| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | ISL ISoCPS | Publications | Events | Matherials |
 | Links | Contacts |
rus | eng |
  


Personal | Interests | Projects | Publications | 

Desnitsky Vasily Alexeevich

Citizenship: Russia
Address academic (office):
St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.: +7-(812)-328-2642
Fax: +7-(812)-328-4450

Position:Senior research fellow

Associate professor, Dr. Vasily A. Desnitsky, Master of Computer Science, Senior research fellow of Laboratory of Computer Security Problems of the St.Petersburg Federal Research Ceneter of the Russian Academy of Sciences, graduated from Mathematics and Mechanics Department of St. Petersburg State University in 2006. Got PhD in the field of Information Security Methods and Systems in 2013.

E-mail: desnitsky[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/desnitsky/

Top 

Research interests

IoT security, cyber-physical systems, energy exhaustion attacks, wireless sensor networks, embedded security, modeling and verification

Top 

Identifiers

2019

  • Desnitsky Vasily Alexeevich - 1st place in the section "Transport Systems" at the III International Scientific Conference "Science of the Future" for the project "Self-learning hardware and software robotic complex for emergency situations".

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2018

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2016

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2015

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2014

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2011

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

Top 

Patents and Programms

Patents for inventions and utility models, applications for them

  1. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Information retrieval device. Patent No. 2792840. Registered in the State Register of Inventions of the Russian Federation on 27.03.2023. The validity period of the exclusive right to the invention expires on 30.11.2042.
  2. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Device for network traffic. Patent No. 2768543. Registered in the State Register of Inventions of the Russian Federation on 24.03.2022. The validity period of the exclusive right to the invention expires on 07.04.2041.
  3. Vasily Desnitsky, Elena Doynikova, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Device for parametric estimation of the distribution law of message streams. Patent No. 2750287. Registered in the State Register of Inventions of the Russian Federation on 25.06.2021. The validity period of the exclusive right to the invention expires on 11.07.2040.
  4. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin, Elena Doynikova. Information retrieval device. Patent No. 2724788. Registered in the State Register of Inventions of the Russian Federation on 25.06.2020. The validity period of the exclusive right to the invention expires on 14.10.2039.

  5. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Random event prediction device. Patent No. 2705010. Registered in the State Register of Inventions of the Russian Federation on 01.11.2019. The validity period of the exclusive right to the invention expires on 14.02.2039.

  6. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk, Igor Saenko, Andrey Chechulin. Information retrieval device. Patent No. 2656736. Registered in the State Register of Inventions of the Russian Federation on 06.06.2018. The validity period of the exclusive right to the invention expires on 27.06.2037.

Programs and databases

2020

  1. Vasily Desnitsky, Igor Parashchuk, Andrey Chechulin. The component of eliminating the estimation uncertainty and categorization of the semantic content of information objects based on the disjoint summation of fuzzy sets. Certificate No. 2020610922. Registered in the Computer Program Registry 22.01.2020.

  2. Vasily Desnitsky, Elena Doinikova. A component of modeling a wireless sensor network for solving security analysis and verification tasks. Certificate No. 2020610060. Registered in the Computer Program Registry 09.01.2020.

  3. Alexey Meleshko, Vasily Desnitsky Component for the input data generation for solving problems of detecting anomalies in a wireless sensor network. Certificate No. 2020665921. Registered in the Computer Program Registry 02.12.2020.

  4. Evgenia Novikova, Vasily Desnitsky Component for the multidimensional data from wireless sensor network visualization. Certificate No. 2020666210. Registered in the Computer Program Registry 07.12.2020.

  5. Alexander Branitskiy, Vasily Desnitsky, Igor Parashchuk. Software tool for adaptation and retraining of the information objects analysis system. Certificate No. 2020665857. Registered in the Computer Program Registry 21.11.2020.

  6. Vasily Desnitsky, Igor Parashchuk., Igor Kotenko. Data processing component of the parental control system for digital content on the Internet. Certificate No. 2020666736. Registered in the Computer Program Registry 16.12.2020.

2019

  1. Vasily Desnitsky. Modeling normal and abnormal wireless sensor network traffic to evaluate and increase protection against Denial-of-Sleep attacks. Certificate No 2019665204. Registered in the Computer Program Registry 20.11.2019.
  2. Vasily Desnitsky. Modeling protection of Digital City network nodes against Denial-of-Sleep attacks. Certificate No 2019665088. Registered in the Computer Program Registry 19.11.2019.
  3. Alexey Meleshko, Vasily Desnitsky. Modeling protection of unmanned aerial vehicles from energy depletion attacks. Certificate No 2019664768. Registered in the Computer Program Registry 13.11.2019.
  4. Alexey Meleshko, Vasily Desnitsky. Modeling components of a Digital City system to counter energy depletion attacks. Certificate No 2019664767. Registered in the Computer Program Registry 13.11.2019.
  5. Vasily Desnitsky, Alexey Meleshko. Assessment of feasibility of energy depletion attacks on an unmanned aerial vehicle through modification of flight performance. Certificate No 2019665584. Registered in the Computer Program Registry 26.11.2019.
  6. Vasily Desnitsky, Andrey Fedorchenko. Modeling an information security violator in wireless sensor networks. Certificate No. 2019667307. Registered in the Computer Program Registry 23.12.2019.

2018

  1. Vasily Desnitsky, Andrey Chechulin. Firmware of a node of a Smart City sensor network to model energy exhaustion attacks. Federal Service for Intellectual Property. Certificate No 2018662696. Registered in the Computer Program Registry 12.10.2018.

  2. Vasily Desnitsky, Andrey Chechulin. Detection of energy exhaustion attacks on the base of rules in wireless mesh networks. Federal Service for Intellectual Property. Certificate No 2018662817. Registered in the Computer Program Registry 16.10.2018.

  3. Vasily Desnitsky, Andrey Chechulin. Control for governing an unmanned aerial vehicle to model energy exhaustion attacks . Federal Service for Intellectual Property. Certificate No 2018662871. Registered in the Computer Program Registry 17.10.2018.

  4. Vasily Desnitsky, Nickolay Rudavin, Igor Saenko. Modeling unwanted information flows in information systems. Federal Service for Intellectual Property. Certificate No 2018663496. Registered in the Computer Program Registry 29.10.2018.

  5. Vasily Desnitsky, Igor Kotenko. Module of analysis of unwanted information flows in information systems. Federal Service for Intellectual Property. Certificate No 2018663497. Registered in the Computer Program Registry 29.10.2018.

2017

  1. Vasily Desnitsky, Igor Parashchuk, Andrey Chechulin. Modeling of the attacks on wireless modules if mobile network. Federal Service for Intellectual Property. Certificate No 2017619724. Registered in the Computer Program Registry 19.09.2017.

  2. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Processing of security events from the cyberphysical water supply management system. Federal Service for Intellectual Property. Certificate No 2017660183. Registered in the Computer Program Registry 19.09.2017.

  3. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Managing of the security of a wireless mesh-network. Federal Service for Intellectual Property. Certificate No 2017661289. Registered in the Computer Program Registry 09.10.2017.

2016

  1. Ñàåíêî È.Á., Êóøíåðåâè÷ À.Ã., Äåñíèöêèé Â.À. Êîìïîíåíò âçàèìîäåéñòâèÿ ñ ïîëüçîâàòåëÿìè ñèñòåìû îáðàáîòêè áîëüøèõ ìàññèâîâ äàííûõ äëÿ ìîíèòîðèíãà áåçîïàñíîñòè êîìïüþòåðíûõ ñåòåé. Ñâèäåòåëüñòâî ¹ 2016663475. Çàðåãèñòðèðîâàíî â Ðååñòðå ïðîãðàìì äëÿ ÝÂÌ 08.12.2016.
  2. Äåñíèöêèé Â.À. Êîìïîíåíò îáíàðóæåíèÿ àíîìàëüíûõ äàííûõ îò ñåíñîðîâ äëÿ ñèñòåìû êîíòðîëÿ òåìïåðàòóðíîãî ðåæèìà ïîìåùåíèÿ. Ñâèäåòåëüñòâî ¹ 2016663374. Çàðåãèñòðèðîâàíî â Ðååñòðå ïðîãðàìì äëÿ ÝÂÌ 06.12.2016.
  3. Äåñíèöêèé Â.À., Êîòåíêî È.Â. Êîìïîíåíò îöåíêè ýôôåêòèâíîñòè âåðèôèêàöèè èíôîðìàöèîííûõ ïîòîêîâ íà îñíîâå ìåòîäà ïðîâåðêè íà ìîäåëè. Ñâèäåòåëüñòâî ¹ 2016663477. Çàðåãèñòðèðîâàíî â Ðååñòðå ïðîãðàìì äëÿ ÝÂÌ 08.12.2016.

2015

  1. Vasily Desnitsky, Igor Kotenko. Component for gathering data on a system for design, verification and testing security components of information and telecommunication Internet of Things systems. Certificate No 2015615411. Registered in the Computer Program Registry 18.05.2015.

  2. Vasily Desnitsky, Igor Kotenko. A software tool for evaluation of effectiveness of configuring security components of Internet of Things systems. Certificate N 2015662025. Registered in the Computer Program Registry 16.11.2015.

  3. Vasily Desnitsky. The software of representing the input data for configuring components of protection of embedded devices. Certificate ¹ 2015662185. Registered in the Computer Program Registry 18.11.2015.

  4. Vasily Desnitsky. Generator of report forms of analysis of security systems of the Internet of things. Certificate ¹ 2015662184. Registered in the Computer Program Registry 18.11.2015.

2014

  1. Vasily Desnitsky, Igor Kotenko. Verificataion of network information flows for protection of information and telecommunication systems with embedded devices. Federal Service for Intellectual Property. Certificate No 2014661027. Registered in the Computer Program Registry 22.10.2014.

2013

  1. Igor Kotenko, Vasily Desnitsky. Configurator of protection system of embedded devices. Federal Service for Intellectual Property. Certificate No 2013612691. Registered in the Computer Program Registry 11.03.2013 ã.

Top 

Projects

Current Grants and Projects

Former Projects

  • Vasiliy Desnitsky (Principal Investigator). “Models, techniques and algorithms for security analysis of software and hardware components of wireless sensor networks”. Research grant # 19-07-00953 A of Russian Foundation of Basic Research, 2019-2021 (Principal Investigator).
    Report-2019-19-07-00953-a-short.pdf [application/pdf] (195496 bytes)
    Report-2020-19-07-00953-a-short.pdf [application/pdf] (201695 bytes)
    Report-2021-19-07-00953-a-short.pdf [application/pdf ] (205488 bytes)
  • Igor Kotenko (Principal Investigator) – State Contract No. 05.607.21.0322 "Development of methods, models, algorithms and software tools based on detecting deviations in heuristics of ultra-high volume traffic to detect network attacks and protect against them". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2019-2020 (Researcher).
    Report-FTP-Results-05.607.21.0322.pdf [application/pdf] (204912 bytes)
  • Andrey Chechulin (Principal Investigator). Grant of Russian Science Foundation ¹ 18-71-10094 "Monitoring and counteraction to malicious influence in the information space of social networks", 2018-2021 (Researcher).
    RSCF_18-71-10094_Report_2020_eng.pdf [application/pdf] (196723 bytes)
    RSCF_18-71-10094_Report_2020_rus.pdf [application/pdf] (258925 bytes)
    RSCF_18-71-10094_Report_2021_eng.pdf [application/pdf] (178723 bytes)
    RSCF_18-71-10094_Report_2021_rus.pdf [application/pdf] (194835 bytes)
  • Igor Saenko (Principal Investigator). Grant of Russian Science Foundation ¹ 18-11-00302 "Intelligent digital network content processing for effective detection and counteraction of inappropriate, dubious and harmful information", 2018-2020 (Main researcher).
    RSF-Results-2018-18-11-00302-Eng.pdf [application/pdf] (94208 bytes)
    RSF-Results-2018-18-11-00302-Rus.pdf [application/pdf] (245760 bytes)
  • Andrey Chechulin (Principal Investigator). "Research, development and application of Augmented Reality technology for cyber and cyberphysical systems security data visualization" Research grant # 18-37-20047 of Russian Foundation of Basic Research, 2018-2020 (Researcher).
    Report-2019-18-37-20047-short.pdf [application/pdf] (208896 bytes)
  • Vasily Desnitsky (Principal Investigator). Russian Federation Presidential Grant ¹ MK-5848.2018.9 "Modeling and analysis of cyber-physical energy exhaustion attacks on Internet of Things devices", 2018-2019 (Principal Investigator).
  • Igor Kotenko (Principal Investigator). NIR-FUND of ITMO University ¹ 717075 "Methods, Models, Methods, Algorithms, Protocols and Applications for ensuring Information Security of Cyber-Physical Systems", 2017-2019 (Researcher).
  • Andrey Chechulin (Principal Investigator). “Development of mathematical models, techniques and alghoritms of security evaluation, attack modelling and countermeasures selection in near-real time mode”. Research grant # 15-07-07451-a of Russian Foundation of Basic Research, 2015-2017 (Researcher).
    Report-2015-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
    Report-2016-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
    Report-2017-15-07-07451-a-short.pdf [application/pdf] (422782 bytes)
  • Igor Kotenko (Principal Investigator) – Grant of Russian Science Foundation ¹ 15-11-30029 "Incident management and counteraction against targeted cyber-physical attacks in distributed largescaled mission critical systems taking into account cloud services and networks of the Internet of Things", 2015-2017., 2015-2017 (Researcher).
    RSF-Results-2015-15-11-30029-Eng.pdf [application/pdf] (18843 bytes)
    RSF-Results-2015-15-11-30029-Rus.pdf [application/pdf] (128851 bytes)
    RSF-Results-2016-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2016-15-11-30029-Rus.pdf [application/pdf] (442368 bytes)
    RSF-Results-2017-15-11-30029-Eng.pdf [application/pdf] (327680 bytes)
    RSF-Results-2017-15-11-30029-Rus.pdf [application/pdf] (438272 bytes)
  • Vasiliy Desnitsky (Principal Investigator). “Development and investigation of models and techniques for design and verification of combined protection mechanisms for information and telecommunication systems with embedded devices on the base of expert knowledge”. Research grant # 14-07-00417-a of Russian Foundation of Basic Research, 2014-2016 (Principal Investigator).
    Report-2014-14-07-00417-a-short.pdf [application/pdf] (258333 bytes)
    Report-2015-14-07-00417-a-short.pdf [application/pdf] (516620 bytes)
    Report-2016-14-07-00417-a-short.pdf [application/pdf] (740843 bytes)
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.604.21.0137 "Development of the technologies of the interactive visualization of the unformalized heterogeneous data for decision support systems in scope of the information security monitoring and management in the information and telecommunication systems". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0137_current_status.pdf [application/pdf] (138103 bytes)
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.604.21.0147 "Development of the methods for aggregation, normalization, analysis and visualization of big arrays of the heterogeneous, structured, semi-structured and unstructured data for the security monitoring and management of the distributed network of the electronic consumer devices". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0147_current_status.pdf [application/pdf] (142791 bytes)
  • Igor Kotenko (Principal Investigator). State Contract No. 14.604.21.0033 “Models, methods and software for development and analysis of information-telecommunication system security components for Internet of Things concept”. Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2015., 2014-2015 (Researcher).
    14.604.21.0033_current_status [application/pdf] (262992 bytes)
  • Igor Kotenko (Principal Investigator) – State Contract No. 14.616.21.0028 "Perspective methods of correlation of the security information and incidents management information in the critical infrastructures on the base of the convergence of the technologies of the security awareness on the physical and logical levels". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014., 2014-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). “Mathematical models and methods for monitoring and management of information security in computer networks and systems of critical infrastructures based on intelligent services of information protection”. Research grant # 13-01-00843-a of Russian Foundation of Basic Research, 2013-2015 (Researcher).
    Report-2013-13-01-00843-a-short.pdf [application/pdf] (294747 bytes)
    Report-2014-13-01-00843-a-short.pdf [application/pdf] (761856 bytes)
    Report-2015-13-01-00843-a-short.pdf [application/pdf] (562916 bytes)
  • Igor Kotenko (Principal Investigator). “Methods for the synthesis of the distributed intelligent system of information and technological security of automated control systems for railways”. Research grant # 13-07-13159-ofi_m_RJD of Russian Foundation of Basic Research, 2013-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). “Mathematical models, methods and algorithms of attack modeling, computer systems and networks protection analysis, information security risk analysis and decision-making for selection of security mechanisms in computer systems and networks”. Program "Architectural and software solutions, and security of data-processing supercomputer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2012-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 “Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures”. Project of Russian Ministry of Education and Science, 2011-2013 (Researcher).
  • Igor Saenko (Principal Investigator). “Mathematical models and methods of analysis and synthesis of access systems to information and network resources in modern and advanced computer systems and networks through the establishment and application of artificial intelligence. Research grant # 11-07-00435-à of Russian Foundation of Basic Research, 2011-2013 (Researcher).
    Report-2011-11-07-00435-a-short.pdf [application/pdf] (287595 bytes)
    Report-2012-11-07-00435-a-short.pdf [application/pdf] (344443 bytes)
    Report-2013-11-07-00435-a-short.pdf [application/pdf] (317185 bytes)
  • Igor Kotenko (Principal Investigator). “Mathematical models and methods of integrated protection against network attacks and malware in computer networks and systems based on hybrid multi-agent modeling and simulation of computer counteraction, verified adaptive security policies and proactive monitoring by data mining”. Research grant # 10-01-00826-a of Russian Foundation of Basic Research, 2010-2013 (Researcher).
    Report-2010-10-01-00826-a-short.pdf [application/pdf] (191714 bytes)
    Report-2011-10-01-00826-a-short.pdf [application/pdf] (260794 bytes)
    Report-2012-10-01-00826-a-short.pdf [application/pdf] (348160 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). “Design of Secure and energy-efficient embedded systems for Future internet applications (SecFutur)”. Research Project of the European Community seventh framework program (FP7). Contract No. 256668 (http://www.secfutur.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). “MAnagement of Security information and events in Service InFrastructures (MASSIF)”. Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator). “Mathematical Models, Methods and Algorithms of Proactive Protection against Malware in Computer Networks and Systems”. Program "Architecture, system solutions, software, standardization and information security of computer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2009-2011 (Researcher).
  • Igor Kotenko (Principal Investigator). Project on demand of Section of Applied Problems of Russian Academy of Sciences. Governmental contract, 2008-2009 (Researcher).
  • Igor Kotenko (Principal Investigator“Models and methods of construction and functioning support of intelligent adaptive security systems based on modeling and simulation of security systems behavior, realization of verified security policies, security evaluation and proactive monitoring”. Research grant # 07-01-00547 of Russian Foundation of Basic Research, 2007-2009 (Researcher).
    Report-07-01-00547a-2007short.pdf [application/pdf] (193198 bytes)
    Report-07-01-00547a-2008short.pdf [application/pdf] (205945 bytes)
    Report-07-01-00547a-2009short.pdf [application/pdf] (943498 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). “Remote EnTrusting by RUn-time Software authentication (RE-TRUST)”. Research Project of the European Community sixth framework program, 2006-2009 (Researcher).
  • Igor Kotenko (Principal Investigator). “Automatic Detection and Response Techniques against Internet Worms”. The subcontract with International Research Institute for Advanced Systems (IRIAS) according to contract with Hewlett-Packard, 2006-2007 (Researcher).
  • Igor Kotenko (Principal Investigator). “Development of scientific-methodical bases of information protection in the communication channels of International collective ecological safety system”. The state contract with the Center of security problems research of the Russian Academy of Sciences, 2006-2006 (Researcher).
  • Igor Kotenko (Principal Investigator). “Modeling of information security processes in computer networks in adversarial environment: formal framework, mathematical models, multi-agent architecture, software prototype and experimental evaluation”. Research grant 04-01-00167 of Russian Foundation of Basic Research, 2004-2006 (Researcher).
    Report-04-01-00167a-2006.pdf [application/pdf] (446259 bytes)
    Report-04-01-00167a.pdf [application/pdf] (510438 bytes)
  • Igor Kotenko (Principal Investigator). “Mathematical Models of Active Analysis of Vulnerabilities, Intrusion Detection and Network Attacks Counteraction in Computer Networks based on Multi-agent Technologies”. Program "Optimization of computer architectures to particular classes of tasks, information assurance of network technologies" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies"., 2003-2008 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). “Policy-based Security Tools and Framework (POSITIF)”. Research Project of the European Community sixth framework program. Contract # IST-2002-002314, 2003-2007 (Researcher).

Top 

Main publications

Books and Chapters in Books

  1. Vasily Desnitsky, Dmitry Sakharov, Andrey Chechulin, Igor Ushakov, Tatiana Zakharova. Information Security for Data Centers. Tutorial. SPb.: SPbSUT, 2019. - 92 pages. // https://elibrary.ru/item.asp?id=38554623
  2. Igor Kotenko, Igor Saenko, Andrey Chechulin, Olga Polubelova, Evgenia Novikova, Elena Doinikova, Andrey Shorov, Vasily Desnitsky. Intelligent information security services in critical infrastructures. Monography / Ed. Igor Kotenko and Igor Sayenko. St. Petersburg: BHV Publishing House, 2019. 400ð. ISBN 978-5-9775-3968-5 https://www.elibrary.ru/item.asp?id=42927796 // https://elibrary.ru/item.asp?id=42927796

Papers

2024

  1. E.S. Novikova, V.A. Desnitsky. Analysis of visualisation of multidimensional data on the base of glyphs by using chernoff faces // Informatization and communication. 2024. No. 1. pp. 76-83. DOI: 10.34219/2078-8320-2024-15-76-83 // https://www.elibrary.ru/item.asp?id=60028821 (in Russian).

2023

  1. Maxim Kolomeets, Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Graph Visualization: Alternative Models Inspired by Bioinformatics. Sensors, 2023, 23(7), 3747. DOI:10.3390/s23073747
  2. Vasily Desnitsky, Diana Levshun, Igor Kotenko. An Approach to Attack Detection on Graph-Based Modeling of States in Critical Infrastructures // 2023 International Russian Automation Conference (RusAutoCon). 2023. DOI: 10.1109/RusAutoCon58002.2023.10272943
  3. Igor Kotenko, Igor Parashchuk, Vasily Desnitsky. Determination of the Transition Probability Matrix for an IoT Fuzzy Security Model // 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS). 2023. pp. 40-44.
  4. Igor Kotenko, Vasily Desnitsky, Evgenia Novikova. Defect Detection in Industrial IoT-based Machines: Case of Small Training Dataset // 2023 IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS). 2023. DOI: 10.1109/IoTaIS60147.2023.10346064
  5. Vasily Desnitsky. Modeling and Detection of Denial-of-Sleep Attacks on Autonomous IoT Devices in Wireless Sensor Networks // Internet of Things / Security, Trust and Privacy Models, and Architectures in IoT Environments. 2023. pp. 77-97. DOI: 10.1007/978-3-031-21940-5_5
  6. Vasily Desnitsky, Igor Kotenko, Igor Paraschuk, Elena Fedorchenko. Metrics and Indicators of Security of Critical Resources in State and Corporate Objects and Processes // Òðóäû Ñåìèíàðà Information Computing and Processing. 2023
  7. A.V. Meleshko, V.A. Desnitsky. Echnique of attack detection in self-organizing decentralized wireless sensor networks // Scientific and Analytical journal "Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia". 2023. No. 3. pp. 63-74. DOI: 10.61260/2218-130X-2023-3-63-74 // https://elibrary.ru/item.asp?id=54765334 (in Russian).
  8. T.K. Zhukebaeva, V.A. Desnitsky, E.M. Mardenov. Analytical modeling of attacks in wirelesssensor networks for attack detection // Informatization and Communications. 2023. No. 3. pp. 98-105. DOI: 10.34219/2078-8320-2023-14-3-98-105 // https://elibrary.ru/item.asp?id=54668232 (in Russian).
  9. A.V. Meleshko, V.A. Desnitsky. Modeling a self-organizing decentralized wireless sensor network with role-functioning for attack detection // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2023. 3. pp. 63-69. DOI: 10.46418/2079-8199_2023_3_10 // https://www.elibrary.ru/item.asp?id=56006756 (in Russian).
  10. V.A. Desnitskiy. Attack detection in critical infrastructures on the base of analysis of states// Computer tools in education. 2023. Issue 3. pp. 8-17. DOI: 10.32603/2071-2340-2023-3-8-17 //http://ipo.spb.ru/journal/index.php?article/2346/ (in Russian).
  11. V.A. Desnitsky. Analysis of attacking effects on autonomous devices of information and telecommunication systems and networks // In the collection: Mathematical and computer modeling. Collection of materials of the X International Scientific Conference. Omsk, 2023. pp. 248-249 // https://elibrary.ru/item.asp?id=50349461 (in Russian).
  12. V.A. Desnitsky. Analysis of modeling conditions of attacks in industrial water purification systems // Information security of the regions of Russia (IBRD-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 75-76 // https://elibrary.ru/item.asp?id=60024732&pff=1 (in Russian).
  13. V.A. Desnitsky. Detection of attacks on graph-based modeling of system states // Information security of the regions of Russia (IBRR-2023) XIII-I St. Petersburg Interregional Conference. Materials of the conference, – St. Petersburg, SPOISU. 2023. pp. 76-77 // https://elibrary.ru/item.asp?id=60024733&pff=1 (in Russian).
  14. Vasily Desnitsky. Simulation Modeling of a Flotation Water Treatment System for Attack Evaluation // 2023 International Ural Conference on Electrical Power Engineering (UralCon). 2023.

2022

  1. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Multi-aspect based approach to attack detection in iot clouds // Sensors. 2022. Ò. 22. ¹ 5, Ïîðÿäêîâûé íîìåð: 1831. DOI: 10.3390/s22051831 https://www.elibrary.ru/item.asp?id=48184560
  2. Desnitsky V. Decentralized role-based secure management in wireless sensor networks // Lecture Notes in Networks and Systems. 2022. Ò. 424. Ñ. 51-58. DOI: 10.1007/978-3-030-97020-8_6 https://www.elibrary.ru/item.asp?id=48584383
  3. Alexey Meleshko, Anton Shulepov, Vasily Desnitsky, Evgenia Novikova. Visualization Assisted Approach to Anomaly and Attack Detection in Water Treatment Systems // July 2022Water 14(15):2342. DOI:10.3390/w14152342
  4. Igor Kotenko, Elena Doynikova, Andrey Fedorchenko, Vasily Desnitsky. Automation of Asset Inventory for Cyber Security: Investigation of Event Correlation-Based Technique // July 2022Electronics 11(15):2368 DOI:10.3390/electronics11152368
  5. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Simulation-based and Graph oriented Approach to Detection of Network Attacks // Conference: 2022 11th Mediterranean Conference on Embedded Computing (MECO), P.436-439. DOI:10.1109/MECO55406.2022.9797159
  6. Vasily Desnitsky, Igor Kotenko, Igor Parashuk. Vector-based dynamic assessment of cyber-security of critical infrastructures // Â ñáîðíèêå: Proceedings of the 2022 Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2022. 2022. Ñ. 277-282. DOI: 10.1109/ElConRus54750.2022.9755836 // https://www.elibrary.ru/item.asp?id=48582045
  7. Vasily Desnitsky. Machine learning-based detection of denial-of-sleep attacks in wireless sensor networks // Izvestiya SPbSETU LETI. 2022. No. 5/6. pp. 32-40. DOI: 10.32603/2071-8985-2022-15-5/6-32-40 // https://elibrary.ru/item.asp?id=48763628 (in Russian).
  8. K.E. Izrailov, M.V. Buinevich, I.V. Kotenko, V.A. Desnitsky. Assessment and prediction of the complex objects state: application for information security // Issues of cybersecurity. 2022. No. 6 (52). pp. 2-21. DOI: 10.21681/23113456-6-2022-2-21 // https://elibrary.ru/item.asp?id=50329071 (in Russian).
  9. V.A. Desnitskiy. Modeling and visual analysis of denial-of-sleep attacks in wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2022. No. 3. pp. 14-21. DOI: 10.46418/2079-8199_2022_3_2 // https://elibrary.ru/item.asp?id=49835297 (in Russian).
  10. Alexey Meleshko, Vasily Desnitsky. Detecting attacks in self-organizing decentralized wireless sensor networks // In the collection: Mathematical and information modeling. materials of the All-Russian Conference of Young Scientists. Ministry of Science and Higher Education of the Russian Federation, Tyumen State University, Institute of Mathematics and Computer Science. Tyumen, 2022. pp. 276-281. https://www.elibrary.ru/item.asp?id=49518839 (in Russian).
  11. V.A. Desnitskiy. Combined approach to attack detection in water supply management systems // In the book: Regional Informatics (RI-2022). Jubilee XVIII St. Petersburg International Conference. Conference materials. St. Petersburg, 2022. pp. 152-153.// https://elibrary.ru/item.asp?id=49977187 (in Russian).

2021

  1. Vasily Desnitsky, Igor Kotenko. Simulation and Assessment of Battery Depletion Attacks on Unmanned Aerial Vehicles for Crisis Management Infrastructures // Simulation Modelling Practice and Theory. 2021. Ò. 107. Ñ. 102244. DOI: 10.1016/j.simpat.2020.102244 // https://elibrary.ru/item.asp?id=45028824
  2. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Fuzzy sets in problems of identification of attacks on wireless sensor networks // Â ñáîðíèêå: Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021. 2021. Ñ. 290-293. DOI: 10.1109/ElConRus51938.2021.9396712 // https://www.elibrary.ru/item.asp?id=46024531
  3. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko, Eugenia Novikova, A. Shulepov. Combined approach to anomaly detection in wireless sensor networks on example of water management system // Â ñáîðíèêå: 2021 10th Mediterranean Conference on Embedded Computing, MECO 2021. 10. 2021. Ñ. 9460237. DOI: 10.1109/MECO52532.2021.9460237 https://www.elibrary.ru/item.asp?id=47060214
  4. Vasily Desnitsky. Iotaas based approach to design of a WSN for secure smart city monitoring // Proceedings - 2021 International Russian Automation Conference, RusAutoCon 2021. 2021. Ñ. 443-447. DOI: 10.1109/RusAutoCon52004.2021.9537476 // https://elibrary.ru/item.asp?id=47096519
  5. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Approach to Anomaly Detection in Self-Organized Decentralized Wireless Sensor Network for Air Pollution Monitoring // MATEC Web of Conferences. 2021. 346 (03002). pp. 1-8. DOI: 10.1051/matecconf/202134603002 (WoS, Scopus, ïåðå÷åíü ÂÀÊ, ÐÈÍÖ)
  6. Vasily Desnitskiy. Approach to real time attack detection on the base of simulation and graph oriented modeling // Informatization and Communication. 2021. No. 7. pp. 30-35. DOI: 10.34219/2078-8320-2021-12-7-30-35 // https://www.elibrary.ru/item.asp?id=47378755 (in Russian).
  7. Alexey Meleshko, Anton Shulepov, Vasily Desnitsky, Eugenia Novikova. Integrated approach to revelation of anomalies in wireless sensor networks for water control cases // Computer tools in education. 2021. No. 1. pp. 58-67. DOI: 10.32603/2071-2340-2021-1-59-68 https://www.elibrary.ru/item.asp?id=47143926 (in Russian).
  8. Vasily Desnitskiy. Classification and analysis of energy depletion attacks in critical cyber-physical systems with unmanned aerial vehicles // Scientific and Analytical Journal Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia. 2021. No. 3. pp. 44-49. https://www.elibrary.ru/item.asp?id=47085002 (in Russian).
  9. Vasily Desnitskiy. An approach to construction of a secure protocolfor decentralized interaction in wireless sensor networks // Scientific and Analytical journal Bulletin of the St. Petersburg University of the State Fire Service of the Ministry of Emergency Situations of Russia. 2021. No. 4. pp. 51-57. https://www.elibrary.ru/item.asp?id=47520614 (in Russian).
  10. Vasily Desnitsky. Analysis of the model of energy depletion attacks in cyber-physical systems // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 2. pp. 21-27. DOI: 10.46418/2079-8199_2021_2_3 https://www.elibrary.ru/item.asp?id=46618710 (in Russian).
  11. Alexey Meleshko, Vasily Desnitsky. Anomaly revelation approach for decentralized mesh wireless sensor network for air pollution monitoring // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 3. pp. 9-14. DOI: 10.46418/2079-8199_2021_3_2 // https://elibrary.ru/item.asp?id=47695937 (in Russian).
  12. Vasily Desnitskiy. Modeling energy exhaustion attacks on uav in telecommunication systems and networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2021. No. 4. pp. 14-20. DOI: 10.46418/2079-8199_2021_4_2 https://www.elibrary.ru/item.asp?id=47935486 (in Russian).
  13. Vasily Desnitskiy, Igor Paraschuk. Formal description of the features of the intruder model and criticality of attacking actions on wireless sensor networks // Actual problems of infotelecommunications in science and education. collection of scientific articles: in 4 volumes. St. Petersburg State University of Telecommunications named after Prof. M.A. Bonch-Bruevich. Saint Petersburg, 2021. pp. 297-301. https://www.elibrary.ru/item.asp?id=46275413 (in Russian).
  14. V.A. Desnitskiy. Analysis of applicability and theoretical evaluation of means for analysis of protection of the components in wireless sensor networks // XII St. Petersburg Interregional Conference "Information Security of Russian regions" (IBRR-2021). 2021. Vol. 1. P. 77 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf // https://elibrary.ru/item.asp?id=49241018 (in Russian).
  15. V.A. Desnitskiy. An approach to monitoring Denial-of-Sleep attacks in wireless sensor networks using intelligent data analysis // XII St. Petersburg Interregional Conference "Information Security of Russian Regions" (IBRR-2021). 2021. T 1. pp. 78-79 http://www.spoisu.ru/files/ibrr/ibrr2021/ibrr2021_materials.pdf https://www.elibrary.ru/item.asp?id=49241017 (in Russian).
  16. V.A. Desnitskiy. Architecture and hardware and software prototypes of security analysis tools for wireless sensor networks components // In the collection: Mathematical and computer modeling. Collection of materials of the IX International Scientific Conference dedicated to the 85th anniversary of Professor V.I. Potapov. Omsk, 2021. pp. 251-253. http://fkn.univer.omsk.su/nauka/Conf/2021/IX_MCM_Conf_2021.pdf https://www.elibrary.ru/item.asp?id=48737114 (in Russian).
  17. V.A. Desnitskiy. Analysis of requirements for real-time detection of attacks in critical infrastructures // In the collection: Mathematical and computer modeling. Collection of materials of the IX International Scientific Conference dedicated to the 85th anniversary of Professor V.I. Potapov. Omsk, 2021. pp. 254-256. http://fkn.univer.omsk.su/nauka/Conf/2021/IX_MCM_Conf_2021.pdf. https://www.elibrary.ru/item.asp?id=48737115 (in Russian).
  18. V.A. Desnitskiy. Application of simulation principles to solve problems of detecting attacks in critical infrastructures // In the collection: Digital region: experience, competencies, projects. Proceedings of the IV International Scientific and Practical Conference dedicated to the Year of Science and Technology in Russia. Bryansk, 2021. pp. 195-198. http://bgitu.ru/upload/iblock/f78/Sbornik_Tsifrovoy_region_opyt_kompetentsii_proekty_2021.pdf https://www.elibrary.ru/item.asp?id=48374815 (in Russian).

2020

  1. Vasily Desnitsky, Nikolay Rudavin, Igor Kotenko. Modeling and Evaluation of Battery Depletion Attacks on Unmanned Aerial Vehicles in Crisis Management Systems // Studies in Computational Intelligence Vol. 868 Ð. 323-332 DOI:10.1007/978-3-030-32258-8_38 // https://elibrary.ru/item.asp?id=43212577
  2. Anastasia Balueva, Vasily Desnitsky, Igor Ushakov. Approach to Detection of Denial-of-Sleep Attacks in Wireless Sensor Networks on the Base of Machine Learning // Studies in Computational Intelligence. 2020. Ò. 868. Ñ. 350-355. DOI: 10.1007/978-3-030-32258-8_41 eLIBRARY ID: 41346187
  3. Alexey Meleshko, Vasily Desnitsky, Igor Kotenko. Machine learning based approach to detection of anomalous data from sensors in cyber-physical water supply systems // Â ñáîðíèêå: IOP Conference Series: Materials Science and Engineering. International Conference on Modern Trends in Manufacturing Technologies and Equipment 2019, ICMTME 2019. 2020. Ñ. 033034. DOI: 10.1088/1757-899X/709/3/033034 // https://elibrary.ru/item.asp?id=43236220
  4. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Neural Network Based Classification of Attacks on Wireless Sensor Networks // Proceeding of the 2020 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus 2020) St. Petersburg and Moscow, Russia, 27–30 ÿíâàðÿ 2020 ã. P. 284-287 DOI: 10.1109/EIConRus49466.2020.9039275. // https://www.elibrary.ru/item.asp?id=43259386
  5. Vasily Desnitsky. Approach to Machine Learning based Attack Detection in Wireless Sensor Networks // Proceedings - 2020 International Russian Automation Conference (RusAutoCon) Sochi, 06–12 ñåíòÿáðÿ 2020 ãîäà C. 767-771. DOI: 10.1109/RusAutoCon49822.2020.9208085. https://www.elibrary.ru/item.asp?id=45202232
  6. Vasily Desnitsky, Igor Kotenko. Enhancing technology of producing secure IoT devices on the base of remote attestation // MATEC Web of Conferences, ICMTMTE 2020, Vol. 329, Article Number 03023. P. 1-8. 2020. DOI: 10.1051/matecconf/202032903023 (WoS) https://www.matec-conferences.org/articles/matecconf/pdf/2020/25/matecconf_icmtmte2020_03023.pdf
  7. Meleshko A V, Desnitsky V A, Kotenko I V. Modeling attacks in self-organizing wireless sensor networks of smart cities // IOP Conference Series: Materials Science and Engineering. 2020. vol. 971. pp. 032077 DOI: 10.1088/1757-899X/971/3/032077 (WoS, Scopus, ÐÈÍÖ)
  8. A.V. Meleshko, V.A. Desnitsky, I.V. Kotenko. Modelling attacks in self-organizing wireless sensor networks of smart cities // IOP Conference Series: Materials Science and Engineering. Ñåð. "International Conference on Modern Trends in Manufacturing Technologies and Equipment, ICMTMTE 2020 - Materials Science" 2020. Ñ. 032077. DOI: 10.1088/1757-899X/971/3/032077 https://www.elibrary.ru/item.asp?id=45070170
  9. Vasily Desnitsky. Modeling and analysis of information security threats in wireless sensor networks // Journal Information Technology and Telecommunications. Vol. 8, No. 3. 2020. P. 102-111. DOI: 10.31854/2307-1303-2020-8-3-102-111. // https://www.elibrary.ru/item.asp?id=43960182 (in Russian).
  10. Vasily Desnitsky, Nikolay Rudavin. Modeling of Denial-of-Sleep attacks in wireless sensor networks // Vestnik Sankt-Peterburgskogo Universiteta GPS MChS Rossii. Issue 3. P. 76-82. 2020. https://www.elibrary.ru/item.asp?id=44108907 (in Russian).
  11. Vasily Desnitsky, Alexey Meleshko. Approach to modeling attacks in digital city’s self-organizing wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1 Natural and technical sciences. No. 3. P. 20-25. 2020. DOI: 10.46418/2079-8199_2020_3_3 // https://www.elibrary.ru/item.asp?id=44180589 (in Russian).
  12. Meleshko A.V., Vasily Desnitsky. A game based technique for application of countermeasure selection process // Scientific and Analytical journal Bulletin of the Saint Petersburg University of the State Fire Service of the EMERCOM of Russia. 2020, No. 4. Ð. 70-77. https://vestnik.igps.ru/wp-content/uploads/V20204/10.pdf https://www.elibrary.ru/item.asp?id=44539817 (in Russian).
  13. V. A. Desnitsky. Analysis of information security violations in wireless sensor networks // Bulletin of the St. Petersburg State University of Technology and Design. Series 1: Natural and technical sciences. 2020. No. 4. P. 48-55. DOI: 10.46418/2079-8199_2020_4_7 https://www.elibrary.ru/item.asp?id=44830242 (in Russian).
  14. Alexander Branitskiy, Polina Gladysheva, Vasily Desnitsky, Igor Kotenko. Implementation and evaluation of adaptation and retraining methods for the analysis of information objects in web-content // IX International Scientific, Technical and Scientific Methodological Conference "Actual Problems of Information Telecommunications in Science and Education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 154-158. // https://elibrary.ru/item.asp?id=44603985 (in Russian).
  15. Vasily Desnitsky, Alexey Meleshko. Modeling attacks on self-organizing wireless sensor networks // IX International scientific-technical and scientific-methodical conference "Actual problems of infotelecommunications in science and education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 389-394.//https://www.elibrary.ru/item.asp?id=44604034 (in Russian).
  16. Vasily Desnitsky, Igor Parashchuk. A generalized algorithm for analyzing the security of wireless sensor networks from attacking influences // IX International Scientific and Technical and Scientific and Methodological Conference "Actual problems of infotelecommunications in science and education" (APINO-2020). February 26-27, 2020. Collection of scientific articles. Volume 1. SPb., 2020. P. 394-398. // https://www.elibrary.ru/item.asp?id=44604035 (in Russian).
  17. Vasily Desnitsky, Alexey Meleshko. Approach to detection of anomalous data in cyber-physical systems // Proceedings of the scientific seminar "Fundamental problems of management of production processes in the transition to Industry 4.0". P. 257-258. 2020. https://www.elibrary.ru/item.asp?id=44131878 (in Russian).
  18. Vasily Desnitsky. An approach to analysis of information security violations in mobile applications // XVII St. Petersburg International Conference "Regional Informatics (RI-2020)". October 28-30, 2020. Conference materials / SPOISU. - SPb, Ð. 134-136. 2020. https://www.elibrary.ru/item.asp?id=49390761 (in Russian).
  19. Vasily Desnitsky. Hardware and software stand for modeling attacks in ZigBee networks // In the collection: Priority directions of innovation activity in industry. Collection of scientific articles on the results of the eleventh International Scientific Conference. 2020. pp. 81-84. https://www.elibrary.ru/item.asp?id=44569809 (in Russian).
  20. I. B. Paraschuk, V. A. Desnitsky Features of security assessment software and hardware components of wireless sensor networks // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 166-168 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf https://www.elibrary.ru/item.asp?id=49390766 (in Russian).
  21. I. B. Paraschuk, V. A. Desnitsky, O. N. Tushkanova. Model of the digital content parental control system on the Internet // XVII St. Petersburg International Conference " Regional Informatics (RI-2020)". St. Petersburg, October 28-30, 2020, part 1., pp. 168-170 http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf // https://www.elibrary.ru/item.asp?id=49390765 (in Russian).
  22. V. A. Desnitsky, A. A. Chechulin, E. V. Doynikova. A technique for verification of representation models of wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, ðð. 197-198. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf https://www.elibrary.ru/item.asp?id=45844808 (in Russian).
  23. A. A. Chechulin, E. V. Doynikov, V. A. Desnitsky. Model of a stacked pie chart for visual analytics in virtual reality // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 233-234. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844827 (in Russian).
  24. V.A. Desnitsky, I.B. Paraschuk. A technique for revelation of anomalous data in wireless sensor networks on the base of artificial intelligence methods // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, p. 199. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf https://www.elibrary.ru/item.asp?id=45844809 (in Russian).
  25. V.A. Desnitsky, I.B. Parashchuk. Wireless sensor networks and analysis of security against attacks of their hardware and software components // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, 22-26 Sep. 2020, pp. 207-208. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf // https://www.elibrary.ru/item.asp?id=45844815 (in Russian).
  26. V. A. Desnitsky, A. A. Branitsky, A.V. Fedorchenko. A technique for distributed collection, processing and analysis of data in a wireless sensor network // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020. pp. 195-196. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf https://www.elibrary.ru/item.asp?id=45844807 (in Russian).
  27. V. A. Desnitsky. An approach to evaluation of energy resources depletion attacks in wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020. p. 200. https://www.elibrary.ru/item.asp?id=45844810 (in Russian).
  28. V. A. Desnitsky. An approach to the construction of security components for Internet of Things systems on the base of fog computing // Perspective directions of development of domestic information technologies: materials of the VI interregional scientific and practical conference, Sevastopol, September 22-26, 2020, pp. 249-250. http://www.spoisu.ru/files/pnroit/pnroit-2020_materials.pdf https://www.elibrary.ru/item.asp?id=45844834 (in Russian).
  29. V. A. Desnitsky. Architecture and algorithms of the system of distributed data collection, processing and analysis in a wireless sensor network // In the book: Mathematical and computer modeling. collection of materials of the VIII International Scientific Conference dedicated to the memory of A.L. Josefer. Omsk, 2020. pp. 252-254. http://fkn.univer.omsk.su/nauka/Conf/2020/VIII_MCM_Conf_2020.pdf https://www.elibrary.ru/item.asp?id=45809228 (in Russian).
  30. V. A. Desnitsky. Analysis of wireless sensor networks for solving information security problems // In the book: Mathematical and computer modeling. collection of materials of the VIII International Scientific Conference dedicated to the memory of A.L. Josefer. Omsk, 2020. pp. 255-257. 2020. P. 255-257. http://fkn.univer.omsk.su/nauka/Conf/2020/VIII_MCM_Conf_2020.pdf https://www.elibrary.ru/item.asp?id=45809230 (in Russian).
  31. V. A. Desnitsky. Identification of anomalous data from sensors of wireless sensor networks // In the collection: Challenges of the digital economy: the development of a comfortable urban environment. Proceedings of the III All-Russian Scientific and Practical Conference with international participation. 2020. pp. 233-235. https://www.elibrary.ru/item.asp?id=44171535 (in Russian).
  32. V. A. Desnitsky. Algorithms for detection of anomalous data from sensors in self-organizing wireless sensor networks // In the collection: DIGITAL REGION: EXPERIENCE, COMPETENCIES, PROJECTS. collection of articles of the III International Scientific and Practical Conference dedicated to the 90th anniversary of the Bryansk State University of Engineering and Technology. Bryansk, 2020. pp. 252-256. https://www.elibrary.ru/item.asp?id=45793877 (in Russian).
  33. V. A. Desnitsky. Approach to construction and analysis of a secure system for distributed collection and prosessing of data from nodes of a wireless sensor network // In the collection: DIGITAL REGION: EXPERIENCE, COMPETENCIES, PROJECTS. collection of articles of the III International Scientific and Practical Conference dedicated to the 90th anniversary of the Bryansk State University of Engineering and Technology. Bryansk, 2020. pp. 256-258. https://www.elibrary.ru/item.asp?id=45793878 (in Russian).
  34. Vasily Desnitsky. A technique for application of the process of countermeasure choice on the base of game theory approach // XVII St. Petersburg International Conference "Regional Informatics (RI-2020)". October 28-30, 2020. Conference materials / SPOISU. - SPb, Ð. 133-134. http://www.spoisu.ru/files/ri/ri2020/ri2020_materials_1.pdf https://www.elibrary.ru/item.asp?id=49390762 (in Russian).

2019

  1. Vasily Desnitsky, Igor Kotenko, Danil Zakoldaev. Evaluation of Resource Exhaustion Attacks against Wireless Mobile Devices // Electronics. 2019. Ò. 8. ¹ 5. Ñ. 500, https://doi.org/10.3390/electronics8050500 // https://elibrary.ru/item.asp?id=41630344
  2. Vladislav Alexandrov, Vasily Desnitsky, Dmitry Chaly. Design and Security Analysis of a Fragment of Internet of Things Telecommunication System // Journal Automatic Control and Computer Sciences. Voume 53. Issue 7. P. 851-856. 2019. DOI: 10.3103/S0146411619070241 (WoS) // https://elibrary.ru/item.asp?id=43243969
  3. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. Protection Mechanisms against Energy Depletion Attacks in Cyber-Physical Systems // Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2019, Saint Petersburg - Moscow,J anuary 28-30, 2019, pp. 214-219, 2019. DOI: 10.1109/EIConRus.2019.8656795 // https://elibrary.ru/item.asp?id=38701751
  4. Desnitsky V.A., Kotenko I.V., Parashchuk I.B. Methods of assessing the effectiveness of network content processing systems for detecting malicious information9 taking into account the elimination of uncertainty in the semantic content of information objects // Proceedings of 2019 22nd International Conference on Soft Computing and Measurements, SCM 2019. 22. 2019. Ñ. 41-44. DOI: 10.1109/SCM.2019.8903670 // https://www.elibrary.ru/item.asp?id=43213385 (WoS, Scopus).
  5. Lidia Vitkova, Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Approach to organizing of a heterogeneous swarm of cyber-physical devices to detect intruders // Â ñáîðíèêå: IFAC-PapersOnLine. 9th IFAC Conference on Manufacturing Modelling, Management and Control, MIM 2019. 2019. Ñ. 945-950. DOI: 10.1016/j.ifacol.2019.11.316 https://www.elibrary.ru/item.asp?id=43243011
  6. Vasily Desnitsky, Igor Kotenko. Monitoring the State of Materials in Cyberphysical Systems: Water Supply Case Study // Materials Today: Proceedings. 2019. P. 410-416. 2019. DOI: 10.1016/j.matpr.2019.01.005 // https://elibrary.ru/item.asp?id=39002730
  7. Vasily Desnitsky, Alexey Meleshko. Security analysis of software and hardware components in wireless sensor networks // Information Technology and Telecommunications. 2019. Vol. 7, No. 1. P. 75-83. https://www.sut.ru/doci/nauka/1AEA/ITT/2019_1/75-83.pdf 10.31854/2307-1303-2019-7-1-75-83 // https://elibrary.ru/item.asp?id=41382752 (in Russian).
  8. Alexey Meleshko, Vasily Desnitsky. Machine learning based approach to detection of anomalous data from sensors in ciber-physical water supply systems // Bulletin of the St. Petersburg State University of Technology and Design. Series 1 Natural and technical sciences. No. 4. P. 69-72. 2019. // https://elibrary.ru/item.asp?id=42485920 (in Russian).
  9. Vasily Desnitsky, Nikolay Rudavin. Modeling and evaluation of energy exhaustion attacks on unmanned aerial vehicles in crisis management systems // Scientific and analytical journal Bulletin of the St. Petersburg University of the State Fire Service EMERCOM of Russia. 2019. Issue 4. P. 69-74. https://www.elibrary.ru/item.asp?id=41833385 (in Russian).
  10. Vasily Desnitsky, Igor Parashchuk. Indicators of accessibility, integrity and privacy of data of users of wireless sensor networks in the interests of analysis and ensuring their security // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". Conference materials. Saint-Petersburg, October 23-25, 2019. P. 114-116, 2019 (in Russian).// http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=46470582 (in Russian).
  11. Aleksei Meleshko, Vasily Desnitsky // Data anomalies identification in ciber-physical water supply systems // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". Conference materials. Saint-Petersburg, October 23-25, 2019. P. 136-137 http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://elibrary.ru/item.asp?id=46470466 (in Russian).
  12. Igor Parashchuk, Vasily Desnitsky. Architecture of the component of eliminating the uncertainty of analysis of the problem of information facilities on the basis of processing of complete, contradictive and fuzzle knowledge // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". Conference materials. Saint-Petersburg, October 23-25, 2019. P. 244-245 // http://www.spoisu.ru/files/ibrr/ibrr2019/ibrr2019_materials.pdf // https://www.elibrary.ru/item.asp?id=46470281 (in Russian).
  13. Igor Parashchuk, Vasily Desnitsky. Analysis of the sense filling of information objects on the basis of processing of full, contravenous and fuzzy knowledge: architecture of the component of elimination the uncertainty // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". The proceedings of conference. Issue 7. Saint-Petersburg, October 23-25, 2019. P. 258-262 http://www.spoisu.ru/files/riib/riib_7_2019.pdf // https://www.elibrary.ru/item.asp?id=42562059 (in Russian).
  14. Vasily Desnitsky, Igor Parashchuk. Analysis and security of data protection of users of wireless sensor networks: indicators of accessibility, integrity and confidentiality // XI Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2019)". The proceedings of conference. Issue 7. Saint-Petersburg, October 23-25, 2019. P. 34-38 http://www.spoisu.ru/files/riib/riib_7_2019.pdf // https://www.elibrary.ru/item.asp?id=42561898 (in Russian).
  15. Anastasia Balueva, Vasily Desnitsky. Approach to detection of Denial-of-Sleep attacks in cyber-physical systems on the base of machine-training methods // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) Vol. 1., p. 97-103 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383501&pff=1 (in Russian).
  16. Vasily Desnitsky, Pavel Dumenko. Analysis of Information Security Violations in Mobile Applications // VIII International Scientific-Technical and Scientific-Methodological Conference "Actual Problems of Information and Telecommunications in Science and Education" (APINO 2019), February 27-28, 2019, proceedings, St. Petersburg. : SPbSUT, Ð. 384-390 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf https://www.elibrary.ru/item.asp?id=41383559 (in Russian).
  17. L.A. Vitkova, V.A. Desnitsky, K.N. Zhernova, A.A. Chechulin. Review of human-computer interaction for network security // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles) T. 1, p. 218-223 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?id=41383526 (in Russian).
  18. V.A. Desnitsky, I.P. Zuev, P.V. Karelsky, M.M. Kovtsur. Analysis of dissemination channels in the social network Twitter // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles), T. 1., p. 390-395 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://elibrary.ru/item.asp?id=41383560 (in Russian).
  19. Gamidov T.O., Desnitsky V.A., Dudkina O.S., Sakharov D.V. Methods and techniques for analysis of unwanted information in social networks // VIII International scientific-technical and scientific-methodological Conference "Actual problems of infotelecommunications in science and education" (APINO 2019). St. Petersburg, February 27-28, 2019 (collection of scientific articles)T. 1., p. 317-320 https://www.sut.ru/doci/nauka/1AEA/APINO/8-APINO%202019.%20Ò.1.pdf // https://www.elibrary.ru/item.asp?id=41383545 (in Russian).
  20. Vasily Desnitsky, Igor Kotenko, Igor Parashchuk. Methodology for evaluating the effectiveness of network content processing systems for detecting malicious information, taking into account the elimination of uncertainties in the semantic content of information objects // International Conference on Soft Computing and Measurements. T. 1. P. 62-65. 2019. // https://www.elibrary.ru/item.asp?id=38309100 (in Russian).
  21. Alexandr Branitskiy, Vasily Desnitsky. Approach to adaptation and retraining of system for analyzing the information objects // In the book: Promising directions of development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 62-64. // https://elibrary.ru/item.asp?id=42944524 (in Russian).
  22. Vasily Desnitsky, Andrey Fedorchenko. Modeling processes of protection against attacks of energy exhaustion in cyberphysical systems // Materials of V interregional scientific-practical conference Advanced national information systems and technologies, September 24-28, p. 282-284, 2019. https://www.elibrary.ru/item.asp?id=42944610 (in Russian).
  23. Vasily Desnitsky, Elena Doinikova, Andrey Fedorchenko, Alexander Branitsky. Modeling and analysis of intruder actions in wireless sensor networks // Proceedings of the II International Scientific and Practical Conference "Digital Region: Experience, Competencies, Projects". Ed. Bryansk State Engineering and Technology University. P. 237-240. 2019. https://www.elibrary.ru/item.asp?id=42462480 (in Russian).
  24. Vasily Desnitsky, Nikolay Rudavin, Alexey Meleshko. Analysis of attacking effects of the Denial-of-Sleep type in cyber-physical systems // In the collection: New information technologies and systems. Collection of scientific articles of the XVI International Scientific and Technical Conference. 2019. pp. 216-218. https://www.elibrary.ru/item.asp?id=41508390 (in Russian).
  25. Vasily Desnitsky. Modeling and analysis of cyberphysical attacks of the depletion of energy resources of the devices of the Internet of things systems // Collection of abstracts of the participants of the II International Scientific Conference "Science of the Future - Science of the Young" IV All-Russian Forum "Science of the Future - Science of the Young" May 14-17, 2019, Sochi, Russia. Ed. LLC "Inconsult K", p. 115. 2019. ISBN 978-5-9500875-1-6. (in Russian).
  26. Vasily Desnitsky, Nikolay Rudavin. Analysis of atacking influences on unmanned aerial vehicles // The V interregional scientific and practical conference "Perspective directions of development of domestic information technologies". September 24-28, 2019, Russia, Sevastopol. pp. 318-319. // https://elibrary.ru/item.asp?id=42944626 (in Russian).
  27. V.A. Desnitsky, N.N. Rudavin. Analysis of attacking effects on unmanned aerial vehicles // In the book: Promising directions of development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 318-319. https://www.elibrary.ru/item.asp?id=42944626 (in Russian).
  28. V.A. Desnitsky, Yu.A. Svintsov. Approaches to the analysis of security of hardware-software components of wireless sensor networks // In the book: Promising directions for the development of domestic information technologies. materials of the V interregional scientific and practical conference. Sevastopol State University; St. Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences. Sevastopol, 2019. pp. 320-321. https://www.elibrary.ru/item.asp?id=42944627 (in Russian).

2018

  1. Vasily Desnitsky, Igor Kotenko. Security event analysis in XBee-based wireless mesh networks // Â ñáîðíèêå: Proceedings of the 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2018. 2018. Ñ. 42-44. DOI: 10.1109/EIConRus.2018.8317025 // https://elibrary.ru/item.asp?id=35749402
  2. Igor Kotenko, Igor Saenko, Andrey Chechulin, Vasily Desnitsky, Lidia Vitkova, Anton Pronoza. Monitoring and counteraction to malicious influences in the information space of social networks // Â ñáîðíèêå: 10th International Conference on Social Informatics (SocInfo). 2018. Ñ. 159-167. DOI: 10.1007/978-3-030-01159-8_15 // https://elibrary.ru/item.asp?id=35677138
  3. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. Ensuring Availability of Wireless Mesh Networks for Crisis Management // Studies in Computational Intelligence. 2018. Ò. 798. Ñ. 344-353. DOI: 10.1007/978-3-319-99626-4_30 // https://elibrary.ru/item.asp?id=35751016
  4. Vasily Desnitsky, Igor Kotenko. Analysis of Energy Resource Depletion Attacks on Wireless Devices // Journal of Instrument Engineering. 2018. Vol.61.No.4. P.291-297.DOI: 10.17586/0021-3454-2018-61-4-291-297 https://cyberleninka.ru/article/n/analiz-atak-istoscheniya-energoresursov-na-sistemy-besprovodnyh-ustroystv/viewer // https://www.elibrary.ru/item.asp?id=32836535 (in Russian).
  5. Vasily Desnitsky, Igor Kotenko, Nikolay Rudavin. An Approach to Ensuring Availability in Wireless Networks for Ñrisis Management // Scientific and analytical journal Bulletin of St. Petersburg University of the State Fire Service EMERCOM of Russia. 2018. No.3. P.92-96. // https://elibrary.ru/item.asp?id=36263688 (in Russian).
  6. Vasily Desnitsky, Nikolay Rudavin. Modeling and analysis of energy exhaustion attacks in digital city systems // Information Technology and Telecommunications. 2018. Vol. 6, No.3. P. 10-18. https://www.sut.ru/doci/nauka/ITT/10-18.pdf // https://elibrary.ru/item.asp?id=37179956 (in Russian).
  7. Anastasia Balueva, Vasily Desnitsky. Secure data transfer protocol for the internet of things on raspberry Pi Example // Information Technology and Telecommunications. 2018. Vol. 6. No.4. P. 10-20 https://www.sut.ru/doci/nauka/1AEA/ITT/2018_4/10-20.pdf // https://www.elibrary.ru/item.asp?id=41162088 (in Russian).
  8. Vasily Desnitsky. Feasibility analysis of resource exhaustion attacks on unmanned aerial vehicles // Journals - Herald of Modern Research. 2018. Nr. 12.5 (27). P. 100-102. https://elibrary.ru/download/elibrary_36709001_32704293.pdf // https://www.elibrary.ru/item.asp?id=36709001 (in Russian).
  9. Vasily Desnitsky, Alexander Branitskiy. Principles of adaptation and retraining of a system for analyzing information objects for protection against inappropriate and malicious information // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 404–407. // https://elibrary.ru/item.asp?id=37028986 (in Russian).
  10. Vasily Desnitsky, Nikolay Rudavin. Approach to security analysis of wireless self-organizing network for crisis management // Proceedings of the conference "Information technologies in management" (ITU-2018). St. Petersburg. October 2-4, 2018. SPb.: Concern Central Research Institute Electropribor JSC, 2018, P. 488-492. // https://www.elibrary.ru/item.asp?id=37029003 (in Russian).
  11. Alexander Branitskiy, Vasily Desnitsky. Substantiation of requirements for adaptation and retraining of system of analysis of information objects for protection against unwanted and harmful information // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 120-122. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf // https://elibrary.ru/item.asp?id=46484187 (in Russian).
  12. Vasily Desnitsky. Analysis of denial-of-sleep attacks on IoT devices // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 129-131. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf https://www.elibrary.ru/item.asp?id=46486372 (in Russian).
  13. Nikolay Rudavin, Vasily Desnitsky. Construction of system components for managing availability of zigbee networks // XVI Anniversary Saint-Petersburg International Conference "Regional informatics-2018 (RI-2018)". St. Petersburg, Russia. October 24-26, 2018. Proceedings. P. 165-167. http://www.spoisu.ru/files/ri/ri2018/ri2018_materials.pdf https://www.elibrary.ru/item.asp?id=46488011 (in Russian).
  14. Alexey Meleshko, Vasily Desnitsky. Security Incident Modeling in a Water Supply Management System // In the collection: Actual problems of infotelecommunications in science and education (APINO 2018). VII International Scientific-technical and scientific-methodical conference. Collection of scientific articles. In 4 volumes. Edited by S.V. Bachevsky. 2018. pp. 301-306. https://www.sut.ru/doci/nauka/7apino/APINO%202018-T2.pdf // https://elibrary.ru/item.asp?id=35428316&pff=1 (in Russian).
  15. Pavel Dumenko, Vasily Desnitsky. An approach to development and evaluation of a protocol for remote attestation of Java programs // Actual problems of informational communication in science and education (ÀPINO 2018). VII International technical science and methodical science conference. Compilation of papers. In 4 volumes. Edited by S.V. Bachevskiy. 2018. Volume 1. P. 280-285. https://www.sut.ru/doci/nauka/7apino/Sb_APINO%202018_Ò_1.pdf // https://elibrary.ru/item.asp?id=35231575&pff=1 (in Russian).
  16. Vasily Desnitsky. Rule based rerelation of energy resource exhaustion attacks in wireless sensor networks // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018. P. 247-248. // https://www.elibrary.ru/item.asp?id=36570193 (in Russian).
  17. Vasily Desnitsky. An approach to providing availability in wireless sensor networks for crisis management // Perspective directions of development of domestic information technologies: materials of the IV interregional scientific and practical conference. Sevastopol, September 18-22, 2018 P. 63-64. https://elibrary.ru/download/elibrary_36569973_64647042.pdf // https://www.elibrary.ru/item.asp?id=36569973 (in Russian).
  18. Vasily Desnitsky, Igor Kotenko Machine learning based detection of DENIAL-OF-SLEEP attacks in wireless sensor networks for crisis management // Proceedings of XXI International Conference on Soft Computing and Measurements (SCM-2018). Saint-Petersburg, Russia,May 23-25, 2018. Vol.1. P.431-433 // https://elibrary.ru/item.asp?id=35619840 (in Russian).

2017

  1. Vasily Desnitsky and Igor Kotenko. Modeling and Analysis of IoT Energy Resource Exhaustion Attacks // Studies in Computational Intelligence - 11th International Symposium on Intelligent Distributed Computing (IDC'2017). Belgrade. Serbia, 11-13 october 2017. Vol.737 P. 263-270. DOI: 10.1007/978-3-319-66379-1_23 // https://elibrary.ru/item.asp?id=31113146
  2. Vasily Desnitsky, Igor Kotenko. Modeling and analysis of security incidents for mobile communication mesh ZigBee-based network // XX International Conference on Soft Computing and Measurements (SCM'2017). Saint-Petersburg, 24–26 may 2017. P.500-502. DOI: 10.1109/SCM.2017.7970629 // https://elibrary.ru/item.asp?id=31032496
  3. Igor Kotenko, Vasily Desnitsky. Ñountering targeted cyber-physical attacks in distributed large-scale critical systems // Information Security. Inside, 2017, ¹4(76), P. 66-69. // https://elibrary.ru/item.asp?id=29966171 (in Russian).
  4. Vasily Desnitsky. An IoTaaS-based approach to design digital city software. Vestnik Sankt-Peterburgskogo Universiteta GPS MChS Rossii. 2017. Issue. 4. P. 94-105. // https://elibrary.ru/item.asp?id=32561545 (in Russian).
  5. Vasily Desnitsky. A modeling and analysis of security incidents in a cyber-physical system for water supply management // Journal Information technologies and telecommunications. 2017. Vol.5, ¹ 3. P. 93-102. // https://elibrary.ru/item.asp?id=30725044 (in Russian).
  6. Vasily Desnitsky, Igor Kotenko. Modeling and analysis of security incidents for mobile communication mesh ZigBee-based network // XX International Conference on Soft Computing and Measurements (SCM'2017),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2017. Vol. 2, P. 39-42. https://elibrary.ru/download/elibrary_29902194_82983224.pdf // https://elibrary.ru/item.asp?id=29902194 (in Russian).
  7. Vasily Desnitsky Desnitsky V.A., Kotenko I.V., Lauta O.S., Sayenko I.B. An approach to the cyber-resilience assessment on the basis of topological conversion of stochastic networks // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). 01-02 March 2017. Conference proceedings. St. Petersburg., 2017. Vol. 2. P.250-255.https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf // https://www.elibrary.ru/item.asp?id=32578164 (in Russian).
  8. Vasily Desnitsky, Nikolai Ostrouschenko.A model of the secure mobile communication network for support and operational management in emergency situations // VI International Conference on Advanced Info-Telecommunication (ICAIT 2017). 01-02 March 2017. Conference proceedings. St. Petersburg., 2017. Vol. 2. P. 255-260. https://www.sut.ru/doci/nauka/6apino/apino2017-2.pdf // https://elibrary.ru/item.asp?id=32578166&pff=1 (in Russian).
  9. Vasily Desnitsky. Evaluation of wireless device protection from energy exhaustion attacks // International congress IS&IT – International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 2-9, 2017. Vol. 2. pp. 343-349. (in Russian).
  10. Vasily Desnitsky. Modeling and security analysis of a communication network for crisis managament on the base of xbee devices // X St. Petersburg Interregional Conference "Information Security of the regions of Russia" (IBRR-2017). November 1-3, 2017.Proceedings. Issue 4. St. Petersburg: SPOISU P. 221-223 https://www.elibrary.ru/download/elibrary_35276202_89146554.pdf // https://elibrary.ru/item.asp?id=35276202 (in Russian).
  11. Vasily Desnitsky. Äåñíèöêèé Â.À. Analysis of energy resource exhaustion attacks on xbee-based nodes in wireless sensor networks. The All-Russian Forum "The System of Distributed Situation Centers as the Basis for Digital Transformation of Public Administration" (SDSC-2017), Ð.Ñ.146-147 (in Russian).
  12. Vasily Desnitsky. Analysis of attacking influences on energy resource exhaustion in Internet of Things systems. XIX scientific-practical conference «RusCrypto’2017». Moscow Region, Solnechnogorsk, March 22-24, 2017. http://www.ruscrypto.ru/. (in Russian).

2016

  1. Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin and Igor Kotenko. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System// Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), June, 2016 Vol.7, No.2, P.60-80. http://isyou.info/jowua/papers/jowua-v7n2-4.pdf DOI: 10.22667/JOWUA.2016.06.31.060 // https://elibrary.ru/item.asp?id=27036091
  2. Vasily Desnitsky and Igor Kotenko. Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge // Journal of Ambient Intelligence and Humanized Computing (AHIC), Springer. October 2016, Volume 7, Issue 5, P.705–719. DOI 10.1007/s12652-016-0371-6. http://link.springer.com/article/10.1007/s12652-016-0371-6 // https://www.elibrary.ru/item.asp?id=27575769 (WoS and Scopus)
  3. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System // 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016). Heraklion, Crete,2016 February 17-19. IEEE Computer Society P.609-616. DOI: 10.1109/PDP.2016.99 // https://elibrary.ru/item.asp?id=27160200
  4. Vasily Desnitsky, Igor Kotenko. Event analysis for security incident management on a perimeter access control system // XIX International Conference on Soft Computing and Measurements (SCM'2016), Saint Petersburg, 25–27 may 2016 P.481-483. DOI: 10.1109/SCM.2016.7519819 // https://elibrary.ru/item.asp?id=27586770
  5. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System // SPIIRAS Proceedings. 2016. Issue 48. P.5-31. DOI: 10.15622/sp.48.1 // https://elibrary.ru/item.asp?id=27177922 (in Russian).
  6. Vasily Desnitsky, Dmitry Chaly. Client/server-based approach to software protection of internet of things // Technical sciences-from theory to practice // Technical sciences - from theory to practice. 2016. No. 11 (59). pp. 6-13. // https://elibrary.ru/item.asp?id=27450831 (in Russian).
  7. Vasily Desnitsky. An approach to information flow verification of Internet of things systems // Journal "Methods and technical means of ensuring information security" // 25th scientific and Technical conference "Methods and technical means of ensuring information security". July 4-July 7, 2016 St. Petersburg. Materials. Polytechnic University Press ¹ 25 P.34-35. https://www.elibrary.ru/item.asp?id=36546748 (in Russian).
  8. Vasily Desnitsky, Andrey Chechulin. Information flow verification technique for Internet of things systems // XV Ànniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.156-157. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=32608615&pff=1 (in Russian).
  9. Vasily Desnitsky, Igor Kotenko, Yan Kopchak. Analysis of events for management of security incidents on the example of access control system // International Conference on Soft Computing and Measurements. 2016. Vol. 2. pp. 332-336. https://www.elibrary.ru/download/elibrary_27187696_81386086.pdf // https://elibrary.ru/item.asp?id=27187696 (in Russian).
  10. Vasily Desnitsky. Detection of anomalous data from sensors embedded devices based on expert knowledge // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.676-679. // https://elibrary.ru/item.asp?id=27559696&pff=1 (in Russian).
  11. Vasily Desnitsky. Implementation of software means for model checking based verification of network data flows // 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 4–6, 2016. P.680-683. // https://elibrary.ru/item.asp?id=27559697&pff=1 (in Russian).
  12. Vladislav Alexandrov, Vasily Desnitsky, Dmitry Chaly. Development and security analysis of a fragment of Internet of Things system. Modeling and Analysis of Information Systems. Volume 23, issue 26. 2016. P.767-776. (in Russian).
  13. Vasily Desnitsky, Dmitry Levshun. The choice and combination of elements for the construction of an integrated system of cyber-physical security // 18th International Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ (in Russian).
  14. Vasily Desnitsky. Detection of anomalous data from sensors in the information and telecommunication systems with embedded devices// International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol.1. P.217-223. (in Russian).
  15. Vasily Desnitsky, Vladislav Alexandrov. Model intruder information and telecommunication systems of the Internet of Things // Anniversary XV St. Petersburg International Conference " Regional Informatics-2016 (RI-2016)" St. Petersburg, October 26-28, 2016. P.155-156. http://www.spoisu.ru/files/ri/ri2016/ri2016_materials.pdf // https://elibrary.ru/item.asp?id=35091301&pff=1 (in Russian).

2015

  1. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detection of Anomalies in Data for Monitoring of Security Components in the Internet of Things // Proceedings of International Conference on Soft Computing and Measurements, SCM 2015. 18. 2015. P. 189-192. DOI: 10.1109/SCM.2015.7190452 // https://elibrary.ru/item.asp?id=26956584
  2. Vasily Desnitsky, Igor Kotenko. Design and Verification of Protected Systems with Integrated Devices Based on Expert Knowledge // Automatic Control and Computer Sciences. 2015. Vol. 49. ¹ 8. Ñ. 648-652. DOI: 10.3103/S0146411615080246 // https://elibrary.ru/item.asp?id=27137072
  3. Vasily Desnitsky, Elena Doynikova. Architecture and effectiveness evaluation of software tool for configuring security components of systems with embedded devices // Technical sciences - from theory to practice. 2015. No. 52. pp. 9-13. // https://www.elibrary.ru/item.asp?id=25026425 (in Russian).
  4. Elena Doynikova, Vasily Desnitsky. Generator of the random attack sequences for the computer network on the base of the CAPEC attack patterns // Technical sciences - from theory to practice. 2015. No. 51. pp. 11-16. // https://www.elibrary.ru/item.asp?id=24395535 (in Russian).
  5. Vasily Desnitsky, Igor Kotenko. Formation of the expertise to develop secure systems with embedded devices. Problems of information security, Computer systems, 2015. ¹ 4, P.35-41.// https://elibrary.ru/item.asp?id=25817955 (in Russian).
  6. Vasily Desnitsky. A technique for evaluation resource consumption of security components of information and telecommunication systems with embedded devices // Ìåòîäû è òåõíè÷åñêèå ñðåäñòâà îáåñïå÷åíèÿ áåçîïàñíîñòè èíôîðìàöèè. 2015. ¹ 24. Ñ. 69-70. // https://docs.yandex.ru/docs/view?url=ya-disk-public%3A%2F%2FqA%2B%2BbqJsf46QKlC8IMmnap318%2FL2eHqbf%2FpzT8otpZmRS7xVOIbXmgflUTAGPt%2FwskEAmkQ4kXOg0TR8ZsXayQ%3D%3D&name=Ìàòåðèàëû-êîíôåðåíöèè-2015.pdf&nosw=1 // https://www.elibrary.ru/item.asp?id=36546625 (in Russian).
  7. Vasily Desnitsky. A technique for revelation of functional and non-functional incompatibilities of security components of embedded devices of information and telecommunication systems // // Methods and technical means of ensuring information security. 2015. No. 24. pp. 70-71. // https://www.elibrary.ru/item.asp?id=36546626 (in Russian).
  8. Vasily Desnitsky. Configuring security components of embedded devices on the base of a heuristic approach. Technical sciences – from theory to practice, ¹ 46, 2015. P.16-20. (in Russian).
  9. Vasily Desnitsky. A technique for evaluation resource consumption of security components for systems with embedded devices. Technical sciences – from theory to practice, ¹ 47, 2015. P.14-18. (in Russian).
  10. Vasily Desnitsky. Models of the development process for combined protection mechanisms for information and telecommunication systems with embedded devices. International congress "IS&IT15" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2015. Vol. 2. P.113-118. (in Russian).
  11. Vasily Desnitsky. A model of a configuration of embedded device security components. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.65-66. (in Russian).
  12. Vasily Desnitsky. A technique for evaluation of embedded device security components. // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.66-67. (in Russian).
  13. Vladislav Aleksandrov, Vasily Desnitsky, Sergey Bushuev. Development and analysis if a fragment of a secure Internet of Things system IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.56-57. (in Russian).
  14. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detection of anomalies in data for monitoring of security components in the internet of things. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2015. P.17-22.// https://elibrary.ru/item.asp?id=25016045 (in Russian).
  15. Sergey Bushuev, Vasily Desnitsky. Formation of expertise for the development of secure systems, "Internet of Things". 17th International Conference “RusCrypto`2015”, Solnechnogorsk, March 17-20, 2015. http://www.ruscrypto.ru/ (in Russian).

2014

  1. Vasily Desnitsky, Igor Kotenko. Expert Knowledge based Design and Verification of Secure Systems with Embedded Devices // Lecture Notes in Computer Science. 2014. Ò. 8708. Ñ. 194-210. DOI: 10.1007/978-3-319-10975-6_15 // https://elibrary.ru/item.asp?id=41765429
  2. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Features of the information security systems design in cyber-physical systems // Methods and technical means of ensuring information security. 2014. No. 23. pp. 67-69. https://www.elibrary.ru/item.asp?id=36467256 (in Russian).
  3. Vasily Desnitsky, Andrey Chechulin. Verification of information and telecommunication systemms with embedded devices on the base of generalized intuder model // Methods and technical means of ensuring information security. 2014. No. 23. pp. 66-67. https://www.elibrary.ru/item.asp?id=36467255 (in Russian).
  4. Vasily Desnitsky. Conceptual combined model of the protection system of embedded devices // Innovations in science. 2014. No. 38. pp. 55-59. https://www.elibrary.ru/item.asp?id=22456885 (in Russian).
  5. Vasily Desnitsky. Development of knowledge model for design and secure embedded devices. Natural and mathematical science in the modern world. 2014, ¹23, P.35-40. https://www.elibrary.ru/item.asp?id=22286126 (in Russian).
  6. Vasily Desnitsky, Andrey Chechulin. Generalized intruder model and verification of information systems with embedded devices // Technical sciences - from theory to practice. 2014. No. 39. pp. 7-21. // https://elibrary.ru/item.asp?id=22562560 (in Russian).
  7. Vasily Desnitsky, Igor Kotenko. Configuring information systems with embedded devices to provide complex security on railway transport // Methods and technical means of ensuring information security. 2014. No. 23. pp. 89-90. https://www.elibrary.ru/item.asp?id=36467267 (in Russian).
  8. Vasily Desnitsky, Igor Kotenko. Combined protection model of information and telecommunication systems of Internet of Things concept // Methods and technical means of ensuring information security. 2014. No. 23. pp. 65-66. // https://elibrary.ru/item.asp?id=36467254 (in Russian).
  9. Vasily Desnitsky. Verification of network information flows of the systems with embedded devices on the basis of expert knowledge // In the collection: Materials of the conference "Information Technologies in Management" (ITU-2014). 2014. pp. 596-600. https://www.elibrary.ru/item.asp?id=22461595 (in Russian).
  10. Vasily Desnitsky, Igor Kotenko. Expert knowledge based design and verification of secure systems with embedded devices // Problems of information security. Computer systems. 2014. ¹ 3, P.16-22. // https://elibrary.ru/item.asp?id=22508068 (in Russian).
  11. Vasily Desnitsky, Igor Kotenko. The use of expert knowledge for development of secure systems with embedded devices Information // Technologies and Computing Systems, 2014. ¹ 4, P.58-73. // https://elibrary.ru/item.asp?id=22509438 (in Russian).
  12. Vasily Desnitsky. Design and verification of security mechanisms for systems with embedded devices on the base of expert knowledge. 16th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  13. Vasily Desnitsky, Elena Doynikova. Development of the defence components for the embedded devices considering expert knowledge // International science and practical conference "Theoretical and applied problems of the information security". June 19, 2014, Minsk, Police Academy, the Republic of Belarus, 2014. (in Russian).
  14. Vasily Desnitsky. Analysis of perspective systems with embedded devices to form expert knowledge in the field of design secure information and telecommunication systems. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.130. (in Russian).
  15. Vasily Desnitsky, Igor Kotenko. Conceptual combined model of embedded device protection system and its application to configuring components of multi-level intellectual system of complex security on railway transport. XIV Saint-Petersburg International Conference “Regional informatics-2014” (“RI-2014”). Proceedings. St. Petersburg, 2014. P.131. (in Russian).

2013

  1. Vasily Desnitsky. A technique for verification of network information flows in information and telecommunication systems with embedded devices // Proceedings of SPIIRAN. 2013. No. 7 (30). pp. 246-257. https://www.elibrary.ru/item.asp?id=20927262 (in Russian).
  2. Vasily Desnitsky, Igor Kotenko. Configurtion based design of secure embedded devices. Problems of information security. Computer systems. 2013. ¹ 1, P.44-54. // https://elibrary.ru/item.asp?id=19121738 (in Russian).
  3. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Verification of information flows for design of secure information systems with embedded devices // High availability systems, 2013. Vol. 9. No. 3. pp. 112-117. // https://elibrary.ru/item.asp?id=21046160 (in Russian).
  4. Vasily Desnitsky. Configuration based combined protection of embedded devices // Innovations in science. 2013. No. 16-1. pp. 64-67. https://www.elibrary.ru/item.asp?id=18766375 (in Russian).
  5. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services providing complex security on rail transport. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P.40-55. // https://elibrary.ru/item.asp?id=20927238 (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure information systems with embedded devices. 15th Conference “RusCrypto”. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  7. Vasily Desnitsky. Verification of information flows in process of development secure systems with embedded devices. 22th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2013)”. Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.17-18. (in Russian).
  8. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services of multi-level intelligent system of rail transport complex security. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.91-92. (in Russian).
  9. Vasily Desnitsky. Information flow verification in systems with embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.92-93. (in Russian).
  10. Vasily Desnitsky. A technique for configuring secure embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.93-94. (in Russian).

2012

  1. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration-based approach to embedded device security. Lecture Notes in Computer Science, Springer-Verlag // Lecture Notes in Computer Science. 2012. Ò. 7531 LNCS. Ñ. 270-285. DOI: 10.1007/978-3-642-33704-8_23 // https://elibrary.ru/item.asp?id=20474247
  2. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. An Approach for Network Information Flow Analysis for Systems of Embedded Components // Lecture Notes in Computer Science. 2012. Ò. 7531 LNCS. Ñ. 146-155. DOI: 10.1007/978-3-642-33704-8_13 // https://elibrary.ru/item.asp?id=20474240
  3. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuring of combined protection components for embedded devices by solving optimality task // Highly Available Systems. 2012. Ò. 8. ¹ 2. Ñ. 50-56. eLIBRARY ID: 17997821 (in Russian).
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration of secure systems with embedded and mobile devices // Information security issues. 2012. No. 2 (97). pp. 20-28. // https://elibrary.ru/item.asp?id=17795186 (in Russian).
  5. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Information flow analysis techniques for development of secure systems which includes embedded systems // High availability systems. 2012. Vol. 8. No. 2. pp. 116-122 // https://elibrary.ru/item.asp?id=17997830 (in Russian).
  6. Vasily Desnitsky, Igor Kotenko. A model for configuring protected and energy-efficient embedded systems. Journal of Instrument Engineering, Vol.55, ¹ 11, 2012. P.52–57. // https://www.elibrary.ru/item.asp?id=18045936 (in Russian).
  7. Vasily Desnitsky. Configuration model for combined protection of information systems with embedded devices. VII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2011)", Saint-Petersburg. The proceedings of conference, 2012. P.77-83. (in Russian).
  8. Jose Fran. Ruiz, Vasily Desnitsky. Design of protected telecommunication systems with embedded devices. 14th Conference “RusCrypto'2012”. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  9. Vasily Desnitsky, Igor Kotenko. Configuring information and telecommunication systems with embedded devices. 21th All-Russian Conference “Methods and technical tools of information security”(MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012.P.14-17. (in Russian).
  10. Andrey Chechulin, Vasily Desnitsky, Igor Kotenko. Information flow analysis for development of secure systems with embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.35-37. (in Russian).
  11. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities between security components in design process of secure embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.17-19. (in Russian).
  12. Vasily Desnitsky. Modeling of non-functional protection properties in the process of configuration of secure embedded devices. 21th Àll-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.12-14. (in Russian).
  13. Vasily Desnitsky. Configuring combined protection components for embedded system protection on the base of solving optimality task. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P.383-384. (in Russian).
  14. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure embedded systems in European Union project SecFutur. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 9–11, 2012. P.699-708. // https://www.elibrary.ru/item.asp?id=21718338 (in Russian).
  15. Vasily Desnitsky. Analysis of approaches to development of anytime algorithms to solve computationally complex problems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.90. (in Russian).
  16. Vasily Desnitsky. Configuring secure embedded devices on the base of non-functional protection properties. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.91. (in Russian).
  17. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities of security components in embedded devices. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.93. (in Russian).
  18. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Using anytime algorithms of attack modeling and security evaluation in SIEM systems. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P. 92. (in Russian).
  19. Andrey Chechulin, Vasily Desnitsky. Information flow analysis in the task of embedded system analysis. XIII Saint-Petersburg International Conference “Regional informatics-2012” (“RI-2012”). Proceedings. St. Petersburg, 2012. P.129. (in Russian).
  20. Vasily Desnitsky. Development of model and software tool for configuring and security control in corporative distributed information systems with embedded and mobile devices. XVII St. Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.195. (in Russian).
  21. Jose Fran. Ruiz, Vasily Desnitsky, Rajesh Harjani, Antonio Manna, Igor Kotenko and Andrey Chechulin. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components // Â ñáîðíèêå: Proceedings - 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012. 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012. Garching, 2012. Ñ. 261-268. DOI: 10.1109/PDP.2012.36 // https://www.elibrary.ru/item.asp?id=17990791

2011

  1. Vasily Desnitsky. Configuring embedded and mobile devices on the basis of solving an optimization problem // Proceedings of SPIIRAN. 2011. No. 4 (19). p. 221. https://www.elibrary.ru/item.asp?id=17288946 (in Russian).
  2. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. An abstract model for embedded systems and intruders // Proceedings of the Work in Progress Session held in connection with the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, February 2011. SEA-Publications. SEA-SR-29. 2011. P.25-26. ISBN 978-3-902457-29-5. // https://www.elibrary.ru/item.asp?id=28132924
  3. Vasily Desnitsky, Andrey Chechulin. Models of development of secure embedded systems // High availability systems. 2011. Vol. 7. No. 2. pp. 97-101.// https://www.elibrary.ru/item.asp?id=17098471 (in Russian).
  4. Igor Kotenko, Vasily Desnitsky, Andrey Chechulin. Investigation of technologies for secure embedded systems design in European Union project SecFutur. Information Security. Inside, ¹ 3(39), 2011. P.68-75.// https://www.elibrary.ru/item.asp?id=23134338 (in Russian).
  5. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Constructing and testing secure embedded systems. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Selected Proceedings. St. Petersburg, 2011. P.115-121. // https://www.elibrary.ru/item.asp?id=29293611 (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Abstract model for embedded secure systems. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  7. Andrey Chechulin, Vasily Desnitsky. Intruder model for provision of embedded systems security. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  8. Vasily Desnitsky, Andrey Chechulin. Unification of a process of secure embedded systems construction. 13th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  9. Vasily Desnitsky. The model of a unified process for development of secure embedded systems. 20th All-Russian Conference “Methods and technical tools of information security” (MTTIS 2011)”. Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.15-16. (in Russian).
  10. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration model for combined protection of information systems with embedded devices. VII St.Petersburg Interregional Conference «Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69-70. (in Russian).
  11. Vasily Desnitsky. Configuring effectiveness evaluation for combined protection mechanisms on the basis of optimality problem solving. VII St.Petersburg Interregional Conference “Information Security of Russian Regions (IBRR-2011)”. October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69. (in Russian).

2010

  1. Vasily Desnitsky, Igor Kotenko. Combined protection of software from unauthorized modifications // News of higher educational institutions. Instrumentation. 2010. Vol. 53. No. 11. pp. 36-41. // https://www.elibrary.ru/item.asp?id=15503308 (in Russian).
  2. V. Desnitsky, I. Kotenko. Protectability and scalability of software protection mechanism based on remote entrusting principles // Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, 2010. Vol.52, P.50-67 // https://www.elibrary.ru/item.asp?id=23938231 (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Security and Scalability of Remote Entrusting Protection // Lecture Notes in Computer Science. 2010. Ò. 6258 LNCS. Ñ. 298-306. DOI: 10.1007/978-3-642-14706-7_23 // https://www.elibrary.ru/item.asp?id=16978659
  4. Vasiliy Desnitsky, Igor Kotenko. Development and analysis of remote entrusting protocol. VI St.Petersburg Interregional Conference “Information Security of Russian Regions” (IÂRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2010. P.121-129. ISBN 978-5-904031-95-4. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko. Software protection based on the principle of remote entrusting. 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P.159-163. ISBN 978-5-94057-693-8. (in Russian).
  6. Vasiliy Desnitsky, Igor Kotenko. Combined mechanisms to protect software from unauthorized modifications. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.100-101. (in Russian).
  7. VasilyDesnitsky. Technique of finding the optimum combination of protection methods to protect software from interventions. ÕIX All-Russian Conference “Methods and technical tools of information security” (MTTIS 2010)”. Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.9-10. (in Russian).
  8. Vasiliy Desnitsky, Andrey Chechulin, Igor Kotenko. Configuration model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.41-42. ISBN 978-5-904031-99-2. (in Russian).
  9. Vasiliy Desnitsky, Andrey Chechulin. Abstract model of embedded devices. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.40-41. ISBN 978-5-904031-99-2. (in Russian).
  10. Andrey Chechulin, Vasily Desnitsky, Mikhail Stepashkin. Intruder model in the task of security assurance of embedded system. XII Saint-Petersburg International Conference “Regional informatics-2010” (“RI-2010”). Proceedings. St. Petersburg, October 20-22, 2010. P.150. ISBN 978-5-904031-99-2. (in Russian).

2009

  1. Vasily Desnitsky, Igor Kotenko. Analysis and Design of Entrusting Protocol for Distributed Software Protection. Proceedings of the Work in Progress Session heldin connection with the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. February 2009. SEA-Publications: SEA-SR-21. 2009. P.8-9.
  2. Vasily Desnitsky, Igor Kotenko. Design of Entrusting Protocols for Software Protection // Lecture Notes in Geoinformation and Cartography. Ñåð. "Information Fusion and Geographic Information Systems - Proceedings of the 4th International Workshop, IF and GIS 2009" 2009. Ñ. 301-316. DOI: 10.1007/978-3-642-00304-2_21 // https://www.elibrary.ru/item.asp?id=20547380
  3. V.A. Desnitskiy, I.V. Kotenko. Methods of software protection based on the principle of remote trust // Information protection. Inside. 2009. No. 6 (30). pp. 57-61. // https://www.elibrary.ru/item.asp?id=23168407 (in Russian).
  4. Vasily Desnitsky, Igor Kotenko. Design and Analysis of Remote Entrusting Protocol. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko. Approach to Software Protection based on Remote Entrusting Mechanism. 11th Conference “RusCrypto” on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  6. Vasily Desnitsky. Configutation of software protection mechanism by means of security policies. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.97-98. (in Russian).
  7. Vasily Desnitsky. Scalability and security of protection mechanism on the basis of the remote entrusting principle. VI St.Petersburg Interregional Conference «Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.98. (in Russian).
  8. Vasily Desnitsky, Igor Kotenko. Performance and Scalability of Remote Entrusting Protection. Second International Workshop on Remote Entrusting (RE-TRUST 2009). September 30 - October 1, 2009. Riva del Garda, Italy, 2009.
  9. Igor Kotenko, Vasily Desnitsky. Aspect-oriented implementation of the remote trust-based software protection model. Information Technologies and Computing Systems, ¹4, 2009. P.67-76. // https://www.elibrary.ru/item.asp?id=13090468 (in Russian).

2008

  1. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on “Remote Entrusting” mechanism // Information Security. Inside, No.5(23), 2008. P.68-74. // https://elibrary.ru/item.asp?id=23274066 (in Russian).
  2. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on “Remote Entrusting” mechanism // Information Security. Inside, No.4(22), P.59-63, 2008. // https://elibrary.ru/item.asp?id=23274050 (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on “Remote Retrusting” Mechanism. V Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. Selected Proceedings. St.Petersburg, 2008. P.172-177. (in Russian).
  4. Vasily Desnitsky, Igor Kotenko. Software protection model based on remote entrusting mechanism. News of High schools. Journal of Instrument Engineering, Vol.51, ¹11, 2008. P.26-31. ISSN 0021-3454.// https://elibrary.ru/item.asp?id=11675981 (in Russian).
  5. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for software protection based on “Remote Entrusting”. ÕVII All-Russian Conference “Methods and technical tools of information security” (MTTIS 2008)”. Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for “Remote Entrusting” mechanism. International Conferences “Intelligent systems (AIS 2008)” and “Intelligent CAD (CAD-2008)”. Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  7. Vasily Desnitsky. Design and Analysis of Protocol for Protecting the Programs against Malicious Modifications. XI International Conference “Regional informatics-2008” (“RI-2008”). Proceedings. St. Petersburg, October 21-23, 2008. P.98-99. (in Russian).

2007

  1. Vasily Desnitsky, Igor Kotenko. Models of Remote Authentication for Software Protection. International Conferences “Intelligent systems (AIS'07)” and “Intelligent CAD (CAD-2007)”. Proceedings.Moscow, Fizmatlit, 2007. P.43-50. (in Russian).
  2. Vasily Desnitsky, Igor Kotenko. Remote Authentication for Protection of Programs against Non-authorized Modification. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.81-84. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Model of Protecting the Programs against Non-authorized Changes on the Basis of Remote Trust Mechanism. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.81. // https://www.elibrary.ru/item.asp?id=35099930 (in Russian).
  4. Vasily Desnitsky. Remote Authentication as the Mechanism of Software Protection on Remote Clients. ÕVI All-Russian Conference “Methods and technical tools of information security” (MTTIS 2007)””. June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.5. (in Russian).
  5. Vasily Desnitsky. Aspect-oriented Approach to Mobile Module Realization in Software Protection System. Scientific-practical Symposium “National Information Systems and State Security”. Proceedings. Moscow, Russia. September 2007. P.87-89. (in Russian).
  6. Vasily Desnitsky. Realization of Mobile Module Replacement Mechanism on the Basis of Aspect-oriented Programming Paradigm. V St.Petersburg Interregional Conference “Information Security of Russian Regions (ISRR-2007)”. St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.49-50. http://www.spoisu.ru/files/ibrr/ibrr2007/ibrr2007_materials.pdf // https://www.elibrary.ru/item.asp?id=35099891 (in Russian).

2006

  1. Vasily Desnitsky, Igor Kotenko. Protection of the software against breaking: the analysis of methods. Õ St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.108-109. (in Russian).

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPC RAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page