. Analysis of application trends and issues of security of information systems of data storage for cloud technologies // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 93-95 https://elibrary.ru/download/elibrary_35276133_73217751.pdf // https://elibrary.ru/item.asp?id=35276133 (in Russian).
  71. Alexander Branitskiy. Evasion and Insertion Network Attacks on the Example of Snort, Suricata and Bro // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 209-210 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276196 (in Russian).
  72. Alexander Branitskiy. Algorithms for Parallel Searching of Template Substrings in Realization of ADS Signature Rules // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 210-212 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276197 (in Russian).
  73. Elena Doynikova and Igor Kotenko. Models, technique and algorithms of the countermeasure selection based on the system of security metrics for the proactive and reactive response to attacks in computer networks // Regional informatics and information security. 2017. pp. 223-225. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://www.elibrary.ru/item.asp?id=35276203 (in Russian).
  74. Andrey Fedorchenko, Andrey Chechulin, and Elena Doynikova. Security event formats in logging system of OS Windows // Regional informatics and information security. 2017. pp. 257-259. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://www.elibrary.ru/item.asp?id=35276215 (in Russian).
  75. Maxim Kolomeec. Data visualization models usage in DLP-systems // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 411-412 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://www.elibrary.ru/item.asp?id=35276263 (in Russian).
  76. Maxim Kolomeec, Andrey Chechulin. Application of new visualization models to improve the effectiveness of user-made solutions // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 466-468. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276283 (in Russian).
  77. Kushnerevich A.G. Evaluation of the Efficiency of Hadoop distributed data analysis platform in comparison with Spark platform for network security Goals // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 228-230 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://www.elibrary.ru/item.asp?id=35276205 (in Russian).
  78. Ageev S.A., Sayenko I.B. Assessment of network computer security risks on basis of the fuzzy logical inference // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 28-30 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276099 (in Russian).
  79. Igor Saenko. Assessment Analysis of the Problem of Information Resources Access Control in Cloudy Infrastructures // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 159-160 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://www.elibrary.ru/item.asp?id=35276169 (in Russian).
  80. Andrey Fedorchenko and Igor Kotenko. Influence of data changes dynamics in the process of security events correlation // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 255-257 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276214 (in Russian).
  81. Igor Ushakov, Igor Kotenko. Model of Discovery an Inside Attacker Based on Big Data Technologies // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 253-254 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276212 (in Russian).
  82. Igor Ushakov, Igor Kotenko. Security Databases Fora Corporative Network: Implementing SQL and NoSQL Technologies // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 254-255 http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276213 (in Russian).
  83. Anton Pronoza, Ekaterina Ïðîíîçà, Andrey Chechulin, Igor Kotenko. Automatic detection of difference between the interests of social network users of depending on their cognitive functions // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 261-263. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276217 (in Russian).
  84. Anton Pronoza, Andrey Chechulin, Nikolay Komashinsky. Security threats in social networks and protection from information // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 259-261. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://www.elibrary.ru/item.asp?id=35276216 (in Russian).
  85. Vasily Desnitsky. Äåñíèöêèé Â.À. Analysis of energy resource exhaustion attacks on xbee-based nodes in wireless sensor networks. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017), Ð.Ñ.146-147 (in Russian).
  86. Dmitry Levshun. Reliable communication between cyberphysical elements of the situational monitoring system. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017), Ð. 174-176 (in Russian).
  87. Dmitry Levshun. Features of the use of cyberphysical systems for monitoring security in situational centers. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017), (accepted for printing). Ð. 172-174 (in Russian).
  88. Alexander Branitskiy. Detection and Prevention of Distributed Network Attacks using the Technologies of Machine Learning // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 141-143 (in Russian).
  89. Andrey Fedorchenko, Alexei Kushnerevich, Igor Saenko, and Igor Kotenko. An approach for processing big data for security monitoring the distributed situational centers // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 201-202 (in Russian).
  90. Andrey Fedorchenko, Elena Doynikova, Igor Kotenko, and Andrey Chechulin. Analysis of security events properties for correlation process for siem-systems // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 199-201 (in Russian).
  91. Igor Parashchuk, Nikolay Mikhailichenko, Leonid Sayarkin, Vladimir Tkachenko. Peculiarities of information security on data centers, in data storage systems and in workplaces of distributed situational centers, using the modules of a trusted download. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 188-190 (in Russian).
  92. Nikolay Komashinsky. Functional model of a computational cluster for a subsystem for analyzing computer attacks in data centers. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. Ñ. 166-168 (in Russian).
  93. Eugene Merkushev, Igor Kotenko. Confidentiality mechanisms of of information in cloud systems of distributed situational centers. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 183-184 (in Russian).
  94. Elena Doynikova, Igor Kotenko, and Andrey Fedorchenko. System of incident response for security information and events monitoring. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 148-150 (in Russian).
  95. Elena Doynikova, Andrey Fedorchenko, and Andrey Chechulin. Features of ontological approach application for the integration of security information. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 150-152 (in Russian).
  96. Maxim Kolomeec. Usage of visual analytics in distributed situational centers. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). Ð. 163-166 (in Russian).
  97. Nikolay Komashinsky, Igor Kotenko. The Neural Network Analysis Subsystem of Computer Attacks to Protect the Cloud Platform in Data Centers // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 168-170 (in Russian).
  98. Eugene Merkushev, Igor Kotenko. The mechanisms for ensuring the availability of cloud services for distributed situational centers // The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. Ñ. 183-184 (in Russian).
  99. Igor Parashchuk, Yan Copchak, S. Nogin, K. Mulyarchik. Evaluation of the Effectiveness of the Information Security System of Situational Centers: Trends in Modeling and Development of Methodology. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017 Ð. 185-188 (in Russian).
  100. Anton Pronoza, Andrey Chechulin. Research of individual interests of senior classes pupils in social networks in order to prevent their participation in unlawful activities. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 192-194 (in Russian).
  101. Igor Saenko, O. Loktionov. Ensuring the Security of Information Interaction of Situational Centers in Software-configurable Networks. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 194-196 (in Russian).
  102. Andrey Chechulin, Elena Doynikova, and Andrey Fedorchenko. An approach for information security repository construction and application. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. 209-211 (in Russian).
  103. Igor Ushakov, Igor Kotenko. The Database Model of the Security Systems of Distributed Situation Centers for Big Data Processing. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017). 2017. Ð. Ñ. 198-199 (in Russian).
  104. Igor Kotenko, Igor Parashchuk, Igor Saenko. Information security of cyberphysical systems: the basic directions of research // Perspective directions of development of native information technologies: materials of the III Interregional scientific-practical conference "Perspective directions of development of native information technologies". Sevastopol, September 19-23, 2017 P. 63-65. // https://elibrary.ru/item.asp?id=34962124 (in Russian).
  105. Vasily Desnitsky. Analysis of attacking influences on energy resource exhaustion in Internet of Things systems. XIX scientific-practical conference «RusCrypto’2017». Moscow Region, Solnechnogorsk, March 22-24, 2017. http://www.ruscrypto.ru/. (in Russian).
  106. Andrey Chechulin. Graphical models for visualization of securitu metrics in a computer network. XIX scientific-practical conference «RusCrypto’2017». Moscow Region, Solnechnogorsk, March 22-24, 2017. http://www.ruscrypto.ru/. (in Russian).
  107. Kushnerevich A.G. Development and evaluation of a software platform for parallel distributed processing of security event data. XIX scientific-practical conference «RusCrypto’2017». Moscow Region, Solnechnogorsk, March 22-24, 2017. http://www.ruscrypto.ru/. (in Russian).
  108. Alexey Meleshko, Evgeny Chumak, Sergey Savkov. Assessment of risks: comparative analysis of approaches and methodologies // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU. P. 420-421. http://www.spoisu.ru/files/riib/riib_4_2017.pdf // https://elibrary.ru/item.asp?id=35276268 (in Russian).
  109. Rychkova Anastasia, Gayfulina Diana, Khakimova Elvira. Application of applied programs for educational purposes for the formation of professional competence of future bachelors of information security // University complex as a regional center of education, science and culture: materials of all-Russian scientific-methodical conference. Orenburg, 1-3 February 2017. P. 3207-3211. https://elibrary.ru/download/elibrary_28977479_22433450.pdf // https://elibrary.ru/item.asp?id=28977479 (in Russian).
  110. I. M. Levkin, D. V. Sakharov, L. A. Vitkova, K. A. Naumenko Recognition of information and psychological impact on the Internet, as a specific task of situational centers // All-Russian Forum "System of distributed situational centers as a basis for digital transformation of public administration" (SDSC-2017), St. Petersburg, 25-27 October 2017, pp. 103-105 (in Russian).
  111. K.E. Izrailov, V.V. Pokusov. Actual issues of interaction of elements of complex information security systems // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. Edited by S.V. Bachevsky. 2017. pp. 255-260. // https://elibrary.ru/item.asp?id=32650680 (in Russian).
  112. A.A. Biryukov, K.E. Izrailov. The comparative analysis of models of threats of information security for the benefit of applicability for multi-stage schemes of the attacks // In the collection: Actual problems of infotelecommunications in science and education (APINO 2017). Collection of scientific articles of the VI International Scientific-technical and scientific-methodical Conference. In 4 volumes. Edited by S.V. Bachevsky. 2017. pp. 108-112. // https://elibrary.ru/item.asp?id=32578093 (in Russian).
  113. V.V. Baranov, M.A. Biryukov, S.A. Kravchenko, A.S. Maksimov, I.B. Saenko. Simulation model for the analysis of information security risks in the design of role-based schemes for the differentiation of access to databases // In the collection: Actual problems of information security. proceedings of the Interuniversity Scientific and Practical Conference. 2017. pp. 26-31. // https://elibrary.ru/item.asp?id=29725543 (in Russian).
  114. M.A. Biryukov, A.A. Brunilin, I.B. Saenko. The method of formation of uniform semantic model for data domains of the heterogeneous tasks' complex // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. Edited by S.V. Bachevsky. 2017. pp. 83-88. // https://elibrary.ru/item.asp?id=32650640 (in Russian).
  115. M.A. Biryukov, A.A. Brunilin, I.B. Saenko. A simulation approach to modeling the access control system for common information space // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. Edited by S.V. Bachevsky. 2017. pp. 78-83. // https://elibrary.ru/item.asp?id=32650639 (in Russian).
  116. A.M. Starkov, I.B. Saenko. On the problem of managing virtual local area networks in corporate information systems // In the collection: Regional Informatics and information security. 2017. pp. 166-167. // https://elibrary.ru/item.asp?id=35276173 (in Russian).
  117. M.A. Biryukov, O.P. Zibrov, I.B. Saenko. A way to implement a mandatory access control model based on a role model // In the collection: Regional Informatics and information security. 2017. pp. 48-50. // https://elibrary.ru/item.asp?id=35276111 (in Russian).
  118. I.B. Saenko, A.V. Kiy, S.A. Yasinsky, K.V. Lyzhinkin. Access control to the resources of departmental information systems based on user information profiles // Information and Cosmos. 2017. No. 4. pp. 119-125. // https://elibrary.ru/item.asp?id=32261228 (in Russian).
  119. I.A. Teplov, A.V. Makhnach, I.B. Saenko. An approach to building a simulation model of the functioning of the information security system of a robotic complex // In the collection: Regional informatics and information security. 2017. pp. 171-172. // https://www.elibrary.ru/item.asp?id=35276176 (in Russian).

2016

  1. Dmitry Novozhilov, Igor Kotenko and Andrey Chechulin. Improving the Categorization of Web Sites by Analysis of Html-Tags Statistics to Block Inappropriate Content // Studies in Computational Intelligence. 2016. Ò. 616. Ñ. 257-263. DOI: 10.1007/978-3-319-25017-5_24 // https://elibrary.ru/item.asp?id=24934708
  2. Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, and Igor Kotenko. Technique of Data Visualization: Example of Network Topology Display for Security Monitoring // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2016. Ò. 7. ¹ 1. Ñ. 58-78. http://isyou.info/jowua/papers/jowua-v7n1-4.pdf DOI: 10.22667/JOWUA.2016.03.31.058 // https://elibrary.ru/item.asp?id=27150813
  3. Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin and Igor Kotenko. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System// Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), June, 2016 Vol.7, No.2, P.60-80. http://isyou.info/jowua/papers/jowua-v7n2-4.pdf DOI: 10.22667/JOWUA.2016.06.31.060 // https://elibrary.ru/item.asp?id=27036091
  4. Igor Kotenko, Dmitry Levshun, Andrey Chechulin. Event correlation in the integrated cyber-physical security system // The 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM-2016), IEEE, St. Petersburg, Russia, May 2016 P.484-486. DOI: 10.1109/SCM.2016.7519820 // https://elibrary.ru/item.asp?id=27589708
  5. Maxim Kolomeets, Andrey Chechulin, Igor Kotenko. Visualization Model for Monitoring of Computer Networks Security Based on the Analogue of Voronoi Diagrams // Lecture Notes in Computer Science. 2016. Ò. 9817. Ñ. 141-157. DOI: 10.1007/978-3-319-45507-5_10 // https://elibrary.ru/item.asp?id=27569647
  6. Vasily Desnitsky and Igor Kotenko. Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge // Journal of Ambient Intelligence and Humanized Computing (AHIC), Springer. October 2016, Volume 7, Issue 5, P.705–719. DOI 10.1007/s12652-016-0371-6. http://link.springer.com/article/10.1007/s12652-016-0371-6 // https://www.elibrary.ru/item.asp?id=27575769 (WoS and Scopus)
  7. Igor Saenko, Fadey Skorik, Igor Kotenko. Application of Hybrid Neural Networks for Monitoring and Forecasting Computer Networks States // Lecture Notes in Computer Science. 2016. Ò. 9719. Ñ. 521-530. DOI: 10.1007/978-3-319-40663-3_60 // https://elibrary.ru/item.asp?id=27076462 (WoS and Scopus)
  8. Igor Kotenko. Guest Editorial: advances in secure Distributed and Network-Based Computing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 7, No. 2, June 2016. P.1-2. // https://elibrary.ru/item.asp?id=27036194 (Scopus)
  9. Elena Doynikova, Igor Kotenko. Countermeasure selection based on the attack and service dependency graphs for security incident management // Lecture Notes in Computer Science. 2016. Ò. 9572. Ñ. 107-124. DOI: 10.1007/978-3-319-31811-0_7 // https://elibrary.ru/item.asp?id=27047170
  10. Elena Doynikova, Igor Kotenko. Techniques and Software Tool for Risk Assessment on the Base of Attack Graphs in Information and Security Event Management Systems // Saint-Petersburg Institute for Informatics and Automation of the RAS. 2016. ¹5. P. 56-67. DOI:10.15217/issn1684-8853.2016.5.54
  11. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System // 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016). Heraklion, Crete,2016 February 17-19. IEEE Computer Society P.609-616. DOI: 10.1109/PDP.2016.99 // https://elibrary.ru/item.asp?id=27160200
  12. Igor Kotenko, Elena Doynikova. Dynamical calculation of security metrics for countermeasure selection in computer networks // Proceedings - 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2016. 24. 2016. Ñ. 558-565. DOI: 10.1109/PDP.2016.96 // https://elibrary.ru/item.asp?id=27160210
  13. Igor Kotenko, Igor Saenko. An Approach to Aggregation of Security Events in Internet-of-Things Networks Based on Genetic Optimization // Â ñáîðíèêå: Proceedings - 13th IEEE International Conference on Ubiquitous Intelligence and Computing, 13th IEEE International Conference on Advanced and Trusted Computing, 16th IEEE International Conference on Scalable Computing and Communications, IEEE International Conference on Cloud and Big Data Computing, IEEE International Conference on Internet of People and IEEE Smart World Congress and Workshops, UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld 2016. 13. 2016. Ñ. 657-664. DOI: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0109 // https://elibrary.ru/item.asp?id=29483970
  14. Vasily Desnitsky, Igor Kotenko. Event analysis for security incident management on a perimeter access control system // XIX International Conference on Soft Computing and Measurements (SCM'2016), Saint Petersburg, 25–27 may 2016 P.481-483. DOI: 10.1109/SCM.2016.7519819 // https://elibrary.ru/item.asp?id=27586770
  15. Igor Saenko and Igor Kotenko. Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes //Â ñáîðíèêå: ACM International Conference Proceeding Series. 1. Ñåð. "PrAISe 2016 - 1st International Workshop on Artificial Intelligence for Privacy and Security, Held at EUMAS 2016" 2016. Ñ. 2970033. DOI: 10.1145/2970030.2970033 // https://elibrary.ru/item.asp?id=27570214
  16. Elena Doynikova, Igor Kotenko. Security assessment based on attack graphs and open standards for computer networks with mobile components // The 2016 International Symposium on Mobile Internet Security (MobiSec’16). Taichung, Taiwan. July 14-15, 2016. 11 p. http://docs.wixstatic.com/ugd/a6c9b6_602321846ab246958450c7513f9c5692.pdf
  17. Igor Saenko, Oleg Lauta, Igor Kotenko. Analytical modeling of mobile banking attacks based on a stochastic network conversion technique // The 2016 International Symposium on Mobile Internet Security (MobiSec’16). Taichung, Taiwan. July 14-15, 2016. 10 p. https://www.researchgate.net/publication/312021348_Analytical_modeling_of_mobile_banking_attacks_based_on_a_stochastic_network_conversion_technique
  18. Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Juha Karhunen. Android Malware Detection: Building Useful Representations // The IEEE 15th International Conference on "Machine Learning and Applications". Proceedings. Anaheim, California, USA, December 18-20, 2016. P.201-206. https://research.cs.aalto.fi/aml/Publications/android_sayfullina_building_useful_representations.pdf
  19. Buinevich M., Izrailov K., Vladyko A. The life cycle of vulnerabilities in the representations of software for telecommunication devices // Â ñáîðíèêå: 2016 18th International Conference on Advanced Communication Technology (ICACT). 2016. Ñ. 430-435.
  20. M. Buinevich, K. Izrailov, A. Vladyko. Method and prototype of utility for partial recovering source code for low-level and medium-level vulnerability search // Â ñáîðíèêå: 2016 18th International Conference on Advanced Communication Technology (ICACT). 2016. Ñ. 700-707. DOI: 10.1109/ICACT.2016.7423603 // https://elibrary.ru/item.asp?id=25873415
  21. Anton Pronoza, Andrey Chechulin, Igor Kotenko. Mathematical Models of Visualization in SIEM Systems // SPIIRAS Proceedings. 2016. Issue 3(46). P.90-107. DOI: 10.15622/sp.46.8 https://elibrary.ru/download/elibrary_26498850_30177438.pdf // https://elibrary.ru/item.asp?id=26498850 (in Russian).
  22. Andrey Chechulin. The main types of the network changes that should be taken into account during the construction of an analytical attack models // Journal "Methods and technical means of ensuring information security" No. 25. pp.113-114. // https://elibrary.ru/item.asp?id=36546805 (in Russian).
  23. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 1. SPIIRAS Proceedings. 2016. Issue 4(47). P.5-27. DOI: 10.15622/sp.47.1 http://ia.spcras.ru/index.php/sp/article/view/3366/1950 // https://elibrary.ru/item.asp?id=26498862 (in Russian).
  24. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Technique of visualization of computer network topology for monitoring of information security // PJournal of Instrument Engineering. Vol.59, ¹ 10, 2016. P.807-812. DOI 10.17586/0021-3454-2016-59-10-807-812 // https://elibrary.ru/item.asp?id=27170903 (in Russian).
  25. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System // SPIIRAS Proceedings. 2016. Issue 48. P.5-31. DOI: 10.15622/sp.48.1 // https://elibrary.ru/item.asp?id=27177922 (in Russian).
  26. Dmitry Levshun, Andrey Chechulin. Mathematical model for description of information objects of different types to organize the search of materials in a unified repository of multimedia data from field ethnographic expeditions // Innovations in science. 2016. No. 11 (60). pp. 21-29. // https://elibrary.ru/item.asp?id=27448577 (in Russian).
  27. Mikhail Mikhailov, Maxim Kolomeec, Mikhail Bulgakov, Andrey Chechulin. Investigation and determination of general advantages and disadvantages of existing data warehouses types and analysis of applications // Technical sciences - from theory to practice. 2016. No. 11 (59). pp. 22-27. // https://elibrary.ru/item.asp?id=27450833 (in Russian).
  28. Andrey Fedorchenko, Dmitry Levshun, Andrey Chechulin, Igor Kotenko. An Analysis of Security Event Correlation Techniques in Siem-Systems. Part 2 // SPIIRAS Proceedings. 2016. Issue 6(49). P.5-27. DOI: 10.15622/sp.49.11 // https://elibrary.ru/item.asp?id=27657130 (in Russian).
  29. Dmitry Novozhilov, Andrey Chechulin, Igor Kotenko. Improving website categorization based on HTML tag statistics for blocking unwanted content // Management-information systems, 2016. No 6(85), P.65-73. DOI: 10.15217/issn1684-8853.2016.6.65 // https://elibrary.ru/item.asp?id=27536576 (in Russian).
  30. Igor Saenko, Fadey Skorik and Igor Kotenko. Monitoring and forecasting computer network state based on the use of hybrid neural networks // Journal of Instrument Engineering. Vol.59, ¹ 10, 2016. P.795-800. DOI: 10.17586/0021-3454-2016-59-10-795-800 // https://elibrary.ru/item.asp?id=27170901 (in Russian).
  31. Igor Saenko, Oleg Lauta and Igor Kotenko. Application of stochastic networks conversion technique for simulation of mobile banking attacks // Journal of Instrument Engineering. 2016. Vol.59, ¹ 11, P.928-933. (RISC, Scopus) DOI: 10.17586/0021-3454-2016-59-11-928-933 // https://elibrary.ru/item.asp?id=27371874 (in Russian).
  32. Alexander Branitskiy, Igor Kotenko. Analysis and Classification of Methods for Network Attack Detection // SPIIRAS Proceedings. 2016. Issue 2(45). P.207-244. DOI: 10.15622/SP.45.13 // https://elibrary.ru/item.asp?id=25920723 (in Russian).
  33. Evgenia Novikova, Igor Kotenko. Detection of anomalous activity in mobile money transfer services using RADViz-visualization // SPIIRAS Proceedings. 2016. Issue 48. P.32-51. DOI: 10.15622/sp.48.2 // https://elibrary.ru/item.asp?id=27177923 (in Russian).
  34. Evgenia Novikova, Igor Kotenko, Eugene Fedotov. Visual data analysis for anomalies detection in mobile money transfer services // Information Security. Inside, 2016, ¹4(70), P.40-47 https://elibrary.ru/item.asp?id=27035153 (in Russian).
  35. Elena Doynikova, Igor Kotenko. Techniques and software tool for risk assessment on the base of attack graphs in information and security event management systems // Information and Control Systems, 2016, ¹ 5(84), P.54-65. ISSN 1684-8853.2016. DOI: 10.15217/issn1684-8853.2016.5.54 // https://elibrary.ru/item.asp?id=27219304 (in Russian).
  36. Andrey Kiy, Igor Saenko, and Sergey Bushuyev. Approach to access control of information resources based on the user application analysis //Technical sciences – from theory to practice. 2016, ¹ 56, Novosibirsk, SibAK, P.24-29. eLIBRARY ID: 25751309 https://sibac.info/conf/tech/lvi/49173 https://www.elibrary.ru/download/elibrary_25751309_22020089.pdf // https://www.elibrary.ru/item.asp?id=25751309 (in Russian).
  37. Valery Kuvaev, Igor Saenko, and Sergey Bushuyev. Model of the assessment of operational accessibility to resources of the common information space // Technical sciences – from theory to practice. 2016, Novosibirsk, SibAK, ¹ 58-1 P.88-93. https://cyberleninka.ru/article/n/model-otsenki-operativnoy-dostupnosti-k-resursam-edinogo-informatsionnogo-prostranstva // https://www.elibrary.ru/item.asp?id=26154131 (in Russian).
  38. Vasily Desnitsky, Dmitry Chaly. Client/server-based approach to software protection of internet of things // Technical sciences-from theory to practice // Technical sciences - from theory to practice. 2016. No. 11 (59). pp. 6-13. // https://elibrary.ru/item.asp?id=27450831 (in Russian).
  39. Igor Saenko, Aleksey Kushnerevich, Igor Kotenko and Yan Kopchak. Program framework of the distributed parallel stream data processing for security monitoring in Internet-of-things networks // Mathematical methods in engineering and technology - MMTT. 2016. No. 4 (86). pp. 90-93. // https://www.elibrary.ru/item.asp?id=28385037 (in Russian).
  40. Aleksey Brunilin, Mikhail Biryukov and Igor Saenko. Model and method of use of ontologies for access control management in the common information space // Model and method of using ontologies to control access differentiation in a single information space // Mathematical methods in engineering and technology - MMTT. 2016. No. 6 (88). pp. 122-124. // https://elibrary.ru/item.asp?id=28417626 (in Russian).
  41. Elena Doynikova, Andrey Fedorchenko. Techniques of the automated response on the security incidents during information and security events management in the systems of interacting services // Mathematical methods in engineering and technology - MMTT. 2016. No. 10 (92). pp. 180-183. // https://www.elibrary.ru/item.asp?id=28769331 (in Russian).
  42. Igor Saenko, Igor Kotenko and Sergey Kruglov. Approach to the solution of “a role mining problem” when forming the RBAC model on the basis of genetic algorithms // Methods and technical means of ensuring information security. 2016. ¹ 25. P.113. // https://www.elibrary.ru/item.asp?id=36546804 (in Russian).
  43. Igor Saenko, Aleksey Kushnerevich, Igor Kotenko and Yan Kopchak. Approach to implementation of parallel stream data handling for security monitoring of the Internet of Things network // Methods and technical means of ensuring information security. 2016. No. 25. pp. 38-40. // https://elibrary.ru/item.asp?id=36546751 (in Russian).
  44. Alexander Branitskiy. Artificial immune systems as a concept for detection and classification of attacks under conditions of dynamically changing traffic // Methods and technical means of ensuring information security. 2016. No. 25. pp. 12-13. // https://elibrary.ru/item.asp?id=36546734 (in Russian).
  45. Vasily Desnitsky. An approach to information flow verification of Internet of things systems // Journal "Methods and technical means of ensuring information security" // 25th scientific and Technical conference "Methods and technical means of ensuring information security". July 4-July 7, 2016 St. Petersburg. Materials. Polytechnic University Press ¹ 25 P.34-35. https://www.elibrary.ru/item.asp?id=36546748 (in Russian).
  46. Elena Doynikova. Models, techniques and algorithms for calculation of the information systems security metrics in scope of the hierarchical system of the security metrics // Methods and technical means of ensuring information security. 2016. No. 25. pp. 45-47. // https://www.elibrary.ru/item.asp?id=36546756 (in Russian).
  47. Oleg Lauta, Mikhail Kotsynyak and Igor Saenko. Development of models of the computer attacks on the basis of a method of topological conversion of stochastic networks // Methods and technical means of ensuring information security. 2016. No. 25. pp. 104-105.// https://www.elibrary.ru/item.asp?id=36546798 (in Russian).
  48. Evgenia Novikova. Generation of the patterns of objects movement in the dynamic environment // Methods and technical means of ensuring information security. 2016. No. 25. pp. 106-108. // https://elibrary.ru/item.asp?id=36546800 (in Russian).
  49. Andrey Fedorchenko. Security events correlation for target attacks detecting // Journal "Methods and technical means of ensuring information security" // Methods and technical means of ensuring information security. 2016. No. 25. pp. 32-33. // https://elibrary.ru/item.asp?id=36546747 (in Russian).
  50. K. E. Izrailov, V.V. Pokusov. Utility for vulnerability search in a software of telecommunication devices by method algoritmization of machine code. Part 3. Modular-algorithmic architecture // Information technology and telecommunications. 2016. Vol. 4. No. 4. pp. 104-121. // https://elibrary.ru/item.asp?id=29041144 (in Russian).
  51. M.V Buinevich M.V., K.E. Izrailov, D.I. Mostovich, A.Yu. Yaroshenko. Problematic issues of neutralization of vulnerabilities in a software code of telecommunication devices // Problems of risk management in the technosphere. 2016. No. 3 (39). pp. 81-89.// https://elibrary.ru/item.asp?id=27162851 (in Russian).
  52. M.V. Buinevich, K.E. Izrailov. Utility for vulnerability search in a software of telecommunication devices by method algoritmization of machine code. Part 1. Functional architecture // Information technologies and telecommunications. 2016. Vol. 4. No. 1. pp. 115-130. // https://elibrary.ru/item.asp?id=26191560 (in Russian).
  53. K.E. Izrailov. Utility for vulnerability search in software of telecommunication devices by method algorithmization of machine code. Part 2. Information architecture // Information technologies and telecommunications. 2016. Vol. 4. No. 2. pp. 86-104. // https://elibrary.ru/item.asp?id=27468771 (in Russian).
  54. M.V. Buinevich, K.E. Izrailov. Categorical synthesis and technological analysis of security import substitution variants of telecommunication devices software // Information technologies and telecommunications. 2016. Vol. 4. No. 3. pp. 95-106.// https://elibrary.ru/item.asp?id=28384815 (in Russian).
  55. Andrey Chechulin, Maxim Kolomeec, Igor Kotenko, Sergey Busuev. Architecture of software prototype of heterogeneous data visualization system // Mathematical methods in engineering and technology - MMTT. 2016. No. 8 (90). pp. 142-144 // https://www.elibrary.ru/item.asp?id=28417712 (in Russian).
  56. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Architecture of integrated security system // Journal "Methods and technical means of information security" No. 25. pp.53-54. // https://elibrary.ru/item.asp?id=36546762 (in Russian).
  57. I.B. Saenko, A.V. Kiy, S.N. Bushuev. Methods of access control to information resources based on the analysis of application activity // In the collection: SCIENCE TODAY: FACTS, TRENDS, FORECASTS. materials of the international scientific and practical conference: in 2 parts. Scientific center "Disput". 2016. pp. 69-71. // https://elibrary.ru/item.asp?id=26334436 (in Russian).
  58. K.N. Zhernova, T.N. Starkova. Prospects of video call development // Current directions of scientific research: from theory to practice. 2016. No. 2-2 (8). pp. 28-32. // https://elibrary.ru/item.asp?id=26018058 (in Russian).
  59. A.V. Magaskin, A.A. Brunilin, I.B. Saenko. Ontological approach to creation of decision-making support systems // Technical Sciences - from theory to practice. 2016. No. 11 (59). pp. 28-32. // https://elibrary.ru/item.asp?id=27450834 (in Russian).
  60. I.B. Paraschuk, A.S. Bashkirtsev, S.B. Nogin. Dynamic optimization of control parameters in the interests of managing communication between various information-analytical and computing systems // Natural and technical Sciences. No.4 (94), 2016. p.193-196 // https://elibrary.ru/item.asp?id=25968080 (in Russian).
  61. Evgenia Novikova, Igor Kotenko, Eugene Fedotov. Visual data analysis for anomalies detection in mobile money transfer services // Information Security. Inside, 2016, ¹5(71), P.72-82. // https://elibrary.ru/item.asp?id=27035199 (in Russian).
  62. Andrey Chechulin, Maxim Kolomeec. Application of new visualization techniques for security metrics of computer networks. 18th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. https://docplayer.ru/61888797-Primenenie-novyh-metodov-vizualizacii-dlya-otobrazheniya-metrik-bezopasnosti-kompyuternoy-seti.html (in Russian).
  63. Igor Kotenko, Dmitry Levshun, Andrey Chechulin, Sergey Bushuev. Event correlation in the integrated cyber-physical security system. XIX International Conference on Soft Computing and Measurements (SCM'2016),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI". P.327-331. // https://elibrary.ru/item.asp?id=27187695 (in Russian).
  64. Maxim Kolomeec, Andrey Chechulin. Development of new graphical models for networks visualization. 6th international forum on practical security Positive Hack Days. Moscow, Russia. May 17-18, 2016. http://www.phdays.ru/ (in Russian).
  65. Andrey Chechulin, Dmitry Novozhilov. Development of a test bed for the efficiency evaluation of intellectual methods for websites classification // International congress "IS&IT16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol. 2. P.32-37. (in Russian).
  66. Evgenia Deshevih, Igor Ushakov, Andrey Chechulin. Integration of SIEM systems with security event correlation systems based on Big Data technology // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. 2016, October 4–6, P.684-687. // https://elibrary.ru/item.asp?id=27559698 (in Russian).
  67. Dmitry Novozhilov, Andrey Chechulin. Development of the platform for experiments with the websites classification methods // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.740-749. // https://elibrary.ru/item.asp?id=27559706 (in Russian).
  68. Anton Pronoza, Andrey Chechulin, Ian Kopchak. Approach for network security visualization evaluation based on ratio of informativity and ease of perception // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.750-757. // https://elibrary.ru/item.asp?id=27559707 (in Russian).
  69. Andrey Chechulin. Tehniques for attack models building and modification for network security analysis // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.782-785.// https://elibrary.ru/item.asp?id=27559713&pff=1 (in Russian).
  70. Maxim Kolomeec, Igor Kotenko, Andrey Chechulin. Visualization model for cybersecurity monitoring system based on analogue of Voronoi diagrams // 15th National Conference on Artificial Intelligence with International Participation (CAI 2016). October, 3-7, 2016. Smolensk, Russia. Proceedings of the conference. P.180-187. // https://elibrary.ru/item.asp?id=27307887 (in Russian).
  71. Dmitry Levshun, Andrey Chechulin, Igor Kotenko. Secure inter-controller interaction based on I2C protocol // XV Ànniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.169-170. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=29348476 (in Russian).
  72. Dmitry Novozhilov, Andrey Chechulin. Metrics for the analysis of the structural features of the web pages by machine learning methods // XV Ànniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.184-185. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf (in Russian).
  73. Mikhail Mikhailov, Andrey Chechulin. Clusterization-correlation scanner the data warehouse // XV Ànniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.181. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091366 (in Russian).
  74. Mikhail Bulgakov, Andrey Chechulin. Development of hardware and software for the simulation of the security incidents in railway systems. XV Ànniversary Saint-Petersburg International Conference "Regional informatics-2016(RI-2016)". Proceedings. St. Petersburg, 2016. P.151. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091362&pff=1 (in Russian).
  75. Maxim Kolomeec, Andrey Chechulin, Yan Kopchak. Development of a graphical interface for visualization of computer network security systems. XV Ànniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)" Proceedings. St. Petersburg, 2016. P.166-167. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=29349010 (in Russian).
  76. Dmitry Levshun, Andrey Chechulin. Comparison of approaches for the construction of a database for the organization of research materials in a unified repository for multimedia data from field ethnographic expeditions // Regional informatics "RI-2016". Conference materials. 2016. pp. 330-331. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=29348408 (in Russian).
  77. Nikita Dubrovin, Igor Ushakov, Andrey Chechulin. Big data technologies for security information and event management systems // 5th International Conference on Advanced Infotelecommunication ("ICAIT-2016"). March, 10-11, 2016. Collection of scientific papers. Saint-Petersburg, 2016. Vol.1, P.348-353. // https://elibrary.ru/item.asp?id=27296327 (in Russian).
  78. Vasily Desnitsky, Andrey Chechulin. Information flow verification technique for Internet of things systems // XV Ànniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.156-157. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=32608615&pff=1 (in Russian).
  79. Vasily Desnitsky, Igor Kotenko, Yan Kopchak. Analysis of events for management of security incidents on the example of access control system // International Conference on Soft Computing and Measurements. 2016. Vol. 2. pp. 332-336. https://www.elibrary.ru/download/elibrary_27187696_81386086.pdf // https://elibrary.ru/item.asp?id=27187696 (in Russian).
  80. Alexander Branitskiy, Igor Kotenko. Techniques of combining the binary classifiers for identifying the anomalous network connections // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.660-664. // https://elibrary.ru/item.asp?id=27559692 (in Russian).
  81. Elena Doynikova, Igor Kotenko. Technique for the security assessment of computer networks on the base of attack graphs and service dependency graphs // Information technologies in management (ITU-2016). Materials of the 9th Conference on Management Problems. P. 688-699 // https://www.elibrary.ru/item.asp?id=27559699 (in Russian).
  82. Elena Doynikova, Igor Kotenko. Technique for countermeasure selection to response on security incidents in computer networks on the base of security metrics // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.700-705. // https://elibrary.ru/item.asp?id=27559700 (in Russian).
  83. Nikolay Vasilishin, Igor Ushakov, Igor Kotenko. Research of the network traffic analysis algorithms using big data to detect computer attacks // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.670-675.// https://elibrary.ru/item.asp?id=27559695&pff=1 (in Russian).
  84. Alexander Branitskiy. Architecture of the distributed system of detection, classification and prevention of network attacks based on signature analysis and computational intelligence methods // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.651-655. // https://elibrary.ru/item.asp?id=27559689 (in Russian).
  85. Alexander Branitskiy. Modified model of computational immune system based on evolutionary-genetic approach for detection and classification of anomalous network connections // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.656-659. // https://elibrary.ru/item.asp?id=27559690 (in Russian).
  86. Mikhail Bulgakov, Dmitry Levshun. The main challenges of the protection of physical security systems communication lines// 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.665-669. // https://elibrary.ru/item.asp?id=27559693 (in Russian).
  87. Vasily Desnitsky. Detection of anomalous data from sensors embedded devices based on expert knowledge // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.676-679. // https://elibrary.ru/item.asp?id=27559696&pff=1 (in Russian).
  88. Vasily Desnitsky. Implementation of software means for model checking based verification of network data flows // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.680-683. // https://elibrary.ru/item.asp?id=27559697&pff=1 (in Russian).
  89. Maxim Kolomeec. Usage of human's cognitive features for security data visualization // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.723-728 // https://www.elibrary.ru/item.asp?id=27559703 (in Russian).
  90. Aleksey Kushnerevich. Aggregation of big data arrays for detection of security events on the basis of distributed stream processing // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.729-734. // https://www.elibrary.ru/item.asp?id=27559704 (in Russian).
  91. Dmitry Levshun. The integration technique of access control system into integrated security system // Information technologies in management (ITU-2016). Materials of the 9th Conference on Management Problems. Chairman of the Presidium of the multi-conference V. G. Peshekhonov. 2016. pp. 735-739. // https://elibrary.ru/item.asp?id=27559705 (in Russian).
  92. Igor Saenko, Mikhail Biryukov. Method of integration of local access control schemes for heterogeneous resources of a common information space // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016 . P.758-762. // https://elibrary.ru/item.asp?id=27559708 (in Russian).
  93. Igor Saenko, Aleksey Kushnerevich, and Sergey Bushuyev. Application of the distributed parallel computing framework for preliminary processing of big data on security events in the Internet of things // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016.P.763-767. // https://elibrary.ru/item.asp?id=27559709 (in Russian).
  94. Igor Saenko, Oleg Lauta. Assessment of cyber-stability of computer networks on the basis of results of stochastic simulation of the computer attacks // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P. 768-773. // https://elibrary.ru/item.asp?id=27559710 (in Russian).
  95. Andrey Fedorchenko. Analysis of security events correlation features in SIEM-systems // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.774-777. // https://elibrary.ru/item.asp?id=27559711&pff=1 (in Russian).
  96. Andrey Fedorchenko. Features of security events correlation technique for target attacks detection// 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.778-781. // https://elibrary.ru/item.asp?id=27559712&pff=1 (in Russian).
  97. Igor Saenko, Aleksey Brunilin, Vyacheslav Efimov and Sergey Yasinskiy. Organization of information exchange of heterogeneous automated systems: ontological approach. Information and Space. ¹ 2, 2016, P.60-64. // https://elibrary.ru/item.asp?id=26134146 (in Russian).
  98. Vladislav Alexandrov, Vasily Desnitsky, Dmitry Chaly. Development and security analysis of a fragment of Internet of Things system. Modeling and Analysis of Information Systems. Volume 23, issue 26. 2016. P.767-776. (in Russian).
  99. Igor Saenko and Igor Kotenko. Genetic algorithms for Boolean matrix factorization in relation to access control problems in computer networks // 15th National Conference on Artificial Intelligence with International Participation (CAI 2016). October, 3-7, 2016. Smolensk, Russia. Proceedings of the conference. Vol.3, P.98-106. // https://elibrary.ru/item.asp?id=27307851 (in Russian).
  100. Andrey Fedorchenko, Igor Kotenko. Techniques of security events correlation for target attacks detecting // 18th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ (in Russian).
  101. Vasily Desnitsky, Dmitry Levshun. The choice and combination of elements for the construction of an integrated system of cyber-physical security // 18th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ (in Russian).
  102. Sergey Ageev and Igor Saenko. Models of information security risk management in multiservice communication systems on the basis of fuzzy situation-dependent networks // 18th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru (in Russian).
  103. Igor Saenko and Valery Kuvayev. Models and technique of the assessment and support of operational accessibility of resources in the common information space // Mathematical methods in engineering and technology - MMTT. 2016. No. 6 (88). pp. 139-141. // https://elibrary.ru/item.asp?id=28417632 (in Russian).
  104. Igor Saenko, Igor Kotenko and Sergey Kruglov. Genetic approach to reconfiguring of diagrams of role access in the common information space // International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol.1. P.13-18. (in Russian).
  105. Elena Doynikova, Igor Kotenko. Technique and software tool for the countermeasure selection in computer networks on the base of the dynamical recalculation of security metrics // International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2015. Vol. 2. P.271-276. (in Russian).
  106. Vasily Desnitsky. Detection of anomalous data from sensors in the information and telecommunication systems with embedded devices// International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol.1. P.217-223. (in Russian).
  107. Nickolay Komashinsky, Igor Kotenko. Analysis of the approaches for the detection of the targeted attacks. XV Ànniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.167-168. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://www.elibrary.ru/item.asp?id=35091064 (in Russian).
  108. Igor Kotenko, Igor Ushakov. Using big data technologies to monitor information security incidents // XV Ànniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. Ð.168-169. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091250&pff=1 (in Russian).
  109. Eugene Merkushev, Igor Kotenko. Analysis of properties of cloud computing security ecosystem // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.179-180. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=46489050&pff=1 (in Russian).
  110. Anton Pronoza, Igor Kotenko. Actual problems of big data visualization in security information and event management systems // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.189-190. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091174&pff=1 (in Russian).
  111. Anton Pronoza, Igor Kotenko. Analysis of big data visualization models to solve the problem of monitoring large-scale computing networks //Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016 . P.188-189. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091260&pff=1 (in Russian).
  112. Igor Saenko and Igor Kotenko. Models and methods of visual analysis of schemes and policies of access control to the resources of the common information space // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016 . P.192-193. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://www.elibrary.ru/item.asp?id=35091275 (in Russian).
  113. Alexander Branitskiy. Combined approach to network attack detection based on signature analysis and computational intelligence methods // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.150. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091300 (in Russian).
  114. Alexander Branitskiy, Maxim Colomeec. Development of visualization system of computer networks based on Voronoi diagram // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P. 151. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=29349072 (in Russian).
  115. Vasily Desnitsky, Vladislav Alexandrov. Model intruder information and telecommunication systems of the Internet of Things // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.155-156. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091301&pff=1 (in Russian).
  116. Elena Doynikova. Graph-based and open standards-based security assessment for mobile networks // Regional informatics "RI-2016". Conference materials. 2016. pp. 158-159. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://www.elibrary.ru/item.asp?id=35091302 (in Russian).
  117. Igor Saenko, Aleksey Kushnerevich and Sergey Bushuyev. Parallel distributed traffic analysis platform in computer networks for security incident detection // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.193-194. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://www.elibrary.ru/item.asp?id=35089230 (in Russian).
  118. Andrey Fedorchenko. Host-oriented methods of correlation of security events // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.199-200. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35089369&pff=1 (in Russian).
  119. Vladimir Komashinskiy, Dmitry Komashinskiy, Oleg Mihalev, Vyacheslav Yudaev. Cognitive Cyber-Physical Systems of Transport Safety // International Practical Conference "Russian Transport: Problems and Perspectives - 2016". 29-30 November, 2016. Proceedings, vol. 2. SPb., 2016. P.148-153.// https://www.elibrary.ru/item.asp?id=28361915&pff=1 (in Russian).
  120. Gorodetsky V.I., Tushkanova O.N. Effective Big Data Processing Techniques for Decision Making // In the collection: The 9th Russian Multi-conference on Management Problems. materials of the plenary sessions. SSC RF JSC "Concern "Central Research Institute "Electropribor". 2016. pp. 74-96. // https://elibrary.ru/item.asp?id=26797583 (in Russian).
  121. M.V. Buinevich, K.E. Izrailov, D.I. Mostovich. Comparative analysis of approaches to finding vulnerabilities in software code // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles of the V International scientific-technical and scientific-methodical conference. 2016. pp. 256-260. // https://www.elibrary.ru/item.asp?id=27296306 (in Russian).
  122. I.B. Saenko, A.G. Kushnerevich, I.V. Kotenko. Implementation of a distributed parallel computing platform for collecting and preprocessing big monitoring data in cyber-physical systems // In the collection: International Congress on Informatics: Information Systems and Technologies. materials of the International Scientific Congress. S. V. Ablameyko (editor-in-chief). 2016. pp. 641-645. // https://elibrary.ru/item.asp?id=28354963 (in Russian).
  123. I.B. Paraschuk, M.V. Tsaramov, D.V. Safonov. Analysis of the main requirements for search and navigation procedures in large volumes of information circulating in regional telecommunication networks // Jubilee XV-I St. Petersburg International Conference "Regional Informatics-2016 (RI-2016)". Materials of the conference. St. Petersburg: SPOISU, 2016. p.115. // https://elibrary.ru/item.asp?id=35548599&pff=1 (in Russian).
  124. E.V. Burkova, D.A. Gayfullina, E.R. Khakimova. An applied program for assessing the physical security of an object based on a logical-probabilistic approach // In the collection: Information resources and systems in economics, science and education. Collection of articles of the VI International Scientific and Practical Conference. Edited by V.B. Moiseev. 2016. pp. 10-14. // https://elibrary.ru/item.asp?id=26621382 (in Russian).
  125. O.V. Ostraya, E.R. Khakimova, D.A. Gayfullina. Evariste Galois - mathematician and revolutionary // In the collection: University complex as a regional center of education, science and culture. Materials of the All-Russian Scientific and Methodological Conference. 2016. pp. 1357-1363. // https://elibrary.ru/item.asp?id=25766150 (in Russian).
  126. V.I. Gorodetsky, O.N. Tushkanova. Big data technology // In the book: Promising directions of development of domestic information technologies. materials of the II interregional scientific and practical conference. Sevastopol State University; scientific ed. by B.V. Sokolov. 2016. pp. 15-17. // https://elibrary.ru/item.asp?id=27558832 (in Russian).
  127. K.N. Zhernova, V.I. Korzhik. Comparison of new russian federation block cipher standard (gost r 34.12-2015) with known before block ciphers and estimation of this hardware implemented standard breaking on // In the collection: Actual problems of infotelecommunications in science and education. collection of scientific articles of the V International scientific-technical and scientific-methodical conference. 2016. pp. 363-368.// https://elibrary.ru/item.asp?id=27296334 (in Russian).
  128. A.V. Manaskin, I.B. Saenko. Ontological approach to the creation of decision support systems for managing special communications // In the collection: Special Communication and Information Security (SSBI – 2016). International Scientific and Practical Conference. 2016. pp. 10-14. // https://elibrary.ru/item.asp?id=27504120 (in Russian).
  129. I.B. Saenko, S.N. Bushuev. The Internet of Things network security model // In the collection: Science today: history and modernity. Materials of the international scientific and practical conference: in 2 parts. The scientific center "Disput". 2016. pp. 58-60. // https://www.elibrary.ru/item.asp?id=27271301 (in Russian).
  130. I,B. Paraschuk, N.V. Mikhailichenko. Special purpose data processing centers, analysis of possible stages of creating a methodology for evaluating the effectiveness of their functioning // In the collection: Modern problems of creation and operation of weapons, military and special equipment. Collection of articles of the III All-Russian scientific and practical conference. 2016. pp. 325-328. // https://elibrary.ru/item.asp?id=27610995 (in Russian).

2015

  1. Andrey Fedorchenko, Igor Kotenko and Andrey Chechulin. Design of integrated vulnerabilities database for computer networks security analysis. 23th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2015). Turku, Finland, March, 2015. P.559-566. DOI: 10.1109/PDP.2015.38 // https://elibrary.ru/item.asp?id=26999070
  2. Igor Kotenko, Andrey Fedorchenko and Andrey Chechulin. Integrated repository of security information for network security evaluation // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2015. Ò. 6. ¹ 2. Ñ. 41-57. href="http://jowua.yolasite.com/vol6no2.php">http://jowua.yolasite.com/vol6no2.php (Scopus) eLIBRARY ID: 23989252 (in Russian).
  3. Maxim Kolomeec, Andrey Chechulin and Igor Kotenko. Methodological Primitives for Phased Construction of Data Visualization Models. Journal of Internet Services and Information Security (JISIS), Vol.5, No.4, November, 2015. P.60-84. http://www.jisis.org/vol5no4.php // https://elibrary.ru/item.asp?id=28865195
  4. Andrey Chechulin, Igor Kotenko. Attack Tree-based Approach for Real-Time Security Event Processing //Automatic Control and Computer Sciences. 2015. Vol. 49. ¹ 8. P. 701-704. DOI: 10.3103/S0146411615080052 // https://elibrary.ru/item.asp?id=27137320
  5. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detection of Anomalies in Data for Monitoring of Security Components in the Internet of Things // Proceedings of International Conference on Soft Computing and Measurements, SCM 2015. 18. 2015. P. 189-192. DOI: 10.1109/SCM.2015.7190452 // https://elibrary.ru/item.asp?id=26956584
  6. Vasily Desnitsky, Igor Kotenko. Design and Verification of Protected Systems with Integrated Devices Based on Expert Knowledge // Automatic Control and Computer Sciences. 2015. Vol. 49. ¹ 8. Ñ. 648-652. DOI: 10.3103/S0146411615080246 // https://elibrary.ru/item.asp?id=27137072
  7. Igor Kotenko, Igor Saenko. Improved genetic algorithms for solving the optimisation tasks for design of access control schemes in computer networks // International Journal of Bio-Inspired Computation, Inderscience Enterprises Ltd., Vol. 7, No. 2, 2015, P.98-110. DOI: 10.1504/IJBIC.2015.069291 // https://elibrary.ru/item.asp?id=24031824 (Scopus)
  8. Igor Kotenko, Igor Saenko. Reconfiguration of access schemes in virtual networks of the internet of things by genetic algorithms // Studies in Computational Intelligence. 2016. Ò. 616. Ñ. 155-165. DOI: 10.1007/978-3-319-25017-5_15 // https://elibrary.ru/item.asp?id=24934717
  9. Igor Kotenko, Igor Saenko, Fadey Skorik, Sergey Bushuev. Neural network approach to forecast the state of the internet of things elements. Â ñáîðíèêå: Proceedings of International Conference on Soft Computing and Measurements, SCM 2015. 18. 2015. Ñ. 133-135. DOI: 10.1109/SCM.2015.7190434 // https://elibrary.ru/item.asp?id=26956184 (Scopus)
  10. Igor Kotenko, Igor Saenko, Sergey Ageev. Security Risks Management in the Internet of Things based on Fuzzy Logic Inference. The 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP 2015) in conjunction with The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Helsinki, Finland. 20-22 August 2015. Los Alamitos, California. IEEE Computer Society. 2015. P.654-659. (Scopus)
  11. A. Fedorchenko, I. Kotenko, A. Chechulin. Integrated repository of security information for network security evaluation // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2015. Ò. 6. ¹ 2. Ñ. 41-57. // https://elibrary.ru/item.asp?id=23989252
  12. I. Kotenko. Guest editorial: security in distributed and network-based computing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2015. Vol. 6. ¹ 2. P. 1-3 // https://elibrary.ru/item.asp?id=23989377
  13. O. Tushkanova. Comparative analysis of the numerical measures for mining associative and causal relationships in big data // Communications in Computer and Information Science. 2015. Ò. 535. Ñ. 571-582 DOI: 10.1007/978-3-319-23766-4_45 // https://elibrary.ru/item.asp?id=26927658
  14. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Evaluation of Text Classification Techniques for Inappropriate Web Content Blocking // The IEEE 8th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2015). Proceedings. Warsaw, Poland, September 24-26, 2015. P.412-417. DOI: 10.1109/IDAACS.2015.7340769 // https://www.elibrary.ru/item.asp?id=26955270 (Scopus)
  15. Luiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Yoan Miche, Amaury Lendasse, Juha Karhunen. Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive Bayes // The 14th IEEE International Conference on "Trust, Security and Privacy in Computing and Communications". Proceedings. Helsinki, Finland, August 20-22, 2015. P.198-205.
  16. Igor Kotenko, Elena Doynikova. Countermeasure selection in SIEM systems based on the integrated complex of security metrics // Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015. 23. 2015. Ñ. 567-574. DOI: 10.1109/PDP.2015.34 // https://elibrary.ru/item.asp?id=26998252
  17. Igor Kotenko, Elena Doynikova. The CAPEC based generator of attack scenarios for network security evaluation // Proceedings of the 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2015. 8, Technology and Applications. 2015. Ñ. 436-441. DOI: 10.1109/IDAACS.2015.7340774 // https://elibrary.ru/item.asp?id=26954706
  18. Alexander Branitskiy, Igor Kotenko. Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers // Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015. 18. 2015. Ñ. 152-159. DOI: 10.1109/CSE.2015.26 // https://elibrary.ru/item.asp?id=26997880 (WoS, Scopus)
  19. Igor Kotenko, Igor Saenko, Sergey Ageev, Yan Kopchak. Abnormal Traffic Detection in networks of the Internet of things based on fuzzy logical inference. XVIII International Conference on Soft Computing and Measurements (SCM'2015). IEEE Xplore, 2015. P.5-8. DOI: 10.1109/SCM.2015.7190394. // https://elibrary.ru/item.asp?id=26955939 (Scopus)
  20. Igor Kotenko, Igor Saenko. The Genetic Approach for Design of Virtual Private Networks // Proceedings - IEEE 18th International Conference on Computational Science and Engineering, CSE 2015. 18. 2015. Ñ. 168-175. DOI: 10.1109/CSE.2015.23 // https://elibrary.ru/item.asp?id=26998325
  21. Pronoza E., Vagunova E., Pronoza A. Construction of a Russian Paraphrase Corpus: Unsupervised Paraphrase Extraction. Proceedings of the 9th Russian Summer School in Information Retrieval, August 24–28, 2015, Saint-Petersburg, Russia, (RuSSIR 2015, Young Scientist Conference), Springer CCIS 573, P.146-157.
  22. M. Buinevich, K. Izrailov, A. Vladyko. Method for partial recovering source code of telecommunication devices for vulnerability search // Â ñáîðíèêå: 17th International conference on Advanced Communications Technology(ICACT). 2015. Ñ. 76-80.
  23. I. Kotenko, I. Saenko, S. Ageev. Countermeasure security risks management in the internet of things based on fuzzy logic inference // Â ñáîðíèêå: Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. 14. 2015. Ñ. 654-659. DOI: 10.1109/Trustcom.2015.431 // https://elibrary.ru/item.asp?id=27153712
  24. Y. Bekeneva, K. Borisenko, A. Shorov, I. Kotenko. Investigation of ddos attacks by hybrid simulation // Lecture Notes in Computer Science. 2015. Ò. 9357. Ñ. 179-189. DOI: 10.1007/978-3-319-24315-3_18 // https://elibrary.ru/item.asp?id=26926703
  25. V. Gorodetsky, V. Samoylov, O. Tushkanova. Agent-based customer profile learning in 3G recommender systems: ontology-driven multi-source cross-domain case // Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science). 2015. Ñ. 12-25. DOI: 10.1007/978-3-319-20230-3-2 // https://elibrary.ru/item.asp?id=23992803
  26. V. Gorodetsky, O. Tushkanova. Data-driven semantic concept analysis for user profile learning in 3G recommender systems // Proceedings - 2015 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, WI-IAT 2015. Big Data in Global Brain and Social Networks. 2015. Ñ. 92-97 DOI: 10.1109/WI-IAT.2015.80 // https://elibrary.ru/item.asp?id=27153946
  27. O. Tushkanova, V. Gorodetsky. Data-driven semantic concept analysis for automatic actionable ontology design // Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, DSAA 2015. 2015. Ñ. 7344893 DOI: 10.1109/DSAA.2015.7344893 // https://elibrary.ru/item.asp?id=26996462
  28. Igor Kotenko, Igor Saenko, Andrey Chechulin. Development of new generation of security information and event management systems // Methods and technical means of ensuring information security. 2015. No. 24. pp. 123-124. // https://www.elibrary.ru/item.asp?id=36546656 (in Russian).
  29. Igor Kotenko, Andrey Chechulin, Dmitry Komashinsky. Automated categorization of web-sites for inappropriate content blocking. Problems of information security. Computer systems. ¹ 2, 2015. P.62-68. // https://www.elibrary.ru/item.asp?id=24115356 (in Russian).
  30. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Review of Methodological Primitives for the Phased Construction of Data Visualization Model .SPIIRAS Proceedings. 2015. ¹ 5 (42), P.232-257 // https://elibrary.ru/item.asp?id=24277967 (in Russian).
  31. Dmitry Levshun, Andrey Chechulin. Problems of construction a single repository of multimedia data from field ethnographic expeditions. Technical sciences – from theory to practice. 2015, ¹46, Novosibirsk, SibAK, P.25-30. (in Russian).
  32. Dmitry Levshun. Security event correlation process decomposition. Technical sciences – from theory to practice. 2015, ¹46, P.31-39. // https://elibrary.ru/item.asp?id=24395539 (in Russian).
  33. Vladimir Komashinskiy, Dmitriy Komashinskiy. The Cognitive Metaphor in the Evolution of Telecommunication and Industrial Network Infrastructures or The First Steps Towards the Post-Information Society // Communication Technologies and Equipment Magazine, Vol. 1, 2015. P.62-67. // https://www.elibrary.ru/item.asp?id=23863584 (in Russian).
  34. Igor Kotenko, Evgenia Novikova, Andrey Chechulin. Visualization of security metrics for security monitoring and event management. Problems of information security. Computer systems. ¹ 4, 2015. P.42-47. // https://elibrary.ru/item.asp?id=25817956 (in Russian).
  35. Valery Kuvaev, Andrey Chechulin, Viacheslav Efimov, Konstantin Lizhinkin. Options for the design a unified information space for the integration of heterogeneous automated systems. Information and Space. Scientific and technical journal, ¹ 4, 2015, P.83-87. // https://elibrary.ru/item.asp?id=25371843 (in Russian).
  36. Elena Doynikova, Igor Kotenko, Andrey Chechulin. Dynamic security assessment of computer networks in siem-systems // Information Technology Security, Vol. 22 ¹ 3, 2015. P.33-42. // https://elibrary.ru/item.asp?id=25284632 (in Russian).
  37. Igor Kotenko, Elena Doynikova. Methods of selecting countermeasures on the basis of an integrated system of indicators of security in systems of information management and security events // Information management systems, ¹ 3, 2015. P.60-69. DOI: 10.15217/issn1684-8853.2015.3.60 // https://elibrary.ru/item.asp?id=23693738 (in Russian).
  38. Vasily Desnitsky, Elena Doynikova. Architecture and effectiveness evaluation of software tool for configuring security components of systems with embedded devices // Technical sciences - from theory to practice. 2015. No. 52. pp. 9-13. // https://www.elibrary.ru/item.asp?id=25026425 (in Russian).
  39. Elena Doynikova, Vasily Desnitsky. Generator of the random attack sequences for the computer network on the base of the CAPEC attack patterns // Technical sciences - from theory to practice. 2015. No. 51. pp. 11-16. // https://www.elibrary.ru/item.asp?id=24395535 (in Russian).
  40. Elena Doynikova, Igor Kotenko. Countermeasure selection for the management of the computer networks security on the base of the integrated system of security metrics // Methods and technical means of ensuring information security. 2015. No. 24. pp. 114-115. // https://www.elibrary.ru/item.asp?id=36546652 (in Russian).
  41. Elena Doynikova. Attacks generator on the base of the classification of the attack patterns CAPEC // Methods and technical means of ensuring information security. 2015. No. 24. pp. 71-72. // https://www.elibrary.ru/item.asp?id=36546627 (in Russian).
  42. Andrey Fedorchenko, Igor Kotenko, Andrey Chechulin. Development of Information Access and Management Services for Integrated Vulnerability Database // Security of Information Technologies 2015. Vol. 22. No. 4. pp. 21-27. // https://elibrary.ru/item.asp?id=27704651 (in Russian).
  43. Alexander Branitskiy, Igor Kotenko. Construction of neural network and immune cell intrusion detection system. Problems of information security, Computer systems, ¹ 4, 2015. P.23-27. // https://elibrary.ru/item.asp?id=25817953 (in Russian).
  44. Alexander Branitskiy, Igor Kotenko. Network attack detection based on combination of neural, immune and neuro-fuzzy classifiers. Information management systems, ¹ 4(77), 2015. P.69-77 // https://elibrary.ru/item.asp?id=24113108 (in Russian).
  45. Alexander Branitskiy, Igor Kotenko. Methods of combining the binary classifiers for problems of detection and classification of network attacks // Methods and technical means of ensuring information security. 2015. No. 24. p. 68. // https://elibrary.ru/item.asp?id=36546624 (in Russian).
  46. Alexander Branitskiy. Intrusion detection on the basis of combination of signature-based methods and mechanisms of machine learnin // Methods and technical means of ensuring information security. 2015. No. 24. p. 67 // https://elibrary.ru/item.asp?id=36546623 (in Russian).
  47. Vasily Desnitsky, Igor Kotenko. Formation of the expertise to develop secure systems with embedded devices. Problems of information security, Computer systems, 2015. ¹ 4, P.35-41.// https://elibrary.ru/item.asp?id=25817955 (in Russian).
  48. Vasily Desnitsky. A technique for evaluation resource consumption of security components of information and telecommunication systems with embedded devices // Ìåòîäû è òåõíè÷åñêèå ñðåäñòâà îáåñïå÷åíèÿ áåçîïàñíîñòè èíôîðìàöèè. 2015. ¹ 24. Ñ. 69-70. // https://docs.yandex.ru/docs/view?url=ya-disk-public%3A%2F%2FqA%2B%2BbqJsf46QKlC8IMmnap318%2FL2eHqbf%2FpzT8otpZmRS7xVOIbXmgflUTAGPt%2FwskEAmkQ4kXOg0TR8ZsXayQ%3D%3D&name=Ìàòåðèàëû-êîíôåðåíöèè-2015.pdf&nosw=1 // https://www.elibrary.ru/item.asp?id=36546625 (in Russian).
  49. Vasily Desnitsky. A technique for revelation of functional and non-functional incompatibilities of security components of embedded devices of information and telecommunication systems // // Methods and technical means of ensuring information security. 2015. No. 24. pp. 70-71. // https://www.elibrary.ru/item.asp?id=36546626 (in Russian).
  50. Igor Saenko, Igor Kotenko. Using genetic optimization and visual analysis tools for access schema design in virtual local area networks. Information technology and computer systems, ¹ 1, 2015. P.33-46.// https://elibrary.ru/item.asp?id=24842568 (in Russian).
  51. Igor Kotenko, Igor Saenko, Sergey Ageev, Yan Kopchak. Detection of anomalous traffic in the networks of the Internet of Things, based on fuzzy logical deduction // International Conference on Soft Computing and Measurements. 2015. Vol. 1. pp. 9-14. // https://elibrary.ru/item.asp?id=23578885 (in Russian).
  52. Igor Kotenko, Igor Saenko, Fadey Skorik, Sergey Bushuev. Neural network approach to forecast the state of the internet of things elements. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 1, Saint-Petersburg, ETU "LETI", 2015. P.395-399. // https://elibrary.ru/item.asp?id=23579019 (in Russian).
  53. Igor Saenko, Valery Kuvayev, Maxim Biryukov. The general architecture of the common access control system for diverse resources in uniform information and communication space // Technical sciences - from theory to practice. 2015. No. 52. pp. 70-75. // https://elibrary.ru/item.asp?id=25026434 (in Russian).
  54. Igor Saenko, Valery Kuvayev, Maxim Biryukov. Use of ontologies for management of access differentiation to diverse resources of common information and communication space // Technical sciences - from theory to practice. 2015. No. 52. pp. 76-80. // https://elibrary.ru/item.asp?id=25026435 (in Russian).
  55. Igor Saenko, Igor Kotenko. Adaptive change of policies and schemes of of access control to the resources of an unified information space // Methods and technical means of ensuring information security. 2015. No. 24. pp. 127-128. // https://www.elibrary.ru/item.asp?id=36546659 (in Russian).
  56. Sergey Ageev, D. Vasil'ev, Igor Saenko. Security Management protected multi-service network of special-purpose // Methods and technical means of ensuring information security. 2015. No. 24. pp. 106-107. // https://www.elibrary.ru/item.asp?id=36546647 (in Russian).
  57. Vitkova L.A. Study of a distributed computer system of adaptive action // High-tech technologies in space research of the Earth. 2015. Vol. 7. No. 5. pp. 44-48. // https://elibrary.ru/item.asp?id=25293131 (in Russian).
  58. M.V. Buinevich, O.V. Shcherbakov, A.G. Vladyko, K.E. Izrailov. Architectural vulnerability models of networks // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2015. No. 4. pp. 86-93. // https://elibrary.ru/item.asp?id=25294888 (in Russian).
  59. I.M. Novikov, I.V. Kotenko. Definition of functional logic of web applications based on network traffic data // Methods and technical means of ensuring information security. 2015. No. 24. pp. 91-92.// https://elibrary.ru/item.asp?id=36546637 (in Russian).
  60. S.A. Ageev, I.B. Saenko. Method of intellectual multi-agent information security risk management in protected multiservice special-purposed networks // T-comm: Telecommunications and Transport. 2015. Vol. 9. No. 1. pp. 5-10. https://cyberleninka.ru/article/n/metod-intellektualnogo-mnogoagentnogo-upravleniya-riskami-informatsionnoy-bezopasnosti-v-zaschischennyh-multiservisnyh-setyah/viewer // https://elibrary.ru/item.asp?id=22959655 (in Russian).
  61. S.V. Bessonov, N.A. Barykin, I.B. Saenko. Development of the XML-database for the control system of organizational type // Innovations in Science. 2015. No. 43. pp. 42-46. // https://www.elibrary.ru/item.asp?id=23181857 (in Russian).
  62. O.N. Tushkanova, V.I. Gorodetsky. Associative classification: analytical overview. Part 1 // Proceedings of SPIIRAN. 2015. No. 1 (38). pp. 183-203. // https://elibrary.ru/item.asp?id=23342080 (in Russian).
  63. Tushkanova O.N., Gorodetsky V.I. Associative classification: analytical overview. Part 2// Proceedings of SPIIRAN. 2015. No. 2 (39). pp. 212-240. // https://elibrary.ru/item.asp?id=23388656 (in Russian).
  64. O.N. Tushkanova. Experimental study of the numerical measures for mining associative and causal relationship in big data // Information technologies and computing systems. 2015. No. 3. pp. 23-32. // https://elibrary.ru/item.asp?id=25032417 (in Russian).
  65. A.A. Brunilin, V.O. Kuvaev, I.B. Saenko. Ontological approach to the organization of information interaction of heterogeneous automated systems for special purposes // T-Comm: Telecommunications and Transport. 2015. Vol. 9. No. 2. pp. 69-73. // https://elibrary.ru/item.asp?id=23101487 (in Russian).
  66. I.V. Kotenko, O.l. Karsaev. Use of multi-agent technologies for complex protection of information resources in computer networks // Izvestiya TRTU, thematic issue. 2015. pp.1-13 // https://cyberleninka.ru/article/n/ispolzovanie-mnogoagentnyh-tehnologiy-dlya-kompleksnoy-zaschity-informatsionnyh-resursov-v-kompyuternyh-setyah/viewer (in Russian).
  67. Branitskiy Alexander. Methods of computational intelligence for detection and classification of anomalies in network traffic. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.61-62. // https://elibrary.ru/item.asp?id=35090390 (in Russian).
  68. Nikita Dubrovin, Igor Ushakov, Igor Kotenko. Implementation of a Hadoop based prototype to analyze big data. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.69-70. // https://elibrary.ru/item.asp?id=35090621 (in Russian).
  69. Igor Saenko, Sergey Ganya. Technical principles and methodological approaches to the organization and deployment of solutions for aggregation, normalization, analysis and visualization of large volumes of heterogeneous data for monitoring security in the iot networks" // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.84-85. // https://www.elibrary.ru/item.asp?id=35087647 (in Russian).
  70. Igor Saenko, Igor Kotenko. Models and methods for evaluating the effectiveness of a system of access control differentiation to resources of the information space. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.85-75. // https://www.elibrary.ru/item.asp?id=35088149 (in Russian).
  71. Maxim Kolomeec, Andrey Chechulin, Igor Kotenko. Visualization of security settings of computer networks using a Voronov's diagram. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.73-74. // https://elibrary.ru/item.asp?id=29348616 (in Russian).
  72. Doynikova E. V., Kotenko I. V. Analysis and application of security metrics in the SIEM-systems on the base of attack graphs and dependency graphs services // Regional Informatics and information security proceedings. St. Petersburg Society of computer science, computer engineering, communication systems and management. 2015. C. 104-112. // https://www.elibrary.ru/item.asp?id=28311640 (in Russian).
  73. Vasily Desnitsky. Configuring security components of embedded devices on the base of a heuristic approach. Technical sciences – from theory to practice, ¹ 46, 2015. P.16-20. (in Russian).
  74. Vasily Desnitsky. A technique for evaluation resource consumption of security components for systems with embedded devices. Technical sciences – from theory to practice, ¹ 47, 2015. P.14-18. (in Russian).
  75. K.E. Izrailov. Search for vulnerabilities in various representations of machine code // In the book: Information Security of the regions of Russia (IBRR-2015). Conference materials. 2015. p. 157. // https://elibrary.ru/item.asp?id=28771243 (in Russian).
  76. S.I. Shterenberg, L.A. Tsvetkova. Analysis of the possibilities of embedding hidden self-modifying code in the executable file format.EXE // In the collection: Current trends in science and education. Collection of scientific papers based on the materials of the International Scientific and Practical Conference: in 5 parts. AR-Consult LLC. 2015. pp. 109-113.// https://elibrary.ru/item.asp?id=23147077 (in Russian).
  77. D.A. Gayfullina, E.R. Khakimova. Ada Lovelace and her programm for finding bernoulli numbers on the babbage's analytical engine // In the collection: Some actual problems of modern mathematics and mathematical education. Herzen Readings - 2015. materials of the 68th scientific conference. Edited by: V.F. Zaitsev, V.D. Budaev, A.V. Flegontov. 2015. pp. 192-197. // https://elibrary.ru/item.asp?id=23444364 (in Russian).
  78. O.V. Acute, D.A. Gayfulina, E.R. Khakimova. Ada Lovelace and her program for finding Bernoulli numbers on a Babbage computer // In the collection: The University complex as a regional center of education, science and culture. Materials of the All-Russian Scientific and Methodological Conference (with international participation). 2015. pp. 1252-1260. // https://elibrary.ru/item.asp?id=23153755 (in Russian).
  79. D.A. Kovalchenko, S.B. Nogin, I.B. Paraschuk. Analysis of approaches to analytical modeling of the change of states of processes implemented by information transmission systems // Jubilee 70th NTC NTORES named after A.S. Popov, dedicated to Radio Day. Proceedings of the conference. Volume 1. St. Petersburg: NTORES, 2015. pp. 131-133. (in Russian).
  80. Anton Pronoza, Andrey Chechulin. Model of information gathering process for a heterogeneous network structure investigation for visualization component of security information and event management systems // Methods and technical means of ensuring information security. 2015. No. 24. pp. 125-127. // https://elibrary.ru/item.asp?id=36546658 (in Russian).
  81. Andrey Chechulin, Anton Pronoza. Classification and analysis of network objects' relations types for further visualization // Methods and technical means of ensuring information security. 2015. No. 24. pp. 132-133.// https://elibrary.ru/item.asp?id=36546661 (in Russian).
  82. Andrey Chechulin. Classification and models development for network objects relation representation. International congress IS&IT15 - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2015. Mosñow, Fizmathlit, 2015. Vol. 2. P.165-170. (in Russian).
  83. Dmitry Smirnov, Andrey Chechulin. Security data correlation in IoT networks. 17th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2015. http://www.ruscrypto.ru/ (in Russian).
  84. Vasily Desnitsky. Models of the development process for combined protection mechanisms for information and telecommunication systems with embedded devices. International congress "IS&IT15" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2015. Vol. 2. P.113-118. (in Russian).
  85. Andrey Fedorchenko. Rule-oriented method for correlation of security events in SIEM. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.86-87. (in Russian).
  86. Vasily Desnitsky. A model of a configuration of embedded device security components. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.65-66. (in Russian).
  87. Vasily Desnitsky. A technique for evaluation of embedded device security components. // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.66-67. (in Russian).
  88. Vladislav Aleksandrov, Vasily Desnitsky, Sergey Bushuev. Development and analysis if a fragment of a secure Internet of Things system IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.56-57. (in Russian).
  89. Evgeniya Deshevyh, Igor Ushakov, Igor Kotenko. An overview of tools and platforms for processing big data for information security monitoring tasks // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.67. // https://elibrary.ru/item.asp?id=35090688 (in Russian).
  90. Krylov Konstantin, Igor Ushakov, Igor Kotenko. Analysis of techniques of application the big data concept for monitoring computer network security. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.75-76. // https://elibrary.ru/item.asp?id=35090855 (in Russian).
  91. Dmitry Levshun, Andrey Chechulin, Maxim Kolomeec, Igor Kotenko. An architecture of access management system to a room on the base of contactless smart cards. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.76. // https://elibrary.ru/item.asp?id=29348371 (in Russian).
  92. Dmitry Novozhilov, Andrey Chechulin. Development of software tools to support the experiments on a web site classification. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.80-81. // https://elibrary.ru/item.asp?id=35088474&pff=1 (in Russian).
  93. Anton Pronoza, Andrey Chechulin, Sergey Bushuev. Model of presentation of data of heterogeneous structure on information objects of computer network for visualization subsystem of event management systems and security information // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.82-83. // https://elibrary.ru/item.asp?id=35088482&pff=1 (in Russian).
  94. Sergey Bushuev, Andrey Chechulin, Anton Pronoza. Classification of sources of network objects and relationships between them. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.62-63. // https://elibrary.ru/item.asp?id=35089135 (in Russian).
  95. Andrey Chechulin. Mathematical models and algorithms for modeling attacks and the development of countermeasures in near-real time. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.90.// https://elibrary.ru/item.asp?id=35089146&pff=1 (in Russian).
  96. Elena Doynikova. Application of dependency graphs of services within a task of analysis of computer network security for criticality assessment of system resources and reasonable choice of protective measures. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (ISRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.68-69. // https://www.elibrary.ru/item.asp?id=35089155 (in Russian).
  97. Elena Doynikova. Methods and algorithms development for generation of attack scenarios on the network for its security level evaluation. 20th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2015. P.133. (in Russian).
  98. Chechulin A.A. Models and methods development for protection against unwanted and harmful information on the Internet // 20th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2015. P.133. (in Russian).
  99. Andrey Fedorchenko. The combined correlation process of security events in SIEM-systems. 24th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2015)”. Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.102-103. // https://elibrary.ru/item.asp?id=36546645 (in Russian).
  100. Alexander Branitskiy, Vladimir Polushin. Construction of neural network and immune cell intrusion detection system. 17th International Conference “RusCrypto`2015”, Solnechnogorsk, March 17-20, 2015. http://www.ruscrypto.ru/ (in Russian).
  101. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detection of anomalies in data for monitoring of security components in the internet of things. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2015. P.17-22.// https://elibrary.ru/item.asp?id=25016045 (in Russian).
  102. Sergey Bushuev, Vasily Desnitsky. Formation of expertise for the development of secure systems, "Internet of Things". 17th International Conference “RusCrypto`2015”, Solnechnogorsk, March 17-20, 2015. http://www.ruscrypto.ru/ (in Russian).
  103. Igor Kotenko, Igor Saenko. The genetic approach to designing a virtual private network in secure information space. International congress "IS&IT15" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2015. Mosñow, Fizmathlit, 2015. Vol. 2. P.320-325. (in Russian).
  104. Alexander Mozhaev, Alexander Nozik, Alexander Strukov, Andrey Chechulin. Modern trends in structural and logical analysis of reliability and cybersecurity of Automated Process Control Systems (APCS). International Science School "Modeling and Analysis of Safety and Risk in Complex Systems" (MABR-2015). St.Petersburg, Russia, November 17-19, 2015. P. 140-145 // https://elibrary.ru/item.asp?id=25391175&pff=1 (in Russian).
  105. Dmitry Levshun, Maxim Kolomeec. Experience in developing of a distributed perimeter protection system based on elements of Internet of Things network. International scientific school "Incident management and countering targeted cyber-physical attacks in distributed large-scale critical systems (IM&CTCPA 2015)". SPIIRAS, St. Petersburg, 26-28 November 2015. http://www.comsec.spb.ru/imctcpa15/. (in Russian).
  106. I.V. Kotenko, A.V. Sharov. Investigation of the mechanisms of protection of computer networks from infrastructure attacks based on the approach "nervous system of the network" // Problems of information security. Computer systems. 2015. No. 3. pp. 45-55. // https://elibrary.ru/item.asp?id=24115369 (in Russian).

2014

  1. Igor Kotenko, Andrey Shorov, Andrey Chechulin, Evgenia Novikova. Dynamical Attack Simulation for Security Information and Event Management // Lecture Notes in Geoinformation and Cartography. 2014. ¹ 199699. Ñ. 219-234. DOI: 10.1007/978-3-642-31833-7_14 // https://elibrary.ru/item.asp?id=30986943
  2. Igor Kotenko, Olga Polubelova, Igor Saenko. Logical Inference Framework for Security Management in Geographical Information Systems // Lecture Notes in Geoinformation and Cartography. 2014. ¹ 199699. Ñ. 203-218. DOI: 10.1007/978-3-642-31833-7_13 // https://elibrary.ru/item.asp?id=31127063
  3. Igor Kotenko, Igor Saenko. A Genetic Approach for Virtual Computer Network Design // Studies in Computational Intelligence. 2015. Ò. 570. Ñ. 95-105. DOI: 10.1007/978-3-319-10422-5_11 // https://elibrary.ru/item.asp?id=23966401
  4. Vasily Desnitsky, Igor Kotenko. Expert Knowledge based Design and Verification of Secure Systems with Embedded Devices // Lecture Notes in Computer Science. 2014. Ò. 8708. Ñ. 194-210. DOI: 10.1007/978-3-319-10975-6_15 // https://elibrary.ru/item.asp?id=41765429
  5. Igor Kotenko, Elena Doynikova. Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.5, No.3, September 2014. P.14-29 //https://elibrary.ru/item.asp?id=23989639
  6. Andrey Shorov, Igor Kotenko. The framework for simulation of bioinspired security mechanisms against network infrastructure attacks // The Scientific World Journal. 2014. Ò. 2014. Ñ. 172583. DOI: 10.1155/2014/172583 // https://elibrary.ru/item.asp?id=24047080
  7. Igor Kotenko, Andrey Chechulin. Fast Network Attack Modeling and Security Evaluation based on Attack Graphs // Journal of Cyber Security and Mobility, Vol.3, No.1, 2014. P.27–46. DOI: 10.13052/jcsm2245-1439.312 // https://elibrary.ru/item.asp?id=28953942
  8. Igor Kotenko, Andrey Chechulin, Andrey Shorov, Dmitry Komashinsky. Analysis and Evaluation of Web Pages Classification Techniques for Inappropriate Content Blocking // Lecture Notes in Computer Science. 2014. Ò. 8557 LNAI. Ñ. 39-54. DOI: 10.1007/978-3-319-08976-8_4 // https://www.elibrary.ru/item.asp?id=41762947
  9. Igor Kotenko, Elena Doynikova. Security Assessment of Computer Networks based on Attack Graphs and Security Events // Lecture Notes in Computer Science. 2014. Ò. 8407 LNCS. Ñ. 462-471. DOI: 10.1007/978-3-642-55032-4_47 // https://elibrary.ru/item.asp?id=41766110
  10. Novikova E., Kotenko I., Fedotov E. Interactive multi-view visualization for fraud detection in mobile money transfer services // International Journal of Mobile Computing and Multimedia Communications. 2014. Vol. 6. ¹ 4. P. 73-97. DOI: 10.4018/IJMCMC.2014100105 // https://elibrary.ru/item.asp?id=27137197
  11. Igor Kotenko, Elena Doynikova and Andrey Chechulin. Security metrics based on attack graphs for the Olympic Games scenario // Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. 2014. Ñ. 561-568. DOI: 10.1109/PDP.2014.113 // https://elibrary.ru/item.asp?id=21873723
  12. Philipp Nesteruk, Lesya Nesteruk, Igor Kotenko. Creation of a Fuzzy Knowledge Base for Adaptive Security Systems // Proceedings of the 22th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2014). Turin, Italy. 12th - 14th February, 2014. Los Alamitos, California. IEEE Computer Society. 2014. P.574-577. (WoS, Scopus) DOI: 10.1109/PDP.2014.115 // https://elibrary.ru/item.asp?id=21873658
  13. Igor Kotenko, Elena Doynikova. Security Evaluation for Cyber Situational Awareness // Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014. 16. 2014. Ñ. 1197-1204. DOI: 10.1109/HPCC.2014.196 // https://elibrary.ru/item.asp?id=24064097
  14. M. Buinevich, K. Izrailov. Method and utility for recovering code algorithms of telecommunication devices for vulnerability search // Â ñáîðíèêå: 16th International Conference on Advanced Communication Technology. 2014. Ñ. 172-176. DOI: 10.1109/ICACT.2014.6778943 // https://elibrary.ru/item.asp?id=26914430
  15. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of security information and events in the information and telecommunication systems // Radio electronics issues. 2014. Vol. 3. No. 1. pp. 170-180. // https://elibrary.ru/item.asp?id=21314643 (in Russian).
  16. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Features of the information security systems design in cyber-physical systems // Methods and technical means of ensuring information security. 2014. No. 23. pp. 67-69. https://www.elibrary.ru/item.asp?id=36467256 (in Russian).
  17. Vasily Desnitsky, Andrey Chechulin. Verification of information and telecommunication systemms with embedded devices on the base of generalized intuder model // Methods and technical means of ensuring information security. 2014. No. 23. pp. 66-67. https://www.elibrary.ru/item.asp?id=36467255 (in Russian).
  18. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Open vulnerability bases and their application in security analysis systems of computer networks // Management-information systems, 2014, ¹5(72), P.72-79. // https://elibrary.ru/item.asp?id=22479528 (in Russian).
  19. Andrey Chechulin, Igor Kotenko. Attack Graph Construction for Security Events Analysis // Security of Information Technologie. 2014. Vol. 21. No. 3. pp. 135-141. // https://elibrary.ru/item.asp?id=23396058 (in Russian).
  20. Andrey Chechulin, Igor Kotenko. Real-time security events processing using an approach based on the attack trees analysis. Problems of information security. Computer systems. 2014. ¹ 3, P.56-59.// https://elibrary.ru/item.asp?id=22508074 (in Russian).
  21. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Analytical overview of open vulnerabilities databases. Problems of information security. Computer systems. ¹ 3, 2014. P.131-135. // https://elibrary.ru/item.asp?id=22508083 (in Russian).
  22. E.V. Doynikova, I.V. Kotenko. Analysis of the current situation and support for decision-making on the security of a computer network based on a system of security indicators // News of higher educational institutions. Instrumentation. 2014. vol. 57. No. 11. pp. 72-77. // https://elibrary.ru/item.asp?id=22502742 (in Russian).
  23. Igor Kotenko, Igor Saenko. The proposals about ontological representation and hybrid data storage for security events in the automated control system of railway transport // Technical science - from theory to practice, ¹ 29, 2013. Novosibirsk, SibAK, 2013. P.28-32 // https://elibrary.ru/item.asp?id=21046302 (in Russian).
  24. Igor Kotenko, Igor Saenko. Proposals on the logical inference implementation for cyber security management in the automated control system of railway transport // Natural and mathematical sciences in the modern world. 2014. No. 14. pp. 46-50.// https://www.elibrary.ru/item.asp?id=21063776 (in Russian).
  25. Igor Kotenko, Elena Doynikova. Calculation and analysis of security metrics based on attack graphs and service dependencies. Problems of information security. Computer systems, ¹ 2, 2014. P.19-36. // https://elibrary.ru/item.asp?id=21946385 (in Russian).
  26. Igor Kotenko, Igor Saenko, Rafael Yusupov. New generation of the security incidents’ monitoring and management systems // Nauchno-tekhnicheskie vedomosti SPbGPU. Informatics. Telecommunications. Control. SPbGPU, 2014, ¹ 3 (198), P.7-18. // https://elibrary.ru/item.asp?id=21693375 (in Russian).
  27. Vasily Desnitsky. Conceptual combined model of the protection system of embedded devices // Innovations in science. 2014. No. 38. pp. 55-59. https://www.elibrary.ru/item.asp?id=22456885 (in Russian).
  28. Vasily Desnitsky. Development of knowledge model for design and secure embedded devices. Natural and mathematical science in the modern world. 2014, ¹23, P.35-40. https://www.elibrary.ru/item.asp?id=22286126 (in Russian).
  29. Vasily Desnitsky, Andrey Chechulin. Generalized intruder model and verification of information systems with embedded devices // Technical sciences - from theory to practice. 2014. No. 39. pp. 7-21. // https://elibrary.ru/item.asp?id=22562560 (in Russian).
  30. Anton Noskov, Andrey Chechulin. Investigation of heuristic approach to attacks on the telecommunications network detection based on data mining techniques // Proceedings of SPIIRAS. Issue 6 (37). Pp. 208-224. Saint Petersburg: Nauka, 2014 // https://elibrary.ru/item.asp?id=22777714 (in Russian).
  31. Sergey Ageev, Igor Saenko, Yury Egorov, A.Gladkih, A.Bogdanov. Intelligent hierarchical information security risk management in protected special-purpose multiservice networks // Automation of the control processes. Is. ¹3 (37), 2014. ISSN 1991-2927. P.78-88.// https://elibrary.ru/item.asp?id=22104525 (in Russian).
  32. Valery Kuvayev, Igor Saenko. A conceptual framework for the integration of heterogeneous enterprise information resources in a common information space // Problems of economics and management in trade and industry. 2014. No. 3 (7). pp. 101-104. ISSN 2309-3064. // https://elibrary.ru/item.asp?id=23065804 (in Russian).
  33. Igor Saenko, Valery Kuvayev, Sergey Alyshev. An approach to design the quality indicators system for common information space. Natural and mathematical science in the modern world. 2014, ¹ 14. Novosibirsk, SibAK, P.51-56. // https://elibrary.ru/item.asp?id=21063777 (in Russian).
  34. Igor Kotenko, Igor Saenko. About an architecture of the multilevel intelligent information security system for the automated systems of railway transport. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.97-98. // https://elibrary.ru/item.asp?id=36467272 (in Russian).
  35. Vasily Desnitsky, Igor Kotenko. Configuring information systems with embedded devices to provide complex security on railway transport // Methods and technical means of ensuring information security. 2014. No. 23. pp. 89-90. https://www.elibrary.ru/item.asp?id=36467267 (in Russian).
  36. Vasily Desnitsky, Igor Kotenko. Combined protection model of information and telecommunication systems of Internet of Things concept // Methods and technical means of ensuring information security. 2014. No. 23. pp. 65-66. // https://elibrary.ru/item.asp?id=36467254 (in Russian).
  37. Elena Doynikova. Approach to the security assessment on the base of the attack graphs in the security information and events management systems // Methods and technical means of ensuring information security. 2014. No. 23. pp. 90-91. // https://www.elibrary.ru/item.asp?id=36467268 (in Russian).
  38. Sergey Ageev, Igor Saenko. Intelligent information security risk management methods of multi service communication networks // Methods and technical means of ensuring information security. 2014. No. 23. pp. 59-60. // https://www.elibrary.ru/item.asp?id=36467250 (in Russian).
  39. Valery Kuvayev, Igor Saenko. An approach to solving the task of the access control in heterogeneous information space // Methods and technical means of ensuring information security. 2014. No. 23. pp. 33-34. // https://www.elibrary.ru/item.asp?id=36467237 (in Russian).
  40. M.V. Buinevich, K.E. Izrailov, O.V. Shcherbakov. Model of machine code specialized for vulnerabilities search // Bulletin of the Voronezh Institute of GPS of the Ministry of Emergency Situations of Russia. 2014. No. 2 (11). pp. 46-51. // https://elibrary.ru/item.asp?id=21574302 (in Russian).
  41. M.V. Buinevich, O.V. Shcherbakov, K.E. Izrailov. Structural model of machine code specialized for search for software vulnerabilities of the automated control systems // Problems of risk management in the technosphere. 2014. No. 3 (31). pp. 68-74. // https://elibrary.ru/item.asp?id=22553713 (in Russian).
  42. K.E. Izrailov. Methods of assessing the effectiveness of medium of algorithmization used to find vulnerabilities // Informatization and Communication. 2014. No. 3. pp. 44-47. // https://elibrary.ru/item.asp?id=22531534 (in Russian).
  43. A.V. Fedorchenko, A.A. Chechulin, I.V. Kotenko. Building an integrated vulnerability database // News of higher educational institutions. Instrumentation. 2014. Vol. 57. No. 11. pp. 62-67. // https://elibrary.ru/item.asp?id=22502740 (in Russian).
  44. V.I. Gorodetsky, O.N. Tushkanova. Ontology-based user profile personification in 3g recommender systems // Design ontology. 2014. No. 3 (13). pp. 7-31. // https://elibrary.ru/item.asp?id=21884863 (in Russian).
  45. A.A. Branitsky, A.V. Timofeev. Intellectual methods of detection and classification of network attacks // Intellectualization of information processing (see books). 2014. Vol. 10. No. 1. pp. 228-229. // https://elibrary.ru/item.asp?id=32260735 (in Russian).
  46. Dmitry Levshun, Andrey Chechulin. Construction of the classification scheme for the existing methods of security events correlation. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Ð.148-149. // https://elibrary.ru/item.asp?id=29293506 (in Russian).
  47. Alexandra Kasatkina, Andrey Chechulin. Multimedia database on IFUGAO folklore (Philippines): specifying a problem and selecting solutions // All-Russian Research-to-Practice Conference "Native minorities in dominating society: Practice of applied studies and efficient tools of ethnic". Kemerovo, 17-18 October 2014. Proceedings. Kemerovo, 2014. Ð.312-317. // https://www.elibrary.ru/item.asp?id=32295680 (in Russian).
  48. Igor Kotenko, Igor Saenko. The technique for verification of security policies in the multilevel intelligent system of integrated protection of railway transport. Technical science - from theory to practice. 2014. ¹ 30. P.18-22 // https://elibrary.ru/item.asp?id=21112705 (in Russian).
  49. Igor Kotenko, Igor Saenko. About the tasks of cybersecurity in ‘e-city’ infrastructures on the basis of artificial intelligence methods // Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 618-622. ISBN 978-5-91995-042-4. // https://www.elibrary.ru/item.asp?id=22461599 (in Russian).
  50. Vasily Desnitsky. Verification of network information flows of the systems with embedded devices on the basis of expert knowledge // In the collection: Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 596-600. https://www.elibrary.ru/item.asp?id=22461595 (in Russian).
  51. Elena Doynikova. Security assessment in the information systems and information security incidents response considering current security situation. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.601-604. ISBN 978-5-91995-042-4. // https://elibrary.ru/item.asp?id=22461596 (in Russian).
  52. Igor Saenko, Valery Kuvayev. About using artificial intelligent methods for access control to resources of the common information space of the heterogeneous automated systems. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.631-637. ISBN 978-5-91995-042-4. // https://elibrary.ru/item.asp?id=22461601 (in Russian).
  53. Sergey Ageev, Igor Saenko. Information security risk management in the protected multi-service special purpose network on the basis of intelligent multi-agents. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 7–9, 2014. P.556-562. ISBN 978-5-91995-042-4.// https://www.elibrary.ru/item.asp?id=22461589 (in Russian).
  54. K.E. Izrailov. Method and software tool for restoring algorithms of machine code of telecommunication devices to search for vulnerabilities // In the collection: Regional informatics "RI-2014". Materials of the XIV St. Petersburg International Conference. 2014. pp. 140-141. // https://elibrary.ru/item.asp?id=28771217 (in Russian).
  55. I.B. Paraschuk. On the issue of using network-oriented technologies for building regional information and communication systems // XIV St. Petersburg International Conference “Regional Informatics-2014” (“RI-2014"). Materials of the conference. St. Petersburg, 2014. pp. 96-97 (in Russian).
  56. Andrey Chechulin, Igor Kotenko. Application of Big Data processing methods for computer network infrastructure security // Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 614-617. // https://elibrary.ru/item.asp?id=22461598 (in Russian).
  57. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. Integrated vulnerabilities database for computer networks security evalution systems // Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 638-341.// https://elibrary.ru/item.asp?id=22461602 (in Russian).
  58. Andrey Chechulin, Igor Kotenko. Design of the system for users protection against inappropriate content in the Internet. In the collection: Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 642-647. // https://elibrary.ru/item.asp?id=22461603 (in Russian).
  59. Andrey Chechulin. The main challenges in the design of an electronic catalog of field data. Maklaevskie chtenya-2014. St. Petersburg, Russia. April 15-16, 2014. http://www.kunstkamera.ru/science/konferencii_i_seminary/2014/maklaevskie_chteniya2014/ (in Russian).
  60. Dmitry Novozhilov, Andrey Chechulin. Web-page text language recognition techniques. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Ð.155-156. (in Russian).
  61. Andrey Chechulin, Dmitry Komashinkiy. Approach for classification of websites in foreign languages in the Internet. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Ð.169-170. (in Russian).
  62. Andrey Chechulin, Igor Kotenko. Software prototype of analytical attacks modeling component for security information and events management systems. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. Ð.170-171. (in Russian).
  63. I. Kotenko, A. Shorov. Simulation of bio-inspired security mechanisms against network infrastructure attacks // Studies in Computational Intelligence. 2015. Ò. 570. Ñ. 127-133. DOI: 10.1007/978-3-319-10422-5_14 // https://elibrary.ru/item.asp?id=23967089
  64. Igor Kotenko, Evgenia Novikova. Visualization of Security Metrics for Cyber Situation Awareness // The 1st International Software Assurance Workshop (SAW 2014). In conjunction with the 9th International Conference on Availability, Reliability and Security (ARES 2014). September 8nd – 12th, 2014. Fribourg, Switzerland. IEEE Computer Society. 2014. P.506-513. DOI: 10.1109/ARES.2014.75 // https://elibrary.ru/item.asp?id=24029278
  65. Evgenia Novikova, Igor Kotenko. Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer Services // Lecture Notes in Computer Science. 2014. Ò. 8708. Ñ. 63-78. DOI: 10.1007/978-3-319-10975-6_5 // https://elibrary.ru/item.asp?id=41765459
  66. Igor Saenko, Igor Kotenko. Design of Virtual Local Area Network Scheme based on Genetic Optimization and Visual Analysis // Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.5, No.4, P.86-102, December 2014.// https://elibrary.ru/item.asp?id=24027045 (Scopus)
  67. Igor Kotenko, Igor Saenko. Creating New Generation Cybersecurity Monitoring and Management Systems // Herald of the Russian Academy of Sciences, 2014, Vol.84, No.6. ISSN 1019-3316. DOI: 10.1134/S1019331614060033 (Scopus IF=0.170, WoS)
  68. Vasily Desnitsky, Igor Kotenko. Expert knowledge based design and verification of secure systems with embedded devices // Problems of information security. Computer systems. 2014. ¹ 3, P.16-22. // https://elibrary.ru/item.asp?id=22508068 (in Russian).
  69. Igor Kotenko and Igor Saenko. Creating New-Generation Cybersecurity Monitoring and Management Systems. Herald of the Russian Academy of Sciences, Herald of the Russian Academy of Sciences. 2014. Ò. 84. ¹ 6. Ñ. 424-431. DOI: 10.7868/S0869587314110073 // https://elibrary.ru/item.asp?id=22477914 (in Russian).
  70. Igor Kotenko, Elena Doynikova. Monitoring of the current security situation and security decisions support in the computer network on the base of the system of the security metrics . Journal of Instrument Engineering Ò.57, ¹ 10, 2014. P.72-77. ISSN 0021-3454. (in Russian).
  71. Vasily Desnitsky, Igor Kotenko. The use of expert knowledge for development of secure systems with embedded devices Information // Technologies and Computing Systems, 2014. ¹ 4, P.58-73. // https://elibrary.ru/item.asp?id=22509438 (in Russian).
  72. Igor Kotenko, Evgenia Novikova. The models and techniques of a visual data analysis for task solution of the cyber security // 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  73. Vasily Desnitsky. Design and verification of security mechanisms for systems with embedded devices on the base of expert knowledge. 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  74. Igor Kotenko, Igor Saenko. On the construction of an multilevel intelligent information security system for the automated systems of railway transport. Intelligent systems on the transport. IV International scientific-practical Conference «IntellectTrans-2014». St. Petersburg,Proceedings. Petersburg State Communications’ University. 2014. P.21. (in Russian).
  75. Igor Kotenko, Igor Saenko. On the construction of a multilevel intelligent information security system for the automated systems of railway transport. IV International scientific-practical Conference «IntellectTrans-2014». St. Petersburg,Proceedings. Petersburg State Communications’ University. 2014. P.196-203. (in Russian).
  76. Igor Kotenko, Rafael Yusupov. Cybersecurity monitoring and management systems of a new generation for information security in critical infrastructures. XVII All-Russian scientific-practical Conference "Actual security and protection problems". Saint-Petersburg, April 1–4, 2014. (in Russian).
  77. Igor Kotenko, Evgenia Novikova. Visual analytics guard of the information security. International Forum on practical security Positive Hack Days. Moscow. May 21-22, 2014. http://www.phdays.ru (in Russian).
  78. Igor Saenko, Igor Kotenko. Fundamentals of the construction of the perspective security monitoring and management systems for a protection of the critical information objects. International scientific-practical conference "Theoretical and practical information security problems". June 19, 2014. Minsk, Academy of the Ministry of Internal Affairs, Belarus Republic, 2014. (in Russian).
  79. Andrey Fedorchenko, Andrey Chechulin, Igor Kotenko. The integrated database of vulnerabilities. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  80. Andrey Chechulin. The analysis and classification of a possible changes occurring in a computer network and their influence on trees of attacks. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  81. Philipp Nesteruk. Specifics of the two-level organization of adaptive systems of information security. International Scientific and Practical Conference "Theoretical and applied problems of information security." June 19, 2014, Minsk, Academy of MIA Republic of Belarus, 2014. (in Russian).
  82. Elena Doynikova. Calculation of the security metrics in the security monitoring and management systems // International science and practical conference "Theoretical and applied problems of the information security". June 19, 2014, Minsk, Police Academy, the Republic of Belarus, 2014. (in Russian).
  83. Vasily Desnitsky, Elena Doynikova. Development of the defence components for the embedded devices considering expert knowledge // International science and practical conference "Theoretical and applied problems of the information security". June 19, 2014, Minsk, Police Academy, the Republic of Belarus, 2014. (in Russian).
  84. Andrey Fedorchenko. The analysis of vulnerabilities on temporal metrics based on the open database of vulnerabilities X-Force. 23th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2014)”. Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.104-105. (in Russian).
  85. Igor Kotenko, Igor Saenko. A system of logical inference and verification of security policies in automated systems of railway transport. International congress IS&IT,14 - International Conference on Artificial Intelligence and Systems.Proceedings. Moskow, Fizmathlit. 2014. Vol.2. P.271-276. 978-5-9221-1572-8. (in Russian).
  86. Igor Saenko, Igor Kotenko. Genetic approach to virtual network design. International congress IS&IT,14 - International Conference on Artificial Intelligence and Systems.Proceedings. Moskow, Fizmathlit. 2014. Vol.2. P.35-40. ISBN 978-5-9221-1572-8. (in Russian).
  87. Igor Kotenko, Igor Saenko. Intelligent system for cyber security monitoring and incident management. 14-th national conference on artificial intelligence with international participation (KAI-2014), September 24–27, 2014, Kazan, Russia. Proceedings, Vol.3. Kazan: Publ. RIC «Scool», 2014. P.219-227. (in Russian).
  88. Vasily Desnitsky. Analysis of perspective systems with embedded devices to form expert knowledge in the field of design secure information and telecommunication systems. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.130. (in Russian).
  89. Vasily Desnitsky, Igor Kotenko. Conceptual combined model of embedded device protection system and its application to configuring components of multi-level intellectual system of complex security on railway transport. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.131. (in Russian).
  90. Elena Doynikova, Igor Kotenko. Security assessment in the RR automated management systems // XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014 . P.132-133. (in Russian).
  91. Elena Doynikova. Decision support for the countermeasures selection in the information systems on the base of the complex of the security metrics // XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.132. (in Russian).
  92. Andrey Fedorchenko. The techniques of integration database of vulnerabilities for improvement of the analysis of computer networks protection. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.165-166. (in Russian).
  93. Andrey Fedorchenko. Survey of mechanisms of security events correlation in SIEM. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.166. (in Russian).
  94. Sergey Ageev, Igor Saenko. Information security risk evaluation and management in protected multi-service networks on the basis of the artificial intelligent methods. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.116-117. (in Russian).
  95. Igor Kotenko, Igor Saenko. Decision support on information security in the automated control systems of railway transport on the basis of the ontology data modelling. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.144. (in Russian).
  96. Igor Kotenko, Igor Saenko. Models and methods for a visual analysis of Big Data and security events in the automated control systems of railway transport. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.143. (in Russian).
  97. Igor Kotenko, Igor Saenko, Andrey Chechulin. Proactive management of information and security events in network NGN. Seminar of the International Telecommunication Union "Transition developing countries with existing networks to next generation network (NGN): technical, economic, legal and political aspects", St. Petersburg, St. Petersburg GUT Bonch-Bruyevich. 23-25 June 2014. (in Russian).
  98. Alexey Bashmakov, Anton Pronoza. Encrypted containers detection techniques for computer forensics. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.120. (in Russian).

2013

  1. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM systems // Future internet, Vol. 5, ¹3, 2013. P.355-375. ISSN 1999-5903. // https://elibrary.ru/item.asp?id=28953990
  2. Igor Kotenko, Andrey Chechulin. A Cyber Attack Modeling and Impact Assessment Framework. 5th International Conference on Cyber Conflict 2013 (CyCon 2013). Proceedings. IEEE and NATO COE Publications. 4-7 June 2013, Tallinn, Estonia. 2013. P.119-142. (WoS, Scopus)
  3. Igor Kotenko, Andrey Chechulin. Computer Attack Modeling and Security Evaluation based on Attack Graphs. The IEEE 7th International Conference on “Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications” (IDAACS'2013). Proceedings. Berlin, Germany, September 12-14, 2013. P.614-619. DOI: 10.1109/IDAACS.2013.6662998 // https://elibrary.ru/item.asp?id=21908395
  4. I. Kotenko, A. Chechulin. A cyber attack modeling and impact assessment framework // Â ñáîðíèêå: Pan American Health Care Exchanges, PAHCE. Ñåð. "2013 5th International Conference on Cyber Conflict, CyCon 2013 - Proceedings" 2013. P. 6568374 // https://elibrary.ru/item.asp?id=23977532
  5. Igor Kotenko. Experiments with simulation of botnets and defense agent teams // 27th European Conference on Modelling and Simulation (ECMS 2013). Proceedings. May 27 - May 30st, Aalesund University College, Norway. 2013. P.61-67. DOI: 10.7148/2013-0061 // https://elibrary.ru/item.asp?id=21917518
  6. Igor Kotenko, Igor Saenko, Olga Polubelova and Elena Doynikova. The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems // Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. 2013. Ñ. 638-645. DOI: 10.1109/ARES.2013.84 // https://elibrary.ru/item.asp?id=21907177
  7. Igor Kotenko, Evgenia Novikova. Vissecanalyzer: a visual analytics tool for network security assessment // Lecture Notes in Computer Science. 2013. Ò. 8128 LNCS. Ñ. 345-360. DOI: 10.1007/978-3-642-40588-4_24 // https://elibrary.ru/item.asp?id=21908848
  8. Igor Kotenko, Elena Doynikova. Security metrics for risk assessment of distributed information systems // Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, IDAACS 2013. 2013. Ñ. 646-650. DOI: 10.1109/IDAACS.2013.6663004 // https://elibrary.ru/item.asp?id=21908298
  9. Olga Polubelova, Igor Kotenko. Design of vulnerability ontologies and application of logical inference for security information and events menegement. Security of Information Technologies, Vol. 20, ¹1, 2013. P.21-24 // https://elibrary.ru/item.asp?id=21003113 (in Russian).
  10. Igor Kotenko, Olga Polubelova, Andrey Chechulin. Design of the ontology based data model for the network attack modeling system. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.26-39. // https://elibrary.ru/item.asp?id=19416903 (in Russian).
  11. Andrey Chechulin. Technique of rapid construction, modification and analysis of attack trees. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.40-53. // https://elibrary.ru/item.asp?id=19416904 (in Russian).
  12. Olga Polubelova. Architecture and software implementation of the system of verification of filtering rules // Proceedings of SPIIRAS. Issue 3 (26). St. Petersburg, Nauka, 2013. P.79-90. // https://elibrary.ru/item.asp?id=19416907 (in Russian).
  13. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Dynamical recalculation of the security metrics on the example of attack potentiality // Proceedings of SPIIRAN. 2013. No. 7 (30). pp. 26-39. // https://elibrary.ru/item.asp?id=20927236 (in Russian).
  14. Vasily Desnitsky. A technique for verification of network information flows in information and telecommunication systems with embedded devices // Proceedings of SPIIRAN. 2013. No. 7 (30). pp. 246-257. https://www.elibrary.ru/item.asp?id=20927262 (in Russian).
  15. Vasily Desnitsky, Igor Kotenko. Configurtion based design of secure embedded devices. Problems of information security. Computer systems. 2013. ¹ 1, P.44-54. // https://elibrary.ru/item.asp?id=19121738 (in Russian).
  16. Olga Polubelova, Igor Kotenko. The technique of filtering rules verification by model checking. Problems of information security. Computer systems, ¹ 1, 2013. P.151-168. // https://elibrary.ru/item.asp?id=19121749 (in Russian).
  17. Igor Kotenko, Andrey Chechulin. Toward network access control with software-defined networking // High availability systems. 2013. Vol. 9. No. 3. pp. 103-110. // https://elibrary.ru/item.asp?id=21046159 (in Russian).
  18. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Verification of information flows for design of secure information systems with embedded devices // High availability systems, 2013. Vol. 9. No. 3. pp. 112-117. // https://elibrary.ru/item.asp?id=21046160 (in Russian).
  19. Dmitry Komashinskiy, Igor Kotenko, Andrey Chechulin, Andrey Shorov. Autoimatic system for categorization of websites for blocking web pages with inappropriate content // High availability systems. 2013. Vol. 9. No. 3. pp. 119-127. // https://www.elibrary.ru/item.asp?id=21046161 (in Russian).
  20. Igor Kotenko, Saenko I.B., Doynikova E.V. Risk assessment in computer networks of critical infrastructures // Innovations in science. 2013. No. 16-1. pp. 84-88. // https://elibrary.ru/item.asp?id=18766379 (in Russian).
  21. Vasily Desnitsky. Configuration based combined protection of embedded devices // Innovations in science. 2013. No. 16-1. pp. 64-67. https://www.elibrary.ru/item.asp?id=18766375 (in Russian).
  22. Olga Polubelova. Verification of security policy filtering rules by model checking // Innovations in Science, ¹ 16-1, 2013. Novosibirsk, 2013. Ð.134-138. // https://elibrary.ru/item.asp?id=18766386 (in Russian).
  23. Andrey Chechulin. Technique of attack graphs building for systems of security event analysis. Innovations in Science, ¹16-1, 2013. Novosibirsk, SibAK, 2013. Ð.156-160.// https://elibrary.ru/item.asp?id=18766389 (in Russian).
  24. M.V. Buinevich, K.E. Izrailov. Automated means of algorithmization of machine code of telecommunication devices // Telecommunications. 2013. No. 6. pp. 2-9. // https://elibrary.ru/item.asp?id=19084251 (in Russian).
  25. K.E. Izrailov. Algorithmization machine code of telecommunications devices as a strategic means for information security // National security and strategic planning. 2013. No. 2 (2). pp. 28-36.// https://elibrary.ru/item.asp?id=20234442 (in Russian).
  26. K.E. Izrailov. Analysis of the security state of software // In the collection: Actual problems of infotelecommunications in science and education. II International Scientific-technical and scientific-methodical conference. 2013. pp. 874-877. // https://elibrary.ru/item.asp?id=21939827 (in Russian).
  27. K.E. Izrailov. C-language extensionfor algorithm description of telecommunicationdevices code // Information technologies and telecommunications. 2013. Vol. 1. No. 2. pp. 21-31. // https://elibrary.ru/item.asp?id=21133498 (in Russian).
  28. K.E. Izrailov, A.Yu. Vasilyeva, A.I. Ramazanov. Enlarged assesment method of effectiveness of automated tools, recovering source code in search for vulnerability // Bulletin of the Injecon. Series: Technical Sciences. 2013. No. 8 (67). pp. 107-109.// https://elibrary.ru/item.asp?id=20984314 (in Russian).
  29. K.E. Izrailov. The internal representation of a prototype utility for the recovery code // Fundamental and applied research in the modern world. 2013. No. 2. pp. 79-90.// https://www.elibrary.ru/item.asp?id=20221280 (in Russian).
  30. Igor Saenko, Valery Kuvayev. On intelligent system for access control to the resources of a common information space for different types of automated systems. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.105-106. http://www.spoisu.ru/files/ibrr/ibrr2013/ibrr2013_materials.pdf // https://elibrary.ru/item.asp?id=35100315 (in Russian).
  31. K.E. Izrailov. Architectural software vulnerabilities // In the book: The Sixth Scientific Congress of Students and postgraduates of INJECON-2013. Abstracts of reports. St. Petersburg State University of Economics; Faculty of Law and Economic Security. 2013. p. 35.// https://www.elibrary.ru/item.asp?id=28771079 (in Russian).
  32. D.S. Krutov, I.B. Saenko, O.I. Pantyukhin. Mechanisms of information distribution supplement in multi-agent protection system for critical information infrastructures // In the collection: Current problems of infotelecommunications in science and education. II International Scientific-technical and scientific-methodical Conference. 2013. pp. 135-137. // https://www.elibrary.ru/item.asp?id=21939520 (in Russian).
  33. Alexey Konovalov, Igor Kotenko, Andrey Shorov. Simulation-based study of botnets and defense mechanisms against them. Journal of Computer and Systems Sciences International, ¹ 1, 2013, Ð.45-68. ISSN 0002-3388. DOI: 10.7868/S0002338812060042 // https://elibrary.ru/item.asp?id=18444864 (in Russian).
  34. Igor Kotenko, Igor Saenko. Architecture of the system of intelligent information security services in critical infrastructures // Proceedings of SPIIRAS. Issue 1 (24). SPb: Nauka, 2013. P.21-40 // https://elibrary.ru/item.asp?id=18800054 (in Russian).
  35. Igor Kotenko, Igor Saenko. Scientific analysis and policy support for cyber security: the review of perspective research directions according to the results of the international workshop SA&PS4CS 2012. Proceedings of SPIIRAS. Issue 1 (24). SPb: Nauka, 2013. P.66-88. // https://elibrary.ru/item.asp?id=18800057 (in Russian).
  36. Igor Kotenko, Igor Saenko, Olga Polubelova. Perspective data storage systems for security information monitoring and management. Proceedings of SPIIRAS. Issue. 2 (25). SPb: Nauka, 2013. P.113-134. // https://elibrary.ru/item.asp?id=18867193 (in Russian).
  37. Igor Kotenko, Igor Saenko. Mathematical methods, models and architectures for computer network security: the review of perspective research directions according to the results of the International conference MMM-ACNS-2012 // Proceedings of SPIIRAS. Issue 2 (25). SPb: Nauka, 2013. P. 148-170 // https://elibrary.ru/item.asp?id=18867195 (in Russian).
  38. Philipp Nesteruk, Igor Kotenko. Tools for creation of neural network components of intelligent information security systems. Proceedings of SPIIRAS. Issue 3 (26). St. Petersburg, Nauka, 2013. P.7-25. // https://elibrary.ru/item.asp?id=19416902 (in Russian).
  39. Elena Doynikova. Security metrics and security assessment techniques for the computer networks on the base of the attack graphs. Proceedings of SPIIRAS. Issue 3 (26). St. Petersburg, Nauka, 2013. P.54–68. // https://elibrary.ru/item.asp?id=19416905 (in Russian).
  40. Dmitry Komashinskiy. Detecting and identifying malicious executable binaries with data mining methods. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.115-125.// https://www.elibrary.ru/item.asp?id=19416910 (in Russian).
  41. Dmitry Komashinskiy. An approach to detect malicious documents based on data mining techniques. Proceedings of SPIIRAS. Issue 3 (26). St.Petersburg, Nauka, 2013. P.126-135.// https://www.elibrary.ru/item.asp?id=19416911 (in Russian).
  42. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services providing complex security on rail transport. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P.40-55. // https://elibrary.ru/item.asp?id=20927238 (in Russian).
  43. Igor Kotenko, Igor Saenko, Andrey Chernov, Maria Butakova. The construction of a multi-level intelligent information security system for automated systems of railway transport. Proceedings of SPIIRAS.Issue 7 (30). SPb: Nauka, 2013. P.7-25. // https://elibrary.ru/item.asp?id=20927233 (in Russian).
  44. Igor Kotenko, Evgenia Novikova. Visual analysis of computer network security assessment // Information and Control Systems, 2013, ¹ 3(64). P.55-61. // https://elibrary.ru/item.asp?id=20927233 (in Russian).
  45. Igor Kotenko, Igor Saenko. Perspective Methods and Models for Computer Networks Security and Security Support for Cyber Security: review of International Conference of MMM-ACNS-2012 and Workshop SA&PS4CS 2012. Management-information systems, 2013, ¹3, P.97-99. // https://www.elibrary.ru/item.asp?id=19082722 (in Russian).
  46. Evgenia Novikova, Igor Kotenko. The design of the visualisation subsystem of the SIEM-system// Information Technologies , ¹ 9, 2013.Moscow, New Technology. P.32-36. // https://elibrary.ru/item.asp?id=20270628 (in Russian).
  47. Igor Kotenko, Igor Saenko. International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012) and the International Workshop "Scientific Analysis and Policy Support for Cyber Security" (SA&PS4CS 2012). Information Security. Inside, 2013, ¹1. P.8-9 . (in Russian).
  48. Igor Kotenko, Igor Saenko. Intellectual services for information security in computer networks and systems. Information Security. Inside, 2013, ¹2. P.32-41. // https://elibrary.ru/item.asp?id=23048068 (in Russian).
  49. Igor Kotenko, Andrey Shorov. Infrastructure attack protection mechanisms based on bio-inspired approach "Network Nervous System". Issues of information Protection, ¹2(101), 2013. P.57-66. // https://elibrary.ru/item.asp?id=35685860 (in Russian).
  50. Igor Kotenko, Evgenia Novikova. Visualisation techniques for security information and event management. Issues of Information Protection, ¹ 3(102), 2013. Ð.33-42. // https://elibrary.ru/item.asp?id=20276387 (in Russian).
  51. Dmitry Komashinskiy, Igor Kotenko. Data mining methods for malware detection: review of state-of-the-art. Issues of information Protection, ¹4(102), 2013. P.21-33. // https://www.elibrary.ru/item.asp?id=20781390 (in Russian).
  52. Igor Kotenko, Igor Saenko. Proposals for the construction of a multi-level intelligent information security system for automated systems of railway transport. Herald of Rostov State Transport University, 2013, ¹3(51). P.69-79. ISSN 0201-727X. // https://elibrary.ru/item.asp?id=20283971 (in Russian).
  53. Igor Kotenko, Igor Saenko, Rafael Yusupov. Perspective models and methods for computer networks security. Herald of the Russian Academy of Sciences, Vol. 83, ¹5, 2013. P. 463. DOI: 10.7868/S086958731305006X // https://elibrary.ru/item.asp?id=19051685 (in Russian).
  54. Sergey Ageev, Igor Saenko, Yury Egorov, Evgeny Zozulya. Adaptive algorithms of flow intensity estimation for multiservice networks. Proceedings of Automation and Control Processes. Issue 1 (31), 2013. P.3-11. (in Russian).
  55. Igor Kotenko, Andrey Shorov. Investigation of bioinspired approaches for protection against infastructure attacks based on simulation framework // Technical sciences - from theory to practice. 2013. No. 17-1. pp. 39-43. // https://elibrary.ru/item.asp?id=20781325 (in Russian).
  56. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Attack modeling in large computer networks. Technical sciences - from theory to practice, ¹17-1, 2013. Novosibirsk: Publishing House «SibAK», 2013. P.12-16. // https://elibrary.ru/item.asp?id=20781320 (in Russian).
  57. Igor Kotenko, Igor Saenko. The system of intelligent information security services for critical infrastructures. Technical sciences - from theory to practice, ¹17-1, 2013. Novosibirsk: Publishing House «SibAK», 2013. P.7-11 // https://elibrary.ru/item.asp?id=20781319 (in Russian).
  58. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Hybrid adaptive information protection system based on "nervous" and neural network biometaphors // Innovations in science, ¹ 16-1, 2013. Novosibirsk:. "SibAK", 2013. P.79-83. // https://elibrary.ru/item.asp?id=18766378 (in Russian).
  59. Dmitry Komashinskiy. Characteristizing the use of data mining methods for malicious software detection. Innovations in Science, ¹16-1, 2013. Novosibirsk, SibAK, 2013. Ð.74-78. (in Russian).
  60. Evgenia Novikova. Visual Models for Presentation of Information about Network Security. Innovations in Science, ¹ 16-1, 2013. Novosibirsk, SibAK, 2013. Ð.116-120. (in Russian).
  61. Fadey Skorik, Igor Saenko. Neural statement assessment model for a distributed information system // Innovations in science, ¹6-1, 2013. Novosibirsk: Publishing House «SibAK», 2013. P.151-155 // https://elibrary.ru/item.asp?id=18766388 (in Russian).
  62. Anna Demyanchuk, Dmitri Moldovyan, Evgenia Novikova, Denis Gurianov. An Approach to Digital Sceme Construction Based on Two Difficult Problems. Information and Control Systems, ¹ 2, 2013. Ð.60-66. (in Russian).
  63. Evgenia Novikova. Visualization of the Logs of the Mobile Money Transfer Services For Detecting Fraudster Activity. Proceedings ETU "LETI". 2013. ¹ 4. Ð.44-48. (in Russian).
  64. Alexey Konovalov, Igor Kotenko, Andrey Shorov. Simulation-Based Study of Botnets and Defense Mechanisms against Them. Journal of Computer and Systems Sciences International, Vol.52, Issue 1, 2013. P.43-65. Pleiades Publishing, Ltd., ISSN 1064-2307. DOI: 10.1134/S1064230712060044.
  65. Dmitry Komashinskiy, Igor Kotenko. Intelligent Data Analysis for Malware Detection. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 1. P.63-74. ISSN 1727-6209.
  66. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Conception of a Hybrid Adaptive Protection of Information Systems. International Journal of Computing. 2013. Vol. 12. ¹ 1. Ñ. 86-98. // https://elibrary.ru/item.asp?id=35263290
  67. Igor Kotenko, Elena Doynikova. Comprehensive Multilevel Security Risk Assessment of Distributed Information Systems. International Journal of Computing, Research Institute of Intelligent Computer Systems, Ternopil National Economic University. 2013, Vol.12, Issue 3. Ð. 217-225 ISSN 1727-6209. https://computingonline.net/computing/article/view/602/564
  68. Andrey Chechulin, Igor Kotenko. Construction of attack graphs for security events correlation. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  69. Igor Kotenko. Attack modeling, security analysis and visualisation in the SIEM-systems. 15th Conference “RusCrypto'2013”. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  70. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure information systems with embedded devices. 15th Conference “RusCrypto”. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  71. Dmitry Komashinskiy, Andrey Chechulin, Igor Kotenko, Andrey Shorov. Categorization of web sites for inadmissible web pages blocking systems. 15th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  72. Igor Kotenko Attack modeling, calculation of the security metrics and visualization in the perspective SIEM-systems. International forum on practical security “Positive Hack Days”. Moscow. May 23-24, 2013. http://www.phdays.ru (in Russian).
  73. Doynikova E.V, Igor Kotenko. Security assessment for the computer networks on the base of the attack graphs and multilevel system of the security metrics. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.18-20. (in Russian).
  74. Igor Kotenko, Igor Saenko, Elena Doynikova, Olga Polubelova. Application of the ontology of the security metrics for the decision support in cyber security. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.32-33. (in Russian).
  75. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking for decision support systems in cyber security. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.75-77. (in Russian).
  76. Vasily Desnitsky. Verification of information flows in process of development secure systems with embedded devices. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.17-18. (in Russian).
  77. Philipp Nesteruk. Development of an adaptive information security service. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.36-37. (in Russian).
  78. Evgenia Novikova. Visual analytics technique for analysis of events of the mobile money system// 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.37-39. (in Russian).
  79. Olga Polubelova. Using ontologies in decision support system for selecting countermeasures. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.41-42 . (in Russian).
  80. Andrey Chechulin. Recognition of malefactors by attack tress analysis. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.141-142. (in Russian).
  81. Igor Saenko, Igor Kotenko, Olga Polubelova, Elena Doynikova. Application of the ontology of the security metrics for the selection of the countermeasures for the computer networks security. International congress IS&IT’13 - International Conference on Artificial Intelligence and Systems. Proceedings. Moskow, Fizmathlit, 2013. Vol.2. P.372-377. ISBN 978-5-9221-1479-0. (in Russian).
  82. Igor Saenko, Igor Kotenko, Ivan Morozov. Use of genetic algorithms for the access control in geographic information systems. International congress IS&IT’13 - International Conference on Artificial Intelligence and Systems.Proceedings. Moskow, Fizmathlit, 2013. Vol.2. P.58-63. ISBN 978-5-9221-1479-0 . (in Russian).
  83. Igor Kotenko, Igor Saenko. On construction a multi-level intelligent information security system for automated systems of railway transport. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.107-108 . (in Russian).
  84. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services of multi-level intelligent system of rail transport complex security. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.91-92. (in Russian).
  85. Igor Kotenko, Evgenia Novikova. An approach to design of the visual analytical system for security information management on Russian Railways. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.106-107. (in Russian).
  86. Igor Kotenko, Igor Saenko, Olga Polubelova, Elena Doynikova. Ontology of the security metrics for the computer network as basis for the selection of the countermeasures. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.108-109. (in Russian).
  87. Andrey Shorov, Andrey Chechulin, Igor Kotenko. Categorization of web sites for inadmissible web pages blocking systems by textual and graphical content analysis. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.129-130. (in Russian).
  88. Igor Kotenko. Intellectual information security services in security monitoring and management systems of critical infrastructures. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. (in Russian).
  89. Andrey Chechulin. Application of analytical attack modeling for security level increasing of distributed information systems. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.127-128. (in Russian).
  90. Vasily Desnitsky. Information flow verification in systems with embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.92-93. (in Russian).
  91. Vasily Desnitsky. A technique for configuring secure embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.93-94. (in Russian).
  92. Doynikova E.V. Approach to the security analysis for the distributed information systems on the base of the security metrics. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.94-95. (in Russian).
  93. Philipp Nesteruk. Trends in development of information security adaptive systems. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.117-118. (in Russian).
  94. Evgenia Novikova. Detection of the anomalous activity in mobile money system using visual analytics techniques. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.120. (in Russian).
  95. Olga Polubelova. The strategies of firewall filtration rule anomaly resolution.VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.62-63. (in Russian).
  96. Valery Kuvayev, Igor Saenko. Access control to the resources of a common information space in the course of their integration in the automated systems for special purpose. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.85-86 . (in Russian).
  97. Sergey Ageev, Igor Saenko. Intelligent methods for security management in protected multi-service networks. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.51-52 . (in Russian).
  98. Fadey Skorik, Igor Saenko. The technology of "spread spectrum" to ensure the security of wireless networks. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.74-75 . (in Russian).
  99. Elena Doynikova. Development of the decision support system for the proactive response on the incidents of the information security. 18th St.Petersburg assembly of the young scientists and specialists. Proceedings.St.Petersburg, 2013. P.146. (in Russian).
  100. Evgenia Novikova , Jana Mondikova. Towards design of practical work "Blind digital signature" for "Criptographical Protocols" course. XIX International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 24, 2013. P.135-136. (in Russian).
  101. Evgenia Novikova. The usage of interactive technologies in practical works for "Information system intrusion techniques and computer virology" course. XIX International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 24, 2013. Ñ.178-179. (in Russian).
  102. Anna Demjanchuk, Evgenia Novikova, Dmitrii Moldovyan. An approach for security level enforcement of the zero-knowledge authentication protocols. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.51-52. (in Russian).
  103. Igor Kotenko, Andrey Shorov, Evgenia Novikova. Simulation of protection mechanisms based on "Nervous network system" against infrastructure attacks // Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February – 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.526-533. DOI: 10.1109/PDP.2013.85 // https://elibrary.ru/item.asp?id=20428025
  104. Evgenia Novikova, Igor Kotenko. Analytical Visualization Techniques for Security Information and Event Management. Proceedings of the 21th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2013). Belfast, Northern Ireland, UK. 27th February – 1st March 2013. Los Alamitos, California. IEEE Computer Society. 2013. P.519-525. DOI: 10.1109/PDP.2013.84 // https://elibrary.ru/item.asp?id=20427992
  105. S.A. Ageev, I.B. Saenko, Yu.P. Egorov, E.I. Zozulya, A.A. Gladkikh A.A. Adaptive algorithms for estimating traffic intensity in multiservice communication networks // Automation of control processes. 2013. No. 1. pp. 3-11. // https://elibrary.ru/item.asp?id=18901326 (in Russian).
  106. D.V. Komashinsky. Characteristizing the use of data mining methods for malicious software detection // Innovations in Science. 2013. No. 16-1. pp. 74-78. // https://www.elibrary.ru/item.asp?id=18766377 (in Russian).
  107. F.A. Skorik, I.B. Saenko, O.I. Pantyukhin. Software reliability evaluation of the distributed information system // In the collection: Current problems of infotelecommunications in science and education. II International Scientific-technical and scientific-methodical Conference. 2013. pp. 220-223.// https://www.elibrary.ru/item.asp?id=21939880 (in Russian).
  108. V. Bogdanov, I. Kotenko. Policy-based proactive monitoring of security policy performance // Communications in Computer and Information Science. 2013. Ò. 374. ¹ Part II. Ñ. 197-212. DOI: 10.1007/978-3-540-73986-9-17 // https://www.elibrary.ru/item.asp?id=21887939

2012

  1. Igor Kotenko, Andrey Chechulin, Evgenia Novikova. Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012. International Conference on Security and Cryptography. Proceedings. Rome, Italy. 24–27 July 2012. P.391-394. // https://elibrary.ru/item.asp?id=20496746
  2. Igor Kotenko, Andrey Chechulin. Attack Modeling and Security Evaluation in SIEM Systems // International Transactions on Systems Science and Applications. 2012. Ò. 8. Ñ. 129-147. // https://elibrary.ru/item.asp?id=28867303
  3. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Discrete-Event Simulation of Botnet Protection Mechanisms // In book: Discrete Event Simulations - Development and Applications DOI: 10.5772/50101
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration-based approach to embedded device security. Lecture Notes in Computer Science, Springer-Verlag // Lecture Notes in Computer Science. 2012. Ò. 7531 LNCS. Ñ. 270-285. DOI: 10.1007/978-3-642-33704-8_23 // https://elibrary.ru/item.asp?id=20474247
  5. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. An Approach for Network Information Flow Analysis for Systems of Embedded Components // Lecture Notes in Computer Science. 2012. Ò. 7531 LNCS. Ñ. 146-155. DOI: 10.1007/978-3-642-33704-8_13 // https://elibrary.ru/item.asp?id=20474240
  6. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent‐based simulation of cooperative defence against botnets // Concurrency and Computation Practice and Experience 24(6):573 - 588, April 2012. DOI:10.1002/cpe.1858
  7. Igor Kotenko, Andrey Chechulin and Elena Doynikova. Analytical Attack Modeling in Security Information and Event Management Systems. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.27-28. // https://elibrary.ru/item.asp?id=28166372
  8. Igor Kotenko, Andrey Chechulin. Common Framework for Attack Modeling and Security Evaluation in SIEM Systems // Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CPSCom 2012. 2012. Ñ. 94-101. DOI: 10.1109/GreenCom.2012.24 // https://elibrary.ru/item.asp?id=20475202
  9. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Technologies of security information and event management for computer network protection // Computer systems. ¹ 3, 2012. P.57-68. // https://elibrary.ru/item.asp?id=17867303 (in Russian).
  10. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuring of combined protection components for embedded devices by solving optimality task // Highly Available Systems. 2012. Ò. 8. ¹ 2. Ñ. 50-56. eLIBRARY ID: 17997821 (in Russian).
  11. Adil Timofeev, Alexander Branitsky Research and modeling of a neural network method for detecting and classifying network attacks // International Journal "Information Technologies and Knowledge" vol. 6, No. 3, Ð. 257-265.2012 // https://elibrary.ru/item.asp?id=48242804 (in Russian).
  12. M.V. Buinevich, K.E. Izrailov. Method of algorithmization of machine code of telecommunication devices // Telecommunications. 2012. No. 12. pp. 2-6. // https://elibrary.ru/item.asp?id=20807602 (in Russian).
  13. K. E. Izrailov. Model of forecasting the telecommunication system threats on the basis of the artificial neural network // Bulletin of the Injecon. Series: Technical Sciences. 2012. No. 8 (59). pp. 150-153.// https://www.elibrary.ru/item.asp?id=18244835 (in Russian).
  14. K.E. Izrailov. Consideration of program code representations from the perspective of metadata // In the collection: Fundamental Research and Innovation in national research Universities. Materials of the All-Russian Scientific and Methodological Conference. 2012. pp. 176-180.// https://elibrary.ru/item.asp?id=28772707 (in Russian).
  15. K.E. Izrailov, A.Yu. Vasilyeva. Language of description of the telecommunication network security model // In the collection: New Information technologies and Systems (NITiS-2012). Proceedings of the X International Scientific and Technical Conference. 2012. pp. 272-275. // https://elibrary.ru/item.asp?id=28771694 (in Russian).
  16. N.V. Tushkanov, O.N. Tushkanova. Procedures of collective learning and self-organization in multisensory and multi-agent systems // In the collection: The 5th Russian Multi-conference on Management Problems. materials of the conference "Information Technologies in Management" (ITU-2012). 2012. pp. 253-258 // https://elibrary.ru/item.asp?id=21718380 (in Russian).
  17. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration of secure systems with embedded and mobile devices // Information security issues. 2012. No. 2 (97). pp. 20-28. // https://elibrary.ru/item.asp?id=17795186 (in Russian).
  18. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. Network protection methods based on bio-inspired approaches // Issues of information Protection,2012, ¹2(97), P.35-46. // https://elibrary.ru/item.asp?id=17795188 (in Russian).
  19. Dmitry Komashinskiy, Igor Kotenko. Investigation of structural specificities of malicious documents by DATA MINING // Information Technologies and Computing Systems, ¹ 2, 2012, P.76-92. // https://www.elibrary.ru/item.asp?id=18963329 (in Russian).
  20. Dmitry Komashinskiy, Igor Kotenko. Detecting malicious portable document format files with data mining techniques // Problems of information security. Computer systems. ¹ 1, 2012, P.19-35. // https://www.elibrary.ru/item.asp?id=17695523 (in Russian).
  21. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Information flow analysis techniques for development of secure systems which includes embedded systems // High availability systems. 2012. Vol. 8. No. 2. pp. 116-122 // https://elibrary.ru/item.asp?id=17997830 (in Russian).
  22. Olga Polubelova, Igor Kotenko, Igor Saenko, Andrey Chechulin. Applying ontologies and logical inference for security information and event menegement // High availability systems, Vol.8, ¹ 2, 2012. P.100-108. // https://elibrary.ru/item.asp?id=17997828 (in Russian).
  23. Evgenia Novikova, Igor Kotenko. Visualization techniques in siem-systems // High availability systems, Vol. 8, ¹ 2, 2012. P.91-99. // https://elibrary.ru/item.asp?id=17997827 (in Russian).
  24. Vasily Desnitsky, Igor Kotenko. A model for configuring protected and energy-efficient embedded systems. Journal of Instrument Engineering, Vol.55, ¹ 11, 2012. P.52–57. // https://www.elibrary.ru/item.asp?id=18045936 (in Russian).
  25. Dmitry Komashinskiy, Igor Kotenko. An extraction method for structural features to detect harmful software. Journal of Instrument Engineering, Vol.55, ¹ 11, 2012. P.58-63. // https://www.elibrary.ru/item.asp?id=18045937 (in Russian).
  26. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Application of the methods of security event and information management for information protection in the critical infrastructures. Proceedings of SPIIRAS. Issue 1 (20). St.Petersburg, Nauka, 2012. P.27-56. // https://elibrary.ru/item.asp?id=17918594 (in Russian).
  27. Igor Kotenko, Andrey Shorov. Simulation of the Protection Mechanisms against Infrastructural Attacks based on “Nervous Network System”. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.45–70. // https://www.elibrary.ru/item.asp?id=17918623 (in Russian).
  28. Igor Kotenko, Igor Saenko. Developing the system of intelligent services to protect information in cyber warfare // Proceedings of SPIIRAN. 2012. No. 3 (22). pp. 84-100. // https://elibrary.ru/item.asp?id=17918625 (in Russian).
  29. Olga Polubelova, Igor Kotenko. Verification of security policy filtering rules containing temporal parameters by Model Checking. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.113-138. // https://elibrary.ru/item.asp?id=17918627 (in Russian).
  30. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Methods and tools for simulation of attacks in large computer networks: state of the problem. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.5-30. // https://elibrary.ru/item.asp?id=17918621 (in Russian).
  31. Dmitry Kotenko, Igor Kotenko, Igor Saenko. Methodology of iterative attack modelling in large computer networks. Proceedings of SPIIRAS. Issue 4 (23). St. Petersburg, Nauka, 2012. P.50-79. // https://elibrary.ru/item.asp?id=18263541 (in Russian).
  32. Igor Kotenko, Philipp Nesteruk, Andrey Shorov. The concept of adaptive security of information technology systems based on paradigms of neural and nervous networks. Proceedings of SPIIRAS. Issue 4 (23). St. Petersburg, Nauka, 2012. P.100-115.// https://elibrary.ru/item.asp?id=18263544 (in Russian).
  33. Evgenia Novikova, Igor Kotenko. The analysis of the visualization techniques to ensure the protection of information in computer networks // Proceedings of SPIIRAS. Issue.4 (23). SPb.: Science, 2012. Pp. 7-29.// https://www.elibrary.ru/item.asp?id=18263539 (in Russian).
  34. Andrey Kii, Yan Kopchak, Igor Saenko, Andrey Kozlenko. Dynamic access control of information resources in critical infrastructures based on the users’ information profiles // Proceedings of SPIIRAS. Issue 2 (21). St. Petersburg, Nauka, 2012. P.5-20.// https://elibrary.ru/item.asp?id=17918606 (in Russian).
  35. Andrey Kozlenko, Vladimir Avramenko, Igor Saenko, Andrey Kii. Method of assessing the level of information protection against unauthorized access in computer networks on the basis of the security graph // Proceedings of SPIIRAS. Issue 2 (21). St. Petersburg, Nauka, 2012. P.41-55. // https://elibrary.ru/item.asp?id=17918608 (in Russian).
  36. Alexandr Demidov, Oleg Nikiforov, Igor Saenko. Development of the concept of information security of information technology systems of state authorities. Proceedings of SPIIRAS. Issue 3 (22). St. Petersburg, Nauka, 2012. P.71-83 // https://elibrary.ru/item.asp?id=17918624 (in Russian).
  37. Evgenia Novikova. The Design of the New Course "Computer Virology and Intrusion Methods Detection" As Renovation of the Basis Course. Proceedings ETU «LETI». 2012. ¹ 4. P.44-48. (in Russian).
  38. S.V. Alyshev, I.B. Saenko, V.A. Kudryashov, E.V. Oparin. Automating of planning of transport columns mo vement in emergency situations on the basis of geoinformation technology // Izvestia of the St. Petersburg University of Railway Communications. 2012. No. 2 (31). pp. 99-105. // https://www.elibrary.ru/item.asp?id=20213876 (in Russian).
  39. Igor Saenko, Anton Nizhegorodov. Analysis of the problem of access control in automated systems based on database security assessment. // In the world of scientific discoveries. 2012. No. 8 (32). pp. 11-21. // In the world of scientific discoveries. 2012. No. 8 (32). pp. 11-21. (in Russian).
  40. Sergey Ageev, Igor Saenko, Yuriy Egorov, Aleksandr Gladkih. About development of mathematical-model system for control of protected multi-service network // Proceedings of Automation and Control Processes. Issue. No 3 (29), 2012. P.8-18. // https://elibrary.ru/item.asp?id=17990850 (in Russian).
  41. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Investigative Simulation of Botnets and Defence Mechanisms against them. Appendix to the Information Technologies Journal. Moscow, New Technology, 2012, ¹1. 32 pages. ISSN 1684-6400. (in Russian).
  42. Igor Kotenko, Elena Doynikova. SCAP protocol overview. Information Security. Inside, ¹2(44), 2012. P.56-63 // https://elibrary.ru/item.asp?id=23063431 (in Russian).
  43. Igor Kotenko, Elena Doynikova, Andrey Chechulin. Total enumeration and classification of attack patterns (CAPEC): description and application examples. Information Security. Inside, ¹ 4(46), 2012. P.54-66 // https://elibrary.ru/item.asp?id=23063462 (in Russian).
  44. Igor Kotenko, Igor Saenko. SIEM-systems for security information and event management. Information Security. Inside, 2012. ¹ 5 (47). Ñ. 54-65. // https://elibrary.ru/item.asp?id=23063477 (in Russian).
  45. Igor Kotenko, Igor Saenko, Rafael Yusupov. Intelligent security services as cybernetic counteraction tool . Scientific-Practical Proceedings on information counteraction problems, The Security Council of the Russian Federation. Moskow, 2012. (in Russian).
  46. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based simulation of cooperative defense against botnets. Concurrency and Computation: Practice and Experience, Vol. 24, Issue 6, 2012. Ð.573-588.
  47. Igor Kotenko, Andrey Shorov, Philipp Nesteruk. The analysis of bio-inspired approaches to protect computer systems and networks. XVI All-Russian Scientific Conference «Neuroinformatics-2012». Proceedings.Issue 2. Moscow, MIPI, 2012. P.61-71. (in Russian).
  48. Igor Kotenko. Analytical attack modeling and event processing in security event and information management systems. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  49. Jose Fran. Ruiz, Vasily Desnitsky. Design of protected telecommunication systems with embedded devices. 14th Conference “RusCrypto'2012”. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  50. Colin Fidge, Andrey Chechulin. Information flow analysis for development of secure systems with embedded devices. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  51. Olga Polubelova. Application of the ontological approaches and logical inferences to security event and information management. 14th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  52. Igor Kotenko. Cyberwars of software agents: application of the intelligent agent teamwork theory for cyber army building. International forum on practical security “Positive Hack Days”. Moscow. May 30-31, 2012. http://www.phdays.ru (in Russian).
  53. Vasily Desnitsky, Igor Kotenko. Configuring information and telecommunication systems with embedded devices. 21th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012.P.14-17. (in Russian).
  54. Elena Doynikova, Dmitry Kotenko, Igor Kotenko. Analysis of the intrusions using attack and service dependency graphs. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.45-47. (in Russian).
  55. Igor Kotenko, Andrey Chechulin. Analytical attack modeling in security event and information management systems. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.57-58. (in Russian).
  56. Philipp Nesteruk, Igor Kotenko. Formation of fuzzy knowledge base for adaptive information protection systems. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.64-65. (in Russian).
  57. Igor Saenko, Igor Kotenko, Olga Polubelova. The use of an ontological approach to construct a vulnerabilities’ model based on the SCAP. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.74-76. (in Russian).
  58. Andrey Chechulin, Vasily Desnitsky, Igor Kotenko. Information flow analysis for development of secure systems with embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.35-37. (in Russian).
  59. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities between security components in design process of secure embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.17-19. (in Russian).
  60. Vasily Desnitsky. Modeling of non-functional protection properties in the process of configuration of secure embedded devices. 21th Àll-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.12-14. (in Russian).
  61. Dmitry Komashinskiy. Detection systems based on Data Mining and their precision heightening methods. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.159-160. (in Russian).
  62. Evgenia Novikova. Attack graph visualization techniques. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.69-70. (in Russian).
  63. Andrey Chechulin. Technique for evaluation of the efficiency of combined protection against network scanning. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.79-81. (in Russian).
  64. Andrey Shorov. Protection against Attacks on Computer Networks Infrastructure based on “Nervous Network System” Approach. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.81-82. (in Russian).
  65. Sergey Ageev, Igor Saenko. On the models of the coordination of protected multiservice networks management. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.39-40. (in Russian).
  66. Anton Nizhegorodov, Igor Saenko. The management of information and telecommunications system security in creating a unified system of access control to information resources. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.65-67. (in Russian).
  67. Igor Kotenko, Andrey Chechulin. Analytical attack modeling for security event and information management. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol.1. P.385-391. // https://www.elibrary.ru/item.asp?id=29293575 (in Russian).
  68. Igor Kotenko, Igor Saenko. The use of genetic algorithms in optimization problems of the information access control. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol.1. P.40-45. (in Russian).
  69. Olga Polubelova, Igor Kotenko, Igor Saenko. Ontological approach to the construction of intelligent services for security event storage and processing. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P.394-399. (in Russian).
  70. Vasily Desnitsky. Configuring combined protection components for embedded system protection on the base of solving optimality task. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P.383-384. (in Russian).
  71. Igor Kotenko, Rafael Yusupov. Cybersecurity: current state and development trends. The St.Petersburg Scientific Forum “Science and Society. Information technologies”. Seventh St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2012. P.55-56. (in Russian).
  72. Andrey Shorov, Igor Kotenko. The Bioinspired Approaches to Protect Computer Networks from Infrastructure Attacks. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St. Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg. P.149-150. (in Russian).
  73. Evgenia Novikova, Chechulin A.A., Igor Kotenko. Visualisation techniques for computer attack counteraction in security information and event management systems. St. Petersburg Scientific Forum "Science and Society". "Science and Mankind Progress". VII St.Petersburg Nobel Prize Laureates Meeting. Proceedings. St.Petersburg, Russia. P.151-152. (in Russian).
  74. Igor Kotenko, Rafael Yusupov. Current state and development trends in the field of construction of secure computer systems. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.671-675. // https://www.elibrary.ru/item.asp?id=21721941 (in Russian).
  75. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure embedded systems in European Union project SecFutur. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.699-708. // https://www.elibrary.ru/item.asp?id=21718338 (in Russian).
  76. Andrey Chechulin, Igor Kotenko, Evgenia Novikova, Elena Doynikova. Attacks and protection mechanisms in the security event and information management. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.735-739. // https://elibrary.ru/item.asp?id=21721925 (in Russian).
  77. Olga Polubelova, Igor Kotenko, Igor Saenko. Methods of data presentation and inference information management and security event // 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.723-728. // https://elibrary.ru/item.asp?id=21720290 (in Russian).
  78. Sergey Ageev, Igor Saenko, Evgeniy Zozulja. Methods of interlayer criteria coordination for the operation of a protected multi-service network. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.77. (in Russian).
  79. Vasily Desnitsky. Analysis of approaches to development of anytime algorithms to solve computationally complex problems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.90. (in Russian).
  80. Vasily Desnitsky. Configuring secure embedded devices on the base of non-functional protection properties. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.91. (in Russian).
  81. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities of security components in embedded devices. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.93. (in Russian).
  82. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Using anytime algorithms of attack modeling and security evaluation in SIEM systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P. 92. (in Russian).
  83. Elena Doynikova, Igor Kotenko. Integrated approach for security metric set constructing for risk assessment and reaction to intrusions. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.94. (in Russian).
  84. Igor Kotenko, Philipp Nesteruk. On the development of an adaptive information protection system for computer networks. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.102. (in Russian).
  85. Dmitry Krutov, Igor Saenko. Information approach to the implementation of a multi-agent system for information security. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.103-104 // https://elibrary.ru/item.asp?id=35100288 (in Russian).
  86. Ivan Morozov, Igor Saenko. Information Access control in geographic information systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St.Petersburg, 2012. P.111. (in Russian).
  87. Philipp Nesteruk. Technique of adaptive information protection system development. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St.Petersburg, 2012. P.113. (in Russian).
  88. Philipp Nesteruk. Of important tasks that provide adaptive security of IT systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St.Petersburg, 2012. P.112. (in Russian).
  89. Anton Nizhegorodov, Igor Saenko. On the establishment of systems for the protection of cloud-based information systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.114. (in Russian).
  90. Evgenia Novikova. Techniques of the visual analysis for computer network security assessment. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St.Petersburg, 2012. P.114. (in Russian).
  91. Evgenia Novikova. Design of the visualization component for security event and information management. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. Ð.115 (in Russian).
  92. Olga Polubelova. Applying of linear temporal logic to verification of security policy filtering rules by model checking. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.121. (in Russian).
  93. Andrey Chechulin, Igor Kotenko. Attack graph building based on malefactor models and information on vulnerabilities and attack patterns. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129-130. // https://www.elibrary.ru/item.asp?id=35097362 (in Russian).
  94. Andrey Chechulin. Malefactor goals recognition based on analysis of security events and attack graphs. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129-130. // https://elibrary.ru/item.asp?id=73016753 (in Russian).
  95. Andrey Chechulin, Vasily Desnitsky. Information flow analysis in the task of embedded system analysis. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129. (in Russian).
  96. Andrey Shorov. The Bioinspired Approach of “Nervous Network System” for the Protection of Computer Networks against Infrastructure Attacks. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.132. (in Russian).
  97. Igor Saenko, Anton Nizhegorodov, Aleksey Kabanov. Concerning the need of a unified system for access control to information resources in automated systems // Collection of scientific papers SWorld. 2012. Vol. 4. No. 1. pp. 28-29. /https://www.elibrary.ru/item.asp?id=17731145 (in Russian).
  98. Igor Saenko, Anton Nizhegorodov. The impact of protection of information resources in an integrated critical infrastructure security. IV All-Russian Scientific-Practical Conference "Security in an emergency". St. Petersburg, Collection of scientific papers , Polytechnical University Publishing House, 2012. P.151-154. (in Russian).
  99. Dmitry Moldovyan, Evgenia Novikova, Alexey Rizhkov, I. Vasiliev. The collective digital signature with message recovery. 65 conference of the teaching stuff of the St. Petersburg State Electrotechnical University, Proceedings. St. Petersburg. Russia. January 24 - February 4, 2012. P.115-119. (in Russian).
  100. Anna Demyanchuk, Dmitry Moldovyan, Evgenia Novikova. Zero knowledge protocols of "request-response" type. All-Army Scientific Conference" Innovations in the Armed Forces of the Russian Federation". Proceedings. St.Petersburg, Russia. November 29-30, 2012. P.144-148. (in Russian).
  101. Evgenia Novikova. Visual models for computer network security analysis. XVII St.Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.196. (in Russian).
  102. Philipp Nesteruk. Research and development of perspective means of intelligent information protection for industrial systems of the city management. XVII St.Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012 St. Petersburg., 2012. P.195-196. (in Russian).
  103. Andrey Chechulin. Development of an advanced intrusion detection system. XVII St. Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.196. (in Russian).
  104. Evgenia Novikova. Education technologies for teaching network intrusion detection providing adaptive mobility of the specialists in computer security. XVIII International Scientific and Practical Conference "Modern education: content, technology, quality". Proceedings. St. Petersburg, Russia. April 18, 2012, Ò.1. P.221-222. (in Russian).
  105. Tatyana Nesteruk, Lesya Nesteruk, Philipp Nesteruk. Modern trends of knowledge management. Scientific and Practical Conference "Information aspects of economy". Proceedings. Editorial Board.: M.Y.Chirkov. SPb.: SPbGIEU, 2012. P.152-158. (in Russian).
  106. Vasily Desnitsky. Development of model and software tool for configuring and security control in corporative distributed information systems with embedded and mobile devices. XVII St. Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.195. (in Russian).
  107. Igor Saenko, Igor Kotenko. Design and Performance Evaluation of Improved Genetic Algorithm for Role Mining Problem. Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2012). Garching/Munich, February, 2012. P.269-274. DOI: 10.1109/PDP.2012.31 // https://elibrary.ru/item.asp?id=17990577
  108. Jose Fran. Ruiz, Vasily Desnitsky, Rajesh Harjani, Antonio Manna, Igor Kotenko and Andrey Chechulin. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components // Â ñáîðíèêå: Proceedings - 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012. 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012. Garching, 2012. Ñ. 261-268. DOI: 10.1109/PDP.2012.36 // https://www.elibrary.ru/item.asp?id=17990791
  109. Igor Kotenko, Olga Polubelova, Igor Saenko. Hybrid Data Repository Development and Implementation for Security Information and Event Management. Proceedings of the Work in Progress Session held in connection with the 20th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2012). Garching/Munich, February 2012. SEA-Publications. SEA-SR-31. 2012. P.29-30.
  110. D. Komashinskiy and Igor Kotenko. Using Low-Level Dynamic Attributes for Malware Detection based on Data Mining Methods // Lecture Notes in Computer Science. 2012. Ò. 7531 LNCS. Ñ. 254-269. DOI: 10.1007/978-3-642-33704-8_22 // https://www.elibrary.ru/item.asp?id=20474238
  111. Alexandr Moldovyan, Nikolay Moldovyan, Evgenia Novikova. Blind 384-bit Digital Signature Scheme. Lecture Notes in Computer Science, Springer-Verlag, Vol. 7531. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.77-83.
  112. Igor Kotenko. Cyber Wars of Intelligent Agents in the Internet. The Second International Workshop “Scientific Analysis and Policy Support for Cyber Security” (SA&PS4CS 2012). St. Petersburg, Russia, October 20, 2012. P.10.
  113. Igor Kotenko, Olga Polubelova, Igor Saenko. Data Repository for Security Information and Event Management in service infrastructures // SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography. 2012. Ñ. 308-313. // https://elibrary.ru/item.asp?id=20496612
  114. Igor Kotenko, Andrey Shorov. Simulation of Protection Mechanisms against Botnets on The Basis of “Nervous Network” Framework. Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications (SIMULTECH 2012), SciTePress, 2012. P.164-169. // https://www.elibrary.ru/item.asp?id=20497014
  115. Igor Kotenko, Olga Polubelova, Igor Saenko. The Ontological Approach for SIEM Data Repository Implementation. 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing. Besançon, France, September 11-14, 2012. Los Alamitos, California. IEEE Computer Society. 2012. P.761-766. DOI: 10.1109/GreenCom.2012.125 // https://elibrary.ru/item.asp?id=20475186
  116. F. Sailhan, H. Ning, I. Kotenko. Message from the ITHINGS 2012 program co-chairs // Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CPSCom 2012. 2012. Ñ. 6468422. DOI: 10.1109/GreenCom.2012.144 // https://www.elibrary.ru/item.asp?id=20475195
  117. I.B. Saenko, A.V. Nizhegorodov,A.S. Kabanov. The need for a unified system to control access to information resources in automated systems // Modern Scientific Research and their Practical Application. 2012. Vol. 21208. ¹ 2. Ñ. 44-46.// https://www.elibrary.ru/item.asp?id=28315730

2011

  1. N. Tushkanov, O. Tushkanova, V. Nazarov, A. Kuznetsova. Multi-sensor system of intellectual handling robot control on the basis of collective learning paradigm // Advances in Intelligent and Soft Computing. 2011. Ò. 123. Ñ. 195-200. DOI: 10.1007/978-3-642-25661-5_26 // https://elibrary.ru/item.asp?id=18031742
  2. Vasily Desnitsky. Configuring embedded and mobile devices on the basis of solving an optimization problem // Proceedings of SPIIRAN. 2011. No. 4 (19). p. 221. https://www.elibrary.ru/item.asp?id=17288946 (in Russian).
  3. N.B. Tushkanov, A.V. Kuznetsova, V.A. Nazarov, O.N. Tushkanova, D.A. Lyubvin. Construction of multisensory systems of collective control and recognition // News of higher educational institutions. Electromechanics. 2011. No. 1. pp. 54-62. // https://elibrary.ru/item.asp?id=16209770 (in Russian).
  4. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Security analysis of information systems taking into account social engineering attacks. Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, 9-11 February, 2011. Los Alamitos, California. IEEE Computer Society. 2011. P.611-618. DOI: 10.1109/PDP.2011.62 // https://elibrary.ru/item.asp?id=16984038
  5. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based simulation of cooperative defence against botnets // Concurrency Computation Practice and Experience. 2012. Ò. 24. ¹ 6. Ñ. 573-588. DOI: 10.1002/cpe.1858 // https://www.elibrary.ru/item.asp?id=17979717
  6. Igor Saenko, Igor Kotenko. Genetic Algorithms for Role Mining Problem. Proceedings of the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, 9-11 February, 2011. Los Alamitos, California. IEEE Computer Society. 2011. P.646-650. DOI: 10.1109/PDP.2011.63 // https://elibrary.ru/item.asp?id=16989134
  7. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. An abstract model for embedded systems and intruders // Proceedings of the Work in Progress Session held in connection with the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, February 2011. SEA-Publications. SEA-SR-29. 2011. P.25-26. ISBN 978-3-902457-29-5. // https://www.elibrary.ru/item.asp?id=28132924
  8. Igor Kotenko. Cyber Security: Current State and Future Landscape. View from Russia. The Interface of Science, Technology & Security: Areas of most Concern, Now and Ahead. APCSS SEMINAR Proceedings, Honolulu, Hawaii, 4-8 October 2010. Asia-Pacific Center for Security Studies. USA. 2011. Ð.79-81
  9. Igor Kotenko, Olga Polubelova. Verification of Security Policy Filtering Rules by Model Checking. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2011). Prague, Czech Republic, 15-17 September 2011. P.706-710. ISBN 978-1-4244-4882-1. DOI: 10.1109/IDAACS.2011.6072862 // https://elibrary.ru/item.asp?id=18016546
  10. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of botnets and protection mechanisms against them: software environment and experiments. 16th Nordic Conference on Secure IT-Systems. October 26th-28th, 2011. Tallinn, Estonia, Preproceedings, Cybernetica, 2011. P.119-126.
  11. Igor Kotenko, Andrey Chechulin, Elena Doynikova. Combining of Scanning Protection Mechanisms in GIS and Corporate Information Systems // Lecture Notes in Geoinformation and Cartography. Ñåð. "Information Fusion and Geographic Information Systems: Towards the Digital Ocean, IF and GIS 2011" 2011. Ñ. 45-58. DOI: 10.1007/978-3-642-19766-6_5 // https://elibrary.ru/item.asp?id=20528069
  12. Igor Kotenko, Igor Saenko, Rafael Yusupov. Protection of Information Resources in Computer Networks. Herald of the Russian Academy of Sciences, Vol.81, ¹8, 2011. P.746-747. ISSN 1019:3316. // https://elibrary.ru/item.asp?id=16537831 (in Russian).
  13. Igor Kotenko, Igor Saenko, Rafael Yusupov. Scientific Analysis and Policy Support for Security in Cyberspace. Herald of the Russian Academy of Sciences, Vol.81, ¹ 9, 2011. P.844-845. ISSN 1019:3316. // https://www.elibrary.ru/item.asp?id=16893140 (in Russian).
  14. Igor Kotenko, Philipp Nesteruk, Andrey Chechulin. Combining of scanning detection mechanisms in computer networks // Information security issues. 2011. No. 3 (94). pp. 30-34 // https://elibrary.ru/item.asp?id=17306706 (in Russian).
  15. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Agent-based modeling and simulation of botnets and botnet defense // Protection issues of information, 2011, ¹ 3(94), P.24-29. // https://www.elibrary.ru/item.asp?id=17306705 (in Russian).
  16. Vasily Desnitsky, Andrey Chechulin. Models of development of secure embedded systems // High availability systems. 2011. Vol. 7. No. 2. pp. 97-101.// https://www.elibrary.ru/item.asp?id=17098471 (in Russian).
  17. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of botnets and defense mechanisms against them // High availability systems. 2011. Vol. 7. No. 2. pp. 107-111.// https://www.elibrary.ru/item.asp?id=17098473 (in Russian).
  18. Igor Saenko, Igor Kotenko. Genetic optimization of role-based access schemes // High availability systems, No.2, 2011. P.112-116. // https://www.elibrary.ru/item.asp?id=17098474 (in Russian).
  19. Igor Kotenko, Mikhail Stepashkin, Elena Doynikova. Protection analysis of information systems taking into account social engineering attacks. Problems of information security. Computer systems. 2011, ¹ 3. P.40-57 // https://elibrary.ru/item.asp?id=17077012 (in Russian).
  20. Igor Kotenko, Mikhail Stepashkin, Dmitry Kotenko, Elena Doynikova. Information systems security evaluation on the base of social engineering attacks trees. Journal of Instrument Engineering , Ò.54, ¹ 12, 2011. P.5-9. ISSN 0021-3454. (in Russian).
  21. Igor Kotenko, Andrey Shorov. The use of biological metaphors to protect computer systems and networks: a preliminary analysis of the basic approaches. Information Security // Information Security. Inside, 2011. ¹ 2(38), P.66-75. // https://www.elibrary.ru/item.asp?id=23134092 (in Russian).
  22. Igor Kotenko, Vasily Desnitsky, Andrey Chechulin. Investigation of technologies for secure embedded systems design in European Union project SecFutur. Information Security. Inside, ¹ 3(39), 2011. P.68-75.// https://www.elibrary.ru/item.asp?id=23134338 (in Russian).
  23. Igor Kotenko, Elena Doynikova. Vulnerabilities assessment techniques: use for the computer systems security analysis. Information Security. Inside, ¹ 49;0), 2011. P.74-81. // https://elibrary.ru/item.asp?id=23099965 (in Russian).
  24. Igor Kotenko, Elena Doynikova. CVSS vulnerability assessment system and its use for computer system security analysis // Information Security. Inside, ¹ 5(41), 2011. P.54-60 // https://elibrary.ru/item.asp?id=23099118 (in Russian).
  25. Igor Kotenko, Elena Doynikova. Misuse and configuration scoring systems (CMSS and CCSS) for the unified computer systems security analysis. Information Security. Inside, ¹ 6(42), 2011. P.52-60. // https://elibrary.ru/item.asp?id=23093443 (in Russian).
  26. Yury Sineshchuk, Aleksander Philippov, Sergey Terehin, Denis Nikolaev, Igor Saenko. Structural-logical method of the safety analysis of the potentially dangerous objects // Proceedings of SPIIRAS. Issue 2 (17). St.Petersburg, Nauka, 2011. P.55-69. // https://elibrary.ru/item.asp?id=17103969 (in Russian).
  27. Igor Kotenko, Andrey Shorov, Philipp Nesteruk. Analysis of bio-inspired approaches for protection of computer systems and networks // Proceedings of SPIIRAS. Issue 3 (18). St.Petersburg, Nauka, 2011. P.19-73. // https://elibrary.ru/item.asp?id=17103979 (in Russian).
  28. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of protection mechanisms against botnets. Proceedings of SPIIRAS. Issue 4 (19). St.Petersburg, Nauka, 2011. Ð. 7. // https://www.elibrary.ru/item.asp?id=17288935 (in Russian).
  29. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Constructing and testing secure embedded systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Selected Proceedings. St. Petersburg, 2011. P.115-121. // https://www.elibrary.ru/item.asp?id=29293611 (in Russian).
  30. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Simulation of defense against botnets in the Internet. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Selected Proceedings. St. Petersburg, 2011. P.121-132. (in Russian).
  31. Andrey Chechulin, Igor Kotenko. Combining of scanning detection mechanisms. The Ninth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  32. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Abstract model for embedded secure systems. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  33. Alexey Konovalov, Igor Kotenko, Andrey Shorov. The experiments for exploring of botnets. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  34. Andrey Chechulin, Vasily Desnitsky. Intruder model for provision of embedded systems security. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  35. Igor Kotenko. Modeling and analysis of the cybersecurity mechanisms. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  36. Igor Saenko, Igor Kotenko. Method of genetic optimization of schemes for role-based access to information. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  37. Dmitry Komashinkiy, Andrey Chechulin, Igor Kotenko. Categorization of web pages with inadmissible content. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  38. Alexey Konovalov, Andrey Shorov. Simulation of counteraction of botnets and defense mechanisms. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  39. Vasily Desnitsky, Andrey Chechulin. Unification of a process of secure embedded systems construction. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  40. Elena Doynikova, Igor Kotenko. Extension of the informasion risks assessment techniques via application of the service dependency graphs. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.131-132. (in Russian).
  41. Elena Doynikova, Dmitry Kotenko. Application of the vulnerabilities scoring systems to the computer systems security analysis. Tools for security analysis of automated systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.130-131. (in Russian).
  42. Igor Kotenko, Philipp Nesteruk. The principles of an adaptive security systems creation. Tools for security analysis of automated systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.32-33. (in Russian).
  43. Igor Saenko, Olga Polubelova, Igor Kotenko. Design of SIEM repository for a heterogeneous infrastructure. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. Ð.41-42. (in Russian).
  44. Igor Saenko, Anton Sidorov, Sergey Kruglov. Application of genetic algorithms to solve the role mining problem in RBAC systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.89-90. (in Russian).
  45. Andrey Chechulin. Application of combining techniques to the problem of protection against network scanning. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.63-64. (in Russian).
  46. Ivan Morozov, Andrey Chechulin. Access to information in geographical information systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.34-36. (in Russian).
  47. Vasily Desnitsky. The model of a unified process for development of secure embedded systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.15-16. (in Russian).
  48. Dmitry Komashinkiy. Combining of methods of classification and clustering for the detection and identification malware. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.136-137. (in Russian).
  49. Alexey Konovalov. Investigation of botnets and distributed defense mechanisms against them based on simulation methods. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.52-53. (in Russian).
  50. Philipp Nesteruk. The main stages of adaptive security systems development. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.36-38. (in Russian).
  51. Olga Polubelova. Verification of filtering rules of security policy by "Model Checking". 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.87-88. (in Russian).
  52. Andrey Shorov. Set-theoretic model for simulation of infrastructure attacks against computer networks and defense mechanisms. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.64-66. (in Russian).
  53. Sergey Ageev, Olga Polubelova. Methods of safety management in protected multiservice networks. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. Ð.122-124. (in Russian).
  54. Andrey Shorov, Igor Kotenko. The set-theoretic representation of simulation models of infrastructure attacks and defense mechanisms against them // In the collection: Simulation modeling. Theory and practice. IMMOD-2011. 2011. pp. 306-310. // https://www.elibrary.ru/item.asp?id=36260430 (in Russian).
  55. Andrey Chechulin, Igor Kotenko. Analysis of security events in a real network using a network attack modelling system. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.97-98. // https://www.elibrary.ru/item.asp?id=35242777 (in Russian).
  56. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration model for combined protection of information systems with embedded devices. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69-70. (in Russian).
  57. Elena Doynikova, Andrey Chechulin, Igor Kotenko, Dmitry Kotenko. Extension of information risk assessment methodology to account for zero-day attacks // VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.71-72. // https://elibrary.ru/item.asp?id=35242695 (in Russian).
  58. Igor Kotenko, Igor Saenko, Olga Polubelova, Andrey Chechulin. Methods and tools of designing the repository for SIEM system in critical information infrastructure. The VII St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.79-80. // https://elibrary.ru/item.asp?id=35244528 (in Russian).
  59. Dmitry Komashinkiy, Igor Kotenko. Methods of machine learning in anti-cyberthreat systems. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.76-77. (in Russian).
  60. Philipp Nesteruk, Igor Kotenko. The components of development of adaptive computer network security system. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.84-85.// https://elibrary.ru/item.asp?id=35267525 (in Russian).
  61. Igor Saenko, Igor Kotenko. An improved genetic algorithm to solve the role mining problem in RBAC systems. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.92-93. (in Russian).
  62. Andrey Chechulin. Cooperation of scanning detection mechanisms. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.96-97. (in Russian).
  63. Vasily Desnitsky. Configuring effectiveness evaluation for combined protection mechanisms on the basis of optimality problem solving. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69. (in Russian).
  64. Elena Doynikova, Dmitry Kotenko. Extension of the information risks assessment technique via application of service dependencies graphs. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.70-71. (in Russian).
  65. Dmitry Komashinkiy. Methods of machine learning and dynamical malware detection. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.75-76. (in Russian).
  66. Philipp Nesteruk. The main stages of adaptive security systems development. The VII St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.83-84. (in Russian).
  67. Olga Polubelova. Applying of linear temporal logic to verification of security policy filtering rules by model checking. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.88-89. (in Russian).
  68. Olga Polubelova. The ontological approach SIEM data repository implementation. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.89. (in Russian).
  69. Igor Saenko, Olga Polubelova, Sergey Ageev. Proposals for conceptual modeling of information security management subsystem in protected multiservice networks. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.93-94. (in Russian).
  70. Igor Saenko, Andrey Shorov, Ivan Morozov. Access control system in geoinformation systems. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.94-95. (in Russian).
  71. Andrey Shorov. Architecture of protection mechanism against infrastructure attacks based on the “nervous network system” approach. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.157-158. (in Russian).
  72. Igor Saenko, Sergey Ageev., A.G. Filippov. Conceptual modeling of data access control in the key system of information infrastructure // Scientific and analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2011. No. 4. pp. 55-60. // https://elibrary.ru/item.asp?id=18060513 (in Russian).
  73. Igor Saenko, Sergey Alyshev. Methods of optimal routes searching for integrated movement of vehicles in convoys under emergency conditions. Oversight activities and judicial examination in security systems. Scientific reports of young scientists. ¹2, 2011. (in Russian).
  74. Igor Saenko, Sergey Ageev, Alexander Bushuev, Jury Egorov. Concept of automation of information-security control in protected special-purpose multi-service networks // Automation of managerial processes. Issue 1(23), 2011. P.50-57. // https://elibrary.ru/item.asp?id=15633924 (in Russian).
  75. Igor Saenko, Anton Nizhegorodov. The analysis of the development of knowledge base protection systems. IV All-Russian scientific and practical conference with international participation "Scientific creativity in the 21st century", April 2011. Proceeding .Annex to the magazine "In the world of scientific discovery". ¹ 2. Publishing “Research and innovation center". P.86. ISSN 2072-0831. (in Russian).
  76. Igor Saenko, Anton Nizhegorodov, Nikolay Kluchko. The need for protection of databases in modern society. III All-Russian scientific and practical conference with international participation.Modern studies of social problems: Proceeding. Issue 1. Krasnoyarsk, Research and innovation center, 2011. P.224-225. ISBN 978-5-904771-13-3. (in Russian).
  77. Igor Saenko, Anton Nizhegorodov. The need to develop knowledge base protection systems // Ñáîðíèê íàó÷íûõ òðóäîâ SWorld. 2011. Ò. 3. ¹ 1. Ñ. 76-77. // https://www.elibrary.ru/item.asp?id=17725455 (in Russian).
  78. Igor Saenko, Anton Nizhegorodov, Nikolay Kluchko. Analysis of SQL injections as a form of program attack on databases. 66th Scientific and technical conference dedicated to the Day of radio. 19–29 April, 2011. Proceeding.Saint-Petersburg, 2011. P.87-88. (in Russian).
  79. Igor Saenko, Faddey Skorik. Determination of operation scope permissibility for distributed computing. 66th Scientific and technical conference dedicated to the Day of radio. 19–29 April, 2011. Proceeding.Saint-Petersburg, 2011. P.88-89. (in Russian).
  80. Igor Saenko, Sergey Kruglov, Anton Sidorov. Optimization method for scheme of role-based access to information. 66th Scientific and technical conference dedicated to the Day of radio. 19–29 April, 2011. Proceeding.Saint-Petersburg, 2011. P.85-86. (in Russian).
  81. Igor Saenko, Ivan Morozov. The problem of information access control in advanced geographical information systems. 66th Scientific and technical conference dedicated to the Day of radio. 19–29 April, 2011. Proceeding.Saint-Petersburg, 2011. P.84-85. (in Russian).
  82. Igor Saenko, Faddey Skorik, Andrey Shorov. Method of determining the scaling limitations of resources in the grid-systems. XI International scientific and technical conference “Intelligence and science”. (Zheleznovodsk, 28-29 April, 2011).Proceeding. Krasnoyarsk, Information center, 2011. P.133-134. ISBN 978-5-905284-08-3. (in Russian).
  83. Igor Saenko, Sergey Ageev, Yury Sherstuk, Olga Polubelova. A conceptual framework for automating the management of protected multiservice networks // Problems of information security. Computer systems. 2011. No. 3. pp. 30-39. // https://elibrary.ru/item.asp?id=17077011 (in Russian).
  84. Igor Saenko, Sergey Ageev. Basis of mathematical modeling of management tasks for protected multiservice networks. International Congress on Computer Science: Information Systems and Technologies. Proceedings of the International Congress CSIST'2011. Republic of Belarus, Minsk, October 31 – November 3, 2011. In 2 parts. Part 1. Edit.: S.V.Ablameyko et al. Minsk: BSU, 2011. P.282-287. ISBN 978-985-518-563-6. (in Russian).
  85. Igor Saenko, Sergey Alyshev, Alexander Ersov, Vyacheslav Efimov, Ivan Morozov. Searching routes to move vehicles in convoys on the road network by serial method. Certificate about State registration of computer programs No. 2011617681. Registered in computer program register on Federal service for intellectual property, patents and trademarks 03.09.2011 ã. (in Russian).
  86. Oleg Zadan, Elena Doynikova. The problem of management of role-based access to information in a single information space // Ñáîðíèê íàó÷íûõ òðóäîâ SWorld. 2011. Ò. 5. ¹ 2. Ñ. 67-68. // https://www.elibrary.ru/item.asp?id=17082708 (in Russian).
  87. Igor Saenko, Elena Doynikova, Oleg Zadan. About the actual tasks of the management of the role-based information access systems in a single information space // Ñáîðíèê íàó÷íûõ òðóäîâ SWorld. 2011. Ò. 3. ¹ 3. Ñ. 82-83. //https://www.elibrary.ru/item.asp?id=17082536 (in Russian).
  88. Nikolay Moldovyan, Evgenia Dernova (Novikova), Dmitri Moldovyan. The Functionality Extension of Digital Signature Standards of Russian Federation and Belorus // Information security issues. 2011. No. 2 (93). pp. 8-14. // https://www.elibrary.ru/item.asp?id=16381329 (in Russian).
  89. Dmitri Moldovyan, Evgenia Dernova (Novikova), D. Sukhov. The Functionality Extension of Digital Signature Standards // Information and control systems. 2011. No. 2 (51). pp. 63-67. // https://www.elibrary.ru/item.asp?id=16243999 (in Russian).
  90. Nikolay Moldovyan, Evgenia Dernova (Novikova), Dmitri Moldovyan.The Blind and Collective Digital Signature Protocols based on Standard DSTU 4145-2002 // Information security issues. 2011. No. 2 (93). pp. 14-18. // https://www.elibrary.ru/item.asp?id=16381330 (in Russian).
  91. Roman Kishmar, Petr Moldovyanu, Evgenia Dernova (Novikova), D. Sukhov. The Blind Digital Signature Scheme based on Difficulty of Two Hard Problems. Proceedings ETU "LETI". 2011. ¹ 4. P.44-48 // https://www.elibrary.ru/item.asp?id=16313030 (in Russian).
  92. D.V. Komashinsky, I.V. Kotenko, A.A. Chechulin. Categorization of websites for blocking web pages with inappropriate content // High availability systems. 2011. Vol. 7. No. 2. pp. 102-106. // https://www.elibrary.ru/item.asp?id=17098472 (in Russian).
  93. I.V. Kotenko, M.V. Stepashkin, D.I. Kotenko, E.V. Doynikova. Assessment of information system protectability on the base of development of tree of social engineering attack // Izvestia of higher educational institutions. Instrumentation. 2011. Vol. 54. No. 12. pp. 5-9. // https://elibrary.ru/item.asp?id=17077187 (in Russian).
  94. Igor Kotenko, Andrey Shorov. The use of biological metaphors to protect computer systems and networks: a preliminary analysis of the basic approaches. Information Security. Inside, 2011. ¹ 1(37), P.52-57. // https://www.elibrary.ru/item.asp?id=23134080 (in Russian).

2010

  1. Igor Kotenko. Agent-Based Modeling and Simulation of Network Infrastructure Cyber-Attacks and Cooperative Defense Mechanisms // In book: Discrete Event Simulations, August 2010. DOI:10.5772/46961
  2. Vasily Desnitsky, Igor Kotenko. Combined protection of software from unauthorized modifications // News of higher educational institutions. Instrumentation. 2010. Vol. 53. No. 11. pp. 36-41. // https://www.elibrary.ru/item.asp?id=15503308 (in Russian).
  3. I.Kotenko. Agent-Based Modelling and Simulation of Network Cyber-Attacks and Cooperative Defence Mechanisms. Discrete Event Simulations. Sciyo, In-teh. 2010. P.223-246. ISBN 978-953-307-115-2 // https://cdn.intechopen.com/pdfs/11547/InTech-Agent_based_modeling_and_simulation_of_network_infrastructure_cyber_attacks_and_cooperative_defense_mechanisms.pdf (in Russian).
  4. Igor Kotenko, Alexey Konovalov, Andrey Shorov. Investigation of botnets and botnet defense based on simulation metnods. Journal of Instrument Engineering, Vol.53, ¹ 11, 2010, P.42-45. ISSN 0021-3454. (in Russian).
  5. Andrey Chechulin, Igor Kotenko. Combining scanning protection mechanisms in computer networks // Information and control systems. 2010. No. 6 (49). pp. 21-27. // https://www.elibrary.ru/item.asp?id=15581568 (in Russian).
  6. Igor Saenko, Yriy Nikitin. Conceptual modeling of control information access system in military geographic information systems // Information and Space. 2010. No. 3. pp. 76-78. // https://www.elibrary.ru/item.asp?id=22656436 (in Russian).
  7. Igor Saenko, Mochamad Salami, Amer Al-Agbar. Method of determining the required accuracy of the representation of digital cartographic information in automated communication control systems. Information and Space. // Information and Space. 2010. No. 2. pp. 34-36. // https://www.elibrary.ru/item.asp?id=22651713 (in Russian).
  8. Igor Saenko, Yan Kopchak, Sergey Kruglov. Optimization of discretionary access schemes to files in automated systems based on free software // Problems of information security. Computer systems. 2010. No. 3. pp. 22-26. // https://www.elibrary.ru/item.asp?id=15541124 (in Russian).
  9. V. Desnitsky, I. Kotenko. Protectability and scalability of software protection mechanism based on remote entrusting principles // Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, 2010. Vol.52, P.50-67 // https://www.elibrary.ru/item.asp?id=23938231 (in Russian).
  10. Dmitry Komashinskiy, Igor Kotenko. Malware Detection by Data Mining Techniques Based on Positionally Dependent Features. Proceedings of the 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010). Pisa, Italy, 17-19 February, 2010. Los Alamitos, California. IEEE Computer Society. 2010. P.617-623. ISSN 1066-6192. ISBN 978-0-7695-3939-3. DOI: 10.1109/PDP.2010.30 // https://www.elibrary.ru/item.asp?id=15332288
  11. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Agent-based Modeling and Simulation of Botnets and Botnet Defense. Conference on Cyber Conflict. Proceedings 2010. CCD COE Publications. Tallinn, Estonia, June 15-18, 2010. P.21-44. ISBN 978-9949-9040-1-3.
  12. Igor Kotenko, Viktor Scormin (Eds.) Computer Network Security. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. P.346. ISSN 0302-974.
  13. Igor Saenko, Igor Kotenko. Genetic Optimization of Access Control Schemes in Virtual Local Area Networks // Lecture Notes in Computer Science. 2010. Ò. 6258 LNCS. Ñ. 209-216. DOI: 10.1007/978-3-642-14706-7_16 // https://elibrary.ru/item.asp?id=16974173
  14. Vasily Desnitsky, Igor Kotenko. Security and Scalability of Remote Entrusting Protection // Lecture Notes in Computer Science. 2010. Ò. 6258 LNCS. Ñ. 298-306. DOI: 10.1007/978-3-642-14706-7_23 // https://www.elibrary.ru/item.asp?id=16978659
  15. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Simulation of Botnets: Agent-based approach // Studies in Computational Intelligence. 2010. Ò. 315. Ñ. 247-252. DOI: 10.1007/978-3-642-15211-5_26 // https://www.elibrary.ru/item.asp?id=15535333
  16. Dmitry Komashinskiy, Igor Kotenko. Conceptual framework for using data mining methods to detect malicious software // Information Security. Inside. 2010. ¹ 2 (32), P.74-82. // https://www.elibrary.ru/item.asp?id=23143876 (in Russian).
  17. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Agent-oriented simulation of botnets functioning and defense against them. Information Security. Inside. 2010. ¹ 4(34), P.36-45 // https://www.elibrary.ru/item.asp?id=23143897 (in Russian).
  18. Igor Kotenko, Igor Saenko, Rafael Yusupov. International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security". Information Security. Inside. 2010. ¹ 6, P.16-18. (in Russian).
  19. Dmitry Komashinskiy, Igor Kotenko, Andrey Shorov. Approach to detect malware based on postionally dependent information // Proceedings of SPIIRAS. Issue 10. St.Petersburg, Nauka, 2009. P.131-147. ISBN 978-5-02-025507-4. // https://www.elibrary.ru/item.asp?id=15512717 (in Russian).
  20. Igor Saenko, Mochamad Salami. The conceptual model of information in multimedia databases. // In the world of scientific discoveries. 2010. No. 5-1 (11). pp. 102-104. // https://www.elibrary.ru/item.asp?id=15588279 (in Russian).
  21. Igor Saenko, Mochamad Salami. A conceptual model of representation of multimedia information in databases // Collection of scientific papers based on the materials of the international scientific and practical conference. 2010. Vol. 4. No. 2. pp. 20-22. // https://www.elibrary.ru/item.asp?id=16893748 (in Russian).
  22. Igor Saenko, S.Budilkin, V.Samokhin. The functional structure of a unified automated information system for university communications. Proc. of First All-Russian Conference "Information and communication technology - the main factor in implementing a quality management system of educational institutions on the basis of standard ISO». Chelyabinsk: "Education", 2010. P.32-36. (in Russian).
  23. Igor Saenko, A.Nevrov, Mochamad Salami. Object-oriented data model for digital transport networks. I International Scientific and Practical Conference “Object Systems – 2010”. Proc.Rostov-on-Don, 2010. P.78-82. // https://www.elibrary.ru/item.asp?id=22901281 (in Russian).
  24. Igor Saenko, A.Baranov. Optimization of discretionary access to files in the automated government systems based on free software. All-Russian Conference with international participation “Information technology based on free software”.Proc. Elec, 2010. Elec, 2010. P.37-43. (in Russian).
  25. Igor Saenko, Mochamad Salami. Conceptual modeling of multimedia databases in automated systems of organizational type. 7-th All-Russian Conference “Measurement, Automation and Modeling in Industry and research” (MAMI-2010). Proc.Biisk, 2010. P.83-85. (in Russian).
  26. Igor Saenko, Sergey Alyshev. Methods of finding optimal routes of vehicles in the special conditions. 7-th All-Russian Conference “Measurement, Automation and Modeling in Industry and research” (MAMI-2010). Proc.Biisk, 2010. P.17-20. (in Russian).
  27. Igor Saenko, Sergey Alyshev. A parallel method for finding optimal routes for movement of vehicles in the special conditions. Scientific conference with the elements of a scientific school for young people “Parallel Computer Algebra”.Proc. Stavropol: Publishing and Information Centre "Fabula", 2010. P.344-349. ISBN 978-5-91903-007-2. (in Russian).
  28. Igor Saenko, Anton Nizhegorodov. Analysis of SQL-injections as a form of software-based attacks on the databases. V All-Russian conference with international participation “Actual problems of modern science and education”.Proceedings. Vol. 2. Krasnoyarsk: Research and Innovation Centre, 2010. P.264-266. ISBN 978-5-904771-11-9. (in Russian).
  29. Igor Saenko, Mochamad Salami. The method of object-oriented modeling of multimedia databases based on the transformation of entity-relationship diagram. V All-Russian conference with international participation “Actual problems of modern science and education”.Proceedings. Vol. 2. Krasnoyarsk: Research and Innovation Centre, 2010. P.266-269. ISBN 978-5-904771-11-9. (in Russian).
  30. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Simulation of functioning of commands of intelligent agents of botnets and protection systems. 12th National Conference on Artificial Intelligence with International Participation (CAI-2010). Proceedings. Vol.3. September 20-24, 2010, Tver, Russia. Ì.: Fizmatlit, 2010. P.44-51. ISBN 978-5-7995-0543-1. // https://www.elibrary.ru/item.asp?id=36294473 (in Russian).
  31. Vasiliy Desnitsky, Igor Kotenko. Development and analysis of remote entrusting protocol. VI St.Petersburg Interregional Conference “Information Security of Russian Regions” (IÂRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2010. P.121-129. ISBN 978-5-904031-95-4. (in Russian).
  32. Vasily Desnitsky, Igor Kotenko. Software protection based on the principle of remote entrusting. 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P.159-163. ISBN 978-5-94057-693-8. (in Russian).
  33. Dmitry Komashinskiy, Igor Kotenko. Detecting malware based on the processing of static positional information using Data Mining methods. 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P.136-140. ISBN 978-5-94057-693-8. (in Russian).
  34. Dmitry Komashinskiy, Igor Kotenko. Combining Data Mining methods for static detection of Malware. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  35. Andrey Chechulin. Protection against network attacks based on the combined mechanisms of traffic analysis. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  36. Y.Zozulya, I.Kotenko. Blocking Web-sites with inappropriate content based on categorization. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  37. Aleksey Konovalov, Andrey Shorov, Igor Kotenko. Agent-oriented simulation of botnets. 12th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 1-4, 2010. http://www.ruscrypto.ru/ (in Russian).
  38. Igor Kotenko. Investigation of botnets and protection mechanisms against them on the basis of agent-based simulation. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.40-41. (in Russian).
  39. Vasiliy Desnitsky, Igor Kotenko. Combined mechanisms to protect software from unauthorized modifications. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.100-101. (in Russian).
  40. Aleksey Konovalov, Igor Kotenko, Andrey Shorov. Simulation environment for imitating network attacks and defense mechanisms. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.38-39. (in Russian).
  41. Michail Stepashkin, Igor Kotenko, Andrey Chechulin, Alexsander Tulupyev, Tatyana Tulupyeva, Anton Pashenko. Approach to security analysis of automated systems taking into account social-engineering attacks. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.128-129. (in Russian).
  42. Igor Kotenko, Mikhail Stepashkin, Andrey Chechulin, Elena Doynikova, Dmitry Kotenko. Tools for security analysis of automated systems. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.115-116. (in Russian).
  43. Andrey Chechulin. Integration and optimal parameters selection of scanning protection mechanisms. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.25-26. (in Russian).
  44. VasilyDesnitsky. Technique of finding the optimum combination of protection methods to protect software from interventions. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.9-10. (in Russian).
  45. Dmitry Komashinskiy. Combining of data mining methods for malware detection. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.112-113. (in Russian).
  46. Andrey Shorov. Simulation of the stage of formation and constraining the botnet spread. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.50-51. (in Russian).
  47. Vasiliy Desnitsky, Andrey Chechulin, Igor Kotenko. Configuration model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.41-42. ISBN 978-5-904031-99-2. (in Russian).
  48. Aleksey Konovalov, Igor Kotenko. Library of modules for botnet simulation. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.110-111. ISBN 978-5-904031-99-2. (in Russian).
  49. Vasiliy Desnitsky, Andrey Chechulin. Abstract model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.40-41. ISBN 978-5-904031-99-2. (in Russian).
  50. Elena Doynikova. Risk assessment approaches based on attack graphs. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.99-100. ISBN 978-5-904031-99-2. (in Russian).
  51. Elena Doynikova. Applying the fuzzy sets for risk assessment based on attack graphs. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.100. ISBN 978-5-904031-99-2. (in Russian).
  52. Dmitry Komashinskiy. Malware: analysis of metadata by Data Mining tools. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.109-110. ISBN 978-5-904031-99-2. (in Russian).
  53. Dmitry Kotenko. Analysis of existing approaches to constructing and scalability providing of attack graphs for corporate networks. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.113-114. ISBN 978-5-904031-99-2. (in Russian).
  54. Andrey Chechulin. Integrating of malicious traffic detection mechanisms. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.149. ISBN 978-5-904031-99-2. (in Russian).
  55. Andrey Chechulin, Vasily Desnitsky, Mikhail Stepashkin. Intruder model in the task of security assurance of embedded system. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.150. ISBN 978-5-904031-99-2. (in Russian).
  56. Andrey Shorov. Analysis of DDoS-attacks and defense mechanisms against them and the requirements for their simulation. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.152. ISBN 978-5-904031-99-2. (in Russian).
  57. Andrey Shorov. Analysis of bioinspired approaches for protection of computer systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.151. ISBN 978-5-904031-99-2. (in Russian).
  58. Igor Saenko, Oleg Pantyukhin, Mochamad Salami, Amer Al-Agbar. Genetic approach to solving the problem of choosing the location for the communication system to digital maps. III International Conference “Youth and Science: Reality and Future”. Nevinnomyssk, 2010. Proc.Volume V: Natural and applied sciences. P.398-400. ISBN 978-5-94812-091-1 (in Russian).
  59. Igor Saenko, Oleg Pantyukhin, Yriy Nikitin. On the construction of a mathematical synthesis model of multilayer systems of access control to databases. III International Conference “Youth and Science: Reality and Future”. Nevinnomyssk, 2010. Proc.Volume V: Natural and applied sciences. P.400-402. ISBN 978-5-94812-091-1 (in Russian).
  60. Igor Saenko, Amer Al-Agbar. Application of genetic algorithms to the problem of selecting the location of the company infrastructure on digital maps. II All-Russian Inter-University Conference “Science and education in the development of industrial, social and economic spheres of the Russian regions: Zvorykin reading”. Proc. Murom, 2010. P.153-155. (in Russian).
  61. Igor Saenko, Yriy Nikitin. A mathematical synthesis model of access control systems in the production databases. II All-Russian Inter-University Conference “Science and education in the development of industrial, social and economic spheres of the Russian regions: Zvorykin reading”. Proc. Murom, 2010. P.151-153. (in Russian).
  62. Igor Saenko, Yriy Nikitin, Oleg Pantyukhin. A mathematical synthesis model of the multilayer systems of access control to databases. 62-th Scientific Conference of the faculty, researchers and graduate students. Proc. SPbSUT. St.Pb, 2010. P.68-69. (in Russian).
  63. Igor Saenko, Amer Al-Agbar, Oleg Pantyukhin. Method for estimating the properties of terrains to select the positions of a multi-channel radio with a digital cartographic. 62-th Scientific Conference of the faculty, researchers and graduate students. Proc. SPbSUT. St.Pb, 2010. P.70-71. (in Russian).
  64. Igor Saenko, Sergey Alyshev, A.Nevrov, Mochamad Salami. Issues about a construction of object-oriented models of digital communications networks in the ACS. 65-th STC devoted to Radio Day.Proc. SPb, 2010. P.117-118. (in Russian).
  65. Igor Saenko, Sergey Alyshev, A.Nevrov, Amer Al-Agbar. Approach to state estimation of complex objects of digital communication networks based on fuzzy logic. 65-th STC devoted to Radio Day. Proc. SPb, 2010. P.118-120. (in Russian).
  66. Igor Saenko, Sergey Alyshev, A.Nevrov, Amer Al-Agbar. On the solution of choice a route based on digital maps. 65-th STC devoted to Radio Day.Proc. SPb, 2010. P.120-121. (in Russian).
  67. Igor Saenko, Mochamad Salami. On the technology of constructing a multimedia databases of automated information systems. Regional Inter-University Students scientific and practical conference dedicated to the 65-year anniversary of Victory in Great Patriotic War “Recent trends and current trends of development of automated control systems”. Nizhnekamsk, 2010. P.129-130. (in Russian).
  68. Igor Saenko, A.Baranov, Sergey Kruglov, Yriy Nikitin. The method of constructing schemes of role-base access control to information in the management systems databases. Regional Inter-University Students scientific and practical conference dedicated to the 65-year anniversary of Victory in Great Patriotic War “Recent trends and current trends of development of automated control systems”. Nizhnekamsk, 2010. P.84-86. (in Russian).
  69. Igor Saenko, Amer Al-Agbar. Geoinformation decision-making support on placement in the area means of telecommunications infrastructure. International Conference “Actual problems of modern engineering and technology”. Proc. Lipetsk, 2010. P.88-89. (in Russian).
  70. Igor Saenko, Sergey Alyshev, Oleg Pantyukhin. Automating the road transport movement planning in special circumstances through the application of GIS technologies. X International Conference “Intellect and Science”. Proc.Krasnoyarsk, 2010. ISBN 978-5-7638-2006-5. P.39-40. (in Russian).
  71. Igor Saenko, A.Baranov, Sergey Kruglov. Genetic optimization of the role-based access control schemes based on accounting and processing of variable length "chromosomes". ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.22-23. (in Russian).
  72. Igor Saenko. Conceptual synthesis model of the control access scheme to information in a heterogeneous protection environment". ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.21-22. (in Russian).
  73. Igor Saenko, A.Sinyuk. Method for automated supply users of computer network identity data through open communication channels. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.82-84. (in Russian).
  74. Igor Saenko, Sergey Alyshev. On the choice of optimal routes for movement of vehicles under special conditions with the use of geographic information technology. International Conference “Actual problems of modern engineering and technology”. Proc. Lipetsk, 2010. P.88-89. (in Russian).
  75. Igor Saenko, Ivan Morozov, Oleg Zhadan. Managing role-based access to automated systems for industrial purposes. International Conference “Actual problems of modern engineering and technology”. Proc. Lipetsk, 2010. P.90-91. (in Russian).
  76. Igor Saenko, Sergey Alyshev. Search model of complex travel routes of vehicles under special conditions, based on GIS technologies. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.204-205. ISBN 978-5-904031-99-2. (in Russian).
  77. Igor Saenko, A.Nevrov. The integration of physical security systems based on object-oriented databases. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.128-129. ISBN 978-5-904031-99-2. (in Russian).
  78. Igor Saenko, Sergey Kruglov. Optimization technique of role-based access control schemes to data bases of information systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.115-116. ISBN 978-5-904031-99-2. (in Russian).
  79. Igor Saenko, Anton Nizhegorodov. Analysis of the state of development of database protection systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.82. ISBN 78-5-904031-99-2. (in Russian).
  80. Igor Saenko, Anton Nizhegorodov, A.Nikitin. Analysis of the domestic systems of database protection and their development prospects. International Conference “Innovative technologies in manufacturing, science and education”. Proc.Grozny, 2010. P.29-30. (in Russian).
  81. Dmitri Moldovyan, Evgeniia Dernova (Novikova), Nikolay Moldovyan. Digital Signature Schemes with New Randomization Mechanism. Informatization and Communication. 2010. ¹1. P.66-71. // https://www.elibrary.ru/item.asp?id=15560944 (in Russian).
  82. Lidiya Gortinskaya, Evgenia Dernova (Novikova), Dmitri Moldovyan, Petr Moldovyanu. Construction of the Finite Groups of Vectors for Algorithms of Digital Signature Schemes // News of higher educational institutions. Instrumentation. 2010. Vol. 53. No. 5. pp. 11-16.// https://www.elibrary.ru/item.asp?id=13918072 (in Russian).
  83. Evgenia Dernova (Novikova), Ivan Kupriyanov, Dmitri Moldovyan, Alexandr Moldovyan. Blind Digital Schemes with New Features. Informatization and Communication. 2010. ¹1. P.72-76.// https://www.elibrary.ru/item.asp?id=15560945 (in Russian).
  84. I.V. Kotenko, I.B. Saenko, R.M. Yusupov. Analytical review of the reports of the international workshop "scientific analysis and policy support for cyber security" (SA&PS4CS 2010) // Proceedings of SPIIRAN. 2010. No. 2 (13). pp. 226-248. // https://elibrary.ru/item.asp?id=15561117 (in Russian).
  85. I.V. Kotenko, A.M. Konovalov, A.V. Shorov. Investigation of botnets and defense mechanisms on the base of simulation modeling // News of higher educational institutions. Instrumentation. 2010. Vol. 53. No. 11. pp. 42-45. // https://www.elibrary.ru/item.asp?id=15503309 (in Russian).
  86. I.V. Kotenko, I.B. Saenko, R.M. Yusupov. Analytical review of talks on the international conference "mathematical methods, models and architectures for computer network security" (MMM-ACNS-2010) // Proceedings of SPIIRAN. 2010. No. 2 (13). pp. 199-225. // https://elibrary.ru/item.asp?id=15561116 (in Russian).
  87. S.A. Ageev, I.B. Saenko. Security management of protected multi-service networks for special purposes // Proceedings of SPIIRAN. 2010. No. 2 (13). pp. 182-198. // https://elibrary.ru/item.asp?id=15561115 (in Russian).
  88. A.D. Sinyuk, I.B. Saenko. Network key formation protocol on open communication channels with errors // Proceedings of SPIIRAN. 2010. No. 3 (14). pp. 29-49. // https://elibrary.ru/item.asp?id=15565282 (in Russian).
  89. I.B. Saenko, A.V. Nizhegorodov. Analysis of the state and prospects of development of database protection systems from unauthorized access // Collection of scientific papers on the materials of the international scientific and practical conference. 2010. Vol. 3. No. 4. pp. 79-81 // https://elibrary.ru/item.asp?id=16893713 (in Russian).
  90. T.V. Tulupyeva, A.L. Tulupyev, A.E. Pashchenko, A.A. Azarov, M.V. Stepashkin. Social psychological factors that influence the information system users vulnerability degree in regard of socio-engineering attacks // Proceedings of SPIIRAN. 2010. No. 1 (12). pp. 200-214. // https://elibrary.ru/item.asp?id=15561101 (in Russian).
  91. I.B. Saenko, A.A. Nevrov, M.Yu. Salami. Object-oriented modeling of databases of physical protection systems // Object systems. 2010. No. 2. pp. 24-27. // https://www.elibrary.ru/item.asp?id=22901301 (in Russian).
  92. Igor Kotenko, Aleksey Konovalov, Andrey Shorov. Agent-oriented simulation of botnets functioning and defense against them // Information protection. Inside. 2010. No. 5 (35). pp. 56-61.// https://www.elibrary.ru/item.asp?id=23143310 (in Russian).

2009

  1. Kotenko I.V., Vorontsov V.V., Chechulin A.A., Ulanov A.V. Proactive mechanisms for defense against network worms: an approach, implementation and the results of experiments // Information Technologies. 2009. ¹ 1. Ñ. 37-42. // https://elibrary.ru/item.asp?id=11736506
  2. Igor Kotenko. Framework for Integrated Proactive Network Worm Detection and Response. Proceedings of the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. 3. February 18-20, 2009. IEEE Computer Society. 2009. P.379-386. DOI: 10.1109/PDP.2009.52 LIBRARY ID: 15295631
  3. Vasily Desnitsky, Igor Kotenko. Analysis and Design of Entrusting Protocol for Distributed Software Protection. Proceedings of the Work in Progress Session heldin connection with the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. February 2009. SEA-Publications: SEA-SR-21. 2009. P.8-9.
  4. Vasily Desnitsky, Igor Kotenko. Design of Entrusting Protocols for Software Protection // Lecture Notes in Geoinformation and Cartography. Ñåð. "Information Fusion and Geographic Information Systems - Proceedings of the 4th International Workshop, IF and GIS 2009" 2009. Ñ. 301-316. DOI: 10.1007/978-3-642-00304-2_21 // https://www.elibrary.ru/item.asp?id=20547380
  5. Dmitriy Komashinskiy, Igor Kotenko. Integrated usage of data mining methods for malware detection // Lecture Notes in Geoinformation and Cartography. Ñåð. "Information Fusion and Geographic Information Systems - Proceedings of the 4th International Workshop, IF and GIS 2009" 2009. Ñ. 343-357. DOI: 10.1007/978-3-642-00304-2_24 // https://www.elibrary.ru/item.asp?id=20546699
  6. Igor Kotenko. Simulation of agent teams: application of a domainindependent framework to computer network security // Â ñáîðíèêå: Proceedings - 23rd European Conference on Modelling and Simulation, ECMS 2009. 2009. Ñ. 137-143.// https://www.elibrary.ru/item.asp?id=18094922
  7. I.V, Kotenko, V.V. Vorontsov, A.A. Chechulin, A.V. Ulanov. Proactive mechanisms for defense against network worms: an approach, implementation and the results of experiments // Information Technologies. 2009. ¹ 1. Ñ. 37-42. // https://www.elibrary.ru/item.asp?id=11736506 (in Russian).
  8. V.A. Desnitskiy, I.V. Kotenko. Methods of software protection based on the principle of remote trust // Information protection. Inside. 2009. No. 6 (30). pp. 57-61. // https://www.elibrary.ru/item.asp?id=23168407 (in Russian).
  9. Igor Kotenko, Alexander Ulanov. Multi-agent simulation of defense mechanisms against distributed computer attacks. Information Technologies, No.2, 2009. P.38-44. // https://elibrary.ru/item.asp?id=11737075 (in Russian).
  10. Igor Kotenko, Alexander Ulanov. Investigation of models of counteracting the agents in computer networks. The Multiconference “Theory and Systems of Control”. IV International Conference on Control Sciences (ICCS-IV). January 26-30, 2009. Moscow. 2009. (in Russian).
  11. Vasily Desnitsky, Igor Kotenko. Design and Analysis of Remote Entrusting Protocol. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  12. Andrey Chechulin, Igor Kotenko. Protection against Network Attacks by Methods of Filtering and Normalization of Transport and Network Level Protocols. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  13. Igor Kotenko, Rafael Yusupov. Information Technologies for Counteraction against Terrorism. Information Security. Inside, No.2(26), 2009. Ð.74-79 // https://www.elibrary.ru/item.asp?id=23182566 (in Russian).
  14. Andrey Chechulin, Igor Kotenko, Artem Tishkov, Yulia Zozulya, Andrey Shorov. Methods of protection against harmful Web-sites based on reputation evaluation. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  15. Dmitry Komashinsky, Igor Kotenko, Andrey Shorov. Malware Detection based on Data Mining. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/ (in Russian).
  16. Vasily Desnitsky, Igor Kotenko. Approach to Software Protection based on Remote Entrusting Mechanism. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  17. Igor Kotenko. “Network cat-and-mouse”: wars of adaptive software agents. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/ (in Russian).
  18. Sergey Reznik, Igor Kotenko. Methods and Tools of verification for integrated analysis of security protocols. Information Security. Inside, No.3(27), 2009. P.56-72. // https://elibrary.ru/item.asp?id=23181772 (in Russian).
  19. Andrey Shorov, Alexei Konovalov, Igor Kotenko. Investigative Simulation of Botnets and Defence Mechanisms against them. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.132. (in Russian).
  20. Dmitry Komashinsky, Igor Kotenko, Andrey Shorov. Malware Detection Technology based on Data Mining. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.122-123. (in Russian).
  21. Igor Kotenko. Simulation of Defence Processes against Attacks on Infrastructure. ÕVIII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2009)”. Proceedings. St.Petersburg, Russia. June 29 - July 2, 2009. P.63. (in Russian).
  22. Kotenko I.V., Reznik S.A., Shorov A.V. Security protocols verification combining existing approaches and tools. Proceedings of SPIIRAN. 2009. No. 8. pp. 292-310. // https://elibrary.ru/item.asp?id=15512754 (in Russian).
  23. Andrey Shorov. Analysis of biological approaches for protection of computer networks against infrastructural attacks. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.145. (in Russian).
  24. Andrey Chechulin. Detection and counteraction to network attacks on the basis of combined mechanisms of the traffic analysis. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.143-144.// https://www.elibrary.ru/item.asp?id=35099955 (in Russian).
  25. Ekaterina Sidelnikova. Verification of filtering rules of computer network security policy on the basis of event calculus and abductive reasoning. The VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.139-140. (in Russian).
  26. Sergey Reznik. Combined approaches to verification of security protocols. The VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.122-123. (in Russian).
  27. Alexei Konovalov. Botnet simulation on the basis of a set of cooperating intelligent agents. The VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.58. (in Russian).
  28. Dmitriy Komashinskiy. Construction of malware static detection model on the basis of Data Mining. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.56-57. (in Russian).
  29. Yulia Zozulya. Determining the category of a Web site for parental control task. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.53-54. (in Russian).
  30. Vasily Desnitsky. Configutation of software protection mechanism by means of security policies. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.97-98. (in Russian).
  31. Vasily Desnitsky. Scalability and security of protection mechanism on the basis of the remote entrusting principle. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.98. (in Russian).
  32. Igor Kotenko. Design and Functioning Support of Intelligent Information Security Systems. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.112. (in Russian).
  33. Igor Kotenko. Multi-agent modeling for the study of information security mechanisms in the internet // In the collection: Simulation modeling. Theory and practice. Plenary reports. 2009. pp. 38-47. // https://www.elibrary.ru/item.asp?id=36274501 (in Russian).
  34. Vasily Desnitsky, Igor Kotenko. Performance and Scalability of Remote Entrusting Protection. Second International Workshop on Remote Entrusting (RE-TRUST 2009). September 30 - October 1, 2009. Riva del Garda, Italy, 2009.
  35. Igor Kotenko, Bogdanov V. Proactive Monitoring of Security Policy Accomplishment in Computer Networks. Proceedings of IEEE Fourth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications" (IDAACS'2009). Rende (Cosenza), Italy, September 21-23, 2009. Ñ. 364-369. DOI: 10.1109/IDAACS.2009.5342961 // https://www.elibrary.ru/item.asp?id=15340173
  36. Michail Stepashkin, Igor Kotenko. Security analysis of computer networks ans systems based on building of attack trees. The St.Petersburg Scientific Forum “Science and Society. Information technologies”. Forth St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2009. P.363-366. (in Russian).
  37. Igor Kotenko, Rafael Yusupov. Counteraction to cyber terrorism: actual problems and perspective research directions. The St.Petersburg Scientific Forum “Science and Society. Information technologies”. Forth St.Petersburg Meeting of the Nobel Prize laureates. Proceedings. St.Petersburg. 2009. P.329-332. (in Russian).
  38. Igor Kotenko. Intelligent mechanisms of protection against malware propagation. International Conferences “Intelligent systems (AIS 2009)” and “Intelligent CAD (CAD-2009)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Vol.2. Moscow, Fizmatlit, 2009. P.431-438. (in Russian).
  39. Igor Saenko, Yuri Ovsyanikov, Dmitri Guzhva. The method of managing permissions in virtual local area networks using genetic algorithms // Proceedings of the Institute of Engineering Physics. 2009. No. 1 (11). pp. 2-6. // https://www.elibrary.ru/item.asp?id=15124088 (in Russian).
  40. Igor Kotenko. Intelligent mechanisms of cyber security management. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Vol.41, Moscow, URSS, 2009. P.74-103.// https://elibrary.ru/item.asp?id=15284552 (in Russian).
  41. Igor Kotenko, Vasily Desnitsky. Aspect-oriented implementation of the remote trust-based software protection model. Information Technologies and Computing Systems, ¹4, 2009. P.67-76. // https://www.elibrary.ru/item.asp?id=13090468 (in Russian).
  42. Gennadiy Nesteruk , Philipp Nesteruk, Lesya Nesteruk. Application of the Formal Model for Describing Processes of Adaptive Information Security in Computer-aided Systems.// © Springer: "Automation and Remote Control", 2009, Vol. 70, ¹ 3. P.491–501.
  43. Evgeniia Dernova (Novikova), Anna Kostina, Nikolay Moldovyan, Petr Moldovyanu. Towards Application of Finite Vector Spaces in Cryptography // Radio electronics issues. 2009. Vol. 1. No. 2. pp. 164-174.// https://www.elibrary.ru/item.asp?id=16534648 (in Russian).
  44. Petr Moldovyanu, Dmitri Moldovyan, Evgeniia Dernova (Novikova). Usage of Homomorphy and Multidimensional Cyclicity of Finite Group Vectors in Digital Signature Algorithms. Issues of Information Protection. 2009. ¹ 3(86). P.2-9. // https://www.elibrary.ru/item.asp?id=12865176 (in Russian).
  45. Petr Moldovyanu, Dmitri Moldovyan Evgeniia Dernova (Novikova), Anna Kostina. Homomorphy of Finite Vector Groups and Digital Signature Scheme Design // Information and control systems. 2009. No. 4 (41). pp. 26-32. // https://www.elibrary.ru/item.asp?id=12922852 (in Russian).
  46. Moldovyan P.A., Dernova (Novikova) E.S., Kostina A.A., Moldovyan N.A. Multisignature Protocols and Problem of Simultaneous Signing a Package of Contracts // Springer LNGC. 2009. / 4th Int. Workshop IF&GIS'09 Proc. St.Petersburg, May 17-20, 2009. St. Petersburg, Russia
  47. Andrey Chechulin, Igor Kotenko. Detection and Counteraction of Network Attacks based on Combined Mechanisms of Traffic Analysis // Methods and technical means of ensuring information security. 2009. No. 18. p. 69. // https://www.elibrary.ru/item.asp?id=49913421 (in Russian).
  48. D.V. Komashinsky, I.V. Kotenko. Detection of malicious software based on static information processing by data mining methods // Proceedings of the Institute of System Analysis of the Russian Academy of Sciences. 2009. Vol. 51. pp. 65-84. // https://www.elibrary.ru/item.asp?id=25794062 (in Russian).
  49. I.B. Saenko, A.Yu. Ivanov. Methodology of dynamic management of the structure of mobile distributed databases // Information and space. 2009. No. 2. pp. 132-138 // https://www.elibrary.ru/download/elibrary_12940055_79262978.pdf // https://elibrary.ru/item.asp?id=12940055 (in Russian).
  50. F.G. Nesteruk. To organization of intellectual protection of the information // Proceedings of SPIIRAN. 2009. No. 10. pp. 148-159. // https://elibrary.ru/item.asp?id=15512718 (in Russian).
  51. F.G. Nesteruk. To the development of technology for the creation of adaptive information security systems based on intelligent tools // Questions of information protection. 2009. No. 1 (84). pp. 50-56. // https://elibrary.ru/item.asp?id=11774789 (in Russian).
  52. I.B. Saenko, A.Yu. Ivanov. Methodology of dynamic management of the structure of mobile distributed databases // Information and space. 2009. No. 3. pp. 92-94.// https://www.elibrary.ru/download/elibrary_12940077_27859322.pdf // https://www.elibrary.ru/item.asp?id=12940077 (in Russian).
  53. E.K. Izrailov, Ê.Å. Izrailov. Nanotechnology of creation of quantum points from the ultra-cold atoms of hydrogen. 2009., pp. 1-108--1-112 // http://ets.ifmo.ru/tomasov/konferenc/AutoPlay/Docs/Volume%201/2_10.pdf

2008

  1. Igor Kotenko. Multi-agent modeling and the simulation of computer network security processes: “a game of network cats and mice”. NATO Science for Peace and Security Series, D: Information and Communication Security. Volume 17, 2008. Aspects of Network and Information Security. P.56-73. ISBN 978-1-58603-856-4.
  2. Igor Kotenko. Multi-agent Simulation of Attacks and Defense Mechanisms in Computer Networks // International Journal of Computing. 2008. Ò. 7. ¹ 2. Ñ. 35-43.// https://www.elibrary.ru/item.asp?id=36299599
  3. Igor Kotenko, Alexander Ulanov. Packet Level Simulation of Cooperative Distributed Defense against Internet Attacks // Â ñáîðíèêå: Proceedings of the 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing, PDP 2008. 16th Euromicro Conference on Parallel, Distributed and Network-Based Processing, PDP 2008. sponsors: Sun Microsystems, Mairie de Toulouse, Centre National de la Recherche Scientifique, SGI, CNRS-LAAS. Toulouse, 2008. Ñ. 565-572. DOI: 10.1109/PDP.2008.65 // https://elibrary.ru/item.asp?id=15099260
  4. Alexander Ulanov, Igor Kotenko. Simulation of Adaptable Agent Teams in Internet. Workshop on Logics for Agents and Mobility (LAM'08). The European Summer School on Logic, Language and Information (ESSLLI 2008), Hamburg, Germany. 4 - 15 August, 2008. P.67-79.
  5. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on “Remote Entrusting” mechanism // Information Security. Inside, No.5(23), 2008. P.68-74. // https://elibrary.ru/item.asp?id=23274066 (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on “Remote Entrusting” mechanism // Information Security. Inside, No.4(22), P.59-63, 2008. // https://elibrary.ru/item.asp?id=23274050 (in Russian).
  7. Igor Kotenko, Victor Vorontsov, Artem Tishkov, Andrey Chechulin, Alexander Ulanov. Investigation of Proactive Protection Mechanisms against Network Worms. Third International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2008. P.278-283. (in Russian).
  8. Alexander Ulanov, Igor Kotenko. Simulation of Cooperative Mechanisms for Defense of Computer Networks. Third International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2008. P.266-271. (in Russian).
  9. Igor Kotenko, Rafael Yusupov. Actual Research in Computer Network and System Security. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.21-31.// https://www.elibrary.ru/item.asp?id=36398162 (in Russian).
  10. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on “Remote Retrusting” Mechanism. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.172-177. (in Russian).
  11. Igor Kotenko, Alexander Ulanov. Investigation of Protection Mechanisms against DDoS Attacks: Imitation of Counteraction between Intelligent Agents in the Internet. 10th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008. CD ROM. http://www.ruscrypto.ru/. (in Russian).
  12. Igor Kotenko. Proactive Protection Mechanisms against rapidly propagating Network Worms. 10th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 3-5, 2008 CD ROM. http://www.ruscrypto.ru/. (in Russian).
  13. Vasily Desnitsky, Igor Kotenko. Software protection model based on remote entrusting mechanism. News of High schools. Journal of Instrument Engineering, Vol.51, ¹11, 2008. P.26-31. ISSN 0021-3454.// https://elibrary.ru/item.asp?id=11675981 (in Russian).
  14. Victor Vorontsov, Igor Kotenko. Analysis of credit based mechanism of network worm epidemics detection and containment. News of High schools. Instrument making, Vol.51, No.11, 2008. P.21-26. ISSN 0021-3454. // https://www.elibrary.ru/item.asp?id=11675980 (in Russian).
  15. Ekaterina Sidelnikova, Artem Tishkov, Igor Kotenko. Filtering Policy Verification based on Event Calculus and Abduction Reasoning // News of higher educational institutions. Instrumentation. 2008. Vol. 51. No. 11. pp. 31-36. ISSN 0021-3454. // https://elibrary.ru/item.asp?id=11675982 (in Russian).
  16. Olga Polubelova, Igor Kotenko. Verification of Filtering Rules of Security Policy by Model Checking. News of High schools. Instrument making, Vol.51, No.12, 2008. P.44-49. ISSN 0021-3454. (in Russian).
  17. Andrey Chechulin, Igor Kotenko. Investigation of Virus Throttling Defense Mechanisms against Network Worms // Information protection. Inside. 2008. No. 3 (21). pp. 68-73.// https://www.elibrary.ru/item.asp?id=23274038 (in Russian).
  18. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for software protection based on “Remote Entrusting”. ÕVII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2008)”. Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  19. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Detection and Containment of Spreading malware by means of combined protection mechanisms. ÕVII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2008)”. Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  20. Igor Kotenko, Artem Tishkov, Victor Vorontsov. Combining of malware protection mechanisms. International Conferences “Intelligent systems (AIS 2008)” and “Intelligent CAD (CAD-2008)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  21. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for “Remote Entrusting” mechanism. International Conferences “Intelligent systems (AIS 2008)” and “Intelligent CAD (CAD-2008)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  22. Igor Kotenko, Alexander Ulanov. Simulation of adaptation of counteracting intelligent agent teams. XI National Conference on Artificial Intelligence with International Participation (NCAI-2008). Proceedings. Vol.1. Dubna, Russia. September 29 – October 3, 2008. Ì.: URSS, 2008. P.32-40. ISBN 978-5-9710-0226-0 // https://www.elibrary.ru/item.asp?id=36438688 (in Russian).
  23. Igor Kotenko, Rafael Yusupov. Information Technologies for Terrorism Counteraction. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.39-40. // https://www.elibrary.ru/item.asp?id=29123905 (in Russian).
  24. Andrey Shorov, Igor Kotenko. Protection of the computer network from infrastructure attacks based on the implementation of the " nervous system of the network". XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.118-119. // https://www.elibrary.ru/item.asp?id=35435931 (in Russian).
  25. Vitaly Bogdanov. Optimization of Computer Network Security Policy Testing. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.93. (in Russian).
  26. Vasily Desnitsky. Design and Analysis of Protocol for Protecting the Programs against Malicious Modifications. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.98-99. (in Russian).
  27. Dmitriy Komashinskiy. Proactive Technology of Malware Detection by means of Data Mining. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.101. (in Russian).
  28. Alexei Konovalov. Simulation of Network Traffic in the Tasks of Protection against Network Infrastructure Threats. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.101-102. (in Russian).
  29. Dmitriy Kotenko. Design of Attack Graph for Evaluation of Computer Network Security. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.102-103. (in Russian).
  30. Olga Polubelova. Verification of Security Policy Filtering Rules containing Temporal Parameters by Model Checking. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.110-111. (in Russian).
  31. Sergey Reznik. Integrated Approach to Security Protocol Verification on an Example of RE-TRUST Protocol. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.111. (in Russian).
  32. Ekaterina Sidelnikova. Abductive Configurator of Firewall Filtering Rules. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.112. (in Russian).
  33. Andrey Chechulin. Defense against Network Attacks by Normalization of Transport and Network Level Protocols of TCP/IP Stack. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.115-116. (in Russian).
  34. Ekaterina Sidelnikova. Verification of Filtering Policies by means of Event Calculus and Abductive Reasoning. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.133-136. (in Russian).
  35. Igor Kotenko, Victor Vorontsov, Andrey Chechulin. Analysis of Network Worm Detection and Containment Mechanisms. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.113-119. (in Russian).
  36. Dmitriy Komashinskiy, Igor Kotenko. Research of proactive mechanisms of malware detection based on data mining methods // Mathematics and Security of Information Technologies. 2008. P. 226-231. // https://www.elibrary.ru/item.asp?id=43951860 (in Russian).
  37. Philipp Nesteruk , Lesya Nesteruk, Gennadiy Nesteruk. Modeling of Neural-Network Security Tools for Computer-aided Systems: A formal Model of Adaptation and Operation. I. // SpringerLink: “Automation and Remote Control”, 2008, Vol. 69, ¹ 9. P.1603–1614
  38. Philipp Nesteruk , Lesya Nesteruk, Gennadiy Nesteruk. On modeling neural-network protection facilities for computer-aided systems: A formal model of adaptation and operation. II.// Springer: “Automation and Remote Control”, 2008, Vol. 70, ¹ 2. P.283-300.
  39. Evgeniia Dernova (Novikova), Nikolay Moldovyan. Design of Digital Signature Schemes based on Several Hard Problems // Information security issues. 2008. No. 1 (80). pp. 22-27. // https://www.elibrary.ru/item.asp?id=11910801 (in Russian).
  40. Evgeniia Dernova (Novikova), Nikolay Moldovyan. Collective Digital Signature Protocol based on Two Hard Problems // Information technology security. 2008. Vol. 15. No. 2. pp. 79-85. // https://www.elibrary.ru/item.asp?id=18811149 (in Russian).
  41. Evgeniia Dernova (Novikova), Dmitri Moldovyan, Petr Moldovyanu. The construction of the Finite Augmented Field for Cryptographic Applications // Issues of Information Protection. 2008. ¹ 3(82). P.2-7. // https://www.elibrary.ru/item.asp?id=11910825 (in Russian).
  42. Evgeniia Dernova (Novikova), Anna Kostina, Petr Moldovyanu. Using Finite Group of Matrices for Digital Signature Algorithms Construction. Issues of Information Protection. 2008. ¹ 3(82). P.8-12. // https://www.elibrary.ru/item.asp?id=11910826 (in Russian).
  43. Denis Guryanov, Evgeniia Dernova (Novikova), V. Izbash, Dmitri Moldovyan. Algorithms of Digital Signature Based on Difficulty of Rooting Problem in Finite Groups of Known Order // Information and control systems. 2008. No. 5 (36). pp. 33-40.// https://www.elibrary.ru/item.asp?id=11700744 (in Russian).
  44. O.V. Polubelova, I.V. Kotenko. Verification of filtering rules of security policy by model checking // Izvestia of Higher educational institutions. Instrumentation. 2008. Vol. 51. No. 12. pp. 44-50. // https://elibrary.ru/item.asp?id=11676000 (in Russian).
  45. A.A. Budanova, E.V. Doynikova, K.O. Komshilova. Quality management of software products using spiral and flexible software development models // International Conference on Soft Computing and Measurements. 2008. Vol. 1. pp. 237-242. // https://www.elibrary.ru/item.asp?id=25372241 (in Russian).
  46. Dernova E.S., Nguyen Le.M., Kostina A.A., Shcherbakov V.A. Digital signature schemes, hacking of which requires solving two difficult problems in one finite group // In the collection: Regional Informatics-2008. proceedings of the XI St. Petersburg International Conference. 2008. pp. 97-98.// https://www.elibrary.ru/item.asp?id=49901636 (in Russian).

2007

  1. Igor Kotenko, Alexander Ulanov. Agent-oriented environment for modelling and estimation of protection gears from distributed attacks "failure in service" // News of higher educational institutions. Instrumentation. 2007. Vol. 50. No. 1. pp. 18-21. // https://elibrary.ru/item.asp?id=9336953 (in Russian).
  2. Igor Kotenko, Rafael Yusupov. Computer security Technologies. Herald of the Russian Academy of Sciences, Vol.77, ¹4, 2007. P.323-333. // https://www.elibrary.ru/item.asp?id=9535364 (in Russian).
  3. Igor Kotenko, Alexander Ulanov. Multiagent simulation of protection of information resources in internet. Herald of the Russian Academy of Sciences.Journal of Computer and Systems Sciences International, ¹ 5, 2007, P.74-88. // https://elibrary.ru/item.asp?id=9534164 (in Russian).
  4. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Sergey Reznik, Ekaterina Sidelnikova. System of Verification of Computer Network Security Policy. Herald of computer and information technologies, ¹11(41), 2007. P.48-56. // https://elibrary.ru/item.asp?id=12980333 (in Russian).
  5. Igor Kotenko, Alexander Ulanov. Modeling and Simulation of Adaptive Cooperative Defense against Computer Attacks in the Internet. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, URSS, 2007. Vol.31, Ð.103-125 // https://elibrary.ru/item.asp?id=11580233 (in Russian).
  6. Igor Kotenko, Mikhail Stepashkin. Security analysis of computer networks on the basis of modeling the actions of intruders and building a graph of attacks // Proceedings of the Institute of System Analysis of the Russian Academy of Sciences. 2007. Vol. 31. pp. 126-207. // https://elibrary.ru/item.asp?id=11580234 (in Russian).
  7. Alexander Ulanov, Igor Kotenko. Defense against DDoS Attacks: Mechanisms of Prevention, Detection, Source Tracking and Counteraction // Information Security. Inside. 2007. 2007. No. 3 (15). pp. 62-69.// https://elibrary.ru/item.asp?id=23369788 (in Russian).
  8. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Security Policy Performance in Computer Networks // Information Security. Insider. 2007. No. 4 (16). pp. 66-72. // https://www.elibrary.ru/item.asp?id=23369804 (in Russian).
  9. Igor Kotenko, Alexander Ulanov. Computer Wars in the Internet: Modeling and Simulation of Program Agents Counteraction. Information Security. Inside, ¹4(16), 2007,P.38-45. // https://www.elibrary.ru/item.asp?id=23369799 (in Russian).
  10. Igor Kotenko. Automatic Detection and Constraining of Internet Worm Propagation: Brief Analysis of Modern Research. Information Security. Inside, No. 4(16), 2007. P.46-56.// https://www.elibrary.ru/item.asp?id=23369801 (in Russian).
  11. Igor Kotenko. International Conference “Mathematical Methods, Models and Architectures for Computer Networks Security” (MMMACNS-07). Information Security. Inside, No. 3, 2007, P.12; No. 4, 2007, P.56. (in Russian).
  12. Igor Kotenko, Artem Tishkov, Ekaterina Sidelnikova, Olga Chervatuk. Checking of Security Policy Rules for Corporate Computer Networks // Information protection. Insider. 2007. No. 6(18), pp.52-59.// https://elibrary.ru/item.asp?id=23375471 (in Russian).
  13. Igor Kotenko, Victor Vorontsov. Analytical Models of Network Worm Propagation // Proceedings of SPIIRAS. Issue 4, St.Petersburg, Nauka, 2007. P.208-224. // https://www.elibrary.ru/item.asp?id=15561049 (in Russian).
  14. Igor Kotenko, Victor Vorontsov, Alexander Ulanov. Models and Systems of Network Worm Propagation Simulation. Proceedings of SPIIRAS. Issue 4, St.Petersburg, Nauka, 2007. P.225-238. // https://elibrary.ru/item.asp?id=15561050 (in Russian).
  15. Igor Kotenko. Actual Issues of Modeling and Simulation of Information Security Processes on the basis of Technology of Intelligent Agents. Transactions of Saint Petersburg Electrotechnical University “LETI” (ETU). Special issue. Information science problems: philosophy, sociology of science, education. St.Petersburg, SPbETU “LETI”, 2007. P.93-109. (in Russian).
  16. Vitaly Bogdanov, Igor Kotenko. The Proactive Approach to Monitoring of Computer Network Policy. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.373-382. (in Russian).
  17. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detection and Resolution of Conflicts in Security Policies. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.172-185. // https://elibrary.ru/item.asp?id=43951864 (in Russian).
  18. Igor Kotenko, Mikhail Stepashkin. Evaluating the Computer Network Security on the Basis of Attack Graph Analysis. Second International Scientific Conference on Security Issues and Counter Terrorism "Problems of Security and Counter Terrorism". Materials. Moscow State University. 2007. P.466-481. // https://elibrary.ru/item.asp?id=43956792 (in Russian).
  19. Vitaly Bogdanov, Igor Kotenko, Mikhail Stepashkin. Proactive Approach to Network Security Policy Monitoring. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 4 p.
  20. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Network Security Evaluation based on Analysis of Attack Graphs. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 5 p.
  21. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova, Olga Chervatuk. Detection and Resolution of Inconsistencies in Security Policy. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 5 p.
  22. Igor Kotenko, Alexander Ulanov. Confrontation in the Internet: Simulation of Counteraction to Distributed Cyber-Attacks. Proceedings of the International Security and Counteracting Terrorism Conference. Moscow. Lomonosov Moscow State University Intellectual Center. 2007. 4 p.
  23. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Ekaterina Sidelnikova. Security Policy Verification Tool for Geographical Information Systems // Lecture Notes in Geoinformation and Cartography. Ñåð. "Information Fusion and Geographic Information Systems - Proceedings of the 3rd International Workshop, IF and GIS 2007" 2007. Ñ. 128-146. DOI: 10.1007/978-3-540-37629-3_9 // https://elibrary.ru/item.asp?id=20677670
  24. Julien Bourgeois, Abdoul Karim Ganame, Igor Kotenko, Alexander Ulanov. Software Environment for Simulation and Evaluation of a Security Operation Center // Â ñáîðíèêå: Lecture Notes in Geoinformation and Cartography. Ñåð. "Information Fusion and Geographic Information Systems - Proceedings of the 3rd International Workshop, IF and GIS 2007" 2007. Ñ. 111-127. DOI: 10.1007/978-3-540-37629-3_8 // https://elibrary.ru/item.asp?id=20677673
  25. Igor Kotenko, Alexander Ulanov. Multi-agent Framework for Simulation of Adaptive Cooperative Defense against Internet Attacks // Lecture Notes in Computer Science. 2007. Ò. 4476 LNAI. Ñ. 212-228. DOI: 10.1007/978-3-540-72839-9_18 // https://elibrary.ru/item.asp?id=13536467
  26. Igor Kotenko, Alexander Ulanov. Agent-based Simulation Environment and Experiments for Investigation of Internet Attacks and Defense Mechanisms // 21st European Conference on Modelling and Simulation: Simulations in United Europe, ECMS 2007. 2007. Ñ. 146-155. DOI: 10.7148/2007-0146 // https://elibrary.ru/item.asp?id=18099297
  27. Igor Kotenko, Olga Chervatuk, Ekaterina Sidelnikova, Artem Tishkov. Hybrid Multi-module Security Policy Verification // Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007. 8th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007. sponsors: EMANICS. Bologna, 2007. Ñ. 277. DOI: 10.1109/POLICY.2007.25 // https://elibrary.ru/item.asp?id=15051139
  28. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Performance of Computer Network Security Policy. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.32. (in Russian).
  29. Igor Kotenko, Victor Vorontsov, Alexander Ulanov. Proactive Detection and Constraining of Network Worm Propagation. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.91. (in Russian).
  30. Igor Kotenko, Alexander Ulanov. Simulation of Adaptive Opposition of Defense Systems to Distributed Attacks. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.92. (in Russian).
  31. Igor Kotenko, Alexander Ulanov. Investigation of Cooperative Defense against DDoS // SECRYPT 2007 - International Conference on Security and Cryptography, Proceedings. SECRYPT 2007 - International Conference on Security and Cryptography. Ñåð. "SECRYPT 2007 - Proceedings of the International Conference on Security and Cryptography" sponsors: Workflow Management Coalition (WfMC). Barcelona, 2007. Ñ. 180-183. // https://elibrary.ru/item.asp?id=15051849
  32. Igor Kotenko, Victor Vorontsov. Proactive Approach to Detection and Restraining of Network Worms. International Conferences “Intelligent systems (AIS'07)” and “Intelligent CAD (CAD-2007)”. Proceedings.Moscow, Fizmatlit, 2007. Moscow, Fizmatlit, 2007. P.61-68. (in Russian).
  33. Vasily Desnitsky, Igor Kotenko. Models of Remote Authentication for Software Protection. International Conferences “Intelligent systems (AIS'07)” and “Intelligent CAD (CAD-2007)”. Proceedings.Moscow, Fizmatlit, 2007. P.43-50. (in Russian).
  34. Igor Kotenko. Multi-agent Modelling and Simulation of Cyber-Attacks and Cyber-Defense for Homeland Security // Â ñáîðíèêå: 2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS. EEEE, 2007. Ñ. 614-619. DOI: 10.1109/IDAACS.2007.4488494 // https://www.elibrary.ru/item.asp?id=15049284
  35. Vladimir Gorodetsky, Igor Kotenko, Victor Skormin (Eds.). The Forth International Conference Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2007). St. Petersburg, Russia, September 13–15, 2007. Communications in Computer and Information Science (CCIS). Springer. . Vol.1, 2007. 416 ð.
  36. Vitaly Bogdanov, Igor Kotenko. Policy-based Proactive Monitoring of Security Policy Performance // Communications in Computer and Information Science. 2007. Ò. 1. Ñ. 197-212. DOI: 10.1007/978-3-540-73986-9_17 // https://www.elibrary.ru/item.asp?id=20679083
  37. Artem Tishkov, Ekaterina Sidelnikova, Igor Kotenko. Event Calculus based Checking of Filtering Policies. Communications in Computer and Information Science. 2007. Vol. 1. Ñ. 248-253. DOI: 10.1007/978-3-540-73986-9_21 // https://elibrary.ru/item.asp?id=20679090
  38. Igor Kotenko. Models and Methods of Construction and Support of Functioning of Intelligent Adaptive Security Systems // Mathematical methods of pattern recognition. 2007. Vol. 13. No. 1. pp. 599-602. // https://www.elibrary.ru/item.asp?id=29129788 (in Russian).
  39. Alexander Ulanov, Igor Kotenko. Multiagent Environment for Carrying out of Experiments on Protection of Computer Networks // Mathematical methods of pattern recognition. 2007. Vol. 13. No. 1. pp. 631-634. // https://elibrary.ru/item.asp?id=29129798 (in Russian).
  40. Igor Kotenko, Victor Vorontsov. Use of Proactive Approach for Protection against Network Worms. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.78-81. (in Russian).
  41. Vasily Desnitsky, Igor Kotenko. Remote Authentication for Protection of Programs against Non-authorized Modification. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.81-84. (in Russian).
  42. Alexander Ulanov, Igor Kotenko. Simulation of Adaptive Cooperative Strategies of Defense against Internet Attacks. The third All-Russian Scientific and practical conference on simulation modeling and its application in science and industry "Simulation modeling. Theory and Practice" (IMMOD-2007). St. Petersburg, October 17-19, 2007. Collection of reports. St. Petersburg: FSUE Central Research Institute of Shipbuilding Technology. 2007. Volume II. C.211-215. // https://elibrary.ru/item.asp?id=49432666 (in Russian).
  43. Igor Kotenko, Alexander Ulanov, Artem Tishkov, Vitaly Bogdanov, Victor Vorontsov, Andrey Chechulin. Simulation of Network Worm Detection and Containment in Computer Networks. The Third All-Russian Scientific-practical Conference on Simulation and its Application in Science and Industry “Simulation. Theory and Practice (IMMOD-2005)”. St.Petersburg, Russia. October 17-19, 2007. Proceedings. St.Petersburg, 2007. Vol.II. P.106-109. (in Russian).
  44. Igor Kotenko, Rafael Yusupov. Actual Issues and Solutions in the Field of Protection of Computer Networks and Systems. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.55-56. // https://www.elibrary.ru/item.asp?id=36397747 (in Russian).
  45. Artem Tishkov, Igor Kotenko. Computer Network Protection System based on Security Policy. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.122-123. (in Russian).
  46. Vasily Desnitsky, Igor Kotenko. Model of Protecting the Programs against Non-authorized Changes on the Basis of Remote Trust Mechanism. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.81. // https://www.elibrary.ru/item.asp?id=35099930 (in Russian).
  47. Victor Vorontsov, Igor Kotenko. Models of detection and containment of network worms on the basis of proactive approach. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.47-48. // https://www.elibrary.ru/item.asp?id=35461514 (in Russian).
  48. Andrey Chechulin, Igor Kotenko. Mechanisms of protection against network worms on the basis of threshold random walk method. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.70.// https://www.elibrary.ru/item.asp?id=29391109 (in Russian).
  49. Alexander Ulanov. Models of Counteracting the Agent Teams realizing DDoS Attacks and Mechanisms of Protection against them. International Conferences “Intelligent systems (AIS'07)” and “Intelligent CAD (CAD-2007)”Proceedings . Moscow, Fizmatlit, 2007. P.120-127. (in Russian).
  50. Sergey Reznik, Olga Chervatuk. Detection of Filtering and Channel Protection Conflicts in Security Policy on the Basis of Model Checking. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.37. (in Russian).
  51. Vasily Desnitsky. Remote Authentication as the Mechanism of Software Protection on Remote Clients. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.5. (in Russian).
  52. Alexander Ulanov. Architecture and Model of the Environment of Multiagent Simulation of DDoS Attacks and Protection against them. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.96. (in Russian).
  53. Victor Vorontsov. Modeling of Network Worm Propagation.ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. C.88. (in Russian).
  54. Alexander Ulanov. Technique of Simulating the Opposition of Defense Systems to DDOS Attacks in the Internet. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.85-87. (in Russian).
  55. Vasily Desnitsky. Aspect-oriented Approach to Mobile Module Realization in Software Protection System. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.87-89. (in Russian).
  56. Victor Vorontsov. The Mechanism of Detection and Containment of Network Worm Propagation on the Basis of Trust Credits. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.46-47. (in Russian).
  57. Vasily Desnitsky. Realization of Mobile Module Replacement Mechanism on the Basis of Aspect-oriented Programming Paradigm. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.49-50. http://www.spoisu.ru/files/ibrr/ibrr2007/ibrr2007_materials.pdf // https://www.elibrary.ru/item.asp?id=35099891 (in Russian).
  58. Olga Chervatuk. Verification of Filtering Rules of Security Policy by Model Checking. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.69-70. (in Russian).
  59. Andrey Chechulin. Investigation of Network Worm Detection and Containment Mechanisms based on Virus Throttling. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.99-100. // https://www.elibrary.ru/item.asp?id=29391107 (in Russian).
  60. Ekaterina Sidelnikova. Verification of Filtering Rules based on Event Calculation and Abductive Reasoning. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.95. (in Russian).
  61. Dmitriy Komashinskiy. Sensor networks information security. Works of the V Inter-regional Conference "Information Security of Russia Regions", section "Information security of telecommunication networks" St. Petersburg, October 23-25, 2007. P.40. (in Russian).
  62. V. Gorodetsky, I.V. Kotenko, V.A. Skormin. Computer network security: Fourth international conference on mathematical methods, models, and architectures for computer network security, MMM-ACNS 2007 St. Petersburg, russia, september 13-15, 2007 proceedings // Communications in Computer and Information Science. 2007. Ò. 1. // https://www.elibrary.ru/item.asp?id=20679095
  63. D.M. Nenadovich, I.B. Paraschuk, A.S Leshchenko. Features of expert systems for the analysis of information security of telecommunication networks. information security of russian regions // In the collection: Information security of the regions of Russia (IBRR-2007). Conference materials. 2007. pp. 114-115. // https://www.elibrary.ru/item.asp?id=35542098 (in Russian).
  64. A.V. Ulanov, I.V. Kotenko. Protection from DDoS attacks: mechanisms of prevention, detection, source tracking and counteraction // Information Security. Inside. 2007. No. 1 (13). pp. 60-67. // https://elibrary.ru/item.asp?id=23369760 (in Russian).
  65. A.V. Ulanov, I.V. Kotenko. Protection from DDOS attacks: mechanisms of prevention, detection, source tracking and counteraction // Information Security. Inside. 2007. No. 2 (14). pp. 70-77. // https://elibrary.ru/item.asp?id=23369775 (in Russian).
  66. Vitaly Bogdanov, Igor Kotenko. Proactive Monitoring of Security Policy Performance in Computer Networks. Information Security. Insider, No. 3(15), 2007, pp.42-47 // https://www.elibrary.ru/item.asp?id=23369785 (in Russian).
  67. Igor Kotenko, Artem Tishkov, Ekaterina Sidelnikova, Olga Chervatuk. Checking of Security Policy Rules for Corporate Computer Networks // Information Security. Inside, No. 5, 2007. P.46-49; No. 6, 2007. // https://www.elibrary.ru/item.asp?id=23369814 (in Russian).
  68. D. Yu. Guryanov, E.S. Chernova, N.A. Moldovyan. Sending algorithms of electronic digital signature to the main group of matrices of small dimension // in the collection: Information security of the regions of Russia (IBRD-2007). Conference materials. 2007. pp. 79-80. // https://www.elibrary.ru/item.asp?id=49904346 (in Russian).
  69. E.S. Dernova, A.A. Moldovyan. Increasing the durability of algorithms based on combining two independent difficult tasks // In the collection: Information security of the regions of Russia (IBRD-2007). Conference materials. 2007. p. 80.// https://www.elibrary.ru/item.asp?id=49904101 (in Russian).

2006

  1. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Architectures and models of active vulnerabilities analysis based on simulation of malefactors' actions. Problems of information security. Computer systems. 2006, ¹2, Ð.7-24. // https://elibrary.ru/item.asp?id=11626042 (in Russian).
  2. I.V. Kotenko, A.V. Ulanov. Modeling the confrontation of software agents on the Internet: a general approach, modeling environment and experiments // Information protection. Insider. 2006. No. 5 (11). pp. 48-56. // https://elibrary.ru/item.asp?id=23412858 (in Russian).
  3. I.B.Paraschuk, T.M. Hasan. Monitoring of information security: from system-wide to private // Journal "Information Security/ Information security" No. 5, 2006. https://lib.itsec.ru/articles2/focus/monitoring_ib_ot // https://lib.itsec.ru/articles2/focus/monitoring_ib_ot (in Russian).
  4. Alexander Ulanov. Multi-agent simulation of distributed attacks "denial of service" and defense mechanisms // International school-conference on priority courses of science and technology development with participation of young scientists, PhD students and students. Moscow, 2006. P.65-57. (in Russian).
  5. Artem Tishkov, Olga Chervatuk, Dmitry Lakomov, Sergey Reznik, Ekaterina Sidelnikova. Detection and resolution of inconsistencies in the specifications of complex systems.X National Conference on Artificial Intelligence with International Participation (CAI-2006). Proceedings. Vol. 1. Moscow, Fizmatlit, 2006. P.87-90. ISBN: 5-9221-0757-7. (in Russian).
    NCAI-06-A-Tishkov.pdf [application/pdf] (8427 bytes)
    NCAI-06-Tishkov.pdf [application/pdf] (338635 bytes)
  6. Igor Kotenko, Mikhail Stepashkin, Alexander Ulanov. Agent-based modeling and simulation of malefactors' attacks against computer networks. Security and Embedded Systems. D.N.Serpanos, R.Giladi (Eds.). IOS Press. 2006. P.139-146. ISSN 1574-5589.
    NATO-ASI-06-Cover.jpg [image/jpeg] (168841 bytes)
    NATO-ASI-06-paper.pdf [application/pdf] (187094 bytes)
  7. Igor Kotenko, Mikhail Stepashkin. Systems-simulators: assignment, functioning, architecture and approach to implementation // Journal of Instrument Engineering, Vol.49, ¹3, 2006, P.3-9. // https://elibrary.ru/item.asp?id=9161583 (in Russian).
  8. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Vulnerability Analysis of Computer Networks on Design Stages and Maintenance // News of higher educational institutions. Instrumentation. 2006. Vol. 49. No. 5. pp. 3-8. // https://elibrary.ru/item.asp?id=9210071 (in Russian).
  9. Igor Kotenko, Rafael Yusupov. Perspective directions of research in computer security field. Information Security. Inside, ¹2 (8), 2006. P.46-57. // https://elibrary.ru/item.asp?id=23378854 (in Russian).
    inside-zi.2-Cover.jpg [image/jpeg] (438236 bytes)
    inside-zi.2-Paper.pdf [application/pdf] (1312129 bytes)
  10. Igor Kotenko, Mikhail Stepashkin. Security metrics for estimating the security level of computer networks on the basis of constructing attack graphs. Information Security. Inside, 2006, ¹3(9), P.36-45. // https://elibrary.ru/item.asp?id=23409300 (in Russian).
    inside-zi.3-Cover.jpg [image/jpeg] (415428 bytes)
    inside-zi.3-Paper.pdf [application/pdf] (1109875 bytes)
  11. Igor Kotenko, Alexander Ulanov. Simulation of "network cats and mice" game: multiagent technologies for research of cyber-counteraction between antagonistic teams of cyber-agents in the Internet. AI News, ¹3, 2006. // https://elibrary.ru/item.asp?id=50331825 (in Russian).
  12. Igor Kotenko, Alexander Ulanov. Software testbed and experiments for exploring counteraction of attack and defense agents in the Internet. International Security and Counteracting Terrorism Conference. Moscow.Proceedings. Lomonosov Moscow State University Intellectual Center. 2006. P.80-93. (in Russian).
    ISCTC-06-Cover.jpg [image/jpeg] (87507 bytes)
    ISCTC-06-paper1.pdf [application/pdf] (335656 bytes)
  13. Igor Kotenko, Artem Tishkov, Olga Chervatuk. Architecture and Models for Security Policy Verification. International Security and Counteracting Terrorism Conference. Moscow.Proceedings. Lomonosov Moscow State University Intellectual Center. 2006. P. 191-197 // https://elibrary.ru/item.asp?id=44523647 (in Russian).
    ISCTC-06-paper2.pdf [application/pdf] (221722 bytes)
  14. Igor Kotenko, Alexander Ulanov. Agent-based Simulation of Distributed Defense against Computer Network Attacks // Proceedings of 20th European Conference on Modelling and Simulation: Modelling Methodologies and Simulation Key Technologies in Academia and Industry, ECMS 2006. 2006. Ñ. 560-565. DOI: 10.7148/2006-0560 // https://elibrary.ru/item.asp?id=18102226
    ECMS-06-Cover.jpg [image/jpeg] (496519 bytes)
    ECMS-06-Paper.pdf [application/pdf] (381970 bytes)
  15. Igor Kotenko, Alexander Ulanov. Antagonistic Agents in the Internet: Computer Network Warfare Simulation // Â ñáîðíèêå: 2006 9th International Conference on Information Fusion, FUSION. Florence, 2006. Ñ. 4085991. DOI: 10.1109/ICIF.2006.301705 // https://elibrary.ru/item.asp?id=15048026
    Fusion2006-Paper.pdf [application/pdf] (446339 bytes)
  16. Igor Kotenko, Mikhail Stepashkin. Network security evaluation based on simulation of malfactor's behavior // SECRYPT 2006 - International Conference on Security and Cryptography, Proceedings. International Conference on Security and Cryptography, SECRYPT 2006. sponsors: IBM, Polytechnic Institute of Setubal. Setubal, 2006. Ñ. 339-344. // https://elibrary.ru/item.asp?id=15291947
    Secrypt-06-Cover.jpg [image/jpeg] (339392 bytes)
    Secrypt-06-Paper.pdf [application/pdf] (1171216 bytes)
  17. Igor Kotenko, Alexander Ulanov. Agent-based modeling and simulation of network softbots' competition. Knowledge-Based Software Engineering. Proceedings of the Seventh Joint Conference on Knowledge-Based Software Engineering (JCKBSE'06). Tallinn, Estonia. August 28-31. 2006. IOS Press, 2006. P.243-252.
    JKBSE-06-Cover.jpg [image/jpeg] (429831 bytes)
    JKBSE-06-Paper.pdf [application/pdf] (640629 bytes)
  18. Igor Kotenko, Alexander Ulanov. Simulation of Internet DDoS Attacks and Defense // Lecture Notes in Computer Science. 2006. Ò. 4176 LNCS. Ñ. 327-342. DOI: 10.1007/11836810_24 // https://elibrary.ru/item.asp?id=13510558
    ISC-06-Cover.jpg [image/jpeg] (362983 bytes)
    ISC-06-Paper.pdf [application/pdf] (669099 bytes)
  19. Igor Kotenko, Mikhail Stepashkin. Analyzing network security using malefactor action graphs. International Journal of Computer Science and Network Security. 2006. Ò. 6. ¹ 6. Ñ. 226-235. // https://elibrary.ru/item.asp?id=36459385
    IJCSNS-06-06-Cover.jpg [image/jpeg] (235118 bytes)
    IJCSNS-06-06-Paper.pdf [application/pdf] (378933 bytes)
  20. Igor Kotenko, Alexander Ulanov. Simulation Environment for Investigation of Cooperative Distributed Attacks and Defense. 9th International Symposium on Recent Advances in Intrusion Detection. RAID 2006. Abstract and Poster sessions. Hamburg, Germany September 20-22, 2006.
    RAID-06-06-Abstract.pdf [application/pdf] (60473 bytes)
    RAID-06-06-Poster.pdf [application/pdf] (1247155 bytes)
  21. Igor Kotenko, Mikhail Stepashkin. Attack Graph based Evaluation of Network Security // Lecture Notes in Computer Science. 2006. Ò. 4237 LNCS. Ñ. 216-227. DOI: 10.1007/11909033_20 // https://elibrary.ru/item.asp?id=13510785
    CMS-06-LNCS-4237-Cover.jpg [image/jpeg] (384830 bytes)
    CMS-06-LNCS-4237-Paper.pdf [application/pdf] (429758 bytes)
  22. Igor Kotenko, Alexander Ulanov. Agent Teams in Cyberspace: Security Guards in the Global Internet. Â ñáîðíèêå: 2006 International Conference on Cyberworlds, CW'06. Lausanne, 2006. Ñ. 133-140. DOI: 10.1109/CW.2006.12 // https://elibrary.ru/item.asp?id=18102022
  23. Igor Kotenko, Alexander Ulanov. Research of mechanisms of assault and protection in the Internet. ÕV All-Russian Conference “Methods and technical tools of information security” (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.123. (in Russian).
  24. Igor Kotenko, Artem Tishkov. The approach to construction and realization of information security management system based on security policies in computer networks. ÕV All-Russian Conference “Methods and technical tools of information security” (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.122. (in Russian).
  25. Mikhail Stepashkin, Igor Kotenko. Technique of the analysis of computer network security based on modelling of the actions of internal and external infringers. ÕV All-Russian Conference “Methods and technical tools of information security” (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.121. (in Russian).
  26. Vitaly Bogdanov, Igor Kotenko. Proactive monitoring of correct implementation of computer network security policy. ÕV All-Russian Conference “Methods and technical tools of information security” (MTTIS 2006). June 26-28, 2006. St. Petersburg, Proceedings. SPbSPU. P.117. (in Russian).
  27. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Evaluation of security level of computer networks on the basis of attack graph construction. Sixth International Scientific School "Modelling and Analysis of Safety and Risk in Complex Systems" (MASR - 2006), St. Petersburg, July 4-8, 2006. P.150-154. (in Russian).
  28. Alexander Ulanov, Igor Kotenko. Research of defense mechanisms against the distributed attacks "Denial of service" on the basis of multiagent simulation. Sixth International Scientific School "Modelling and Analysis of Safety and Risk in Complex Systems" (MASR - 2006), St. Petersburg, July 4-8, 2006. P.333-339. (in Russian).
  29. Vladimir Gorodetsky, Igor Kotenko, Rafael Yusupov. Computer networks safety // Bulletin of the Russian Academy of Sciences. 2006. Vol. 76. No. 7. pp. 668-670. ISSN: 0869-5873. // https://www.elibrary.ru/item.asp?id=9312983 (in Russian).
  30. Igor Kotenko, Alexander Ulanov. Multi-agent modeling of distributed "Denial of Service" attacks and defense mechanisms. Proceedings of SPIIRAS, Issue 3, Vol.1. St. Petersburg, Nauka, 2006. P.105-125. // https://elibrary.ru/item.asp?id=15555308 (in Russian).
  31. Igor Kotenko, Mikhail Stepashkin, Rafael Yusupov. Mathematical Models, Methods and Architectures for Computer Networks Security: the State-of-the-art Review of Perspective Directions of Research by Results of International Workshop MMM-ACNS-2005. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.11-29. (in Russian).
  32. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Evaluating Security of Computer Networks based on Attack Graphs and Qualitative Security Metrics. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.30-49. // https://elibrary.ru/item.asp?id=15555325 (in Russian).
  33. Vitaly Bogdanov, Igor Kotenko. Architecture, models and techniques of functioning of the system of proactive monitoring of security policy. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.50-69. // https://www.elibrary.ru/item.asp?id=15555326 (in Russian).
  34. Artem Tishkov, Igor Kotenko, Olga Chervatuk, Dmitry Lakomov, Sergey Reznik, Ekaterina Sidelnikova. Conflict Detection and Resolution in Security Policies of Computer Networks. Proceedings of SPIIRAS, Issue 3, Vol.2. St. Petersburg, Nauka, 2006. P.102-114. // https://elibrary.ru/item.asp?id=15555330 (in Russian).
  35. Igor Kotenko, Artem Tishkov, Olga Chervatuk, Dmitry Lakomov. Conflicts search in security policies // Journal of Instrument Engineering, Vol.49, ¹11, 2006. Ñ. 45-49. // https://elibrary.ru/item.asp?id=9336883 (in Russian).
  36. Igor Kotenko, Alexander Ulanov. Agent-oriented environment for simulation and evaluation of "Distributed Denial of Service" defense mechanisms. Journal of Instrument Engineering, Vol.49, ¹11, 2006 (in Russian).
  37. Igor Kotenko, Alexander Ulanov. Modelling and simulation of counteraction of software agents in the Internet: general approach, simulation environment and experiments. Information Security. Inside, 2006. ¹ 4 (10). Ñ. 44-52. // https://elibrary.ru/item.asp?id=23409317 (in Russian).
    inside-zi.4-Cover.jpg [image/jpeg] (453792 bytes)
    inside-zi.4-Paper.pdf [application/pdf] (527867 bytes)
  38. Igor Kotenko, Mikhail Stepashkin. Models of actions of hackers-malefactors realizing distributed multistage attacks. X National Conference on Artificial Intelligence with International Participation(CAI-2006) . Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.617-625. ISBN: 5-9221-0757-7. // https://elibrary.ru/item.asp?id=35556016 (in Russian).
    inside-zi.5-Cover.jpg [image/jpeg] (410110 bytes)
    inside-zi.5-Paper.pdf [application/pdf] (1110624 bytes)
  39. Igor Kotenko, Alexander Ulanov. Agent - based modeling of complex systems behavior in the internet environment// X National Conference on Artificial Intelligence with International Participation(CAI-2006). Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.660-668. ISBN: 5-9221-0757-7. // https://elibrary.ru/item.asp?id=35463337 (in Russian).
    NCAI-06-A-Kotenko1.pdf [application/pdf] (7392 bytes)
    NCAI-06-Kotenko1.pdf [application/pdf] (412623 bytes)
  40. Mikhail Stepashkin, Igor Kotenko, Vitaly Bogdanov. Intelligent system of computer network security analysis. X National Conference on Artificial Intelligence with International Participation(CAI-2006) . Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.149-157. ISBN: 5-9221-0757-7. // https://elibrary.ru/item.asp?id=35464871 (in Russian).
    NCAI-06-A-Stepashkin.pdf [application/pdf] (7539 bytes)
    NCAI-06-Cover.jpg [image/jpeg] (261448 bytes)
    NCAI-06-Stepashkin.pdf [application/pdf] (347385 bytes)
  41. Alexander Ulanov, Igor Kotenko. Multi-agent system for simulation of computer network defense mechanisms. X National Conference on Artificial Intelligence with International Participation(CAI-2006) . Proceedings. Vol. 2. Moscow, Fizmatlit, 2006. P.867-876. ISBN: 5-9221-0757-7.// https://elibrary.ru/item.asp?id=35556154 (in Russian).
  42. Igor Kotenko, Mikhail Stepashkin, Vitaly Bogdanov. Models and methods of intellectual assessment of the level of security of computer networks. International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Proceedings.Moscow, Fizmatlit, 2006. P.321-328. ISBN: 5-9221-0686-4.// https://elibrary.ru/item.asp?id=36305711 (in Russian).
    AIS-06-A-Kotenko1.pdf [application/pdf] (7871 bytes)
    AIS-06-Cover.jpg [image/jpeg] (200919 bytes)
    AIS-06-Kotenko-paper.pdf [application/pdf] (238483 bytes)
  43. Vitaly Bogdanov, Igor Kotenko. Analysis of security policy compliance in computer networks: proactive approach. International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Proceedings.Moscow, Fizmatlit, 2006. P.313-320 ISBN: 5-9221-0686-4. (in Russian).
    AIS-06-A-Bogdanov.pdf [application/pdf] (7934 bytes)
    AIS-06-Bogdanov-paper.pdf [application/pdf] (246197 bytes)
  44. Igor Kotenko, Alexander Ulanov. Cooperative work of the teams of agents in the protection against network attacks of violation of availability. International Conferences "Intelligent systems (AIS'06)" and "Intelligent CAD (CAD-2006)". Proceedings.Moscow, Fizmatlit, 2006. P.306-313. ISBN: 5-9221-0686-4. // https://elibrary.ru/item.asp?id=36555011 (in Russian).
    AIS-06-A-Kotenko2.pdf [application/pdf] (7637 bytes)
    AIS-06-Kotenko-paper.pdf [application/pdf] (599294 bytes)
  45. Igor Kotenko, Alexander Ulanov. Teams of agents in cyberspace: modelling and simulation of information protection processes in the global Internet // Proceedings of the Institute of System Analysis of the Russian Academy of Sciences. 2006. Vol. 27. pp. 108-129. // https://elibrary.ru/item.asp?id=11970008 (in Russian).
  46. Igor Kotenko, Alexander Ulanov. Conflicts in the Internet: models of counteraction to distributed cyber attacks // In the collection: Materials of the Second International Scientific Conference on security and counter-terrorism. 2006. pp. 485-494. // https://elibrary.ru/item.asp?id=44516292 (in Russian).
  47. Vitaly Bogdanov, Igor Kotenko, Mikhail Stepashkin. A proactive approach to security policy monitoring in computer networks. The Firth All-Russian scientific Conference "Mathematics and Security of Information Technologies" (MSIT-06). Moscow, Lomonosov Moscow State University, 2006. (in Russian).
  48. Igor Kotenko, Rafael Yusupov. The main directions of scientific research in the field of protection of computer networks and systems. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. (in Russian).
  49. Victor Vorontsov, Igor Kotenko. Research of approaches to automatic detection and prevention of virus attacks on the basis of the combined mechanisms of network traffic restriction. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.105-106. (in Russian).
  50. Vasily Desnitsky, Igor Kotenko. Protection of the software against breaking: the analysis of methods. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.108-109. (in Russian).
  51. Igor Kotenko, Alexander Ulanov. Opposition in the Internet: Modeling and Simulation of Counteraction to Distributed Cyber-attacks // Materials of the Second International Scientific Conference on Security and Counter-terrorism. 2006. pp. 485-494 // https://www.elibrary.ru/item.asp?id=44516292 (in Russian).
  52. I.V. Kotenko, M.V. Stepashkin, R.M. Yusupov. Mathematical models, methods and architectures for computer networks security: the state-of-the-art review of perspective directions of research by results of international workshop mmm-acns-2005 // Proceedings of SPIIRAN. 2006. Vol. 2. No. 3. pp. 11-29.// https://elibrary.ru/item.asp?id=15555324 (in Russian).

2005

  1. Alexander Ulanov. The use of computer network simulators for modeling the information security processes // IV Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2005)", Saint-Petersburg, June 14-16, 2005. The proceedings of conference - SPb: SPOISU, 2005. P.80-81. (in Russian).
  2. Vladimir Gorodetsky, Oleg Karsaev, Vladimir Samoilov, Alexander Ulanov. Asynchronous alert correlation in multi-agent intrusion detection systems // Lecture Notes in Computer Science. 2005. Ò. 3685 LNCS. Ñ. 366-379. DOI: 10.1007/11560326_28 // https://elibrary.ru/item.asp?id=13480649
  3. Vladimir Gorodetsky, Igor Kotenko. Conceptual Foundations of Stochastic Modeling in the Internet Environment // Transactions of System Analysis Institute, vol.9, Foundations of Information Technologies and Systems. URSS, Moscow, 2005, P.168-185 // https://www.elibrary.ru/item.asp?id=36274917 (in Russian).
  4. Igor Kotenko. Multiagent models of counteracting malefactors and security systems in the Internet. Mathematics and security of information technologies. Conference proceedings. Moscow, Moscow State University, 2005. P.257-265.// https://www.elibrary.ru/item.asp?id=35587479 (in Russian).
  5. Artem Tishkov, Igor Kotenko. Specification and verifications of security policies of protected computer network: using Event calculus. Mathematics and security of information technologies. Conference proceedings. Moscow, Moscow State University, 2005. P.279-283. // https://www.elibrary.ru/item.asp?id=35588934 (in Russian).
  6. Igor Kotenko. Models of counteracting the agents teams of "Distributed Denial of Service" attacks and protection against them. Intelligent systems. Collective monograph .V.M.Kureichik (ed.). Moscow, Fizmatlit, 2005. P.181-188. (in Russian).
  7. Igor Kotenko, Sergey Nesterov. About the approach to development of functionality of network security scanners. XII All-Russian scientific conference "Problems of information security in the Higher School". MIPI, 2005. P.115-116. (in Russian).
  8. Igor Kotenko, Dmitriy Mihailov. Multiagent technologies in tasks of automated monitoring the information systems of industry enterprises. Science and technologies in industry. ¹1, 2005. (in Russian).
  9. Igor Kotenko. Agent-Based Modeling and Simulation of Cyber-Warfare between Malefactors and Security Agents in Internet // Â ñáîðíèêå: Simulation in Wider Europe - 19th European Conference on Modelling and Simulation, ECMS 2005. 2005. Ñ. 533-543. // https://www.elibrary.ru/item.asp?id=18239081
    ECMS2005-Cover.jpg [image/jpeg] (399631 bytes)
    ECMS2005-Paper.pdf [application/pdf] (1013528 bytes)
  10. Igor Kotenko, Alexander Ulanov. Multiagent modeling and simulation of agents' competition for network resources availability. The Fourth International Conference on Autonomous Agents and Multi-Agent Systems. Second International Workshop on Safety and Security in Multiagent Systems (SASEMAS '05). Utrecht, The Netherlands. 2005. P.27-43.
    SASEMAS05-Cover.jpg [image/jpeg] (372878 bytes)
    SASEMAS05-Paper.pdf [application/pdf] (452962 bytes)
  11. Igor Kotenko, Mikhail Stepashkin. Usage of dummy information systems for protecting resources of computer networks // Problems of information security. Computer systems. 2005, ¹1, P.63-73. // https://elibrary.ru/item.asp?id=11622219 (in Russian).
  12. Rafael Yusupov, Igor Kotenko. Security of computer networks and systems: a state of the art and perspective directions of scientific research. IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.90-91. (in Russian).
  13. Artem Tishkov, Igor Kotenko. Multimodular architecture of security policy verifier. IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005.P.79-80. (in Russian).
  14. Igor Kotenko, Mikhail Stepashkin. Imitation models for security level evaluation of information systems at their design stage.IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.63-64. (in Russian).
  15. Mikhail Stepashkin, Igor Kotenko. The testbed of checking decisions on information protection in computer networks. IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.77-78. (in Russian).
  16. Alexander Ulanov, Igor Kotenko. Modelling of protecting against DDOS attacks on the basis of intelligent agents' teamwork. IV St.Petersburg Interregional Conference “Information Security of Russian Regions ("ISRR-2005"). June 14-16, 2005. Proceedings. St.Petersburg, 2005. P.81-82. (in Russian).
  17. Igor Kotenko, Alexander Ulanov. Agent-oriented modelling and simulation of information protection processes: an antagonism of agents for availability of computer networks resources. International Conferences "Artificial Intelligence Systems" (IEEE AIS'05)" and "Intelligent CAD" (CAD-2005). Divnomorskoe, September 3-10, 2005, Proceedings.Ìoscow, Fizmatlit, 2005. Vol.1. P.296-301. // https://elibrary.ru/item.asp?id=50362681 (in Russian).
  18. Igor Kotenko, Mikhail Stepashkin. Intelligent system for analyzing computer networks security at various stages of life cycle. International Conferences "Artificial Intelligence Systems" (IEEE AIS'05)" and "Intelligent CAD" (CAD-2005).Proceedings. Ìoscow, Fizmatlit, 2005. Vol.1. P.231-237. // https://elibrary.ru/item.asp?id=50362729 (in Russian).
  19. Igor Kotenko, Alexander Ulanov. Teamwork Approach for Modeling and Simulation of DDOS attacks in Internet. 6th Workshop on Agent-Based Simulation. ABS6. Erlangen. Germany. September 12-15, 2005. P.28-33.
  20. Igor Kotenko, Mikhail Stepashkin. Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle. The Third International Workshop "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-05). September 24-28, 2005, St. Petersburg, Russia.
  21. Artem Tishkov, Igor Kotenko, Ekaterina Sidelnikova. Security Checker Architecture for Policy-based Security Management. Lecture Notes in Computer Science. 2005. Ò. 3685 LNCS. Ñ. 460-465. DOI: 10.1007/11560326_40 // https://elibrary.ru/item.asp?id=13477534
  22. Vitaliy Bogdanov, Igor Kotenko, Mikhail Stepashkin. The active security analysis of computer networks. ÕIV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.95. (in Russian).
  23. Igor Kotenko, Alexander Ulanov The software environment for simulation of protection mechanisms against distributed attacks "Denial of Service".ÕIV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.96. (in Russian).
  24. Mikhail Stepashkin, Vitaliy Bogdanov, Igor Kotenko. Subsystem of the passive analysis of computer networks security. ÕIV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.100. (in Russian).
  25. Artem Tishkov, Igor Kotenko. Verification of security policies in computer systems. ÕIV All-Russian scientific and technical conference "Methods and tools of information assurance". October 4-6, 2005. St. Petersburg, Proceedings .SPbSPU. 2005. P.101. (in Russian).
  26. Mikhail Stepashkin, Igor Kotenko, Vitaliy Bogdanov. Imitation of attacks for the active vulnerabilities analysis of computer networks. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.269-273. (in Russian).
  27. Igor Kotenko, Alexander Ulanov. Multiagent environment for simulating the mechanisms of protection against distributed computer attacks. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.220-224. (in Russian).
  28. Olga Chervatuk, Artem Tishkov, Igor Kotenko. Verification by model checking in the task of dynamic detection of conflicts in security policy. The second All-Russian scientific-practical conference on imitation modelling and its application in science and industry "Imitation modelling. Theory and practice". IMMOD-2005. Proceedings. Vol.1. St.Petersburg, October 19-21, 2005. P.283-287. (in Russian).
  29. Igor Kotenko, Alexander Ulanov. Agent-based simulation of DDOS attacks and defense mechanisms // International Journal of Computing. 2005. Ò. 4. ¹ 2. Ñ. 16-37. // https://elibrary.ru/item.asp?id=35579859
    Computing-05-Vol.4-Issue-2-Cover.jpg [image/jpeg] (510237 bytes)
    Computing-05-Vol.4-Issue-2-Paper.pdf [application/pdf] (583575 bytes)
  30. Igor Kotenko, Alexander Ulanov. Software testbed and experiments for exploring counteraction of attack and defense agents in the Internet. In the collection: Materials of the Second International Scientific Conference on Security and Counter-Terrorism. 2006. pp. 53-61.// https://elibrary.ru/item.asp?id=44523650 (in Russian).
  31. Vladimir Gorodetski, Igor Kotenko, Viktor Skormin (Editors). Computer Network Security. Lecture Notes in Computer Science, Vol.3685, Springer Verlag, 2005.
  32. Igor Kotenko, Alexander Ulanov. The Software Environment for multi-agent Simulation of Defense Mechanisms against DDoS Attacks. Â ñáîðíèêå: Proceedings - International Conference on Computational Intelligence for Modelling, Control and Automation. 2005. P. 283-288. // https://elibrary.ru/item.asp?id=15339667
  33. Igor Kotenko, Artem Tishkov, Dmitriy Lakomov, Olga Chervatuk, Ekaterina Sidelnikova. Checking correctness of security policies. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  34. Igor Kotenko, Mikhail Stepashkin, Vitaliy Bogdanov. Model of attacks for imitating malefactor's actions in security analysis system for computer networks. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  35. Igor Kotenko, Rafael Yusupov. Computer security: the perspective directions of SPIIRAS research. IV Inter-regional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. (in Russian).
  36. Igor Kotenko. Multi-agent modeling and simulation of computer network security processes: "a game of network cats and mice". NATO Advanced Study Institute (ASI). "Network Security and Intrusion Detection". October 1-12, 2005. Nork, Yerevan, Armenia, IOS Press. 2005.
  37. Vladimir Platonov, Andrey Chechulin. Defending against network and transport layers attacks. IV Interregional Conference "Information Security of Russia Regions". Selected papers proceedings. St.Petersburg, 2005. P.114-115. (in Russian).
  38. Philipp Nesteruk ,Gennadiy Nesteruk, Alexander Kharchenko. Adaptive systems of information protection for electronic business // Information technology in business: Proc. of the 2-nd Int. Conf. 4 –17 June, 2005, P.113–123
  39. Igor Kotenko, Mikhail Stepashkin. Analyzing Vulnerabilities and Measuring Security Level at Design and Exploitation Stages of Computer Network Life Cycle // Lecture Notes in Computer Science. 2005. Ò. 3685 LNCS. Ñ. 311-324. DOI: 10.1007/11560326_24 // https://elibrary.ru/item.asp?id=13479053
  40. V.I. Kurnosov, I.V. Paraschuk. The main problems and ways of integrated security of communications and information // Information and space. 2005. No. 2. pp. 98-104. // https://www.elibrary.ru/item.asp?id=12935899 (in Russian).

2004

  1. Alexander Ulanov, Sergey Nesterov. The risk management method in information security domain based on the game theory. Polytechnic Sympozium. 2004.P.23-99. (in Russian).
  2. Igor Kotenko. Multi-agent applications developed for vulnerabilities analysis and intrusion detection in computer networks // 2004. No. 1. pp. 56-72. // https://www.elibrary.ru/item.asp?id=50238782 (in Russian).
    Confident-2-2004-Cover.jpg [image/jpeg] (203883 bytes)
    Confident-2-2004-Paper.pdf [application/pdf] (536500 bytes)
    Confident-3-2004-Cover.jpg [image/jpeg] (196652 bytes)
    Confident-3-2004-Paper.pdf [application/pdf] (488448 bytes)
  3. Igor Kotenko. Theoretical aspects of developing deception systems. III Inter-regional Conference "Information Security of Russia Regions". Proceedings. St.Petersburg. 2004. P.59-68. (in Russian).
  4. Igor Kotenko, Mikhail Stepashkin. The prototype of deception system simulator: architecture and scripts of carrying out of experiments. III Inter-regional Conference "Information Security of Russia Regions". Proceedings. St.Petersburg. 2004. P.68-73. (in Russian).
  5. Alexander Ulanov, Igor Kotenko. Modeling attack "Distributed Denial of Service" by an example of using virus Mydoom. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.155-156. (in Russian).
  6. Mikhail Stepashkin, Igor Kotenko. Analysis of attributes of network connections and operational system logs for intrusion detection. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.152-153. (in Russian).
  7. Igor Kotenko, Mikhail Stepashkin. Monitoring of users work in computer networks. IX International Conference "Regional informatics-2004", St. Petersburg, Proceedings. SPb., 2004. P.136-137. (in Russian).
  8. Igor Kotenko, Mikhail Stepashkin. Deception systems for protection of information resources in computer networks. Proceedings of SPIIRAS, 2004. Vol. 1. ¹ 2. P. 211-230. (in Russian) // https://elibrary.ru/item.asp?id=15286952 (in Russian).
  9. Vladimir Gorodetski, Oleg Karsayev, Igor Kotenko, V.Samoilov. Multi-Agent Information Fusion: Methodology, Architecture and Software Tool for Learning of Object and Situation Assessment // Â ñáîðíèêå: Proceedings of the Seventh International Conference on Information Fusion, FUSION 2004. sponsors: Sweden Defence Research Agency, SAAB AB, Ericsson Microwave Systems AB, Lockheed Martin Corp., Sjoland and Thyselius AB; editors: Svensson P., Schubert J., Swedish Defence Research Agency FOI. Stockholm, 2004. Ñ. 346-353. // https://www.elibrary.ru/item.asp?id=16946066
    fusion-04-paper.pdf [application/pdf] (451039 bytes)
  10. Pavel Laskov, Christin Schafer, Igor Kotenko. Intrusion detection in unlabeled data with one-class Support Vector Machines. Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2004), Lecture Notes in Informatics (LNI), No. 46, Dortmund, Germany, July 2004. P.71-82.
    DIMVA-04-Cover.jpg [image/jpeg] (781850 bytes)
    DIMVA-04-paper.pdf [application/pdf] (215790 bytes)
  11. Igor Kotenko, Mikhail Stepashkin. Intelligent deception systems for information security in computer networks. International Conferences "Artificial Intelligence Systems" (IEEE AIS'04)" and "Intelligent CAD" (CAD-2004). Proceedings. Divnomorskoe, September 3-10, 2004. P.204-209. (in Russian).
  12. Igor Kotenko. Recognition of agents-hackers plans at detecting computer attacks. International Conferences "Artificial Intelligence Systems" (IEEE AIS'04)" and "Intelligent CAD" (CAD-2004). Proceedings .Divnomorskoe, September 3-10, 2004. P.198-204. (in Russian).
  13. Igor Kotenko, ArtemTishkov, M.Tishkova. The event calculus implementation using ILOG JRules for security policy verification. 9-th International Workshop SPEECH AND COMPUTER (SPECOM'2004) 20-22 September 2004, St. Petersburg, Russia. 2004. P.630-633.
  14. Igor Kotenko. Multi-agent applications developed for vulnerabilities analysis and intrusion detection in computer networks // AI News, ¹ 1, 2004. P.56-72.// https://www.elibrary.ru/item.asp?id=50238782 (in Russian).
  15. Igor Kotenko. Modeling and Simulation of Attacks for Verification of Security Policy and Vulnerability Assessment. Seventh International Symposium on Recent Advances in Intrusion Detection. RAID 2004. Abstract and Poster sessions. Sophia-Antipolis, French Riviera, France, September 15-17, 2004.
  16. Igor Kotenko. Mutiagent modeling of attack "Distributed Denial of Service". IX National Conference on Artificial Intelligence with international participation. Proceedings. Vol.2. Ìoscow: Fizmatlit, 2004. P.723-731. (in Russian).
  17. Vladimir Gorodetsky, Igor Kotenko. Scenarios Knowledge base: A Formal Framework for Proactive Coordination of Coalition Operations. Knowledge Systems for Coalition Operation. M.Pechoucek, A.Tate (eds.). Third International Conference on Knowledge Systems for Coalition Operations (KSCO-2004). Pensacola, Florida. 2004. P.83-97.
    KSCO-04-Cover.jpg [image/jpeg] (142459 bytes)
    KSCO-04-Paper.pdf [application/pdf] (278320 bytes)
  18. Artem Tishkov, Igor Kotenko System of security policies verification in protected computer networks.ÕII Russian Conference "Methods and tools of information assurance". St. Petersburg, Proceedings.SPbSPU. October 4-5, 2004. P.129. (in Russian).
  19. Igor Kotenko, Mikhail Stepashkin, Dmitriy Mihailov. System of collection, analysis and storage of data for users work audit. ÕII Russian Conference "Methods and tools of information assurance". St. Petersburg, Proceedings.SPbSPU. October 4-5, 2004.P.124. (in Russian).
  20. Igor Kotenko, Mikhail Stepashkin. Recognition of goals and plans of malefactors at detecting computer attacks. ÕII Russian Conference "Methods and tools of information assurance". St. Petersburg, SPbSPU. October 4-5, Proceedings. 2004. P.97. (in Russian).
  21. Alexander Ulanov, Igor Kotenko. Models of DDoS-attacks and mechanisms of protection against them. ÕII Russian Conference "Methods and tools of information assurance". St. Petersburg, Proceedings.SPbSPU. October 4-5, 2004. P.106. (in Russian).
  22. Pavel Laskov, Christin Schafer, Igor Kotenko, Klaus-Robert Muller. Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines. Â ñáîðíèêå: Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI). 2004. Ñ. 71-82. // https://elibrary.ru/item.asp?id=41606738
  23. Igor Kotenko. Modeling cyber war: models of teams of attack and protection agents acting in Internet. Applied intelligent systems. Ìoscow, Fizmatlit, 2004 (in Russian).
  24. I.V. Kotenko. Multi-agent applications developed for vulnerabilities analysis and intrusion detection in computer networks // Information protection. Confidential. 2004. No. 2. pp. 72-76. // https://www.elibrary.ru/item.asp?id=28381656 (in Russian).
  25. M.V. Bochkov, I.V. Saenko. Polumarkovskaya model of adaptive protection of information from unauthorized access // Problems of information security. Computer systems. No. 1, 2004, pp. 14-20 (in Russian).

2003

  1. Alexander Ulanov, Sergey Nesterov. Development of method for information defense system effectiveness analysis based on trench games theory. Polytechnic Sympozium. Proceedings. Saint-Petersburg, 2003. P.14-15 (In Russian and English)
  2. Sergey Nesterov, Alexander Ulanov. Development of risk analysis method in information security domain based on trench games theory. XVI international scientific-methodical conference.Mathematics in VUZ. Proceedings .Petrozavodsk, 2003. P.171-173. (In Russian)
  3. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev. Multi-agent Technologies for Computer Network Security: Attack Simulation, Intrusion Detection and Intrusion Detection Learning // Computer Systems Science and Engineering. 2003. Ò. 18. ¹ 4. Ñ. 191-200. // https://www.elibrary.ru/item.asp?id=13440695
    ICSSE-2003-paper.pdf [application/pdf] (1871467 bytes)
  4. Igor Kotenko. Multi-agent technologies of active vulnerabilities analysis and intrusion detection for creating secure distributed computer systems. Proceedings of International Congress "Trust and è safety in informational society", St. Petersburg, April 21-22, 2003. (in Russian).
  5. Igor Kotenko, Evgeniy Man'kov. Agent-Based Modeling and Simulation of Computer Network Attacks. Proceedings of Fourth International Workshop "Agent-Based Simulation 4 (ABS 4)". Jean-Pierre Muller, Martina-M.Seidel (Editors). April 28-3. Montpellier, France, 2003, P.121-126.
  6. Igor Kotenko. Teamwork of Hackers-Agents: Modeling and Simulation of Coordinated Distributed Attacks on Computer Networks // Lecture Notes in Computer Science. 2003. Ò. 2691. Ñ. 464. DOI: 10.1007/3-540-45023-8_45 // https://www.elibrary.ru/item.asp?id=18246409
  7. Vladimir Gorodetsky, Igor Kotenko, J.B.Michael. Multi-agent Modeling and Simulation of Distributed Denial of Service Attacks on Computer Networks. Proceedings of Third International Conference "NAVY AND SHIPBUILDING NOWADAYS" (NSN'2003). St. Petersburg, Russia, June 26-28, 2003. P.38-47.
  8. A.Alexeev, Igor Kotenko. Teamwork of agents protecting from distributed attacks "Denial of service". Proceedings of International Conference on Soft Computing and Measurements (SMC'2003). St-Petersburg, Russia. June 25 - 27, 2003, P.294-297. (in Russian).
  9. Igor Kotenko, Mikhail Stepashkin. Intelligent system for simulating attacks on Web-server for computer systems vulnerabilities analysis. Proceedings of International Conference on Soft Computing and Measurements (SMC'2003). St. Petersburg, Russia, June 25 - 27, 2003, P.298-301. (in Russian).
  10. Igor Kotenko, Leonid Stankevich. Real-time Teamwork of Agents. AI News, ¹ 3, 2003. P.25-31.// https://www.elibrary.ru/item.asp?id=50209381 (in Russian).
  11. Igor Kotenko. Models of Opposition of Agents Teams in realizing of and protecting from distributed attacks "Denial of service".International Conferences "Artificial Intelligence Systems" (IEEE AIS'03)" and "Intelligent CAD" (CAD-2003).Proceedings. Divnomorskoe, September 3-10, 2003. Vol.1. P.422-428. (in Russian).
  12. Sergey Nesterov, Igor Kotenko. Risk analysis of computer systems on the basis of using network attack simulator. VIII International Conference "Regional informatics-2002".Proceedings, St. Petersburg, 2003. P.185-189. (in Russian).
  13. I.Kotenko, A.Alexeev. Modeling of DDoS-attacks on the basis of agents' teamwork. Proceedings of the VIII International Conference "Regional informatics-2002". St. Petersburg, 2003. P.180-184. (in Russian).
  14. Igor Kotenko, Sergey Nesterov. Information assurance systems design by integrating the procedures of risk analysis and active security audit. International Conference "Modeling and Analysis of Safety and Risk in Complex Systems" (MA SR - 2003). St. Petersburg, August 20-23, 2003. P.396-402. (in Russian).
  15. Igor Kotenko, Evgeny Man'kov. Experiments with simulation of attacks against computer networks // Lecture Notes in Computer Science. 2003. Ò. 2776. Ñ. 183-194. DOI: 10.1007/978-3-540-45215-7_15 // https://www.elibrary.ru/item.asp?id=13437915
  16. Igor Kotenko, Alexey Alexeev, Evgeny Man'kov. Formal framework for modeling and simulation of ddos attacks based on teamwork of hackers-agents // Proceedings of 2003 IEEE/WIC International Conference on Intelligent Agent Technology, Halifax, Canada, October 13-16, 2003, IEEE Computer Society. 2003, P.507-510. // https://www.elibrary.ru/item.asp?id=16942583
  17. Igor Kotenko. Active vulnerability assessment of computer networks by simulation of complex remote attacks. Â ñáîðíèêå: Proceedings - 2003 International Conference on Computer Networks and Mobile Computing, ICCNMC 2003. 2003. Ñ. 40-47.
  18. Vladimir Gorodetsky, Oleg Karsaev, Igor Kotenko, V.Samoilov, Mikhail Stepashkin. Multi-agent system of intrusion detection learning. III Inter-regional Conference "Information Security of Russia Regions", Proceedings. Vol.1. St. Petersburg, November 25-27, 2003.P.118. (in Russian).
  19. Dmitriy Komashinski, Igor Kotenko. Multi-agent technology for modeling of virus expansion within Internet. III Inter-regional Conference "Information Security of Russia Regions". Proceedings.Vol.1. St. Petersburg, November 25-27, 2003. P.127-128 (in Russian).
  20. Igor Kotenko. Modeling of cyber war on the basis of agents' technologies.III Inter-regional Conference "Information Security of Russia Regions",Proceedings. Vol.1. St. Petersburg, November 25-27, 2003.P.70-71 (in Russian).
  21. Alexey Alexeev, Igor Kotenko. Multi-agent system of DDOS-attacks simulation. ÕI Russian Conference "Methods and tools of information assurance".Proceedings. St. Petersburg, SPbSPU, November 26-27, 2003.P.101-102. (in Russian).
  22. Igor Kotenko, Mikhail Stepashkin. Prototype of honeypot system. ÕI Russian Conference "Methods and tools of information assurance".Proceedings. St. Petersburg, SPbSPU,. November 26-27, 2003.P.57-58. (in Russian).
  23. Igor Kotenko, Evgeny Man'kov. Stochastic model of attacks on computer networks based on state machines. Informatization and communication, ¹ 1-2, 2003. P.61-67. (in Russian).
  24. Igor Kotenko, Vladimir Gorodetski. Multi-agent Systems for Intrusion Detection. Proceedings of China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-2003), October 19-23, 2003, Shanghai, China. P.9-17.
  25. Igor Kotenko. Multi-agent Modeling and Simulation of Computer Network Attacks based on Teamwork Models and Formal Grammars. Proceedings of China-Russia Bilateral Conference on Intelligent Information Processing (CRBCIIP-2003), October 19-23, 2003, Shanghai, China. P.18-29.
  26. Igor Kotenko. The taxonomies of the attacks on computer systems // SPIIRAS Proceeding, Vol.2. ¹ 1. SPb, SPIIRAS, 2003. P.196-211.// https://elibrary.ru/item.asp?id=15512676 (in Russian).
  27. Andrey Ogarok, Dmitriy Komashinski, Shkolnikov D.K., Martynenko V.V. Virtual wars. Artificial intelligence defends against malware .Confident , 2003, ¹ 2, P.64-69. (in Russian).
  28. Alexander Rostovtsev, Elena Makhovenko, Alexander Filippov, Andrey Chechulin. About the durability of GOST 28147-89 // Problems of information security. Computer systems. 2003. No. 1. pp. 75-83 // https://www.elibrary.ru/item.asp?id=28143117 (in Russian).
  29. Philipp Nesteruk, Gennady Nesteruk, Alexander Kharchenko. Information safety in electronic business: adaptive model of systems safety of information technologies // St. Petersburg, 2003. Information technology in business: Proc. of the Int. Conf. October 8 -10, 2003.
  30. V. Gorodetsky, Igor Kotenko, J. Michael. Multi-agent modeling and simulation of distributed denial-of-service attacks on computer networks // Published 2003, Computer Science, Engineering // Corpus ID: 14198534

2002

  1. Alexander Ulanov. Risk analysis in the domain of computer security. Contest-conference of students works in the domain of modern programming technology of Microsoft company. Proceedings Saint-Petersburg, 2002. P.92-93. (in Russian).
  2. Alexander Ulanov, Sergey Nesterov. The elaboration of risk analysis method in information safety sphere. Polytechnic Sympozium. Proceedings Saint-Petersburg, 2002. P.70. (in Russian).
  3. Vladimir Gorodetsky, Oleg Karsaev, Igor Kotenko, Aleksey Khabalov. Software Development Kit for Multi-agent Systems Design and Implementation. Lecture Notes in Artificial Intelligence, Vol.2296, Springer Verlag, 2002. P.121-130. DOI: 10.1007/3-540-45941-3_13 // https://elibrary.ru/item.asp?id=26768098
  4. Vladimir Gorodetski, Igor Kotenko. Formal Model of complex distributed attacks on Computer Networks. II Inter-regional Conference "Information Security of Russia Regions". Proceedings. Vol.2. Saint-Petersburg, 2002. P.92-97. (in Russian).
  5. Vladimir Gorodetski, Igor Kotenko. Teamwork of Agents in Antagonistic Environment. International Conference on Soft Computing and Measurements. SMC'2002. Proceedings. Saint-Petersburg, 2002. Vol.1. P.259-262. (in Russian).
  6. Igor Kotenko, Oleg Karsayev, V.V.Samoilov. Ontology of learning for Intrusion Detection in Computer Networks. International Conference on Soft Computing and Measurements. SMC'2002. Proceedings. Saint-Petersburg, 2002. Vol.1. P.255-258. (in Russian).
  7. Vladimir Gorodetski, Igor Kotenko. The Multi-agent Systems for Computer Network Security Assurance: frameworks and case studies // Â ñáîðíèêå: 2002 IEEE International Conference on Artificial Intelligence Systems, ICAIS 2002. Proceedings. 2002. Ñ. 297-302. DOI: 10.1109/ICAIS.2002.1048117 // https://www.elibrary.ru/item.asp?id=26997768
    ICAIS-02-paper.pdf [application/pdf] (177148 bytes)
  8. Igor Kotenko, Leonid Stankevich. The Control of Teams of Autonomous Objects in the Time-Constrained Environments // Â ñáîðíèêå: 2002 IEEE International Conference on Artificial Intelligence Systems, ICAIS 2002. Proceedings. 2002. Ñ. 158-163. DOI: 10.1109/ICAIS.2002.1048074 // https://www.elibrary.ru/item.asp?id=26996200
  9. Igor Kotenko, Evgeniy Man'kov. Simulation of Attacks on Telecommunication Systems. VIII International Conference on Informational Networks, Systems and Technologies. ICINSAT-2002. SUT. St.Petersburg, 2002. P.190-198. (in Russian).
  10. Igor Kotenko. Multi-agent Technologies for Support of Intrusion Detection in Computer Networks. Õ Russian Conference "Methods and tools of information assurance". Proceedings. Saint-Petersburg - Pushkin,2002.P.44-45. (in Russian).
  11. Vladimir Gorodetski, Igor Kotenko. Teamwork of Hackers-Agents: Application of Multiagent Technology for Simulation of Distributed Attacks on Computer Networks. VIII National conference with international involvement on Artificial Intelligence Proceedings. (KII-2002) Moscow, 2002. P.711-720. (in Russian).
  12. Igor Kotenko, Nikolay Lihvanzev. The Technology of Expert Critics for Intelligent Support of Decision Making. VIII National conference with international involvement on Artificial Intelligence(CAI-2002). Proceedings. Moscow, 2002. P.565-574. (in Russian).
  13. Igor Kotenko, Leonid Stankevich. Agents' Teamwork in Conditions of Time Constraints. Third International Conference "Artificial Intelligence -2002". Proceedings . 2002. Crimea, Ukraine, 2002.P.249-253 (in Russian).
  14. Igor Kotenko.Case-based Recovering of Formal Grammars specifying Scenarios of Computer Attacks. Third International Conference "Artificial Intelligence -2002". Proceedings. 2002. Crimea, Ukraine, 2002. (in Russian).
  15. Vladimir Gorodetski, Igor Kotenko. Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool // Lecture Notes in Computer Science. 2002. Ò. 2516. Ñ. 219-238. DOI: 10.1007/3-540-36084-0_12 // https://www.elibrary.ru/item.asp?id=26879314
    RAID-02-paper.pdf [application/pdf] (137246 bytes)
  16. Andrey Ogarok, Vladimir Nasypny, Dmitriy Komashinskiy. Technology of intelligence antivirus scanning of dangerous software routines. Magazine “Innovations”, 2002, ¹9,10. P.128-131. (in Russian).
  17. M.V. Bochkov, V.A. Loginov, I.B. Saenko. Active audit of user actions in a secure network // Information protection. Confidential. 2002. No. 4-5. p. 94. (in Russian).

2001

  1. Igor Kotenko, Oleg Karsayev. Application of Multi-agent Technology for Integrated Assurance of Computer Networks. Transactions of Taganrog Radio-Technical University, ¹4(22), 2001. P.38-50. // https://www.elibrary.ru/item.asp?id=12854339 (in Russian).
  2. Igor Kotenko, Nikolay Lihvanzev. Multi-agent Technology of Expert Critics for Intelligent Decision Support. Transactions of Taganrog Radio-Technical University, ¹4(22), 2001. P.17-25. // https://www.elibrary.ru/item.asp?id=12854337 (in Russian).
  3. Vladimir Gorodetski, Igor Kotenko. Models of Attacks on Computer Networks based on Formal Grammars. International Conference on Soft Computing and Measurements. SMC'2001. Proceedings. Saint-Petersburg, 2001. Vol.1. P.212-216. (in Russian).
  4. Nikolay Lihvanzev, Igor Kotenko. Model of Self-adaptation of Expert Critics Components based on Probabilistic State Machines. International Conference on Soft Computing and Measurements. SMC'2001. Proceedings. Saint-Petersburg, 2001. Vol.1. P.131-136. (in Russian).
  5. Vladimir Gorodetski, Oleg Karsayev, Igor Kotenko. Program prototype of the Multi-Agent Computer Network Intrusion Detection System. CAI'2001. International Congress "Artificial Intelligence in XXI Century". Proceedings. Vol.1. 2001. P.280-293. (in Russian).
  6. Vladimir Gorodetski, Oleg Karsayev, Igor Kotenko, Aleksey Khabalov. MAS DK: Software Development Kit for Multi-agent Systems Implementation and Examples of Applications. ICAI'2001. International Congress "Artificial Intelligence in XXI Century". Proceedings. Vol.1. 2001. P.249-262. (in Russian).
  7. Vladimir Gorodetsky, Oleg Karsayev, Aleksey Khabalov, Igor Kotenko, Jeffrey Popyack, Viktor Skormin. Agent-based Model of Computer Network Security System: A Case Study. Information Assurance in Computer Networks. Methods, Models, and Architectures for Network Security. International Workshop MMM-ACNS 2001. St.Petersburg, Russia, May 2001.
  8. Vladimir Gorodetsky, Oleg Karsayev, Igor Kotenko, Aleksey Khabalov. Software Development Kit for Multi-agent Systems Design and Implementation. Proceedings of the Second International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'01. Krakow, Poland, September 26-29, 2001. B.Dunin-Keplicz, E.Nawarecki (Eds.). 2001. P.99-108.
  9. V.Gorodetski, O.Karsayev, I.Kotenko . Multi-agent System of Intrusion Detection into Computer Networks. II Inter-regional Conference "Information Security of Russia Regions " . Proceedings. Vol.1. Saint-Petersburg, 2001. P.56. (in Russian).
  10. V.Gorodetski, I.Kotenko, E,Man'kov. Modeling of distributed Attacks on Computer Networks. II Inter-regional Conference "Information Security of Russia Regions " . Proceedings. Vol.1. Saint-Petersburg, 2001. P.56-57. (in Russian).
  11. I.V. Kotenko. Multi-agent model of decision support in the cooperative work of designers // Perspective information technologies and intelligent systems. 2001. No. 1. p. 10. (in Russian).
  12. Vladimir Gorodetsky, Oleg Karsayev, Aleksey Khabalov, Igor Kotenko, Jeffrey Popyack, Viktor Skormin. Agent-based Model of Computer Network Security System: A Case Study. Lecture Notes in Computer Science. 2001. Ò. 2052. Ñ. 39-50. DOI: 10.1007/3-540-45116-1_7 eLIBRARY ID: 26853674 (in Russian).

2000

  1. Vladimir Gorodetsky, Igor Kotenko, Jeffrey Popyack, Viktor Skormin. Integrated Multi-Agent Information Security System: Mechanisms of Agents' Operation and Learning. Proceedings of the Fifth International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology. PAAM' 2000. PA EXPO 2000. Manchester. UK. Practical Application Company Ltd. 2000. P.151-154.
  2. Vladimir Gorodetski, Igor Kotenko, Oleg Karsaev. Framework for Ontology-based Representation of Distributed Knowledge in Multiagent Network Security System. Proceedings of the 4th World Multi-conference on Systems, Cybernetics and Informatics (SCI-2000), Vol. III: "Virtual Engineering and Emergent Computing". Orlando, USA, July 2000. P.52-58.
  3. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev. Multi-Agent Information Security System in Computer Networks: Mechanisms of Learning and Decision Making for Intrusion Detection. Inter-regional Conference "Information Security of Russia Regions". Proceedings. Saint-Petersburg, 2000. P.97-104. (in Russian).
  4. Vladimir Gorodetski, Igor Kotenko, Oleg Karsaev. Multi-agent Network Security System: Mechanisms of Learning and Decision Making for Intrusion Detection. "Problemy Informatizatsiy", ¹2, 2000. P.67-73. // https://www.elibrary.ru/item.asp?id=47322480 (in Russian).
  5. Igor Kotenko. Models and algorithms of the guaranteed time support for problem solving by knowledge-based systems. International Conference on Soft Computing and Measurements. SMC'2000. Proceedings. Saint-Petersburg, 2000. P.254-257. (in Russian).
  6. Igor Kotenko, V.Golodnov, N.Lihvanzev, M.Zabadani. New Information Technologies for Decision Support Systems in design and Planning of Telecommunication Systems. VI International Conference on Informational Networks and Systems. ISINAS-2000. LONIIS, SUT. St.Petersburg, 2000. P.135-146. (in Russian).
  7. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev, Aleksey Khabalov. Multi-agent Technologies of Integrated Assurance in Telecommunication Networks. VI International Conference on Informational Networks and Systems. ISINAS-2000. LONIIS, SUT. St.Petersburg, 2000. P.122-134. (in Russian).
  8. Vladimir Gorodetsky, Igor Kotenko, Oleg Karsaev. Intelligent Agents for Attack Detection in Computer Networks. CAI'2000. VII National conference with international involvement on Artificial Intelligence Proceedings. Moscow, 2000. P.771-779. (in Russian).
  9. V.I. Gorodetsky, O.I. Karsaev, I.V. Kotenko, A.V. Khabalov. Model of a multi-agent information security system // Izvestia TRTU. 2000. No. 2 (16). pp. 322. // https://www.elibrary.ru/item.asp?id=12854276 (in Russian).
  10. I. V. Kotenko, N.A. Likhvantsev, M.A. Zabadani. Intellectualization of expert criticism procedures in automated design // Izvestiya TRTU. 2000. No. 2 (16). p. 336.// https://www.elibrary.ru/item.asp?id=12854293 (in Russian).

1999

  1. Igor Kotenko. Uncertainty Processing for Monitoring Large-Scaled Distributed Systems // Ìåæäóíàðîäíàÿ êîíôåðåíöèÿ ïî ìÿãêèì âû÷èñëåíèÿì è èçìåðåíèÿì. SMC-99. Ñáîðíèê äîêëàäîâ. ÑÏá: ÑÏáÃÝÒÓ, 1999, Vol.1 P.89-93
  2. Igor Kotenko. Application of Hybrid Agent-Based Technology for Design of Telecommunication Systems // Proceedings of the First International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'99. St. Petersburg,1999. P.139-153.
  3. Vladimir Gorodetsky,Igor Kotenko,Jeffrey Popyack,Victor Skormin . Agent-based Model of Information Security System: Architecture and Formal Framework for Coordinated Behavior Specification // Proceedings of the First International Workshop of Central and Eastern Europe on Multi-agent Systems. CEEMAS'99. St. Petersburg.1999. P.113-123.
  4. Vladimir Gorodetsky,Igor Kotenko,Jeffrey Popyack,Victor Skormin. Ontology-Based Multi-Agent Model of an Information Security System // Lecture Notes in Artificial Intelligence, V.1711. New Directions in Rough Sets, Data Mining, and Granular-Soft Computing. 7th International Workshop, RSFDGrC'99. Yamaguchi, Japan. November 1999. Proceedings. P.528-532.
  5. Vladimir Gorodetsky ,Igor Kotenko, Jeffrey Popyack, Victor Skormin. Multi-Agent Integrated Information Security System for Computer Networks: Architecture and Agent Interaction // Proceedings of the Second International Scientific Conference in the Republic of Kazakhstan on Informative Technologies and Control (KazITC'99). December 6-10, 1999. Almaty, Kazakhstan. P.286-305.
  6. V.I. Gorodetsky, I.V. Kotenko. Architecture of basic agents of a multi-agent information protection system in computer networks // Izvestiya TRTU. 2000. No. 2 (16). pp. 38-51 // https://www.elibrary.ru/item.asp?id=12854203 (in Russian).

1994

  1. I.V. Kotenko. Conflict resolution in computer-supported cooperative design // Lecture Notes in Computer Science. 1994. Ò. 876 LNCS. Ñ. 152-163. DOI: 10.1007/3-540-58648-2_34 // https://www.elibrary.ru/item.asp?id=31076797

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page