| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |
  


Personal | Interests | Projects | Publications | 

Desnitsky Vasily Alexeevich

Citizenship: Russia
Address academic (office):
St.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.: +7-(812)-328-2642
Fax: +7-(812)-328-4450

Position:Senior research fellow

Associate professor, Dr. Vasily A. Desnitsky, Master of Computer Science, Senior research fellow of Laboratory of Computer Security Problems of the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Science (Scientific advisor - prof. Igor Kotenko), graduated from Mathematics and Mechanics Department of St. Petersburg State University in 2006. Got PhD in the field of Information Security Methods and Systems in 2013.

E-mail: desnitsky[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/desnitsky/

Top 

Research interests

IoT security, cyber-physical systems, energy exhaustion attacks, wireless sensor networks, embedded security, modeling and verification

Top 

Identifiers

2019

  • Desnitsky Vasily Alexeevich - 1st place in the section "Transport Systems" at the III International Scientific Conference "Science of the Future" for the project "Self-learning hardware and software robotic complex for emergency situations".

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2018

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2016

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2015

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2014

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2011

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

Top 

Patents and Programms

Patents for inventions and utility models, applications for them

  1. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Device for parametric estimation of the distribution law of message streams. Patent No. 2750287. Registered in the State Register of Inventions of the Russian Federation on 25.06.2021. The validity period of the exclusive right to the invention expires on 11.07.2040.
  2. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin, Elena Doynikova. Information retrieval device. Patent No. 2724788. Registered in the State Register of Inventions of the Russian Federation on 25.06.2020. The validity period of the exclusive right to the invention expires on 14.10.2039.

  3. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Random event prediction device. Patent No. 2705010. Registered in the State Register of Inventions of the Russian Federation on 01.11.2019. The validity period of the exclusive right to the invention expires on 14.02.2039.

  4. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Information retrieval device. Patent No. 2656736. Registered in the State Register of Inventions of the Russian Federation on 06.06.2018. The validity period of the exclusive right to the invention expires on 27.06.2037.

Programs and databases

2020

  1. Vasily Desnitsky, Igor Parashchuk, Andrey Chechulin. The component of eliminating the estimation uncertainty and categorization of the semantic content of information objects based on the disjoint summation of fuzzy sets. Certificate No. 2020610922. Registered in the Computer Program Registry 22.01.2020.

  2. Vasily Desnitsky, Elena Doinikova. A component of modeling a wireless sensor network for solving security analysis and verification tasks. Certificate No. 2020610060. Registered in the Computer Program Registry 09.01.2020.

  3. Alexey Meleshko, Vasily Desnitsky Component for the input data generation for solving problems of detecting anomalies in a wireless sensor network. Certificate No. 2020665921. Registered in the Computer Program Registry 02.12.2020.

  4. Evgenia Novikova, Vasily Desnitsky Component for the multidimensional data from wireless sensor network visualization. Certificate No. 2020666210. Registered in the Computer Program Registry 07.12.2020.

  5. Alexander Branitskiy, Vasily Desnitsky, Igor Parashchuk. Software tool for adaptation and retraining of the information objects analysis system. Certificate No. 2020665857. Registered in the Computer Program Registry 21.11.2020.

  6. Vasily Desnitsky, Igor Parashchuk., Igor Kotenko. Data processing component of the parental control system for digital content on the Internet. Certificate No. 2020666736. Registered in the Computer Program Registry 16.12.2020.

2019

  1. Vasily Desnitsky. Modeling normal and abnormal wireless sensor network traffic to evaluate and increase protection against Denial-of-Sleep attacks. Certificate No 2019665204. Registered in the Computer Program Registry 20.11.2019.
  2. Vasily Desnitsky. Modeling protection of Digital City network nodes against Denial-of-Sleep attacks. Certificate No 2019665088. Registered in the Computer Program Registry 19.11.2019.
  3. Alexey Meleshko, Vasily Desnitsky. Modeling protection of unmanned aerial vehicles from energy depletion attacks. Certificate No 2019664768. Registered in the Computer Program Registry 13.11.2019.
  4. Alexey Meleshko, Vasily Desnitsky. Modeling components of a Digital City system to counter energy depletion attacks. Certificate No 2019664767. Registered in the Computer Program Registry 13.11.2019.
  5. Vasily Desnitsky, Alexey Meleshko. Assessment of feasibility of energy depletion attacks on an unmanned aerial vehicle through modification of flight performance. Certificate No 2019665584. Registered in the Computer Program Registry 26.11.2019.
  6. Vasily Desnitsky, Andrey Fedorchenko. Modeling an information security violator in wireless sensor networks. Certificate No. 2019667307. Registered in the Computer Program Registry 23.12.2019.

2018

  1. Vasily Desnitsky, Andrey Chechulin. Firmware of a node of a Smart City sensor network to model energy exhaustion attacks. Federal Service for Intellectual Property. Certificate No 2018662696. Registered in the Computer Program Registry 12.10.2018.

  2. Vasily Desnitsky, Andrey Chechulin. Detection of energy exhaustion attacks on the base of rules in wireless mesh networks. Federal Service for Intellectual Property. Certificate No 2018662817. Registered in the Computer Program Registry 16.10.2018.

  3. Vasily Desnitsky, Andrey Chechulin. Control for governing an unmanned aerial vehicle to model energy exhaustion attacks . Federal Service for Intellectual Property. Certificate No 2018662871. Registered in the Computer Program Registry 17.10.2018.

  4. Vasily Desnitsky, Nickolay Rudavin, Igor Saenko. Modeling unwanted information flows in information systems. Federal Service for Intellectual Property. Certificate No 2018663496. Registered in the Computer Program Registry 29.10.2018.

  5. Vasily Desnitsky, Igor Kotenko. Module of analysis of unwanted information flows in information systems. Federal Service for Intellectual Property. Certificate No 2018663497. Registered in the Computer Program Registry 29.10.2018.

2017

  1. Vasily Desnitsky, Igor Parashchuk, Andrey Chechulin. Modeling of the attacks on wireless modules if mobile network. Federal Service for Intellectual Property. Certificate No 2017619724. Registered in the Computer Program Registry 19.09.2017.

  2. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Processing of security events from the cyberphysical water supply management system. Federal Service for Intellectual Property. Certificate No 2017660183. Registered in the Computer Program Registry 19.09.2017.

  3. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Managing of the security of a wireless mesh-network. Federal Service for Intellectual Property. Certificate No 2017661289. Registered in the Computer Program Registry 09.10.2017.

2016

  1. .., .., .. . 2016663475. 08.12.2016.
  2. .. . 2016663374. 06.12.2016.
  3. .., .. . 2016663477. 08.12.2016.

2015

  1. Vasily Desnitsky, Igor Kotenko. Component for gathering data on a system for design, verification and testing security components of information and telecommunication Internet of Things systems. Certificate No 2015615411. Registered in the Computer Program Registry 18.05.2015.

  2. Vasily Desnitsky, Igor Kotenko. A software tool for evaluation of effectiveness of configuring security components of Internet of Things systems. Certificate N 2015662025. Registered in the Computer Program Registry 16.11.2015.

  3. Vasily Desnitsky. The software of representing the input data for configuring components of protection of embedded devices. Certificate 2015662185. Registered in the Computer Program Registry 18.11.2015.

  4. Vasily Desnitsky. Generator of report forms of analysis of security systems of the Internet of things. Certificate 2015662184. Registered in the Computer Program Registry 18.11.2015.

2014

  1. Vasily Desnitsky, Igor Kotenko. Verificataion of network information flows for protection of information and telecommunication systems with embedded devices. Federal Service for Intellectual Property. Certificate No 2014661027. Registered in the Computer Program Registry 22.10.2014.

2013

  1. Igor Kotenko, Vasily Desnitsky. Configurator of protection system of embedded devices. Federal Service for Intellectual Property. Certificate No 2013612691. Registered in the Computer Program Registry 11.03.2013 .

Top 

Projects

Current Grants and Projects

  • Igor Kotenko (Principal Investigator). Grant of Russian Science Foundation 21-71-20078 " Analytical processing of large arrays of heterogeneous data in the interests of state assessment, decision support and incident investigation to ensure cybersecurity of critical infrastructures", 2021-2024 (Researcher).
  • Vasiliy Desnitsky (Principal Investigator). Models, techniques and algorithms for security analysis of software and hardware components of wireless sensor networks. Research grant # 19-07-00953 A of Russian Foundation of Basic Research, 2019-2021 (Principal Investigator).
    Report-2019-19-07-00953-a-short.pdf [application/pdf] (195496 bytes)
    Report-2020-19-07-00953-a-short.pdf [application/pdf] (201695 bytes)
  • Andrey Chechulin (Principal Investigator). Grant of Russian Science Foundation 18-71-10094 "Monitoring and counteraction to malicious influence in the information space of social networks", 2018-2021 (Researcher).
    RSCF_18-71-10094_Report_2020_eng.pdf [application/pdf] (196723 bytes)
    RSCF_18-71-10094_Report_2020_rus.pdf [application/pdf] (258925 bytes)
    RSCF_18-71-10094_Report_2021_eng.pdf [application/pdf] (178723 bytes)
    RSCF_18-71-10094_Report_2021_rus.pdf [application/pdf] (194835 bytes)

Former Projects

  • Igor Kotenko (Principal Investigator) State Contract No. 05.607.21.0322 "Development of methods, models, algorithms and software tools based on detecting deviations in heuristics of ultra-high volume traffic to detect network attacks and protect against them". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2019-2020 (Researcher).
    Report-FTP-Results-05.607.21.0322.pdf [application/pdf] (204912 bytes)
  • Igor Saenko (Principal Investigator). Grant of Russian Science Foundation 18-11-00302 "Intelligent digital network content processing for effective detection and counteraction of inappropriate, dubious and harmful information", 2018-2020 (Main researcher).
    RSF-Results-2018-18-11-00302-Eng.pdf [application/pdf] (94208 bytes)
    RSF-Results-2018-18-11-00302-Rus.pdf [application/pdf] (245760 bytes)
  • Andrey Chechulin (Principal Investigator). "Research, development and application of Augmented Reality technology for cyber and cyberphysical systems security data visualization" Research grant # 18-37-20047 of Russian Foundation of Basic Research, 2018-2020 (Researcher).
    Report-2019-18-37-20047-short.pdf [application/pdf] (208896 bytes)
  • Vasily Desnitsky (Principal Investigator). Russian Federation Presidential Grant MK-5848.2018.9 "Modeling and analysis of cyber-physical energy exhaustion attacks on Internet of Things devices", 2018-2019 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). NIR-FUND of ITMO University 717075 "Methods, Models, Methods, Algorithms, Protocols and Applications for ensuring Information Security of Cyber-Physical Systems", 2017-2019 (Researcher).
  • Andrey Chechulin (Principal Investigator). Development of mathematical models, techniques and alghoritms of security evaluation, attack modelling and countermeasures selection in near-real time mode. Research grant # 15-07-07451-a of Russian Foundation of Basic Research, 2015-2017 (Researcher).
    Report-2015-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
    Report-2016-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
    Report-2017-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
  • Igor Kotenko (Principal Investigator) Grant of Russian Science Foundation 15-11-30029 "Incident management and counteraction against targeted cyber-physical attacks in distributed largescaled mission critical systems taking into account cloud services and networks of the Internet of Things", 2015-2017., 2015-2017 (Researcher).
    RSF-Results-2015-15-11-30029-Eng.pdf [application/pdf] (18843 bytes)
    RSF-Results-2015-15-11-30029-Rus.pdf [application/pdf] (128851 bytes)
    RSF-Results-2016-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2016-15-11-30029-Rus.pdf [application/pdf] (442368 bytes)
    RSF-Results-2017-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2017-15-11-30029-Rus.pdf [application/pdf] (438272 bytes)
  • Vasiliy Desnitsky (Principal Investigator). Development and investigation of models and techniques for design and verification of combined protection mechanisms for information and telecommunication systems with embedded devices on the base of expert knowledge. Research grant # 14-07-00417-a of Russian Foundation of Basic Research, 2014-2016 (Principal Investigator).
    Report-2014-14-07-00417-a-short.pdf [application/pdf] (258333 bytes)
    Report-2015-14-07-00417-a-short.pdf [application/pdf] (516620 bytes)
    Report-2016-14-07-00417-a-short.pdf [application/pdf] (740843 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.604.21.0137 "Development of the technologies of the interactive visualization of the unformalized heterogeneous data for decision support systems in scope of the information security monitoring and management in the information and telecommunication systems". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0137_current_status.pdf [application/pdf] (138103 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.604.21.0147 "Development of the methods for aggregation, normalization, analysis and visualization of big arrays of the heterogeneous, structured, semi-structured and unstructured data for the security monitoring and management of the distributed network of the electronic consumer devices". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0147_current_status.pdf [application/pdf] (142791 bytes)
  • Igor Kotenko (Principal Investigator). State Contract No. 14.604.21.0033 Models, methods and software for development and analysis of information-telecommunication system security components for Internet of Things concept. Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2015., 2014-2015 (Researcher).
    14.604.21.0033_current_status [application/pdf] (262992 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.616.21.0028 "Perspective methods of correlation of the security information and incidents management information in the critical infrastructures on the base of the convergence of the technologies of the security awareness on the physical and logical levels". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014., 2014-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical models and methods for monitoring and management of information security in computer networks and systems of critical infrastructures based on intelligent services of information protection. Research grant # 13-01-00843-a of Russian Foundation of Basic Research, 2013-2015 (Researcher).
    Report-2013-13-01-00843-a-short.pdf [application/pdf] (294747 bytes)
    Report-2014-13-01-00843-a-short.pdf [application/pdf] (761856 bytes)
    Report-2015-13-01-00843-a-short.pdf [application/pdf] (562916 bytes)
  • Igor Kotenko (Principal Investigator). Methods for the synthesis of the distributed intelligent system of information and technological security of automated control systems for railways. Research grant # 13-07-13159-ofi_m_RJD of Russian Foundation of Basic Research, 2013-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical models, methods and algorithms of attack modeling, computer systems and networks protection analysis, information security risk analysis and decision-making for selection of security mechanisms in computer systems and networks. Program "Architectural and software solutions, and security of data-processing supercomputer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2012-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures. Project of Russian Ministry of Education and Science, 2011-2013 (Researcher).
  • Igor Saenko (Principal Investigator). Mathematical models and methods of analysis and synthesis of access systems to information and network resources in modern and advanced computer systems and networks through the establishment and application of artificial intelligence. Research grant # 11-07-00435- of Russian Foundation of Basic Research, 2011-2013 (Researcher).
    Report-2011-11-07-00435-a-short.pdf [application/pdf] (287595 bytes)
    Report-2012-11-07-00435-a-short.pdf [application/pdf] (344443 bytes)
    Report-2013-11-07-00435-a-short.pdf [application/pdf] (317185 bytes)
  • Igor Kotenko (Principal Investigator). Mathematical models and methods of integrated protection against network attacks and malware in computer networks and systems based on hybrid multi-agent modeling and simulation of computer counteraction, verified adaptive security policies and proactive monitoring by data mining. Research grant # 10-01-00826-a of Russian Foundation of Basic Research, 2010-2013 (Researcher).
    Report-2010-10-01-00826-a-short.pdf [application/pdf] (191714 bytes)
    Report-2011-10-01-00826-a-short.pdf [application/pdf] (260794 bytes)
    Report-2012-10-01-00826-a-short.pdf [application/pdf] (348160 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). Design of Secure and energy-efficient embedded systems for Future internet applications (SecFutur). Research Project of the European Community seventh framework program (FP7). Contract No. 256668 (http://www.secfutur.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). MAnagement of Security information and events in Service InFrastructures (MASSIF). Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical Models, Methods and Algorithms of Proactive Protection against Malware in Computer Networks and Systems. Program "Architecture, system solutions, software, standardization and information security of computer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2009-2011 (Researcher).
  • Igor Kotenko (Principal Investigator). Project on demand of Section of Applied Problems of Russian Academy of Sciences. Governmental contract, 2008-2009 (Researcher).
  • Igor Kotenko (Principal InvestigatorModels and methods of construction and functioning support of intelligent adaptive security systems based on modeling and simulation of security systems behavior, realization of verified security policies, security evaluation and proactive monitoring. Research grant # 07-01-00547 of Russian Foundation of Basic Research, 2007-2009 (Researcher).
    Report-07-01-00547a-2007short.pdf [application/pdf] (193198 bytes)
    Report-07-01-00547a-2008short.pdf [application/pdf] (205945 bytes)
    Report-07-01-00547a-2009short.pdf [application/pdf] (943498 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). Remote EnTrusting by RUn-time Software authentication (RE-TRUST). Research Project of the European Community sixth framework program, 2006-2009 (Researcher).
  • Igor Kotenko (Principal Investigator). Automatic Detection and Response Techniques against Internet Worms. The subcontract with International Research Institute for Advanced Systems (IRIAS) according to contract with Hewlett-Packard, 2006-2007 (Researcher).
  • Igor Kotenko (Principal Investigator). Development of scientific-methodical bases of information protection in the communication channels of International collective ecological safety system. The state contract with the Center of security problems research of the Russian Academy of Sciences, 2006-2006 (Researcher).
  • Igor Kotenko (Principal Investigator). Modeling of information security processes in computer networks in adversarial environment: formal framework, mathematical models, multi-agent architecture, software prototype and experimental evaluation. Research grant 04-01-00167 of Russian Foundation of Basic Research, 2004-2006 (Researcher).
    Report-04-01-00167a-2006.pdf [application/pdf] (446259 bytes)
    Report-04-01-00167a.pdf [application/pdf] (510438 bytes)
  • Igor Kotenko (Principal Investigator). Mathematical Models of Active Analysis of Vulnerabilities, Intrusion Detection and Network Attacks Counteraction in Computer Networks based on Multi-agent Technologies. Program "Optimization of computer architectures to particular classes of tasks, information assurance of network technologies" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies"., 2003-2008 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). Policy-based Security Tools and Framework (POSITIF). Research Project of the European Community sixth framework program. Contract # IST-2002-002314, 2003-2007 (Researcher).

Top 

Main publications

Books and Chapters in Books

  1. Vasily Desnitsky, Dmitry Sakharov, Andrey Chechulin, Igor Ushakov, Tatiana Zakharova. Information Security for Data Centers. Tutorial. SPb.: SPbSUT, 2019. - 91 pages.
  2. Igor Ushakov, Vasily Desnitsky, Andrey Chechulin, Tatiana Zakharova. Information Security for Data Centers. Teaching aid. SPb.: SPbSUT, 2019. 44 p.
  3. Igor Kotenko, Igor Saenko, Andrey Chechulin, Olga Polubelova, Evgenia Novikova, Elena Doinikova, Andrey Shorov, Vasily Desnitsky. Intelligent information security services in critical infrastructures. Monography / Ed. Igor Kotenko and Igor Sayenko. St. Petersburg: BHV Publishing House, 2019. ISBN 978-5-9775-3968-5

Papers

2021

  1. Desnitsky Vasily, Kotenko Igor. Simulation and Assessment of Battery Depletion Attacks on Unmanned Aerial Vehicles for Crisis Management Infrastructures // February 2021 Simulation Modelling Practice and Theory, vol. 107:102244. pp. 1-12. https://doi.org/10.1016/j.simpat.2020.102244 (WoS, Scopus, ) eLIBRARY ID: 45028824

2020

  1. Vasily Desnitsky, Nikolay Rudavin, Igor Kotenko. Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems // Intelligent Distributed Computing XIII. IDC 2019 // Studies in Computational Intelligence Vol. 868 . 323-332 DOI:10.1007/978-3-030-32258-8_38
  2. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Machine learning based approach to detection of anomalous data from sensors in cyber-physical water supply systems // The International Conference on Modern Trends in Manufacturing Technologies and Equipment 2019 (ICMTME 2019). Sevastopol, Russia. 9-13 September, 2019 // IOP Conference Series: Materials Science and Engineering, Vol. 709, . 033034, DOI: 10.1088/1757-899X/709/3/033034 (WoS, Scopus) eLIBRARY ID: 43236220
  3. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Neural Network Based Classification of Attacks on Wireless Sensor Networks // Proceeding of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus 2020) St. Petersburg and Moscow, Russia, 2730 2020 . P. 284-287 eLIBRARY ID: 43259386 DOI: 10.1109/EIConRus49466.2020.9039275.
  4. Vasily Desnitsky. Approach to Machine Learning based Attack Detection in Wireless Sensor Networks // Proceedings - 2020 International Russian Automation Conference (RusAutoCon) Sochi, 0612 2020 C. 767-771. DOI: 10.1109/RusAutoCon49822.2020.9208085. eLIBRARY ID: 45202232
  5. Vasily Desnitsky, Igor Kotenko. Enhancing technology of producing secure IoT devices on the base of remote attestation // MATEC Web of Conferences, ICMTMTE 2020, Vol. 329, Article Number 03023. P. 1-8. 2020. DOI: 10.1051/matecconf/202032903023 (WoS) https://www.matec-conferences.org/articles/matecconf/pdf/2020/25/matecconf_icmtmte2020_03023.pdf
  6. Meleshko A V, Desnitsky V A, Kotenko I V. Modeling attacks in self-organizing wireless sensor networks of smart cities // IOP Conference Series: Materials Science and Engineering. 2020. vol. 971. pp. 032077 DOI: 10.1088/1757-899X/971/3/032077 (WoS, Scopus, )
  7. Vasily Desnitsky. Modeling and analysis of information security threats in wireless sensor networks // Journal Information Technology and Telecommunications. Vol. 8, No. 3. 2020. P. 102-111. DOI: 10.31854/2307-1303-2020-8-3-102-111. eLIBRARY ID: 43960182 (in Russian).
  8. Vasily Desnitsky, Nikolay Rudavin. Modeling of Denial-of-Sleep attacks in wireless sensor networks // Vestnik Sankt-Peterburgskogo Universiteta GPS MChS Rossii. Issue 3. P. 76-82. 2020. eLIBRARY ID: 44108907 (in Russian).
  9. Vasily Desnitsky, Alexey Meleshko. Approach to modeling attacks in digital citys self-organizing wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1 Natural and technical sciences. No. 3. P. 20-25. 2020. DOI: 10.46418/2079-8199_2020_3_3 eLIBRARY ID: 44180589 (in Russian).
  10. Meleshko A.V., Vasily Desnitsky. A game based technique for application of countermeasure selection process // Scientific and Analytical journal Bulletin of the Saint Petersburg University of the State Fire Service of the EMERCOM of Russia. 2020, No. 4. . 70-77. https://vestnik.igps.ru/wp-content/uploads/V20204/10.pdf eLIBRARY ID: 44539817 (in Russian).
  11. V. A. Desnitsky Analysis of information security violations in wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and technical sciences. 2020. No. 4. P. 48-55. DOI: 10.46418/2079-8199_2020_4_7 eLIBRARY ID: 44830242 (in Russian).
  12. Alexander Branitskiy, Polina Gladysheva, Vasily Desnitsky, Igor Kotenko. Implementation and evaluation of adaptation and retraining methods for the analysis of information objects in web-content // IX International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 154-158. eLIBRARY ID: 44603985 (in Russian).
  13. Vasily Desnitsky, Alexey Meleshko. Modeling attacks on self-organizing wireless sensor networks // IX International scientific-technical and scientific-methodical conference "Actual problems of infotelecommunications in science and education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 389-394. eLIBRARY ID: 44604034 (in Russian).
  14. Vasily Desnitsky, Igor Parashchuk. A generalized algorithm for analyzing the security of wireless sensor networks from attacking influences // IX International Scientific and Technical and Scientific and Methodological Conference "Actual problems of infotelecommunications in science and education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 394-398. eLIBRARY ID: 44604035 (in Russian).
  15. Vasily Desnitsky, Alexey Meleshko. Approach to detection of anomalous data in cyber-physical systems // Proceedings of the scientific seminar "Fundamental problems of management of production processes in the transition to Industry 4.0". P. 257-258. 2020. ISBN 978-5-696-05158 eLIBRARY ID: 44131878 (in Russian).
  16. Vasily Desnitsky. An approach to analysis of information security violations in mobile applications // XVII St. Petersburg International Conference "Regional Informatics (RI-2020)". October 28-30, 2020. Conference materials / SPOISU. - SPb, . 134-136. 2020. (in Russian).
  17. Vasily Desnitsky. Hardware and software stand for modeling attacks in ZigBee networks // Proceedings of the eleventh international scientific conference Priority areas of innovation in industry (November 29-30, 2020). Part 2. P. 81-84. 2020.eLIBRARY ID: 44569809 (in Russian).
  18. I. B. Paraschuk, V. A. Desnitsky Features of security assessment software and hardware components of wireless sensor networks // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 166-168 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf (in Russian).
  19. I. B. Paraschuk, V. A. Desnitsky, O. N. Tushkanova Model of the digital content parental control system on the Internet // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 168-170 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf (in Russian).
  20. V. A. Desnitsky, A. A. Chechulin, E. V. Doynikova A technique for verification of representation models of wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, . 197-198. eLIBRARY ID: 45844808 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  21. A. A. Chechulin, E. V. Doynikov, V. A. Desnitsky Model of a stacked pie chart for visual analytics in virtual reality // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 233-234. eLIBRARY ID: 45844827 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  22. V. A. Desnitsky, I. B. Paraschuk A technique for revelation of anomalous data in wireless sensor networks on the base of artificial intelligence methods // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, p. 199. eLIBRARY ID: 45844809 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  23. V. A. Desnitsky, I. B. Parashchuk Wireless sensor networks and analysis of security against attacks of their hardware and software components // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 207-208. eLIBRARY ID: 45844815 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  24. V. A. Desnitsky, A. A. Branitsky, A.V. Fedorchenko A technique for distributed collection, processing and analysis of data in a wireless sensor network // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020. pp. 195-196.eLIBRARY ID: 45844807 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  25. V. A. Desnitsky An approach to evaluation of energy resources depletion attacks in wireless sensor networks / Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020. p. 200. eLIBRARY ID: 45844810 https://www.elibrary.ru/item.asp?id=45844810 (in Russian).
  26. V. A. Desnitsky An approah to the construction of security components for Internet of Things systems on the base of fog computing // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 249-250. eLIBRARY ID: 45844834 http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf (in Russian).
  27. V. A. Desnitsky Architecture and algorithms of the system of distributed data collection, processing and analysis in a wireless sensor network // Collection of materials of the VIII International Scientific Conference dedicated to the memory of A. L. Iozefera. Mathematical and computer modeling. Omsk State University Press. 2020. .. 252-254. eLIBRARY ID: 45809228 http://fkn.univer.omsk.su/nauka/Conf/2020/VIII_MCM_Conf_2020.pdf (in Russian).
  28. V. A. Desnitsky Analysis of wireless sensor networks for solving information security problems // Collection of materials of the VIII International Scientific Conference dedicated to the memory of A. L. Iozefera. Mathematical and computer modeling. Publishing house of the Omsk State University. 2020. P. 255-257. eLIBRARY ID: 45809230 http://fkn.univer.omsk.su/nauka/Conf/2020/VIII_MCM_Conf_2020.pdf (in Russian).
  29. V. A. Desnitsky Identification of anomalous data from sensors of wireless sensor networks // Proceedings of the III All-Russian Scientific and practical Conference with international participation Challenges of the digital economy: the development of a comfortable urban environment. 2020. . 233-235. (in Russian).
  30. V. A. Desnitsky Algorithms for detection of anomalous data from sensors in self-organizing wireless sensor networks // Proceedings of the III International Scientific and Practical Conference dedicated to the 90th anniversary of the Bryansk State University of Engineering and Technology "Digital Region: experience, competencies, projects". 2020. P. 252-256 eLIBRARY ID: 45793877 (in Russian).
  31. V. A. Desnitsky Approach to construction and analysis of a secure system for distributed collection and prosessing of data from nodes of a wireless sensor network // Proceedings of the III International Scientific and Practical Conference dedicated to the 90th Anniversary of the Bryansk State University of Engineering and Technology "Digital Region: experience, competencies, projects". 2020. .256-258 eLIBRARY ID: 45793878 (in Russian).
  32. Vasily Desnitsky. A technique for application of the process of countermeasure choice on the base of game theory approach // XVII St. Petersburg International Conference "Regional Informatics (RI-2020)". October 28-30, 2020. Conference materials / SPOISU. - SPb, . 133-134. http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf (in Russian).

2019

  1. Vasily Desnitsky, Igor Kotenko, Danil Zakoldaev. Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices // Electronics (Switzeland) (Q1), Volume 8, Issue 5, article number 500, P. 500-504 2019, https://doi.org/10.3390/electronics8050500 eLIBRARY ID: 41630344
  2. Anastasia Balueva, Vasily Desnitsky, Igor Ushakov. Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning // 13th International Symposium on Intelligent Distributed Computing (IDC 2019), Saint-Petersburg, Russia, 7-9 October 2019 // Intelligent distributed computing XIII p. 350-355, 2019. DOI: 10.1007/978-3-030-32258-8_41 eLIBRARY ID: 41346187
  3. Vladislav Alexandrov, Vasily Desnitsky, Dmitry Chaly. Design and Security Analysis of a Fragment of Internet of Things Telecommunication System // Journal Automatic Control and Computer Sciences. Voume 53. Issue 7. P. 851-856. 2019. DOI: 10.3103/S0146411619070241 (WoS) eLIBRARY ID: 43243969
  4. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. Protection Mechanisms against Energy Depletion Attacks in Cyber-Physical Systems // Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2019, Saint Petersburg - Moscow,J anuary 28-30, 2019, pp. 214-219, 2019. DOI: 10.1109/EIConRus.2019.8656795 eLIBRARY ID: 38701751
  5. Desnitsky V.A., Kotenko I.V., Parashchuk I.B. Methods of Assessing the Effectiveness of Network Content Processing Systems for Detecting Malicious Information Taking into Account the Elimination of Uncertainty in the Semantic Content of Information Objects // Proceedings of 2019 22nd International Conference on Soft Computing and Measurements, SCM 2019, St. Petersburg, 2325 2019 . pp. 41-44. DOI: 10.1109/SCM.2019.8903670. https://ieeexplore.ieee.org/document/8903670. (WoS, Scopus). eLIBRARY ID: 43213385
  6. Lidia Vitkova, Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Approach to organizing of a heterogeneous swarm of cyber-physical devices to detect intruders // The 9th IFAC/IFIP/IFORS/IISE/INFORMS Conference "Manufacturing Modelling, Management and Control" (MIM 2019). 28-30 August 2019, Berlin, Germany. Pp. 945-950 (WoS and Scopus). eLIBRARY ID: 43243011
  7. Vasily Desnitsky, Igor Kotenko. Monitoring the State of Materials in Cyberphysical Systems: Water Supply Case Study, Materials Today: Proceedings. 2019. // International conference on modern trends in manufacturing technologies and equipment, ICMTMTE 2018, Sevastopol, September 10-14, 2018. P. 410-416. 2019. https://doi.org/10.1016/j.matpr.2019.01.005. (WoS and Scopus). eLIBRARY ID: 39002730
  8. Vasily Desnitsky, Alexey Meleshko. Security analysis of software and hardware components in wireless sensor networks // Information Technology and Telecommunications. 2019. Vol. 7, No. 1. P. 75-83. eLIBRARY ID: 41382752 https://www.sut.ru/doci/nauka/1AEA/ITT/2019_1/75-83.pdf 10.31854/2307-1303-2019-7-1-75-83 (in Russian).
  9. Alexey Meleshko, Vasily Desnitsky. Machine learning based approach to detection of anomalous data from sensors in ciber-physical water supply systems // Bulletin of the St. Petersburg State University of Technology and Design. Series 1 Natural and technical sciences. No. 4. P. 69-72. 2019. eLIBRARY ID: 42485920 (in Russian).
  10. Vasily Desnitsky, Nikolay Rudavin. Modeling and evaluation of energy exhaustion attacks on unmanned aerial vehicles in crisis management systems // Scientific and analytical journal Bulletin of the St. Petersburg University of the State Fire Service EMERCOM of Russia. 2019. Issue 4. P. 69-74. eLIBRARY ID: 41833385 (in Russian).
  11. Vasily Desnitsky, Igor Parashchuk // Indicators of accessibility, integrity and privacy of data of users of wireless sensor networks in the interests of analysis and ensuring their security // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". Conference materials. Saint-Petersburg, October 23-25, 2019. P. 114-116, 2019 (in Russian). http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf eLIBRARY ID: 46470582 (in Russian).
  12. Aleksei Meleshko, Vasily Desnitsky // Data anomalies identification in ciber-physical water supply systems // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". Conference materials. Saint-Petersburg, October 23-25, 2019. P. 136-137 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf eLIBRARY ID: 46470466 (in Russian).
  13. Igor Parashchuk, Vasily Desnitsky. Architecture of the component of eliminating the uncertainty of analysis of the problem of information facilities on the basis of processing of complete, contradictive and fuzzle knowledge // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". Conference materials. Saint-Petersburg, October 23-25, 2019. P. 244-245 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf eLIBRARY ID: 46470281 (in Russian).
  14. Igor Parashchuk, Vasily Desnitsky. Analysis of the sense filling of information objects on the basis of processing of full, contravenous and fuzzy knowledge: architecture of the component of elimination the uncertainty // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". The proceedings of conference. Issue 7. Saint-Petersburg, October 23-25, 2019. P. 258-262 eLIBRARY ID: 42562059 http://www.spoisu.ru/files/riib/riib_7_2019.pdf (in Russian).
  15. Vasily Desnitsky, Igor Parashchuk. Analysis and security of data protection of users of wireless sensor networks: indicators of accessibility, integrity and confidentiality // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". The proceedings of conference. Issue 7. Saint-Petersburg, October 23-25, 2019. P. 34-38 eLIBRARY ID: 42561898 http://www.spoisu.ru/files/riib/riib_7_2019.pdf (in Russian).
  16. Vasily Desnitsky, Pavel Dumenko. Analysis of Information Security Violations in Mobile Applications // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information and Telecommunications in Science and Education" (APINO 2019), February 27-28, 2019, proceedings, St. Petersburg. : SPbSUT, . 384-390 eLIBRARY ID: 41383559 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf (in Russian).
  17. Vitkova L.A., Desnitsky V.A., Zhernova K.N., Chechulin A.A. Review of human-computer interaction for network security // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) T. 1, p. 218-223 eLIBRARY ID: 41383526 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf (in Russian).
  18. Desnitsky V.A., Zuev I.P., Karelsky P.V., Kovtsur M.M. Analysis of dissemination channels in the social network Twitter // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles), T. 1., p. 390-395 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf eLIBRARY ID: 41383560 (in Russian).
  19. Gamidov T.O., Desnitsky V.A., Dudkina O.S., Sakharov D.V. Methods and techniques for analysis of unwanted information in social networks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles)T. 1., p. 317-320 eLIBRARY ID: 41383545 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf (in Russian).
  20. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Methodology for evaluating the effectiveness of network content processing systems for detecting malicious information, taking into account the elimination of uncertainties in the semantic content of information objects // International Conference on Soft Computing and Measurements. T. 1. P. 62-65. 2019. (in Russian).
  21. Alexandr Branitskiy, Vasily Desnitsky. Approach to adaptation and retraining of system for analyzing the information objects // Materials of V interregional scientific-practical conference Advanced national information systems and technologies, September 24-28, p. 62-64, 2019. (in Russian).
  22. Vasily Desnitsky, Andrey Fedorchenko. Modeling processes of protection against attacks of energy exhaustion in cyberphysical systems // Materials of V interregional scientific-practical conference Advanced national information systems and technologies, September 24-28, p. 282-284, 2019. (in Russian).
  23. Vasily Desnitsky, Elena Doinikova, Andrey Fedorchenko, Alexander Branitsky. Modeling and analysis of intruder actions in wireless sensor networks // Proceedings of the II International Scientific and Practical Conference "Digital Region: Experience, Competencies, Projects". Ed. Bryansk State Engineering and Technology University. P. 237-240. 2019. (in Russian).
  24. Vasily Desnitsky, Nikolay Rudavin, Alexey Meleshko. Analysis of attacking effects of the Denial-of-Sleep type in cyber-physical systems // New Information Technologies and Systems: Collection of articles. scientific Art. XVI International scientific and technical conf. (NITiS-2019, Penza, November 2729, 2019). - Penza: Publishing House of PSU, P. 216-218, 2019. (in Russian).
  25. Vasily Desnitsky. Modeling and analysis of cyberphysical attacks of the depletion of energy resources of the devices of the Internet of things systems // Collection of abstracts of the participants of the II International Scientific Conference "Science of the Future - Science of the Young" IV All-Russian Forum "Science of the Future - Science of the Young" May 14-17, 2019, Sochi, Russia. Ed. LLC "Inconsult K", p. 115. 2019. ISBN 978-5-9500875-1-6. (in Russian).
  26. Vasily Desnitsky, Nikolay Rudavin. Analysis of atacking influences on unmanned aerial vehicles // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 318-319. eLIBRARY ID: 42944626 (in Russian).
  27. Anastasia Balueva, Vasily Desnitsky. Approach to detection of Denial-of-Sleep attacks in cyber-physical systems on the base of machine-training methods // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1., p. 97-103 eLIBRARY ID: 41383501 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20.1.pdf (in Russian).

2018

  1. Vasily Desnitsky, Igor Kotenko. Security event analysis in XBee-based wireless mesh networks // Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus 2018), January 29 - February 01, 2018. Moscow and St. Petersburg, Russia. 2018 P. 42-44. DOI: 10.1109/EIConRus.2018.8317025. https://ieeexplore.ieee.org/document/8317025 (Scopus) eLIBRARY ID: 35749402
  2. Igor Kotenko, Igor Saenko, Andrey Chechulin, Vasily Desnitsky, Lidia Vitkova, Anton Pronoza. Monitoring and counteraction to malicious influences in the information space of social networks // The 10th Social Informatics conference (SocInfo2018). September 2528, 2018, Saint Petersburg, Russia. Proceedings, Part II. Lecture Notes in Computer Science, Vol.11186, Springer 2018, ISBN 978-3-030-01158-1. P.159-167. DOI: 10.1007/978-3-030-01159-8_15. eLIBRARY ID: 35677138
  3. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. Ensuring Availability of Wireless Mesh Networks for Crisis Management // Studies in Computational Intelligence. 2018. // International Symposium on Intelligent and Distributed Computing IDC 2018: Intelligent Distributed Computing XII, 15-17 October 2018, Bilbao, Spain Vol.798, P.344-353 DOI:10.1007/978-3-319-99626-4_30 (Q3, Scopus, WoS). eLIBRARY ID: 35751016
  4. Vasily Desnitsky, Igor Kotenko. Analysis of Energy Resource Depletion Attacks on Wireless Devices // Journal of Instrument Engineering. 2018. Vol.61.No.4. P.291-297.DOI: 10.17586/0021-3454-2018-61-4-291-297 eLIBRARY ID: 32836535 https://cyberleninka.ru/article/n/analiz-atak-istoscheniya-energoresursov-na-sistemy-besprovodnyh-ustroystv/viewer (in Russian).
  5. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. An Approach to Ensuring Availability in Wireless Networks for risis Management // Scientific and analytical journal Bulletin of St. Petersburg University of the State Fire Service EMERCOM of Russia. 2018. No.3. P.92-96. DOI: 10.24411/2218-130X-2018-00053 eLIBRARY ID: 36263688 https://vestnik.igps.ru/wp-content/uploads/V103/12.pdf (in Russian).
  6. Vasily Desnitsky, Nikolay Rudavin Modeling and analysis of energy exhaustion attacks in digital city systems // Information Technology and Telecommunications. 2018. Vol. 6, No.3. P. 10-18. https://www.sut.ru/doci/nauka/ITT/10-18.pdf eLIBRARY ID: 37179956 (in Russian).
  7. Anastasia Balueva, Vasily Desnitsky. Secure data transfer protocol for the internet of things on raspberry Pi Example // Information Technology and Telecommunications. 2018. Vol. 6. No.4. P. 10-20 https://www.sut.ru/doci/nauka/1AEA/ITT/2018_4/10-20.pdf eLIBRARY ID: 41162088 (in Russian).
  8. Vasily Desnitsky. Feasibility analysis of resource exhaustion attacks on unmanned aerial vehicles // Journals - Herald of Modern Research. 2018. Nr. 12.5 (27). P. 100-102. eLIBRARY ID: 36709001 https://elibrary.ru/download/elibrary_36709001_32704293.pdf (in Russian).
  9. Vasily Desnitsky, Alexander Branitskiy. Principles of adaptation and retraining of a system for analyzing information objects for protection against inappropriate and malicious information// Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 404407. eLIBRARY ID: 37028986 (in Russian).
  10. Vasily Desnitsky, Nikolay Rudavin. Approach to security analysis of wireless self-organizing network for crisis management // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P.488-492. eLIBRARY ID: 37029003 (in Russian).
  11. Alexander Branitskiy, Vasily Desnitsky. Substantiation of requirements for adaptation and retraining of system of analysis of information objects for protection against unwanted and harmful information // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 120-122. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf eLIBRARY ID: 46484187 (in Russian).
  12. Vasily Desnitsky. Analysis of denial-of-sleep attacks on IoT devices // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 129-131. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf eLIBRARY ID: 46486372 (in Russian).
  13. Nikolay Rudavin, Vasily Desnitsky. Construction of system components for managing availability of zigbee networks // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 165-167. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf eLIBRARY ID: 46488011 (in Russian).
  14. Alexey Meleshko, Vasily Desnitsky. Security Incident Modeling in a Water Supply Management System // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 2. P. 301-306. https://www.sut.ru/doci/nauka/7apino/APINO%202018-T2.pdf (in Russian).
  15. Pavel Dumenko, Vasily Desnitsky. An approach to development and evaluation of a protocol for remote attestation of Java programs // Actual problems of informational communication in science and education (PINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 280-285. eLIBRARY ID: 35231575 https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018__1.pdf (in Russian).
  16. Vasily Desnitsky. Rule based rerelation of energy resource exhaustion attacks in wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018. P. 247-248. eLIBRARY ID: 36570193 https://elibrary.ru/download/elibrary_36570193_53011147.pdf (in Russian).
  17. Vasily Desnitsky. An approach to providing availability in wireless sensor networks for crisis management // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018 P. 63-64. eLIBRARY ID: 36569973 https://elibrary.ru/download/elibrary_36569973_64647042.pdf (in Russian).
  18. Vasily Desnitsky, Igor Kotenko Machine learning based detection of DENIAL-OF-SLEEP attacks in wireless sensor networks for crisis management // Proceedings of XXI International Conference on Soft Computing and Measurements (SCM-2018). Saint-Petersburg, Russia,May 23-25, 2018. Vol.1. P.431-433 eLIBRARY ID: 35619840 (in Russian).

2017

  1. Vasily Desnitsky and Igor Kotenko. Modeling and Analysis of IoT Energy Resource Exhaustion Attacks // Studies in Computational Intelligence - 11th International Symposium on Intelligent Distributed Computing (IDC'2017). Belgrade. Serbia, 11-13 october 2017. Vol.737 P. 263-270. eLIBRARY ID: 31113146 DOI: 10.1007/978-3-319-66379-1_23
  2. Vasily Desnitsky, Igor Kotenko. Modeling and analysis of security incidents for mobile communication mesh ZigBee-based network // XX International Conference on Soft Computing and Measurements (SCM'2017). Saint-Petersburg, 2426 may 2017. P.500-502. eLIBRARY ID: 31032496 DOI: 10.1109/SCM.2017.7970629
  3. Igor Kotenko, Vasily Desnitsky. ountering targeted cyber-physical attacks in distributed large-scale critical systems // Information Security. Inside, 2017, 4(76), P. 66-69. eLIBRARY ID: 29966171 (in Russian).
  4. Vasily Desnitsky. An IoTaaS-based approach to design digital city software. Vestnik Sankt-Peterburgskogo Universiteta GPS MChS Rossii. 2017. Issue. 4. P. 94-105. eLIBRARY ID: 32561545 (in Russian).
  5. Vasily Desnitsky. A modeling and analysis of security incidents in a cyber-physical system for water supply management // Journal Information technologies and telecommunications. 2017. Vol.5, 3. P. 93-102. eLIBRARY ID: 30725044 (in Russian).
  6. Vasily Desnitsky, Igor Kotenko. Modeling and analysis of security incidents for mobile communication mesh ZigBee-based network // XX International Conference on Soft Computing and Measurements (SCM'2017),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2017. Vol. 2, P. 39-42. eLIBRARY ID: 29902194 https://elibrary.ru/download/elibrary_29902194_82983224.pdf (in Russian).
  7. Vasily Desnitsky Desnitsky V.A., Kotenko I.V., Lauta O.S., Sayenko I.B. An approach to the cyber-resilience assessment on the basis of topological conversion of stochastic networks // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). 01-02 March 2017. Conference proceedings. St. Petersburg., 2017. Vol. 2. P.250-255.https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf eLIBRARY ID: 32578164 (in Russian).
  8. Vasily Desnitsky, Nikolai Ostrouschenko.A model of the secure mobile communication network for support and operational management in emergency situations // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). 01-02 March 2017. Conference proceedings. St. Petersburg., 2017. Vol. 2. P. 255-260. eLIBRARY ID: 32578166 https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf (in Russian).
  9. Vasily Desnitsky. Evaluation of wireless device protection from energy exhaustion attacks // International congress IS&IT International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2017. Vol. 2. pp. 343-349. (in Russian).
  10. Vasily Desnitsky. Modeling and security analysis of a communication network for crisis managament on the base of xbee devices // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRD-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 221-223 eLIBRARY ID: 35276202 https://www.elibrary.ru/download/elibrary_35276202_89146554.pdf (in Russian).
  11. Vasily Desnitsky. .. Analysis of energy resource exhaustion attacks on xbee-based nodes in wireless sensor networks. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017), ..146-147 (in Russian).
  12. Vasily Desnitsky. Analysis of attacking influences on energy resource exhaustion in Internet of Things systems. XIX scientific-practical conference RusCrypto2017. Moscow Region, Solnechnogorsk, March 22-24, 2017. http://www.ruscrypto.ru/. (in Russian).

2016

  1. Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin and Igor Kotenko. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System// Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), June, 2016 Vol.7, No.2, P.60-80. (Scopus) http://isyou.info/jowua/papers/jowua-v7n2-4.pdf eLIBRARY ID: 27036091 DOI: 10.22667/JOWUA.2016.06.31.060
  2. Vasily Desnitsky and Igor Kotenko. Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge // Journal of Ambient Intelligence and Humanized Computing (AHIC), Springer. October 2016, Volume 7, Issue 5, P.705719. DOI 10.1007/s12652-016-0371-6. http://link.springer.com/article/10.1007/s12652-016-0371-6 (WoS and Scopus) eLIBRARY ID: 27575769
  3. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System // 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016). Heraklion, Crete,2016 February 17-19. IEEE Computer Society P.609-616. (Scopus) eLIBRARY ID: 27160200 DOI: 10.1109/PDP.2016.99
  4. Vasily Desnitsky, Igor Kotenko. Event analysis for security incident management on a perimeter access control system // XIX International Conference on Soft Computing and Measurements (SCM'2016), Saint Petersburg, 2527 may 2016 P.481-483. DOI: 10.1109/SCM.2016.7519819. (WoS and Scopus) eLIBRARY ID: 27586770 DOI: 10.1109/SCM.2016.7519819
  5. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System // SPIIRAS Proceedings. 2016. Issue 48. P.5-31. eLIBRARY ID: 27177922 DOI: 10.15622/sp.48.1 (in Russian).
  6. Vasily Desnitsky, Dmitry Chaly. Client/server-based approach to software protection of internet of things // Technical sciences-from theory to practice / / Collection of articles based on the materials of the LXIV International scientific and practical conference "Technical Sciences - from theory to practice" November 2016 Publishing house of NP "SibAK", 11 (59), Novosibirsk, SibAK, P.6-13. eLIBRARY ID: 27450831 (in Russian).
  7. Vasily Desnitsky. An approach to information flow verification of Internet of things systems // Journal "Methods and technical means of ensuring information security" // 25th scientific and Technical conference "Methods and technical means of ensuring information security". July 4-July 7, 2016 St. Petersburg. Materials. Polytechnic University Press 25 P.34-35. eLIBRARY ID: 36546748 (in Russian).
  8. Vasily Desnitsky, Andrey Chechulin. Information flow verification technique for Internet of things systems // XV nniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.156-157. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf eLIBRARY ID: 32608615 (in Russian).
  9. Vasily Desnitsky, Igor Kotenko, Yan Kopchak. Analysis of events for management of security incidents on the example of access control system // XIX International Conference on Soft Computing and Measurements (SCM'2016),Proceedings, Vol. 2, Saint-Petersburg, ETU "LETI", 2016. P.332-336. eLIBRARY ID: 27187696 https://www.elibrary.ru/download/elibrary_27187696_81386086.pdf (in Russian).
  10. Vasily Desnitsky. Detection of anomalous data from sensors embedded devices based on expert knowledge // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 46, 2016. P.676-679. eLIBRARY ID: 27559696 (in Russian).
  11. Vasily Desnitsky. Implementation of software means for model checking based verification of network data flows // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 46, 2016. P.680-683. eLIBRARY ID: 27559697 (in Russian).
  12. Vladislav Alexandrov, Vasily Desnitsky, Dmitry Chaly. Development and security analysis of a fragment of Internet of Things system. Modeling and Analysis of Information Systems. Volume 23, issue 26. 2016. P.767-776. (in Russian).
  13. Vasily Desnitsky, Dmitry Levshun. The choice and combination of elements for the construction of an integrated system of cyber-physical security // 18th International Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ (in Russian).
  14. Vasily Desnitsky. Detection of anomalous data from sensors in the information and telecommunication systems with embedded devices// International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol.1. P.217-223. (in Russian).
  15. Vasily Desnitsky, Vladislav Alexandrov. Model intruder information and telecommunication systems of the Internet of Things // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.155-156. eLIBRARY ID: 35091301 http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf (in Russian).

2015

  1. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detection of Anomalies in Data for Monitoring of Security Components in the Internet of Things. XVIII International Conference on Soft Computing and Measurements (SCM'2015). IEEE Xplore, 2015. P.189-192. DOI: 10.1109/SCM.2015.7190452. (Scopus)
  2. Vasily Desnitsky, Igor Kotenko. Design and Verification of Protected Systems with Integrated Devices Based on Expert Knowledge. Automatic Control and Computer Sciences, Allerton Press, Inc., Vol. 49, No. 8, 2015. P.648652. (Scopus)
  3. Vasily Desnitsky, Elena Doynikova. Architecture and effectiveness evaluation of software tool for configuring security components of systems with embedded devices // Technical sciences from theory to practice, 47, 2015. P.9-13. (in Russian).
  4. Elena Doynikova, Vasily Desnitsky. Generator of the random attack sequences for the computer network on the base of the CAPEC attack patterns // Technical sciences from theory to practice, 46, 2015. P.11-16. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko. Formation of the expertise to develop secure systems with embedded devices. Problems of information security, Computer systems, 4, 2015. P.35-41. (in Russian).
  6. Vasily Desnitsky. Configuring security components of embedded devices on the base of a heuristic approach. Technical sciences from theory to practice, 46, 2015. P.16-20. (in Russian).
  7. Vasily Desnitsky. A technique for evaluation resource consumption of security components for systems with embedded devices. Technical sciences from theory to practice, 47, 2015. P.14-18. (in Russian).
  8. Vasily Desnitsky. Models of the development process for combined protection mechanisms for information and telecommunication systems with embedded devices. International congress "IS&IT15" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2015. Vol. 2. P.113-118. (in Russian).
  9. Vasily Desnitsky. A model of a configuration of embedded device security components. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.65-66. (in Russian).
  10. Vasily Desnitsky. A technique for evaluation of embedded device security components. // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.66-67. (in Russian).
  11. Vladislav Aleksandrov, Vasily Desnitsky, Sergey Bushuev. Development and analysis if a fragment of a secure Internet of Things system IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.56-57. (in Russian).
  12. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detecting anomalies in the data for monitoring protection components of the Internet of things. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2015. P.17-22. (in Russian).
  13. Sergey Bushuev, Vasily Desnitsky. Formation of expertise for the development of secure systems, "Internet of Things". 17th International Conference RusCrypto`2015, Solnechnogorsk, March 17-20, 2015. http://www.ruscrypto.ru/ (in Russian).
  14. Vasily Desnitsky. A technique for evaluation resource consumption of security components of information and telecommunication systems with embedded devices. 24th All-Russian Conference Methods and technical tools of information security (MTTIS 2015). Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.69-70. (in Russian).
  15. Vasily Desnitsky. A technique for revelation of functional and non-functional incompatibilities of security components of embedded devices of information and telecommunication systems. 24th All-Russian Conference Methods and technical tools of information security (MTTIS 2015). Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.70-71. (in Russian).

2014

  1. Vasily Desnitsky, Andrey Chechulin. Generalized intruder model and verification of information systems with embedded devices. Technical sciences from theory to practice. 2014, 39, Novosibirsk, SibAK, P.7-21. (in Russian).
  2. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Features of the information security systems design in cyber-physical systems. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.67-69. (in Russian).
  3. Vasily Desnitsky, Andrey Chechulin. Verification of information and telecommunication systemms with embedded devices on the base of generalized intuder model. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.66-67. (in Russian).
  4. Vasily Desnitsky, Igor Kotenko. Expert Knowledge based Design and Verification of Secure Systems with Embedded Devices // 4rd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014). September 8nd 12th, 2014. Fribourg, Switzerland. Lecture Notes in Computer Science (LNCS), Vol.8708. Springer-Verlag. 2014. P.194-210. (WoS, Scopus)
  5. Vasily Desnitsky, Igor Kotenko. Design and verification of secure systems with embedded devices on the base of expert knowledge Problems of information security. Computer systems. 3, 2014. P.16-22. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko. The use of expert knowledge in development of secure systems with embedded devices. Information Technologies and Computing Systems, 4, 2014, P.58-73. (in Russian).
  7. Vasily Desnitsky. Verification of network information flows for the systems with embedded devices on the base of expert knowledge. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 79, 2014. P.596-600. (in Russian).
  8. Vasily Desnitsky. Conceptual combined model of the protection system of embedded devices. Innovations in the science. 2014. Novosibirsk, SibAK, 38, .55-59. ISSN: 2308-6009. (in Russian).
  9. Vasily Desnitsky. Development of knowledge model for design and secure embedded devices. Natural and mathematical science in the modern world. 2014, 23, P.35-40. (in Russian).
  10. Vasily Desnitsky. Design and verification of security mechanisms for systems with embedded devices on the base of expert knowledge. 16th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  11. Vasily Desnitsky, Elena Doynikova. Development of the defence components for the embedded devices considering expert knowledge // International science and practical conference "Theoretical and applied problems of the information security". June 19, 2014, Minsk, Police Academy, the Republic of Belarus, 2014. (in Russian).
  12. Vasily Desnitsky, Igor Kotenko. Configuring information systems with embedded devices to provide complex security on railway transport. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.89-90. (in Russian).
  13. Vasily Desnitsky, Igor Kotenko. Combined protection model of information and telecommunication systems of Internet of Things concept. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.65-66. (in Russian).
  14. Vasily Desnitsky. Analysis of perspective systems with embedded devices to form expert knowledge in the field of design secure information and telecommunication systems. XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014. P.130. (in Russian).
  15. Vasily Desnitsky, Igor Kotenko. Conceptual combined model of embedded device protection system and its application to configuring components of multi-level intellectual system of complex security on railway transport. XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014. P.131. (in Russian).

2013

  1. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services providing complex security on rail transport. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P.40-55. (in Russian).
  2. Vasily Desnitsky. A technique for verification of network information flows in information and telecommunication systems with embedded devices. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P.246-257. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Configuration based design of security embedded devices. Problems of information security. Computer systems. 1, 2013, P.44-54. (in Russian).
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Information flow verification for design of protected information systems with embedded devices. High availability systems, 3 (9), 2013. P.112-117. (in Russian).
  5. Vasily Desnitsky. Configuration based combined protection of embedded devices. Innovations in Science. 16-1, 2013. Novosibirsk: pub. "SibAK". P.64-67. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure information systems with embedded devices. 15th Conference RusCrypto. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  7. Vasily Desnitsky. Verification of information flows in process of development secure systems with embedded devices. 22th All-Russian Conference Methods and technical tools of information security(MTTIS 2013). Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.17-18. (in Russian).
  8. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services of multi-level intelligent system of rail transport complex security. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.91-92. (in Russian).
  9. Vasily Desnitsky. Information flow verification in systems with embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.92-93. (in Russian).
  10. Vasily Desnitsky. A technique for configuring secure embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.93-94. (in Russian).

2012

  1. Jose Fran. Ruiz, Vasily Desnitsky, Rajesh Harjani, Antonio Manna, Igor Kotenko and Andrey Chechulin. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components. Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2012). Garching/Munich, February, 2012. P.261-268. (Scopus)
  2. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration-based approach to embedded device security. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.270-285. (Scopus)
  3. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. An Approach for Network Information Flow Analysis for Systems of Embedded Components. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.146-155. (Scopus)
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration of secure systems with embedded and mobile devices. Issues of information Protection,2, 2012. P.20-28. (in Russian).
  5. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Information flow analysis for development of secure systems with embedded devices. High availability systems, 2, 2012. P.116-122. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuring components of combined protection of embedded devices on the basis of solving optimality task. High availability systems, 2, 2012. P.50-56. (in Russian).
  7. Vasily Desnitsky, Igor Kotenko. A model for configuring protected and energy-efficient embedded systems. Journal of Instrument Engineering, Vol.55, 11, 2012. P.5257. ISSN 0021-3454. (in Russian).
  8. Vasily Desnitsky. Configuration model for combined protection of information systems with embedded devices. VII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2011)", Saint-Petersburg. The proceedings of conference, 2012. P.77-83. (in Russian).
  9. Jose Fran. Ruiz, Vasily Desnitsky. Design of protected telecommunication systems with embedded devices. 14th Conference RusCrypto'2012. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  10. Vasily Desnitsky, Igor Kotenko. Configuring information and telecommunication systems with embedded devices. 21th All-Russian Conference Methods and technical tools of information security(MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012.P.14-17. (in Russian).
  11. Andrey Chechulin, Vasily Desnitsky, Igor Kotenko. Information flow analysis for development of secure systems with embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.35-37. (in Russian).
  12. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities between security components in design process of secure embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.17-19. (in Russian).
  13. Vasily Desnitsky. Modeling of non-functional protection properties in the process of configuration of secure embedded devices. 21th ll-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.12-14. (in Russian).
  14. Vasily Desnitsky. Configuring combined protection components for embedded system protection on the base of solving optimality task. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P.383-384. (in Russian).
  15. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure embedded systems in European Union project SecFutur. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 911, 2012. P.699-708. (in Russian).
  16. Vasily Desnitsky. Analysis of approaches to development of anytime algorithms to solve computationally complex problems. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.90. (in Russian).
  17. Vasily Desnitsky. Configuring secure embedded devices on the base of non-functional protection properties. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.91. (in Russian).
  18. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities of security components in embedded devices. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.93. (in Russian).
  19. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Using anytime algorithms of attack modeling and security evaluation in SIEM systems. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P. 92. (in Russian).
  20. Andrey Chechulin, Vasily Desnitsky. Information flow analysis in the task of embedded system analysis. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.129. (in Russian).
  21. Vasily Desnitsky. Development of model and software tool for configuring and security control in corporative distributed information systems with embedded and mobile devices. XVII St. Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.195. (in Russian).

2011

  1. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. An abstract model for embedded systems and intruders. Proceedings of the Work in Progress Session held in connection with the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, February 2011. SEA-Publications. SEA-SR-29. 2011. P.25-26. ISBN 978-3-902457-29-5.
  2. Vasily Desnitsky, Andrey Chechulin. Model of the process for secure embedded systems development. High availability systems, 2, 2011. P.97-101. (in Russian).
  3. Igor Kotenko, Vasily Desnitsky, Andrey Chechulin. Investigation of technologies for secure embedded systems design in European Union project SecFutur. Information Security. Inside, 3, 2011. P.68-75. (in Russian).
  4. Vasily Desnitsky. Configuring embedded and mobile devices based on optimality problem solving. Proceedings of SPIIRAS. Issue 4 (19). St.Petersburg, Nauka, 2011. P. 221-242. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Constructing and testing secure embedded systems. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Selected Proceedings. St. Petersburg, 2011. P.115-121. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Abstract model for embedded secure systems. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  7. Andrey Chechulin, Vasily Desnitsky. Intruder model for provision of embedded systems security. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  8. Vasily Desnitsky, Andrey Chechulin. Unification of a process of secure embedded systems construction. 13th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  9. Vasily Desnitsky. The model of a unified process for development of secure embedded systems. 20th All-Russian Conference Methods and technical tools of information security (MTTIS 2011). Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.15-16. (in Russian).
  10. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration model for combined protection of information systems with embedded devices. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69-70. (in Russian).
  11. Vasily Desnitsky. Configuring effectiveness evaluation for combined protection mechanisms on the basis of optimality problem solving. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69. (in Russian).

2010

  1. Vasily Desnitsky,Igor Kotenko. Combined software protection against unauthorized ifluences. Journal of Instrument Engineering, Vol.53, 11, 2010, P.36-41. ISSN 0021-3454. (in Russian).
  2. V.Desnitsky, I.Kotenko. Protectability and scalability of software protection mechanism based on remote entrusting principles. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, 2010. Vol.52, P.50-67 (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Security and Scalability of Remote Entrusting Protection. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. P.298-306. ISSN 0302-9743.
  4. Vasiliy Desnitsky, Igor Kotenko. Development and analysis of remote entrusting protocol. VI St.Petersburg Interregional Conference Information Security of Russian Regions (IRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2010. P.121-129. ISBN 978-5-904031-95-4. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko. Software protection based on the principle of remote entrusting. 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P.159-163. ISBN 978-5-94057-693-8. (in Russian).
  6. Vasiliy Desnitsky, Igor Kotenko. Combined mechanisms to protect software from unauthorized modifications. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.100-101. (in Russian).
  7. VasilyDesnitsky. Technique of finding the optimum combination of protection methods to protect software from interventions. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.9-10. (in Russian).
  8. Vasiliy Desnitsky, Andrey Chechulin, Igor Kotenko. Configuration model of embedded devices. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.41-42. ISBN 978-5-904031-99-2. (in Russian).
  9. Vasiliy Desnitsky, Andrey Chechulin. Abstract model of embedded devices. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.40-41. ISBN 978-5-904031-99-2. (in Russian).
  10. Andrey Chechulin, Vasily Desnitsky, Mikhail Stepashkin. Intruder model in the task of security assurance of embedded system. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.150. ISBN 978-5-904031-99-2. (in Russian).

2009

  1. Vasily Desnitsky, Igor Kotenko. Analysis and Design of Entrusting Protocol for Distributed Software Protection. Proceedings of the Work in Progress Session heldin connection with the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. February 2009. SEA-Publications: SEA-SR-21. 2009. P.8-9.
  2. Vasily Desnitsky, Igor Kotenko. Design and Analysis of Remote Entrusting Protocol. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Design of Entrusting Protocols for Software Protection. Fourth International Workshop Information Fusion and Geographical Information Systems (IF&GIS09). St.Petersburg, Russia, May 17-20, 2009. Lecture Notes in Geoinformation and Cartography. Springer. 2009. .301-316
  4. Vasily Desnitsky, Igor Kotenko. Approach to Software Protection based on Remote Entrusting Mechanism. 11th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  5. Vasily Desnitsky. Configutation of software protection mechanism by means of security policies. VI St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.97-98. (in Russian).
  6. Vasily Desnitsky. Scalability and security of protection mechanism on the basis of the remote entrusting principle. VI St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.98. (in Russian).
  7. Vasily Desnitsky, Igor Kotenko. Performance and Scalability of Remote Entrusting Protection. Second International Workshop on Remote Entrusting (RE-TRUST 2009). September 30 - October 1, 2009. Riva del Garda, Italy, 2009.
  8. Igor Kotenko, Vasily Desnitsky. An Aspect-oriented Approach to Realization of Mobile Module in the Security Model based on Remote Entrusting Mechanism. Information Technologies and Computing Systems, 4, 2009. P.67-76. (in Russian).

2008

  1. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on Remote Retrusting Mechanism. V Interregional Conference Information Security of Russian Regions (ISRR-2007). Selected Proceedings. St.Petersburg, 2008. P.172-177. (in Russian).
  2. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on Remote Entrusting Mechanism. News of High schools. Journal of Instrument Engineering, Vol.51, 11, 2008. P.26-31. ISSN 0021-3454. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on Remote Entrusting mechanism. Information Security. Inside, No.4, 2008. P.59-63; No.5, 2008. P.68-74. (in Russian).
  4. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for software protection based on Remote Entrusting. VII All-Russian Conference Methods and technical tools of information security (MTTIS 2008). Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for Remote Entrusting mechanism. International Conferences Intelligent systems (AIS 2008) and Intelligent CAD (CAD-2008). Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  6. Vasily Desnitsky. Design and Analysis of Protocol for Protecting the Programs against Malicious Modifications. XI International Conference Regional informatics-2008 (RI-2008). Proceedings. St. Petersburg, October 21-23, 2008. P.98-99. (in Russian).

2007

  1. Vasily Desnitsky, Igor Kotenko. Models of Remote Authentication for Software Protection. International Conferences Intelligent systems (AIS'07) and Intelligent CAD (CAD-2007). Proceedings.Moscow, Fizmatlit, 2007. P.43-50. (in Russian).
  2. Vasily Desnitsky, Igor Kotenko. Remote Authentication for Protection of Programs against Non-authorized Modification. Scientific-practical Symposium National Information Systems and State Security. Proceedings. Moscow, Russia. September 2007. P.81-84. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Model of Protecting the Programs against Non-authorized Changes on the Basis of Remote Trust Mechanism. V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.81. (in Russian).
  4. Vasily Desnitsky. Remote Authentication as the Mechanism of Software Protection on Remote Clients. VI All-Russian Conference Methods and technical tools of information security (MTTIS 2007). June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.5. (in Russian).
  5. Vasily Desnitsky. Aspect-oriented Approach to Mobile Module Realization in Software Protection System. Scientific-practical Symposium National Information Systems and State Security. Proceedings. Moscow, Russia. September 2007. P.87-89. (in Russian).
  6. Vasily Desnitsky. Realization of Mobile Module Replacement Mechanism on the Basis of Aspect-oriented Programming Paradigm. V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.49-50. (in Russian).

2006

  1. Vasily Desnitsky, Igor Kotenko. Protection of the software against breaking: the analysis of methods. St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.108-109. (in Russian).

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page